Download as pdf or txt
Download as pdf or txt
You are on page 1of 71

Cambridge IGCSE™ Information and Communication Technology

Theory Workbook answers


1 Types and components of computer systems
1 a desktop computer
b mouse
c monitor/screen
d keyboard
e solid-state drive (SSD)
f (inkjet) printer
2 Statement Item from list

graphics editing software


Software used to edit bitmap and vector images

Software that obtains data from sensors allowing control and measurement software
computers to monitor and control external activities

Software used to manipulate and organise numerical


data; data is put into grid of numbered rows and spreadsheet
lettered columns
Software running in the background of a computer that operating system
manages most of the basic functions, such as user
interface and memory management
Software that translates a program written in a high- compiler
level language into machine code so that it can be
directly run on the computer
Software that takes one or more object files produced linker
by a language translator and combines them into a
single program that can be run on a computer

Software that enables one or more hardware devices to device driver


communicate with the computer’s operating system

Cambridge IGCSE Information and Communication Technology Teacher's Guide 1


© David Watson 2021
Cambridge IGCSE Information and Communication Technology Theory Workbook answers

3 True False
Statement
(✓) (✓)
A network interface card allows a user to access websites on the

world wide web

Read-only memory (ROM) is a type of non-volatile memory ✓

Spreadsheets and word processors are examples of applications



software
Video cards and sound cards are typical examples of computer

software

Solid-state drives make use of laser light to read and write data ✓

4 a Advantages Disadvantages
Two from: Two from:
• The user is in direct • The user needs to learn a
communication with the number of commands to
computer. carry out basic operations.
• The user is not restricted to a • All commands need to be
CLI
number of pre-determined typed in which takes time
options. and can be error prone.
• It is possible to alter • Each command must be
computer configuration typed in using the correct
settings. format, spelling, and so on.
Two from: Two from:
• The user does not need to • This type of interface uses up
learn any commands. considerably more computer
• It is more user-friendly; icons memory than a CLI interface.
are used to represent • The user is limited to the
GUI applications. icons provided on the screen.
• A pointing device (such as a • It needs an operating system,
mouse) is used to click on an such as Windows, to operate,
icon to launch the application which uses up considerable
– this is simpler than typing memory.
in commands.

b CLI, one from:


• programmer/analyst/technician
• person who needs direct communication with the computer.
GUI: end-user who does not need to know how a computer works

Cambridge IGCSE Information and Communication Technology Teacher's Guide 2


© David Watson 2021
Cambridge IGCSE Information and Communication Technology Theory Workbook answers

5 a i tablet
ii Features of a tablet, two from:
• high definition, anti-glare displays
• front and back facing cameras (which are used to take photos, videos or act as a
webcam when doing video calls over the internet)
• lower weight and longer battery life than laptops
• uses Bluetooth for connection to printers and other devices
• makes use of flash (solid state) memory and cloud storage facilities to back up and
synchronise (often just referred to as 'sync') data sources
• it uses a number of sensors to carry out the following functions:
• proximity sensors to detect if the device is close to, for example, the ear, which
allows it to block unintended 'touches'
• accelerometers, which detect movement and orientation of the device
(for example, move the display from portrait to landscape to view videos, or
allow it to be used as a 'steering wheel' in car racing games, for example)
• sophisticated speech recognition systems (such as Siri) to enable the user to
ask the device to look for things (such as search the address book).
iii Uses of a tablet, two from:
• web browsing
• games
• watching videos
• listening to music
• built in GPS means that it is great for maps and navigating
• reading documents
• very lightweight and portable with relatively long battery life – so any other
activity where this is an advantage.
b i laptop
ii Features of a laptop, two from:
• lightweight (to aid portability)
• low power consumption (and also long battery life)
• the processor shouldn’t generate too much heat (cooling is very important)
• the most obvious feature is its portability; it can be taken anywhere because the
monitor, pointing device, keyboard, processor and backing store units are all
together in one single unit
• because everything is in one single unit, there are no trailing wires (only one single
cord is used)
• it takes up much less room on a desk, so it can be used anywhere (for example,
in a café)
• its portability allows it to take full advantage of WiFi features
• because it is portable, it can link into any multimedia system.

Cambridge IGCSE Information and Communication Technology Teacher's Guide 3


© David Watson 2021
Cambridge IGCSE Information and Communication Technology Theory Workbook answers

iii Uses of a laptop, two from:


• editing documents
• any application that relies on a physical keyboard, such as word processing,
spreadsheets
• laptops are more powerful than tablets so are better for higher-power applications
such as video editing software, music editing software
• any application that requires a larger screen, such as CAD, desktop publishing
• tends to have larger internal storage capacity than a tablet so useful when access to
cloud storage is limited.
c i smartphone
ii Features of a smartphone, two from:
• high definition, anti-glare display
• front and back facing cameras (which are used to take photos, videos or act as
webcams when doing video calls over the internet)
• lower weight and longer battery life than a laptop
• uses Bluetooth for connection to printers and other devices
• makes use of flash (solid state) memory and cloud storage facilities to back-up and
synchronise (often just referred to as 'sync') data sources
• it uses a number of sensors to carry out the following functions:
• proximity sensors to detect if the device is close to, for example the ear, which
allows it to block unintended 'touches'
• accelerometers which detect movement and orientation of the device
(for example, move the display from portrait to landscape to view videos, or
allow it to be used as a 'steering wheel' in car racing games, for example)
• can use sophisticated speech recognitions systems (such as Siri) to enable the
user to ask the device to look for things (such as search the address book).
iii Uses of a smartphone, two from:
• phone calls
• SMS or other messaging services
• other uses are much the same uses as for a tablet, except the small screen size
means that reading documents is more difficult.
6 a i Uses human voice to give verbal commands
• by speaking commands; system allows natural speech to interface with a computer
• a spoken word is compared to stored words on a database so that instructions can
be carried out.
ii Two from:
• in a car to control in-car entertainment (ICE), satnav, and so on
• in the home/office to control lights, air-conditioning system, and so on
• as a personal assistant, such as Alexa, Siri, Cortana, and so on.

Cambridge IGCSE Information and Communication Technology Teacher's Guide 4


© David Watson 2021
Cambridge IGCSE Information and Communication Technology Theory Workbook answers

b i • relies on human interaction by movement of hands, head or feet


• movement picked up by sensors and/or a camera.
ii Two from:
• operate volume on a car stereo by rotating finger to left or right
• pinch action to change tracks or change a radio channel
• moving a foot under the bumper to open the boot lid
• moving a hand near a sensor to, for example, open/close a window or open a door.
7 True False
Statement
(✓) (✓)

Analogue data is made up of a series of discrete, discontinuous values ✓

Random-access memory (RAM) contents cannot be altered by a



computer user
Read-only memory (ROM) contains parts of the operating system

currently in use
Input devices are necessary to allow computers to receive commands

from a user
Output devices are needed by a computer so it can share the results of

its processing with a human

Read-only memory (ROM) can be increased in size to improve the



operational speed of a computer
Solid-state drives (SSD) have a much faster data access time than

internal memory, such as random-access memory (RAM)
Before data on a hard disk drive (HDD) can be read by the CPU, it must

first be moved into random access memory (RAM)

8 a i–iii Three from:


• robotics in industry, for example, welding car bodies, going into dangerous places,
and so on
• autonomous/driverless vehicles
• search engines
• personal assistants, such as Alexa
• face recognition systems
• predictions, such as weather forecasting.
b Positive impacts:
• makes life easier for people
• can carry out many manual tasks better
• improves health care
• crime investigation techniques.

Cambridge IGCSE Information and Communication Technology Teacher's Guide 5


© David Watson 2021
Cambridge IGCSE Information and Communication Technology Theory Workbook answers

Negative impacts:
• AI can lead to many job losses in a number of areas (although it is true to say that new
technical jobs would also be created); most jobs would be lost in manufacturing but it
would be unwise to speculate that other areas wouldn’t be affected (such as bus, taxi
and train drivers)
• dependency on technology by humans; the inability to carry out tasks done by robots,
for example, could be an issue in the future
• loss of skills that are now done by machines and software applications.
9 Features of AR include:
• allows the user to experience the relationship between digital (virtual) and physical
(real) worlds
• virtual information and objects are overlaid onto real-world situations
• the real world is enhanced with digital details, such as images, text and animation
• the user can experience the AR world through special goggles or via
smartphone/tablet screens
• the user is not isolated from the real world and is still able to interact and see what is going
on in front of them
• examples include the Pokémon GO game which overlays digital creatures onto real-world
situations.
Features of VR include:
• the ability to take the user out of the real-world environment into a virtual (unreal) digital
environment
• in contrast to AR, the user is fully immersed in a simulated digital world
• the user must wear a VR headset or a head-mounted display which allows a 360° view of
the virtual world (this 'fools' the brain into believing they are, for instance, walking on an
ocean bed, walking on an alien world or inside a volcano)
• this technology can be used to good effect in: medicine (teaching operation procedures),
construction, engineering and the military.
Impact of AR:
• safety and rescue operations (for example, it is possible to provide 3D images of an area
where a rescue mission is to take place, giving a team the opportunity to interact with the
environment, and try out rescue procedures before doing the real thing)
• entertainment (for example, AR takes users into a virtual environment where it is possible
to interact with the characters)
• shopping and retail (for example, using your smartphone camera, you can try out make-up
and see how it looks on you before buying it; or you can experience a virtual tour of a new
car where you can 'sit' in the interior and try out the driving experience before buying
the car)
• healthcare (doctors can make use of AR to have a better understanding of a patient’s body;
software, such as Echopixel enables doctors to use CT scans from patients to build up a 3D
image of their body to help with surgery and diagnosis).

Cambridge IGCSE Information and Communication Technology Teacher's Guide 6


© David Watson 2021
Cambridge IGCSE Information and Communication Technology Theory Workbook answers

Impact of VR:
• military applications (for example, training to operate a new military tank)
• education (for example, looking inside an ancient building as part of a history lesson)
• healthcare (for example, as a diagnostic tool to recommend treatment)
• entertainment (for example, games where gloves, goggles or helmets are worn to give
realism to the scenario and even to give visual or audio to make it seem very real)
• fashion (for example, to do fashion shows before doing the real thing – see the clothes on
people, check out the venue, and so on)
• heritage (for example, allowing users to walk around and up close up to monuments like
Stonehenge)
• business (for example, training courses and role-playing scenarios for staff)
• engineering (for example, seeing how new designs like bridges will look in an existing
environment)
• sport (for example, a golfer trying to improve their swing can use this technology and get
feedback to improve their game)
• media (for example, interactive special effects in movies)
• scientific visualisation (for example, seeing part of a molecular structure in chemistry, or
a cell in biology).
10 a basic input-output system (A)
b network interface card (C)
c central processing unit (D)
d command line interface (C)
e analogue to digital converter (B)

2 Input and output devices


1
Application Keyboard Touch screen Sensor

Inputting text into a word processor ✓

Inputting temperatures directly in



an industrial control process

Selecting from a menu at an ATM ✓

Inputting moisture levels in a greenhouse



monitoring system
Inputting commands, such as PrntScrn or

Ctrl+P, into a computer
Selecting options at an information system

access point at an airport

Cambridge IGCSE Information and Communication Technology Teacher's Guide 7


© David Watson 2021
Cambridge IGCSE Information and Communication Technology Theory Workbook answers

2 a • optical character recognition/reader


• optical mark recognition/reader.
b OCR OMR
Because this method reads handwriting, it Because this involves shading in lozenges
is possible for customers to extend their to answer set questions, the information
answers to questions obtained is limited to the choices offered in
each question
This method can read handwriting – but if OMR relies on simply detecting where
the handwriting is poor it may cause marks have been made on a page; the
reading errors position of the marks is compared to a
template stored in memory
OCR is used for converting printed OMR simply reads the position of marks so
documents to an editable electronic format it is ideal for multiple-choice exam papers
OCR requires a complex recognition This method requires complex (and
system expensive) forms to be completed; but the
recognition system is simpler than OCR
Fewer 'how to fill in' instructions are Whilst this method requires more 'how to
needed for forms designed to be completed fill in' instructions, it is easier and faster for
and then read by OCR customers to complete OMR forms than to
complete OCR forms
Whilst OCR is more accurate than data OMR is essentially a more accurate method
entered into a computer by keyboard, there for reading data than OCR
are still problems recognising all types of
handwriting, leading to inaccuracies

3 a One from:
• applications where user has limited hand/arm movement
• control room environment to navigate process screens
• luxury cars to select various functions from an onscreen menu.
b One from:
• video/computer games
• used in simulators (such as flight or driving).
c One from:
• control of TVs, DVD/Blu-ray players, hi-fi systems, etc.
• control of multimedia systems
• remote control of machinery, robots, lighting, and so on.
d One from:
• to input sound for presentations, voice-overs, and so on
• voice recognition systems
• to pick up sounds (such as breaking glass) when used in an intruder alert system
• video-conferencing/VoIP.

Cambridge IGCSE Information and Communication Technology Teacher's Guide 8


© David Watson 2021
Cambridge IGCSE Information and Communication Technology Theory Workbook answers

e One from:
• to scan in documents, photos and books into digital format
• to scan in barcodes at checkout terminals.
f One from:
• selecting objects on a CRT screen
• drawing on a CRT screen (for example, when using CAD software).
4 a i An object is built-up layer by layer using materials such as plastic, powdered metal,
and so on.
ii Uses inkjet technology where the print head moves left to right as well as up and down
to build up layers of an object.
iii Uses two passes for each layer; first pass sprays dry powder and second pass sprays a
binding agent.
b

c Three from:
• prosthetic limbs
• reconstructive surgery
• aerospace: making lightweight parts
• fashion and art: developing creative ideas
• museums: duplicating priceless items for display or to buy as gifts (where the original
is too delicate or valuable to put on show).

Cambridge IGCSE Information and Communication Technology Teacher's Guide 9


© David Watson 2021
Cambridge IGCSE Information and Communication Technology Theory Workbook answers

5 a • directly reading the memory card by slotting it into a card reader connected to
the computer
• connecting the camera directly to the computer via USB port
• using wireless/Bluetooth connectivity for data transfer.
b Two from:
• easier to produce better-quality photos
• easier and faster to upload photos to the computer because there is no need to scan
hardcopy photos in first
• no need to develop film: cost, time and environmental issues (of chemicals and
saving paper)
• memory cards can store many thousands of photos in a small space.
c Two from:
• the user needs to be technically literate to use all of the camera features and also to
transfer photos to the computer and carry out manipulation of them
• some artistry is lost because software can now correct errors such as over-exposure, red
eye, non-straight photos, and so on
• may need to compress images for storage which can remove some of the picture
quality.
6 a RFID reader
b OMR
c OCR
d multimedia projector
e laser printer
7

Cambridge IGCSE Information and Communication Technology Teacher's Guide 10


© David Watson 2021
Cambridge IGCSE Information and Communication Technology Theory Workbook answers

8 a A QR code consists of a block of small squares (light and dark) known as pixels. It can
presently hold up to 4296 characters (or up to 7089 digits) and also allows internet
addresses to be encoded within the QR code. This compares to the 30 digits which is the
maximum for a barcode. However, as more and more data is added, the structure of the QR
code becomes more complex.
The three large squares at the corners of the code function as a form of alignment; the
remaining small corner square is used to ensure the correct size and correct angle of the
camera shot when the QR code is read.
b Three from:
• they can hold much more information than a normal barcode
• there are fewer reading errors than with barcodes
• the higher data capacity of the QR code allows the use of built-in error-checking
systems; normal barcodes contain almost no data redundancy (that is, data which is
duplicated) therefore it isn’t possible to guard against badly printed or damaged
barcodes
• QR codes are easier to read; they don’t need expensive laser or LED (light-emitting
diode) scanners like barcodes – they can be read by the cameras used on smartphones
and tablets
• it is easy to transmit QR codes either as text messages or images
• it is also possible to encrypt QR codes, which gives them greater protection than
traditional barcodes.
c Two from:
• more than one QR format is available
• QR codes can be used to transmit malicious codes; known as attagging – because there
are a large number of free apps available to a user for generating QR codes, that means
anyone can do this
• it is relatively easy to write malicious code and embed this within the QR code; when
the code is scanned, it is possible that the creator of the malicious code could gain
access to everything on the user’s smartphone/tablet (for example, photographs,
address book, stored passwords, etc.); the user could also be sent to a fake website or it
is even possible for a virus to be downloaded.
d Point the phone or tablet camera at the QR code. The app will now process the image taken
by the camera, converting the squares into readable data. The browser software on the
mobile phone or tablet automatically reads the data generated by the app. It will also
decode any web addresses contained within the QR code. The user will then be sent to a
website automatically (or if a telephone number was embedded in the code, the user will be
sent to the phone app). If the QR code contained any free entries to attractions, these will
be automatically sent to the user’s phone/tablet.

Cambridge IGCSE Information and Communication Technology Teacher's Guide 11


© David Watson 2021
Cambridge IGCSE Information and Communication Technology Theory Workbook answers

9 Application DDE device


Shaded boxes or lozenges on a paper questionnaire to be read in optical mark reader
directly to a computer (OMR)
To automatically track an item in a distribution centre without the
need for any scanning; the item can be recognised from up to 50 RFID reader
metres away
Device that can read a matrix made up of dark squares on a light
background; these squares represent data which can be read by a QR code reader
smartphone camera
Device that can read alternating dark and light lines, of varying
barcode reader
thickness, that can be used to identify an item
System that can take characters on paper and convert each character optical character
into a form that can be understood by, for example, a word processor reader (OCR)

10 ink cartridges
thermal bubble
piezoelectric
impact
strikes
inked ribbon
noisy and dirty
laser
positively
toner
negatively
fuser
11 Statement True False
(✓) (✓)

Digital cameras use HDD storage to hold the photographs ✓

Light pens only work with CRT monitors ✓

Trackerballs are used in luxury cars to select functions rather than



operate dials and switches

Data from microphones can be directly processed by a computer ✓

Optical mice use light to transmit data directly to the computer ✓

Ergonomic keyboards are much smaller than standard QWERTY



keyboards
Driving (steering) wheels use sensors to detect left/right movement

to give the sensation of steering

Cambridge IGCSE Information and Communication Technology Teacher's Guide 12


© David Watson 2021
Cambridge IGCSE Information and Communication Technology Theory Workbook answers

12 a RFID:
i use:
• livestock tracking (so that the whereabouts of each animal on a farm is known; it
also identifies which farm owns the animal)
• retail (it is similar to barcodes but does not require any scanning; details, such as
price, can be stored on the tag and then automatically read at a checkout – a big
advantage is that several tags can be read at the same time, thus speeding up the
checkout process)
• admission passes (for example, in theme parks RFID cards eliminate the need to
scan or swipe people before 'rides', reducing the waiting time; it also allows the
tracking of people in the theme park and certain information, such as height or age,
can be stored to prevent entry to certain rides on safety grounds)
• libraries (books can be tracked in and out automatically by readers at the library
entrance; there is no need to scan barcodes or magnetic stripe cards making the
process quicker and more accurate).
ii operation:
• they use radio waves to read or capture information stored on a tag
• RFID tags are made up of a microchip and an antenna
• they can be passive or battery-powered.
b Contactless card reader:
i use:
• to allow PIN-less transactions to take place in, for instance, a shop.
ii operation:
• Customers look out for the contactless symbol on the payment terminal.
• The shop assistant enters the amount for payment.
• The card reader informs the customer to present their contactless card.
• The customer holds their card close to the front of the card reader.
• The terminal display will indicate that the card has been read successfully.
13 Description of stage Order of stage
3
3D printer is now set up to allow the solid object to be 'printed'

Finalised drawing is imported into 3D printing software that prepares 2


data in a format understood by the printer
Object removed from the 3D printer and any unwanted material is cut 5
away or washed away to produce a final solid object
Design is made using CAD software or blueprint downloaded from the 1
internet
Solid object is now built up layer by layer; each layer is 0.1 mm thick 4
and printing can take several hours

Cambridge IGCSE Information and Communication Technology Teacher's Guide 13


© David Watson 2021
Cambridge IGCSE Information and Communication Technology Theory Workbook answers

14 Description of use Name of device

To produce high-quality 'one-off' printing, such as a photograph inkjet printer

To make use of continuous stationery and produce multi-part


dot matrix printer
printouts
To produce a prototype for a new machine part to test its
3D printer
functionality

To operate a valve in a computer-controlled chemical process actuator

To produce wage slips (4000 to be printed overnight unattended); a


dot matrix printer
carbon copy is also needed

Produces high-quality printing where high volume is also required laser printer

Produce verbal output from a computer to help a sight-impaired


(loud) speakers
person correct errors in a word-processed document
Produces very large accurate printouts, such as an A0 drawing, on a
(graph) plotter
variety of materials

15 1 = temperature sensor/pH sensor


2 = pH sensor/temperature sensor
3 = analogue to digital converter (ADC)
4 = microprocessor
5 = DAC
6 = actuator
16 a Three from:
• very efficient, low power consumption
• lightweight devices
• don’t suffer from screen image burn-in (that is, permanent image burned into the
screen due to unchanging images over a period of time)
• screens can be made in large range of sizes
• don’t suffer from a flickering image, unlike CRT monitors
• very sharp image resolution (allow a vast range of colours)
• produce low electric, magnetic and electromagnetic fields compared to CRT monitors.
b Two from:
• colour and contrast from varying viewing angles can be inconsistent
• motion blur is a common fault
• lower contrast than CRT monitors, due to poor black level
• LCDs can have many weak or stuck pixels which are permanently on or off; some
pixels may be improperly connected to adjoining pixels, rows or columns
• the LCD panel may not be uniformly illuminated by the back light, resulting in uneven
intensity and shading over the screen.
Cambridge IGCSE Information and Communication Technology Teacher's Guide 14
© David Watson 2021
Cambridge IGCSE Information and Communication Technology Theory Workbook answers

c • faster data entry


• don’t have to carry a mouse/pointing device around with
• don’t need desk space to operate a mouse/pointing device
• can use features such as pinch and rotate
• allow for a virtual keyboard to type in data.
17

18 Advantages of laser printers:


• printing is fast
• they can handle very large print jobs
• the quality is consistently high
• toner cartridges last for a long time (and the printers can sometimes be a cost-effective
option particularly if colour outputs are not required).
Disadvantages of laser printers:
• only much faster than inkjet printer if lots of copies are being made
• colour laser printers tend to be expensive to run (4-colour/black cartridges are needed plus
diffuser kits, which are expensive to purchase)
• they produce ozone and volatile organic compounds because of their method of printing
and type of toner/ink used (these have been linked to health hazards in the office).
Advantages of inkjet printers:
• high-quality output
• cheaper to buy than laser printers
• very lightweight and have a small footprint
• don’t produce ozone and volatile organic compounds, unlike laser printers.

Cambridge IGCSE Information and Communication Technology Teacher's Guide 15


© David Watson 2021
Cambridge IGCSE Information and Communication Technology Theory Workbook answers

Disadvantages of inkjet printers:


• slow output if many copies needed (little buffer capacity to store the pages)
• can’t do large print jobs (ink cartridges run out too quickly)
• printing can 'smudge' if the user is not careful
• can be expensive if used a lot (original ink cartridges are expensive to buy).
Advantages of dot matrix printers:
• they can be used in environments which would be a problem to laser or inkjet printers
(for example, dusty/dirty or moist atmospheres)
• carbon copies or multi-part outputs can be produced
• very cheap to run and maintain
• easy to use if continuous stationery is required (for example, long print jobs such as
wages slips).
Disadvantages of dot matrix printers:
• very noisy – not good in an office environment
• actually cost more than an inkjet printer to buy initially
• very slow, poor-quality printing.

3 Storage devices and media


1 a i the rate at which data can be sent from a storage device to a computer
ii the time it takes to locate the data stored on the storage media
iii an area on a hard-disk platter; a platter is divided up into a number of sectors
iv the time taken for a specific block of data to be found when waiting for the track to
rotate round to the read/write head
v one of the disks in a disk pack
b i They can be made from glass, ceramic or aluminium, coated in iron oxide
(a magnetic substance).
ii Actuators are used to move the read/write heads (voice coils are used as actuators –
similar to the electromagnetics used in speakers).
2 Storage device Magnetic Optical Solid state

hard disk ✓

flash memory card ✓

Blu-ray disk ✓

DVD-RW ✓

memory stick/pen drive ✓

tape drive ✓

Cambridge IGCSE Information and Communication Technology Teacher's Guide 16


© David Watson 2021
Cambridge IGCSE Information and Communication Technology Theory Workbook answers

3 • A blue laser, rather than a red laser, is used in Blu-ray to carry out read and write
operations; the wavelength of blue light is only 405 nanometres (compared to 650 nm
for red light).
• Using blue laser light means that the pits and lands can be much smaller; consequently,
Blu-ray can store up to five times more data than a normal DVD.
• Single-layer Blu-ray discs use a 1.2 mm thick poly-carbonate disk; however, dual-layer
Blu-ray and normal DVDs both use a sandwich of two 0.6 mm thick disks (i.e. 1.2 mm
thick).
• Blu-ray disks automatically come with a secure encryption system which helps to prevent
piracy and copyright infringement.
• The data transfer rate for a DVD is 10 Mbps and for a Blu-ray disc it is 36 Mbps
(this equates to 1.5 hours to store 25 GB of data).
4 a • they are more reliable (no moving parts to go wrong)
• they are considerably lighter (which makes them suitable for laptops)
• they do not have to 'get up to speed' before they work properly
• they have a lower power consumption
• they run much cooler than HDDs (both these points again make them very suitable for
laptop computers)
• because of no moving parts, they are very thin
• SSD data access time is only 0.1 milliseconds compared to 10 milliseconds for a HDD
• data read speed for an SSD is much faster than for a HDD.
b games consoles:
• they are more reliable (no moving parts to go wrong)
• they are considerably lighter (which makes them suitable for laptops)
• they do not have to 'get up to speed' before they work properly
• they have a lower power consumption
• they run much cooler than HDDs
• because of no moving parts, they are very thin
• SSD data access time is only 0.1 milliseconds compared to 10 milliseconds for
HDD – this is better for games consoles which require a high performance level
• data read speed for an SSD is much faster than for a HDD – also better for games
consoles.
mobile phones:
• small size
• do not use much power, which is important for portable devices
• solid stage is more robust than hard drives, so more suited for portable devices which
get knocked around, dropped etc.
• do not generate a lot of heat
• immediate start-up and data transfer
• lightweight.

Cambridge IGCSE Information and Communication Technology Teacher's Guide 17


© David Watson 2021
Cambridge IGCSE Information and Communication Technology Theory Workbook answers

5 CD-ROM DVD-RW Blu-ray


Application
(✓) (✓) (✓)

Supplying software for use on a computer ✓

Backing up files on a regular basis ✓ ✓

Recording of HD 3-hour long movie ✓

Files to support an application which



cannot be altered

6 a

The floating gate is either charged (1) or not charged (0) and stores the data. The
control gate allows the charge to enter or leave the floating gate, i.e. controls the change
in any data.
b • there are questions about the longevity of data held on SSDs
• memory capacity is not as large as a HDD.
7 True False
Statement
(✓) (✓)

Magnetic tapes have a very slow data transfer rate ✓

Hard disk drive (HDD) platters can be made from ceramic material

coated in iron oxide

Hard disk drive (HDD) surfaces can be split up into tracks and sectors ✓

Hard disk drives (HDDs) are more reliable than solid state drives

(SSD)

DVD-Rs are used to read and write data several times ✓

DVD disks and Blu-ray disks can both use dual-layer technology ✓

Solid-state drives (SSDs) suffer from latency ✓

Devices that use solid state technology, known as flash drives,



use NAND chips
Solid-state drive (SSD) data access time is 100 times less than that for

a hard disk drive (HDD)

Memory cards (such as SD and XD) are examples of magnetic media ✓

Cambridge IGCSE Information and Communication Technology Teacher's Guide 18


© David Watson 2021
Cambridge IGCSE Information and Communication Technology Theory Workbook answers

8 Points in the discussion might include:


• High-quality audio files can be stored on hard disk drive systems (set up as sound systems)
rather than requiring CDs.
• Audio files can also be stored in MP3 format on:
• a computer/tablet
• a mobile/smart phone
• a portable music player (such as iPod).
• Users can use the cloud to store all their files so they can access their music from anywhere
in the world – this is not an option with optical media.
• Users can now stream music from the internet; provided that they have an internet
connection, they can access music from providers through a laptop computer, smartphone,
tablet or any other receiving device.
• It is also a similar story for movies and television where streaming is becoming
increasingly more common.
• Many television sets are now set up as smart televisions – this means it is now possible to
simply stream movies or television programmes on demand without the need for any DVD
or Blu-ray players; in effect, the television set has become the central computer with a link
to the internet using a wireless connection.
• Streaming technology does require a strong and stable internet connection – so optical
media is likely to still have a place wherever internet access is patchy or expensive.

9 Wavelength
Disk type Laser colour Disk is constructed from:
of laser light

CD red 780 nm single 1.2 mm disk

two 0.6 mm disks sandwiched


DVD (dual-layer) red 650 nm
together

Blu-ray (single layer) blue 405 nm single 1.2 mm disk

two 0.6 mm disks sandwiched


Blu-ray (dual-layer) blue 405 nm
together

Cambridge IGCSE Information and Communication Technology Teacher's Guide 19


© David Watson 2021
Cambridge IGCSE Information and Communication Technology Theory Workbook answers

4 Networks and the effects of using them


1 a • NIC installed in all devices
• router to connect to the internet
• switch to link devices together on the LAN
• cabling to connect computers and printers to the network
• AP (access point) devices if the network is to operate as a WLAN.
b i • bridge
• these are used to connect LANs together to make a single network
• providing they both use the same protocol.
ii • do not use routing tables
• have two ports only
• scan a device’s MAC address.
c Weak Strong
Passwort
(✓) (✓)
Pas5word ✓
Ken123 ✓
Ab!*56@@ ✓
15April2022 ✓
TXwm50. (✓) (✓)
Could be considered weak as … but could be considered strong as is
there are only seven a random mix of letters, numbers,
characters … characters and upper/lower case

2 a i • local area network


• used within same building or less than 1 km diameter in area
• consists of a number of computers connected via a hub or a switch.
ii • wide area network
• covers a very large geographical area (for example, a city or a country)
• often formed from a number of LANs connected using a router
• requires infrastructure such as a telephone or satellite network.
iii • wireless local area network
• no cables used; connectivity is through radio waves or infra-red
• makes use of a number of access points (APs)
• … which use spread-spectrum technology
• … and APs receive and transmit data between WLAN and wired network
structure.

Cambridge IGCSE Information and Communication Technology Teacher's Guide 20


© David Watson 2021
Cambridge IGCSE Information and Communication Technology Theory Workbook answers

b • 1 = switch
• 2 = server
• 3 = bridge or switch
• 4 = router
• 5 = internet
c One advantage and one disadvantage of each from:

WLANs LANs
Advantages: Advantages:
• it is easier to expand the networks and • using cables produces a more reliable
it is not necessary to connect the and stable network; wireless
devices using cables connectivity is often subjected to
• these give devices increased mobility interference
provided they are within range of • data transfer rates tend to be faster and
the WAPs there won’t be any 'dead spots'
• no cabling so there is a safety • setting up cabled networks tends to be
improvement and increased flexibility cheaper overall despite the need to buy
and install cable
Disadvantages: Disadvantages:
• there is an increased chance of • cabled networks lose the ability for
interference from external sources devices to be mobile; they must be
• data is less secure than with wired close enough to allow for cable
systems; it is easier to intercept radio connections
waves and microwaves than cables; it • having lots of wires can lead to a
is essential to protect data number of hazards such as tripping
transmissions using encryption hazards, overheating of connections
• data transmission rate is still slower (leading to potential fire risk) and
than for cabled networks although it disconnection of cables during routine
continues to improve office cleaning

3 a Item of information Present


(✓)
Size of the packet (in MB) ✓
Date packet sent
Sender's IP address ✓
Name of recipient
Routing table
Identity number of each packet ✓

b • because the packets may not arrive in the original sequence


• they need to be reassembled in their correct order.
Cambridge IGCSE Information and Communication Technology Teacher's Guide 21
© David Watson 2021
Cambridge IGCSE Information and Communication Technology Theory Workbook answers

c • data packets are sent from 'X' to the nearest router (e.g. R1)
• R1 checks the IP address and notes that none of the data packets are intended for any
devices on the 'Swedish' LAN
• the data packets are then forwarded over a number of routers to their destination
• at the destination, router R2 (for example) is connected to the 'Pakistan' LAN
• the switch in the 'Pakistan' LAN directs the data packets to computer 'Y'.
4 a Three from:
• webcam
• large monitors or TV screens
• microphones
• speakers
• webcam and microphone software drivers
• CODEC software
• echo cancellation software.
b Potential issues, two from:
• potential time lag in responses/delays when talking
• jerky images – usually due to poor internet/network performance or a poor bandwidth
• can be very expensive to set up in the first place (both the hardware and the software
are expensive to purchase and get set up correctly)
• there can be problems if the delegates live in different countries where the time zone
differences are large
• training people to use the system correctly can be both costly and time consuming
• it can be demotivating for staff if they believe that one of the 'perks' of their job is
international travel
• the whole system relies on a good network connection – if it breaks down or the signal
strength is diminished in any way, then the video conference can be almost unusable.
Advantages, two from:
• as people are in their own building, it is much easier to access important documents or
bring in 'experts' at key parts of the conference – this would be difficult if they were a
long way away from their office
• it is possible to hold conferences at short notice (a conference date can be set up within
a few hours as no person needs to travel very far)
• not travelling physically to meetings reduces costs:
• reduced travelling costs
• no need to pay for hotel accommodation or venue hire
• reduced cost of taking people away from their work for two or three days to travel
– people are still paid their wage even though they are not in the office, so this is a
large 'hidden' cost
• it may be better to use video conferencing than have delegates travel to potentially
unsafe places around the world.
Cambridge IGCSE Information and Communication Technology Teacher's Guide 22
© David Watson 2021
Cambridge IGCSE Information and Communication Technology Theory Workbook answers

5 a web conferencing:
• uses internet (with TCP/IP connections) to allow the conference to take place
• requires a computer and high-speed internet connection
• each user needs to download the appropriate app or log onto the website from the link
supplied in an email from the conference organiser
• the organiser can decide who speaks at any given time
• delegates can post comments using instant messaging to allow all delegates to read
comments
• delegates can draw/write on a whiteboard using a keyboard and a mouse
• it is possible to transmit images and videos to other delegates
• documents can easily be shared.
b phone conferencing:
• refers to meetings between people using sound equipment, such as phone, computer or
internet phone
• the organiser of the conference is given two PINs by the phone company (a personal
PIN and a participant’s PIN)
• the organiser contacts all participants and gives them the PIN, date and time of the
phone conference
• when the conference is about to start, the organiser dials the conference phone number
and then keys in his/her personal PIN
• the participants dial the same conference phone number to join and also key in the
participant PIN sent to them by the organiser.
6 a • the card is swiped through a card reader
• data, such as name, ID, sex and date of birth may be on the magnetic stripe
• access is only allowed if details stored on swiped card match those on the database
• access will be denied if stored details do not match those on the database.
b • addition of a PIN
• use of a holographic image (hologram)
• a photographic image printed directly onto a card.
7 a • a type of authentication in the form of a physical device
• physical tokens contain internal clocks and when a PIN and another authentication
factor is entered (for example a debit card), a one-time password/passcode (OTP) is
generated.

Cambridge IGCSE Information and Communication Technology Teacher's Guide 23


© David Watson 2021
Cambridge IGCSE Information and Communication Technology Theory Workbook answers

b • Asif inserts his debit card into physical token (reader)


• he presses the 'identify' button (or something similar) and then enters his PIN
• the device and bank computer are synchronised
• a one-time password/passcode is shown on the screen on the physical token
• Asif keys in this OTP into the bank’s website page
• if the two codes match, then Asif is given access to his bank account.
c • a disconnected physical token is a separate device requiring the user to key in security
data (such as the OTP) into a webpage using a keyboard/keypad
• a connected physical token transmits generated OTPs directly to a computer through a
USB connection; the user does not need to manually enter any data.
d • an electronic token is also known as a software token
• … which is installed on a user’s device
• a website requires electronic tokens to be used to authenticate a user
• the app on the device generates a random number (OTP) which is valid for about
a minute
• the user enters the OTP when prompted by the website together with some other form
of authentication, such as a PIN, touch ID or face ID
• the website server runs the same App which is synchronised with the user’s device so
that they generate the same random number.
8 a authentication is a way of proving your identity
b i zero login:
• essentially relies on devices being smart and secure enough to instantly recognise a
user based on:
• biometric data
• behavioural patterns
• builds up a complex user profile based on biometric data and behavioural patterns
• biometric data includes fingerprint ID or facial ID
• behaviour includes typing speed, location, how you swipe your screen, and so on
• uniquely identifies a user from this data and allows entry to a system without the
need to enter any passwords
• provides enhanced security and an easier login system.
ii Two from:
• How do users know when they are being monitored?
• How do users know if and when they have logged out of the system?
• How well protected is it in reality?
c face recognition (ID), fingerprint recognition (ID)

Cambridge IGCSE Information and Communication Technology Teacher's Guide 24


© David Watson 2021
Cambridge IGCSE Information and Communication Technology Theory Workbook answers

9 True False
Statement
(✓) (✓)
A network interface card has a MAC address hard-wired at the

manufacturing stage
Hubs only send data packets to a specific device on the local

network
A bridge is used to connect a local area network (LAN) to any

external network
Routers use IP addresses to direct data packets to the correct

network
Bluetooth uses spread-spectrum frequency hopping to allow device

pairing
Cloud computing does not require access to the internet to enable

files to be downloaded or uploaded
Wide area networks (WANs) only work over a very limited

distance geographically
Zero login depends on biometrics and behavioural patterns ✓

10 a • LANs use wired connections


• WLANs use wireless connectivity
• … using radio waves or infra-red
• WLANs use access points (APs) which are connected into the wired network at
fixed locations
• APs use spread-spectrum technology
• … a wideband radio frequency or infra-red.
b • LANs work in a small geographical area (less than 1 km)
• WANs work in a large geographical area (e.g. a city, country).
11 a • a method of data storage or computer processing …
• … where data is stored, or processing takes place, on offsite servers in many locations
• there are three types: public, private and hybrid.
b Advantages, three from:
• customer/client files stored in the cloud can be accessed at any time, from any device,
anywhere in the world, provided internet access is available
• there is no need for a customer/client to carry an external storage device with them, or
even use the same computer, to store and retrieve information
• the cloud provides the user with remote backup of data with obvious advantages to
mitigate data loss/promote disaster recovery
• if a customer/client has a failure of their hard disk or backup device, cloud storage will
allow recovery of their data
• the cloud system offers almost unlimited storage capacity (at a price!).

Cambridge IGCSE Information and Communication Technology Teacher's Guide 25


© David Watson 2021
Cambridge IGCSE Information and Communication Technology Theory Workbook answers

Disadvantages, three from:


• security aspects of storing data in the cloud
• if the customer/client has a slow or unstable internet connection, they could have many
problems accessing or downloading their data/files
• costs can be high if a large storage capacity is required; it can also be expensive to pay
for high download/upload data transfer limits with the customer/client internet service
provider (ISP)
• the potential failure of the cloud storage company is always possible – this poses a risk
of loss of all backup data.

5 The effects of using IT


1 a Three from:
• automatic washing machines
• microwave ovens
• cookers
• automatic dish washers
• robotic vacuum cleaners
• bread making machines
• smart fridges and freezers.
b and c

Advantages Disadvantages
• people no longer have to do manual tasks • labour-saving devices can lead to
at home unhealthy life styles (for instance
• they give people more time for leisure microwave ovens may make people
activities, hobbies, shopping and socialising reliant on ready-made meals)
• there is no longer a need to stay home while • they might make people rather lazy
food is cooking or clothes are being washed because there is a dependence on the
• it is possible to control appliances using devices
smartphones – a web-enabled phone allows • people can become less fit if they just
devices to be switched on or off while the sit at home while the devices carry
owner is out out many of the previous manual
• automated burglar alarms give people a tasks
sense of security and well-being as they • tasks carried out by people in the past
give a very sophisticated level of intruder are now done by the microprocessor-
warning at all times controlled devices, which means there
• smart fridges and freezers can lead to more is a potential to lose these household
healthy lifestyles (they can automatically skills
order fresh food from supermarkets using • as with any device which contains a
their internet connections) as well as microprocessor and can communicate
prevent food waste using the internet, there is the risk of
cybersecurity threats

Cambridge IGCSE Information and Communication Technology Teacher's Guide 26


© David Watson 2021
Cambridge IGCSE Information and Communication Technology Theory Workbook answers

d Advantages Disadvantages
• microprocessor-controlled devices save • the devices lead to a more wasteful
energy because they are far more society – it is usually not cost effective
efficient and can, for example, switch to repair circuit boards once they fail;
themselves off after inactivity for a the device is then usually just thrown
certain time period away
• it is easier 'programming' these devices • they can be more complex to operate for
to perform tasks rather than turning people who are technophobes or who
knobs and pressing buttons manually are not very confident around electronic
(for example, QR codes on the side of devices
food packaging can simply be scanned • leaving devices on stand-by (such as
and the oven automatically sets the televisions or satellite receivers) wastes
cooking programme) electricity

2 • autonomous
• sensors
• cameras
• safer
• human
• actuators
• smart
• accident
• congestion
• hacking.
3 a • a vehicle under computer-control using sensors and cameras to gather information
about the immediate surroundings/environment
• a vehicle that is capable of movement without the need for any human input.

Cambridge IGCSE Information and Communication Technology Teacher's Guide 27


© David Watson 2021
Cambridge IGCSE Information and Communication Technology Theory Workbook answers

b and c Three advantages and three disadvantages from:

Advantages of autonomous vehicles Disadvantages of autonomous vehicles


• safer since human error is removed • very expensive system to set up in the
leading to fewer accidents first place (high technology
• better for the environment since requirements)
vehicles will operate more efficiently • the ever-present fear of hacking into the
• reduced traffic congestion (humans vehicle’s control system
cause 'stop-and-go' traffic known as • security and safety issues (software
'the phantom traffic jam', autonomous glitches could be catastrophic; software
vehicles will be better at smoothing out updates would need to be carefully
traffic flow reducing congestion in controlled to avoid potential disasters)
cities) • the need to make sure the system is
• increased lane capacity (research shows well-maintained at all times; cameras
autonomous vehicles will increase lane need to be kept clean so that they do
capacity by 100% and increase average not give false results; sensors could fail
speeds by 20%, due to better braking to function in heavy snowfall or
and acceleration responses together blizzard conditions (radar or ultrasonic
with optimised distance between signals could be deflected by heavy
vehicles) snow particles)
• reduced travel times (for the reasons • driver and passenger reluctance of the
above) therefore less commuting time new technology
• stress-free parking for motorists (the • reduction in the need for taxis could
car will find a parking space on its own lead to unemployment
and then self-park)

d • Trains run on fixed tracks (and often in remote/unpopulated areas) so have little
freedom of movement so can be perceived as 'safer' for autonomous systems.
• Autonomous cars mix with human driven cars and may not be considered sufficiently
sophisticated to respond to situations caused by human drivers.
• Plane crashes always attract negative attention and the public has potential worries that
an autonomous plane could crash in a public area.
• Other points might include:
• Reluctance to rely on the technology – some people might find it hard to believe
that a computer could be safer than a human.
• What happens if there is a computer problem (for example, a hardware or
software failure)?
• How safe is the technology in counteracting hacking and malware attacks?

Cambridge IGCSE Information and Communication Technology Teacher's Guide 28


© David Watson 2021
Cambridge IGCSE Information and Communication Technology Theory Workbook answers

4 True False
Statement
(✓) (✓)

A mobile phone is an example of a labour-saving device ✓

Microprocessor-controlled devices last longer than manually-



controlled devices and are not just 'thrown away'

Smart fridges and freezers can lead to more healthy lifestyles ✓

Microprocessor-controlled devices create an increase in people’s



skill levels and make people less lazy

Autonomous vehicles will increase the number of road accidents in



the future

Smart motorway signs can improve traffic management control



resulting in less traffic congestion

Autonomous vehicles rely on sensors, cameras and actuators to



allow them to drive on the road

The operation of autonomous vehicles would not be affected by



adverse weather conditions, such as a snow blizzard

Cambridge IGCSE Information and Communication Technology Teacher's Guide 29


© David Watson 2021
Cambridge IGCSE Information and Communication Technology Theory Workbook answers

5 Health risk Cause of health risk Methods of removing/reducing the health risk
• use fully adjustable chairs to give the correct
caused by sitting in posture
Back and front of a computer • use foot rests to reduce posture problems
neck strain screen for long
periods of time • use tiltable screens to ensure that the neck is at
the right angle
• ensure that correct posture is maintained
(i.e. correct angle of arms to the keyboard and
mouse, for example)
damage to fingers
and wrists caused by • make proper use of a wrist rest when using a
Repetitive
continuous use of a mouse or keyboard
strain injury
keyboard or repetitive
(RSI) • take regular breaks (+ exercise)
clicking of mouse
buttons, for example • make use of ergonomic keyboards
• use voice-activated software if the user is prone
to problems using a mouse or keyboard
• if necessary, change screens to LCD if older
CRT screens are still used
• take regular breaks (+ exercise)
caused by staring at a
computer screen for • make use of anti-glare screens if the room
too long or by having lighting is incorrect (or use window blinds to cut
Eye strain
incorrect lighting in out direct sunlight)
the room (causing
• users should have their eyes tested on a regular
screen reflections)
basis (middle-vision glasses should be prescribed
if the user has a persistent problem with eye
strain, dry eyes, headaches, etc.)
• make use of anti-glare screens if the room
lighting is incorrect (or use window blinds to cut
out reflections which cause squinting, leading to
caused by incorrect headaches)
lighting, screen • take regular breaks (+ exercise)
Headaches
reflections, flickering
screens, and so on • users should have their eyes tested on a regular
basis (middle-vision glasses should be prescribed
if the user has a persistent problem with
headaches)
• proper ventilation should exist to lower the ozone
caused by laser gas levels to acceptable values
printers in an office
Ozone • laser printers should be housed in a designated
(symptoms are dry
irritation
skin and respiratory printer room
problems) • change to using inkjet printers if possible

Cambridge IGCSE Information and Communication Technology Teacher's Guide 30


© David Watson 2021
Cambridge IGCSE Information and Communication Technology Theory Workbook answers

6 Points might include:


• While some devices leave people with more time to do things outside their home, other
devices encourage people to stay at home.
• Devices, such as smartphones, smart televisions or tablets allow people to communicate
from home using VoIP (a type of video conferencing), emails or chat rooms.
• The positive aspects include:
• it is easier to make new friends using chat rooms
• it is easier to find people who share similar interests/hobbies
• it is less expensive keeping in touch using VoIP technology
• there are no geographical boundaries to people can meet online, so can interact with a
wider range of cultures and people.
• The negative aspects include:
• people do not meet face to face as much (social isolation)
• online gaming, for example, can lead to health problems, such as obesity, due to less
sporting activity (it is a balance that each individual needs to make).
7

Cambridge IGCSE Information and Communication Technology Teacher's Guide 31


© David Watson 2021
Cambridge IGCSE Information and Communication Technology Theory Workbook answers

6 ICT applications
1 a paper-based, three from
• it is easier to target the exact audience
• you can be more certain your advert has been delivered
• posters, if placed strategically, can be seen every day by people
• they catch the attention when in poster-form.
computer-based, three from:
• sound/video/animation can be added
• hyperlinks and hotspots can be used to link to other websites/web pages
• buttons can be added to navigate/move around the website, leading to more
information
• hit counters to see how many people have visited the website
• they can be seen by a global audience
• they cannot be defaced or thrown away
• it is much easier to update a website (and there is no need to do a reprint and then
distribute the new version).
multimedia advertising in a shopping mall, three from:
• use of sound and animation/video effects can be used which are more likely to grab
the attention of the audience, and which can also make the presentation easier to
understand
• it is possible to have interactive/hyperlinks built into the presentation; this means the
presentation could access a company’s website or even key files stored on the cloud
(such as video footage, images, spreadsheets and so on)
• the use of transition effects allow a presentation to display facts in a key or
chronological order
• presentations can be interactive
• it is more flexible; because of the links to websites and other external systems (for
example, the cloud), presentation can be tailored to suit a particular audience.
b i A method used to talk to people using computers or internet-phones connected to the
internet
ii microphone, (loud) speakers
iii Advantages, one from:
• computer-to-computer communication over the internet is free
• it can make use of built-in camera to make a video call.
Disadvantages, one from:
• sound quality can be poor
• there are potential security issues (due to viruses, for example)
• it requires a high-speed broadband connection.

Cambridge IGCSE Information and Communication Technology Teacher's Guide 32


© David Watson 2021
Cambridge IGCSE Information and Communication Technology Theory Workbook answers

2 a Three from:
• the number of vehicles passing the junction in all directions, along with a vehicle count
• how many vehicles build up at the junction
• the time of day
• the day of the week, along with special days such as bank holidays etc.(to understand
how that might alter how the data needs to be interpreted)
• how long it takes a vehicle to clear the junction
• other data could include: pedestrian crossings, nearby left turns, right turns,
filtering, etc.
b Three from:
• using computer models is less expensive than having to build the real thing (for
example, a bridge)
• on many occasions it is safer to use a computer model (some real situations are
hazardous; for example, chemical processes)
• when using computer modelling it is much easier to try out various scenarios in
advance
• it is nearly impossible to try out some tasks in real life because of the high risk
involved or the remoteness (for example, outer space, under the sea, nuclear reactors,
crash testing cars, etc.)
• it is often faster to use a computer model than to do the real thing (some applications
would take years before a result was known; for example, climate change calculations,
population growth, etc.).
c

Cambridge IGCSE Information and Communication Technology Teacher's Guide 33


© David Watson 2021
Cambridge IGCSE Information and Communication Technology Theory Workbook answers

3 Reasons Disadvantage?
(✓)
Robots have difficulty in doing 'one off' tasks ✓
Management can move factories anywhere in the world
Using robots can lead to unemployment
Robots manufacture more items per hour than humans
All items produced using robots are identical
The set up and maintenance of robots is expensive ✓

4 a • contact is made with bank’s computer


• the ATM asks user to enter a PIN
• the PIN is checked to see if it is correct
• the card is checked to see if has expired or has been stolen
• if the card is stolen or expired then it is retained
• the customer account is accessed
• the customer is given a number of on-screen options
• the customer chooses the statement of account option
• the card is returned once the customer is finished.
b • customer selects option to view balance
• ATM makes contact made with bank’s computer
• bank's computer finds the correct record for the customer in its database and sends this
information the ATM
• ATM displays the balance on-screen and asks whether the customer wants a printout.
5 a • 1 = user interface
• 2 = explanation system
• 3 = inference engine
• 4 = rules base
• 5 = knowledge base

Cambridge IGCSE Information and Communication Technology Teacher's Guide 34


© David Watson 2021
Cambridge IGCSE Information and Communication Technology Theory Workbook answers

c Three from:
• oil/mineral prospecting
• medical diagnosis
• strategy games, such as chess
• tax/financial planning
• route scheduling for delivery vehicles
• identification of plants, animals, chemical compounds etc.
d • run the system using input data with known outcomes
• compare the results from expert system with existing system
• make any changes as necessary.
6 True False
Statement
(✓) (✓)
The making of prosthetic limbs is one example of an expert system

application
One of the disadvantages of expert systems is that the results are inconsistent ✓
Expert systems are not infallible ✓
An explanation system provides the user with the reasons why an expert

system came to its final conclusion
The rules base acts like a search engine in an expert system ✓
The knowledge base in an expert system is made up of objects and attributes ✓
When setting up an expert system, the first task is to gather information from

knowledgeable sources

7 a ANPR:
• an abbreviation for automatic number plate recognition
• it is used to read the number plates on a car
• for example, to control the entry/exit barrier to a car park.

Cambridge IGCSE Information and Communication Technology Teacher's Guide 35


© David Watson 2021
Cambridge IGCSE Information and Communication Technology Theory Workbook answers

b Stage order Stage


Algorithms are used to locate and isolate the number plate from
3
the camera image
6 The text string is stored in a database
The motorist returns to the car park and makes payment after
8
inserting his ticket into the machine
A sensor detects a vehicle and sends a signal to the
2 microprocessor to instruct the camera to capture an image of the
front of the vehicle
The motorist drives to the exit barrier and the ANPR system
9 reads the number plate on the vehicle and checks the database for
the number plate
Brightness and contrast of the number plate is adjusted so that the
4
characters can be clearly read
If the number plate is recognised and payment has been made, the
10
exit barrier is raised
Once all the checking is done, the car park entrance barrier is
7 raised and the motorist is issued with a ticket showing date and
time of entry
1 The motorist drives up to the entrance to the car park
Each character on the number plate is then recognised using
5
OCR; the characters are converted into a text string

8 Three from:
• emergency services use GIS to send the closest emergency personnel to a location
• biologists and environmentalists use GIS to protect animal life and plants in certain
vulnerable areas (which meet certain criteria after carrying out a search on the database)
• teachers can use GIS in their geography, science or engineering lessons
• crime mapping can take place in a region or in a country
• route monitoring (used in conjunction with route scheduling software)
• management of agricultural crop data
• addressing public health issues, for example, in the COVID-19 pandemic of 2020–2021 to
show the spread of the virus in different parts of the world and where data could be
combined with other data (such as, age groups, ethnic type, population density, and so on)
to create a unique insight into how the virus spread
• mapping of wildfire risks, for example, in Australia in 2019 during the wildfire outbreaks;
it was possible to map out why and how the fire was spreading.

Cambridge IGCSE Information and Communication Technology Teacher's Guide 36


© David Watson 2021
Cambridge IGCSE Information and Communication Technology Theory Workbook answers

9 True False
Statements
(✓) (✓)
The sat nav in the car sends signals to the GPS satellites giving the car’s

location
If the maps are not up to date, the driver can be given incorrect

instructions

The satellites move around the Earth keeping track of all the cars ✓

The sat nav system installed in the car has state of the art timing systems ✓

The system can estimate the time of arrival of the car at its destination ✓

Paper maps have been scanned in so that the route shows up on the sat

nav screen in the car

10

Cambridge IGCSE Information and Communication Technology Teacher's Guide 37


© David Watson 2021
Cambridge IGCSE Information and Communication Technology Theory Workbook answers

11 a NFC devices communicate at up to 5 centimetres; they are not time dependent and do not
require devices to be paired.
b OMR is used to read pencil or pen marks written on a pre-printed grid; lozenges are filled
with pencil or ink to indicate choices.
c Passive RFID chips do not have a power source; they use the reader’s radio wave energy to
send back information.
d Satellites do not transmit the coordinates to on board sat nav devices; sat nav software
triangulates signals received from at least three satellites to determine the exact position of
the vehicle.
e Sound waves are not transmitted; radio waves are used as carrier waves to send data to the
satellites.
12 a geographic information system (GIS)
b RFID scanner
c token(isation)
d internet banking/shopping/commerce
e expert system
f computer simulation.
13 a Three from:
• sensors could be used out in the river to monitor water level and rate of flow (and
possibly other factors, such as wind speeds); using sensors would give a much faster
response to any deteriorating conditions in the river
• using a computer system is safer, because using humans to monitor conditions could
potentially put them at risk
• data collection is continuous and more accurate than manual measurements (readings
can also be taken more frequently)
• because of the faster response to changing conditions, city dwellers can be warned well
in advance of any flooding actually taking place
• data from the sensors could also be fed into the simulation modelling the flood area;
this could lead to further improvements as more data is gathered, which means that the
simulation becomes closer to reality.
b • it has a faster response to changing conditions
• it is much safer since it is no longer necessary to use 'look outs' who could be in danger
during extreme weather
• data is continuously collected irrespective of weather conditions or time of day (for
example, during the night).

Cambridge IGCSE Information and Communication Technology Teacher's Guide 38


© David Watson 2021
Cambridge IGCSE Information and Communication Technology Theory Workbook answers

c • a cross-section of river (for example, bottlenecks)


• the dimensions of any bridges, weirs or sluices in the flood area
• what can affect water flow rates (for example, downstream tides are affected by the
time of year and by strong winds)
• boundary conditions (for example, upstream flows into rivers and downstream
water levels)
• the start and finishing date for the simulation
• calibration data (observation of actual flooding in the past).
d It is expensive to set up initially and the outcome is only as good as the data input in
the first case.
14 a • an interactive screen with dialogue boxes, command prompts or other input methods
• a series of questions asked about the illness which usually only have Yes/No answers
and are based on the responses to previous questions
• an inference engine compares the symptoms entered with those in the knowledge base
looking for matches
• a rules base is used in the matching process
• once a match is found, the system suggests the probability of the patient’s illness being
identified accurately
• an expert system also suggests possible solutions and remedies to cure the patient or
recommendations on what to do next
• an explanation system will give reasons for its diagnosis so that the user can determine
the validity of the diagnosis or suggested treatment.
b • it could be in the form of text including possible images related to the diagnosis
• there would be possible medications and advice given
• it might give the probability that the solution will work/accuracy of recommendations.
15 Scenarios:
• the amount of traffic that might be caught in a traffic jam on the bridge in the event of an
accident; this could lead to very heavy loading on the bridge structure
• the effects of strong winds; can the bridge design withstand the worst-case scenario
• the effect of earthquakes; is the bridge earthquake-proof
• the effect of tidal waves and ice floes during extreme weather conditions; can the pillars
supporting the bridge withstand these conditions
• the effects of vibrations (there have been cases over the years where bridges have collapsed
due to, for example, wind setting up the natural frequency of the bridge causing it to
collapse).
The reasons modelling was done:
• much cheaper and quicker to test the effect of weather etc. using a model before building
the real thing
• can only build one real bridge but there are a number of potential designs, therefore
modelling is the only way that they can all be tested.
How scale models could be used:
• Can be used to test the effect of wind on the bridges, with the aid of wind tunnels.

Cambridge IGCSE Information and Communication Technology Teacher's Guide 39


© David Watson 2021
Cambridge IGCSE Information and Communication Technology Theory Workbook answers

16 a • simple app to use


• can carry out 'what if' scenarios
• capable of auto-calculations
• possible to embed testing criteria into a cell.
b D5: A number of possible solutions exist here – a nested IF example is given here:
=IF(D4<=100,D4*A1,IF(D4<=1000,100+(D4-100)*A2,IF(D4<=5000,
100+450+(D4-1000)*A3,IF(D4>5000,100+450+1000+(D4-5000)*A4,"comment"))))
D6: = D4 * 0.8
E7: = D6 – D5
17 a it is easy to spellcheck the website contents (C)
b large RAM capacity in the laptop (B)
c Voice over Internet protocol (D)
d software, such as spreadsheets, are well known to users (B)
e robots leave humans free to do more interesting jobs (A)
f autonomous (D)
18 order:

Stage order Stages

4 Cheque image and digital record are added to file of all cheques for bank 'A'

7 Bank 'A' receives data stream containing 'request to pay' and 'no pay' messages

1 Camera in bank 'B' takes an image of the cheque


Central facility breaks file down into individual payment messages and also does
6
a payment validation
2 OCR software turns camera images into electronic data

8 Central facility routes all 'request to pay' and 'no pay' responses to bank 'B'

5 Bank 'B' sends all files to a central facility


Bank 'B' uses electronic data to create a digital record of money to be paid, sort
3
code of bank 'A' and account number of customer

19 a media streaming:
• refers to media content
• … which can be live or pre-recorded
• which is sent to computer/smartphone/tablet
• using the internet and played back on a device in real time
• streaming is done via data packets sent over the internet
• continuous transmission of video or audio files from a remote server to a user’s device
• streaming removes the need to store files on device storage, such as HDD or SSD.

Cambridge IGCSE Information and Communication Technology Teacher's Guide 40


© David Watson 2021
Cambridge IGCSE Information and Communication Technology Theory Workbook answers

b buffering:
• the temporary storage of data
• to prevent 'freezing'
• because playback is often faster than the data streaming rate
• while the buffer receives data packets, it is sending previous data packets to the media
player (playback is always a few seconds behind data receiving time).
c subscriber identity model:
• SIM card installed in a mobile phone
• … to allow it to connect to the mobile phone network.
d simulation:
• creation of a model of a real system
• in order to study the behaviour of the system
• it is computer-generated and is based on mathematical representations.
e end effector:
• a device connected to a robotic arm
• it allows the arm to carry out a number of functions.
f e-ticket:
• electronic ticket
• sent to a device to act as the ticket for entry to an event, theatre, etc.
• often shows as a QR code or barcode.
g out clearing:
• camera takes image of cheque at bank where cheque is presented
• OCR software turns the cheque image into an electronic data format
• creating a digital record of money to be paid, sort code, account number, date and
signature.
h expert system:
• software developed to mimic the expertise and knowledge of an expert
• made up of HCI, explanation system, inference engine, knowledge base and rules base.
i near-field communication:
• uses RFID technology
• can be passive or active
• three types: peer-to-peer, read-write mode and card emulation mode
• range is up to 5 centimetres
• does not require devices to be paired.

Cambridge IGCSE Information and Communication Technology Teacher's Guide 41


© David Watson 2021
Cambridge IGCSE Information and Communication Technology Theory Workbook answers

j tokenisation:
• a user takes a photo of card using a smartphone camera
• the image is stored on a smartphone which reads details such as card number and
bank name
• then details are transmitted to the bank that issued the card
• the bank now replaces details on the card by a series of randomly generated numbers
(called tokens)
• tokens are changed every time NFC transaction takes place.
20 a rules base:
• a set of inference rules
• inference rules are used by the inference engine to draw conclusions (the methods used
closely follow human reasoning)
• inference rules follow logical thinking; usually involving a series of 'IF' statements,
for example: IF continent = 'South America' AND language = 'Portuguese' THEN
country = 'Brazil'.
b knowledge base:
• a repository of facts
• it stores all the knowledge about an area of expertise obtained from a number of expert
resources
• it is basically a collection of objects and their attributes.
c inference engine:
• the main processing element of the expert system
• the engine acts like a search engine examining the knowledge base for information/data
that matches the queries
• responsible for gathering information from the user by asking a series of questions and
applying responses where necessary; each question being asked is based on the
previous responses
• the problem-solving part of the expert system which makes use of inference rules in the
rules base
• because the knowledge base is a collection of objects and attributes, the inference
engine attempts to use information gathered from the user to find an object that
matches (making use of the rules base to find a match).
d explanation system:
• informs the user of the reasoning behind the expert system’s conclusions and
recommended actions
• will supply a conclusion and any suggested actions to take; the important thing is that
it will also give the percentage probability of the accuracy of its conclusions.

Cambridge IGCSE Information and Communication Technology Teacher's Guide 42


© David Watson 2021
Cambridge IGCSE Information and Communication Technology Theory Workbook answers

21 • the customer clicks on the performance they wish to see


• a date and time is typed in
• the required number of seats is also entered
• the seating display at the venue is shown on the screen
• the user selects their seat(s) by highlighting the actual seats on the screen display and then
clicks CONFIRM to go to the next part of the process
• the database is then searched to check the availability of the selected seats
• if the seats are available, the total price is shown + the seat numbers; this shows on another
screen on the web page
• if the customer is happy with this, they select CONFIRM on the screen
• the seats are now temporarily set at NO LONGER AVAILABLE
• the customer then enters their personal details or indicates that they are a returning
customer (in which case the website being used will already have their details)
• the payment method is then selected and payment made
• the theatre seats are then booked in the customer’s name
• the final details are again shown on the screen
• an email is sent to the customer which will contain a QR code which contains all their
booking details (this acts as their e-ticket); the QR code is then scanned at the venue
• the database is finally updated with the booking transaction and the seats become no longer
available.

7 The systems life cycle


1

Cambridge IGCSE Information and Communication Technology Teacher's Guide 43


© David Watson 2021
Cambridge IGCSE Information and Communication Technology Theory Workbook answers

2 a Name of b Description c Advantages of d Disadvantages of


research of research research method research method
method method one from: one from:
This method • an analyst obtains • people are generally
involves reliable data uncomfortable being
watching • it is possible to get a watched and may
personnel using work in a different
the existing better overall view of
the system way (the Hawthorne
system to find
effect)
out exactly how • it is a relatively
Observation it works. inexpensive method • if workers perform
because it only tasks that contravene
involves the analyst standard procedures,
they may not do this
• all inputs and outputs
while being watched
of the current system
are seen
This method • it gives the • it can be a rather
involves a one- opportunity to time-consuming
to-one question- motivate the exercise
and-answer interviewee into
session between • it is relatively
giving open and expensive (team of
the analyst and
the employee/ honest answers to the interviewers and
customer. It is a analyst’s questions analyst needed)
good method if • it allows the analyst • the interviewee cannot
the analyst to probe for more
wants to probe remain anonymous
feedback from the with this method, and
deeply into one
specific aspect interviewee may hide information
Interviews (questions can be
of the existing or not be honest with
system. extended) their answers
• it is possible to • the interviewee can
modify questions as give answers they
the interview think the interviewer
proceeds and ask wants to hear
questions specific to
• interviewees may not
the interviewee
be available at times
• the analyst can watch to suit the analyst
body language and
facial expressions

Cambridge IGCSE Information and Communication Technology Teacher's Guide 44


© David Watson 2021
Cambridge IGCSE Information and Communication Technology Theory Workbook answers

This method • questions can be • the number of


involves answered fairly returned
distributing quickly questionnaires can be
questionnaires to low; not always a
the workforce, • it is a relatively
inexpensive method popular method
clients or system
users to find out (only questionnaires • the questions are
their views of need to be produced) rather rigid since they
the existing have to be generic; it
• individuals can
system and to is not possible to ask
find out how remain anonymous if
they want (and follow-up questions
some of the key
tasks are carried therefore give more • there is no immediate
Questionnaires out. truthful answers) way to clarify a vague
• it allows for a quick answer to a question;
analysis of the data it is not possible to
expand their answers
• interviewees can fill
in a questionnaire in • users tend to
their own time exaggerate their
responses as they are
• it allows a greater
anonymous
number of people to
take part • because they are
anonymous, the
interviewees may not
take it seriously
This method • it allows information • it can be a very time-
allows the to be obtained which consuming exercise
analyst to see was not possible by • because of the
how existing any of the other
files are kept, analyst’s time needed,
methods it is a relatively
look at operating
instructions and • the analyst can see for expensive method to
training themselves how the use
manuals, check current system
Looking at the the accounts, operates
existing etc. This allows
documents the analyst to get
some idea of the
scale of the
problem,
memory size
requirements,
type of
input/output
devices needed,
etc.

Cambridge IGCSE Information and Communication Technology Teacher's Guide 45


© David Watson 2021
Cambridge IGCSE Information and Communication Technology Theory Workbook answers

3 a 15 (D)
b decimal/real (B)
c program listings (C)
d how to print out a document (A)
e examine the documentation (D)
4 a i Four from:
• have a heading to make the purpose of the form clear
• make it clear to the person filling in the form where they must place their answers
• make use of text boxes which will limit the amount of information collected
• make use of character boxes for data such as surnames, telephone numbers, and so
on (each box allows one character only)
• make use of printed text boxes to allow for easy input of items such as date of birth
• make use of tick boxes to make choices easier (such as gender – male, female,
prefer not to say, or similar)
• make sure there is sufficient space to write answers
• make use of clear fonts and clear text colours to ensure the form is easy to read.
ii

b i Five from:
• the use of text boxes to capture key data clearly
• the use of on-screen help when completing the form
• the use of drop-down/combo boxes where there are limited choices
• the use of radio buttons and tick boxes requiring a single click of a mouse to select
• automatic validation of data as it is entered
• control buttons (such as next form, clear entry, save, etc.)
• double entry boxes (with verification rules) to check correctness of key data (for
example, when keying in an email address).

Cambridge IGCSE Information and Communication Technology Teacher's Guide 46


© David Watson 2021
Cambridge IGCSE Information and Communication Technology Theory Workbook answers

ii Some examples of extra features available in a computer-based form:

5 a Analysis Design Evaluation


Activity
stage (✓) stage (✓) stage (✓)
Interviewing users of the existing system ✓
Planning the validation routines/rules ✓
Deciding on the required file structures ✓
Interviewing users of the new system ✓
Examining existing documentation used

in the booking system
b Three from:

Implementation method Design of implementation method


Direct With this method the old system is stopped overnight and
the new system introduced immediately.
With this method, the old and new systems are run side by
Parallel side for a time before the new system takes over
altogether.
Pilot With this method, the new system is introduced into one
branch or office of the company and its performance
assessed before being introduced elsewhere in the
company.
With this method, only part of the new system is
introduced and, only when it proves to work satisfactorily,
Phased
is the next part introduced, and so on, until the old system
is fully replaced.

Cambridge IGCSE Information and Communication Technology Teacher's Guide 47


© David Watson 2021
Cambridge IGCSE Information and Communication Technology Theory Workbook answers

c Items Technical User Both types

Program listing/coding ✓
How to print out data ✓
Hardware requirements ✓
Software requirements ✓
Sample runs (with results) ✓
Validation routines ✓
Systems flowcharts ✓
How to add/delete/amend files ✓
The meanings of possible error messages ✓
Troubleshooting guide ✓

6 a i Data that is acceptable/valid and has a known outcome; for example, a month can be
any integer between 1 and 12.
ii Data at the limits of acceptability/validity; for example, for month data this would be
1 or 12 (end values).
iii Data outside the limits of acceptability/validity and should be rejected or cause an error
message; for example, for month data, any number less than 1 or greater than 12, non-
numeric and non-integer values.
b Normal Extreme Abnormal
Input data
(✓) (✓) (✓)
0 (✓) ✓
22.5 ✓
15.1 ✓
18 (✓) ✓
1 ✓
fifteen ✓
2.175 ✓
−10 ✓
25 ✓

Cambridge IGCSE Information and Communication Technology Teacher's Guide 48


© David Watson 2021
Cambridge IGCSE Information and Communication Technology Theory Workbook answers

7 a Field name Validation check Data type

cd_title text/character alphanumeric

item_number range/format numeric: integer

number_in_stock type/range check integer

last_ordered_date format check numeric: date/time

reorder_level type/range check numeric: integer

b Three from:
• field length
• data type
• any special codes used, e.g. XL standing for 'extra large'
• is it a primary field?
c • input formats/data capture forms
• output formats/screen layouts/report layouts
• validation routines.
8 Example of data item Example of data item that
Field name Validation check that would PASS would FAIL validation
validation check check

credit card range 1234 5678 9012 3456 1234 5678 9012 345
number character check 1234 5678 9012 3456 ABCD 1234 EFGH 5678

order code format check AB1234AB 12ABCD34

red
123
colour character check black
B*1*
white

character check XS 34
size
format (X or XX) M XXS

Cambridge IGCSE Information and Communication Technology Teacher's Guide 49


© David Watson 2021
Cambridge IGCSE Information and Communication Technology Theory Workbook answers

9 • Compare the final solution with the original task.


• Identify any limitations of the system.
• Identify any necessary improvements that need to be made.
• Evaluate the user’s responses to using the new system.
• Compare test results from the new system with results from the old system.
• Compare performance of the new system with performance of the old system.
• Observe users performing set tasks (compare old with new).
• Measure the time taken to complete tasks (compare old with new).
• Interview users to gather responses about how well the new system works.
• Give out questionnaires to gather responses about the ease of use of the new system.
10 a You need to check that the data that is being input or transferred to the system is correct.
There are certain techniques that need to be adopted to make sure that the data populating
the files/database is at least of the right type and that it conforms to certain rules.
Validation routines and verification methods are used to ensure that this happens. These
routines have to be fully tested to ensure that they do trap unwanted data but also to make
sure any data transferred from a paper-based system to an electronic system has been
done accurately.
You need to check that the processing of data is correct and as expected. For instance, if
calculations are being performed with the data then testing would uncover if there are any
errors, or incorrect assumptions with those calculations.
You need to check that the outputs from the system are correct. Even if the initial data and
the processing are correct, the wrong data might be output in the wrong place, or cannot be
clearly seen. Thorough testing will ensure that user screens are user-friendly and that the
correct output is associated with the inputs to the system.
b A testing strategy is the method adopted to test a system. It would normally state how
detailed the testing should be and how much time is available. For instance, it might be that
specific parts of the system are more critical and need more testing than other parts.
A common strategy is to test software modules separately to see if they function correctly.
Any problems resulting from the testing requires the module to be modified and then
tested again.
Once the development of each module is completed, the whole system needs to be tested as
a whole (i.e. all modules functioning together). Even though each module may work
satisfactorily, when they are all put together there may be data clashes or incompatibility,
memory issues, etc.
c i test plan:
• a list of all the tests to be performed
• what data is to be used in the testing
• what type of testing is the data designed to check (i.e. normal, abnormal
or extreme)
• what live data should be used
• what are the expected outcomes from the testing
• do the actual outcomes match what is expected.

Cambridge IGCSE Information and Communication Technology Teacher's Guide 50


© David Watson 2021
Cambridge IGCSE Information and Communication Technology Theory Workbook answers

ii For example:

Data set Data input Type of data input Expected outcome

A 4.0 extreme data accepted

B 10.0 extreme data accepted

C 7.5 normal data accepted

D 9.2 normal data accepted

error message/data
E 2.0 abnormal
rejected
error message/data
F 12.5 abnormal
rejected
error message/data
G −3.5 abnormal
rejected
error message/data
H twelve abnormal
rejected

iii 'Actual outcome'


The values should be same as column 4.
If they are not the same, validation routines need to be rewritten/added and then the
system retested with the same data set.

8 Safety and security


1 a Health and safety is how to stop people becoming ill or being affected by daily contact
with IT equipment. Physical safety is concerned with the dangers that could lead to serious
injuries or even loss of life.

Cambridge IGCSE Information and Communication Technology Teacher's Guide 51


© David Watson 2021
Cambridge IGCSE Information and Communication Technology Theory Workbook answers

b Safety risk – Cause of safety risk Prevention measures – two from:


three from: two from:
• spilling liquids/drinks
• do not allow drinks to be taken into
on electric equipment
the computer room
• exposed
• check all wires on a regular basis and
wires/damaged
renew wires if there is any sign of
insulation
Electrocution damaged insulation
• unsafe electrical
• ensure all equipment is checked by a
equipment
qualified electrician on a regular basis
• unsafe electrics (for
• make use of an RCB (residual current
example, wall sockets)
breaker) to prevent electrocution
in the office

• increase the number of wall sockets


and do not use too many extension
blocks
• overloaded wall
sockets (several items • do not cover the cooling vents on
plugged into one wall computer equipment
socket) • clean out dust accumulation in
• overheating of computers to prevent overheating
Fire hazard computer equipment • make sure all equipment is fully
(due to poor heat tested on a regular basis
dissipation) • ensure there is good room ventilation
• exposed wires causing • use low-voltage equipment wherever
a short circuit possible
• have a number of fully tested carbon
dioxide/dry powder fire extinguishers

• use cable ducts to make the wires safe

• trailing wires on the • cover exposed wires and hide wires


floor under desks away from general
Tripping thoroughfare
hazard • damaged carpets and
other flooring • use wireless connectivity wherever
possible, thus eliminating the need
for trailing cables
• heavy equipment
unstable or falling • use desks strong enough to take the
from desks weight of the computer equipment
Personal injury • desks collapsing under • use large desks and tables so that
weight/desks not hardware is not too close to the edge
designed to take the where it could fall off
weight

Cambridge IGCSE Information and Communication Technology Teacher's Guide 52


© David Watson 2021
Cambridge IGCSE Information and Communication Technology Theory Workbook answers

2 a e-safety:
• refers to the benefits, risks and responsibilities when using IT equipment
• often defined to be the safe and responsible use of IT technology
• also concerned with user behaviour as well as electronic security when: using the
internet, when sending/receiving emails, using social media or online gaming.
b Five from:
• When using the internet make sure that the websites being used can be trusted (for
example, look out for websites including https and/or the green padlock symbol).
• Only purchase items from websites that offer secure, encrypted connections.
• When using search engines, always make sure the device settings are set to 'safe search'
and the highest possible level of security is used.
• Only use websites recommended by teachers, parents or from trusted sources.
• Be careful what you download; is the material potentially offensive or could it be
malware?
• It is essential that anti-virus or anti-malware software is always running in the
background and is kept up to date.
• Always remember to log out of sites when you have finished using them; remember
that cookies are used every time you log into a website (take particular care with
websites that store key data such as bank account or credit/debit card details).
• Check that email addresses or website addresses pertaining to come from a genuine
company contain the company name; for example, a web page with the address
[email protected] should be treated with caution, whereas
[email protected] is more likely to be genuine.
3 a i Three from:
• name
• address or email address
• ID card/passport number
• IP address
• cookie ID
• advertising identifier on a mobile phone
• date of birth
• banking details (account number)
• photograph of an individual.

Cambridge IGCSE Information and Communication Technology Teacher's Guide 53


© David Watson 2021
Cambridge IGCSE Information and Communication Technology Theory Workbook answers

ii Three from:
• ethnicity
• political views
• membership of a political party
• membership of a trade union
• religion
• sexual orientation
• criminal record
• genetic data/DNA
• biometric data.
b Three from:
• predators (people who prey on others who they see as vulnerable)
• cyber bullying (the use of electronic communication to bully a person, typically by
sending messages of an intimidating or threatening nature)
• use of webcams which allow people to see into homes
• voice-masking technology (to disguise a voice so you cannot tell their sex or age, or
even their accent)
• viruses, phishing or spyware
• violence in the game itself, which can lead to violent behaviour in reality.
4 Descriptions of security risk Name of security risk
The act of gaining unauthorised access to a user’s computer hacking
The use of legitimate-looking emails that contain links to fake
websites; once the user clicks on the link, their browser is sent to phishing
this fake website
Malicious code installed on a user’s HDD/SSD or on a web
server; the code will redirect the user’s browser to a fake website pharming
without their knowledge
Program code that can replicate, with the intention of deleting,
corrupting or altering data/files on a computer’s HDD/SSD; this virus
causes the computer or software to malfunction
Malware that does not need an active host program to do damage
to, for example, a network of computers; they replicate without worm
targeting any specific files or programs on a computer
Software that gathers information by monitoring keyboard
activity carried out on a computer; the gathered data is sent back key logger/spyware
to the cybercriminal who sent the software in the first place

Cambridge IGCSE Information and Communication Technology Teacher's Guide 54


© David Watson 2021
Cambridge IGCSE Information and Communication Technology Theory Workbook answers

5 a shoulder surfing (B)


b vishing (D)
c ransomware (A)
d skimmer (D)
e adware (A)
6 a

b i digital certificate:
• a pair of files stored on a user’s computer used to encrypt and decrypt
communications
• files divided into public key and private key.
ii Three from:
• sender’s email address
• name of digital certificate owner
• serial number
• expiry date
• public key
• digital signature of CA (certificate authority).
c secure sockets layer:
• type of protocol
• … that allows data to be sent and received securely over a network/internet
• recognised by appearance of https and/or green padlock.
7 a secure sockets layer (C)
b automatic teller machine (D)
c one-time passcode/password (A)

Cambridge IGCSE Information and Communication Technology Teacher's Guide 55


© David Watson 2021
Cambridge IGCSE Information and Communication Technology Theory Workbook answers

8 a Pharming is software on a hard drive or web server that sends the web browser to a fake
website without any action from a user; the clicking on a link in an email is actually known
as phishing.
b Using a scanned image of a card is not enough to make a plastic, usable copy; the
magnetic stripe needs to be magnetically copied using a skimmer or shimmer (if the chip is
to be read as well).
c Backing up files does not safeguard against a virus attack because the backed-up data may
contain the virus attachments, which would then be reintroduced into the computer system
if the backed-up files were reinstalled.
d Changing passwords does not guard against key logging software because this is
programming code saved on the hard drive/SSD which can come from a number of
sources.
e The data protection act does not stop hackers; it can merely implement legal action if the
hacker is caught in the act, but does not stop them from carrying out the hacking attack in
the first place.
9 Dangers include:
• Identity theft:
• Do not give out personal information or photos of yourself to people you do not know;
do not let strangers access such photos by always making sure you use the privacy
settings when posting photos of yourself on social media sites.
• The risk of personally identifying yourself or others, risks criminals knowing where
you live:
• It is important that none of the photos you post can link you to a place or an address
(for example, it is not a good idea to show the number plate on a car because it is
possible to find your address from this information); particular care should be taken not
to post photos of yourself in some form of school uniform; again, this gives somebody
information about where they can find you. Do not post email addresses or real house
addresses, because these can be used to find information about you, or lead to stalking
or even breaking into your house.
• You know nothing about strangers on the internet and they may try to exploit you:
• Always maintain privacy settings to stop 'non-friends' from contacting you and make
sure you control who has access to your profile. Only make friends with people you
know or who are known to other friends.
• Block or report anybody who acts suspiciously or uses inappropriate language.
• Be very careful with the language used in chat rooms; always use a nickname and
not your real name.
• Keep private and personal data secret.
• Stay in public chat rooms.
• Never arrange to meet anyone for the first time on your own.
• Always tell an adult if anyone you do not know wants to meet you in person.
• Avoid the misuse of images.
• Always respect people’s confidentiality.

Cambridge IGCSE Information and Communication Technology Teacher's Guide 56


© David Watson 2021
Cambridge IGCSE Information and Communication Technology Theory Workbook answers

10 a Encrypt the connection Encrypt the actual email Encrypt stored or


with your email provider: messages: archived email messages:
• Encryption of the • Encryption of emails • Any backed-up
connection with your themselves prevents a messages stored on
email supplier prevents hacker making sense of your email supplier’s
unauthorised users from any intercepted server also need to be
intercepting and messages (keeping any encrypted.
capturing login details sensitive or confidential • If a hacker acquires
as well as any email information safe). access to this server,
messages sent or they could then gain
received. access to your stored or
• As the emails leave archived messages.
your email supplier’s
server and travel to their
destination server they
are at risk; encryption
will give the additional
protection described
above.

b Four from:
• online banking and all online financial transactions
• online shopping/commerce
• when sending software out to a restricted list of users
• sending and receiving emails
• using cloud storage facilities
• intranets and extranets (as well as the internet)
• Voice over Internet Protocols (VoIP) when carrying out video chatting and/or audio
chatting over the internet
• used in instant messaging
• when making use of a social networking site.

Cambridge IGCSE Information and Communication Technology Teacher's Guide 57


© David Watson 2021
Cambridge IGCSE Information and Communication Technology Theory Workbook answers

11

12 a • a form of verification when logging in to a website which requires two methods of


authentication to verify who a user is
• uses a one-time passcode (OTP) which is usually an 8-digit PIN
• … which needs to be keyed in to authenticate a user
• this OTP PIN is normally sent to a mobile device nominated by the user.
b Step order Step description

6 Access to website is now allowed


The website asks Karl to input his user ID and password into the
3
login web page
1 Karl registers his mobile phone with the website

4 An 8-digit PIN is sent back to Karl’s mobile phone

5 Karl keys the 8-digit PIN into the web page using his tablet

2 Karl logs on to the website from his tablet

Cambridge IGCSE Information and Communication Technology Teacher's Guide 58


© David Watson 2021
Cambridge IGCSE Information and Communication Technology Theory Workbook answers

c • an email is sent to Karl which contains a link to a webpage where the password
can be re-set
• another email is then sent to Karl warning him that their password has just been
changed and asking him to report if it was not him that made this change.
13 a i Three from:
• Fingerprints are fairly unique, therefore this technique would improve security
because it would be difficult to replicate a person’s fingerprints.
• Other security devices (such as magnetic cards) could be lost or even stolen, which
makes them less effective.
• It would be impossible to 'sign in' for somebody else because the fingerprints
would match up to one person only on the database.
• Fingerprints cannot be misplaced; a person always has them.
ii Three from:
• It is relatively expensive to install and set up.
• If a person’s fingers are damaged through an injury, this can have an effect on the
scanning accuracy.
• Some people may regard it as an infringement of civil liberties.
b i Three from:
• signature recognition
• retina scans
• iris recognition
• face recognition
• voice recognition.

Cambridge IGCSE Information and Communication Technology Teacher's Guide 59


© David Watson 2021
Cambridge IGCSE Information and Communication Technology Theory Workbook answers

ii One technique from:

Biometric
Benefits Drawbacks
technique
• non-intrusive
• if individuals do not sign their
• requires very little time names in a consistent manner there
Signature to verify (about five may be problems with signature
recognition seconds) verification
• relatively low-cost • high error rate of 1 in 50
technology
• very high accuracy • it is very intrusive
Retina • there is no known way • it can be relatively slow to verify a
scans to replicate a person’s retina scan with stored scans
retina pattern • very expensive to install and set up
• very high accuracy • very intrusive
Iris • verification time is • uses a lot of memory for the data to
recognition generally less than 5 be stored
seconds • very expensive to install and set up
• non-intrusive method • it is affected by changes in lighting,
Face the person’s hair, their age, and if
• relatively inexpensive
recognition
technology the person is wearing spectacles
• a person’s voice can be easily
recorded and used for unauthorised
• non-intrusive method
access
• verification takes less
Voice • low accuracy
than 5 seconds
recognition • an illness, such as a cold, can
• relatively inexpensive
change a person’s voice, making
technology
absolute identification difficult or
impossible

Cambridge IGCSE Information and Communication Technology Teacher's Guide 60


© David Watson 2021
Cambridge IGCSE Information and Communication Technology Theory Workbook answers

14 True False
Statement
(✓) (✓)
A Trojan horse contains malicious code embedded in legitimate-looking

software; it needs to be executed by an end-user
Eyestrain is an example of a safety risk associated with using IT equipment ✓
A person’s political and religious views are regarded as being personal data ✓
Http in a browser window indicates that the website is using SSL encryption ✓
Smishing uses the SMS system on a mobile phone to send out fake text

messages to a user
The term malicious use refers to data deletion, fraud, identity theft and

selling personal and sensitive data
Worms require an active host program to be initiated in a computer or

computer network
Plaintext is the result of putting cyber text through an encryption algorithm ✓

9 Audiences
1 a Three from:
• the age of the target group
• the experiences of the audience
• the expectations of the audience
• the knowledge of the audience.
b Three from:
• interviewing a cross-section of the target group
• giving out paper questionnaires to people in the target group
• creating online surveys
• carrying out market research – this could involve the two techniques described above
plus focus groups, but would certainly involve a more sophisticated and in-depth
analysis of the data received (it would all depend on how large the 'affected' audience
is likely to be).
2 a Creating illegal copies of software.
b Three from:
• When software is being installed, the user could be asked to key in a unique reference
number or product key (a string of letters and numbers) which was supplied with the
original copy of the software (for example: 4a3c 0efa 65ab a81e) – without a valid
product key the software will not work.
• The original software packaging often comes with a sticker informing the purchaser
that it is illegal to make copies of the software; the label is often in the form of a
hologram indicating that this is a genuine copy.

Cambridge IGCSE Information and Communication Technology Teacher's Guide 61


© David Watson 2021
Cambridge IGCSE Information and Communication Technology Theory Workbook answers

• Some software will only run if the CD-ROM, DVD-ROM or memory stick is actually
in the drive; this stops illegal multiple use and network use of the software.
• Some software will only run if a dongle is plugged into one of the USB ports.
• The user will be asked to click 'OK'/'I AGREE' or put a cross in a box to agree to the
licence agreement before the software continues to install – while this does not stop
piracy it does make it clear that the software is legally protected by copyright.
c Three from:
• It is illegal to make a software copy and then sell it or give it away to a friend or
colleague.
• It is illegal to use software on a network or in multiple computers unless a licence has
been acquired to allow this to happen.
• It is illegal to use coding from the copyright software in your own software and
then pass this software on or sell it as your own without the permission of the
copyright holders.
• It is illegal to rent out a software package without permission to do so from the
publishers.
• It is illegal to use the name of copyrighted software on other software without
agreement to do so.
3

4 a For example:
• age range
• income levels
• what other games they like
• other interests
• are there any additional needs?

Cambridge IGCSE Information and Communication Technology Teacher's Guide 62


© David Watson 2021
Cambridge IGCSE Information and Communication Technology Theory Workbook answers

b Age range – for example:


Young children will respond to:
• bright, cheerful colours
• animation and sound
• more pictures than text (less writing)
• large font and simple short words.
Adults and older children will respond to:
• attractive display
• interesting content
• a good mixture of text and images
• appropriate language level
• use of bullet points to make the content easier to read.
Income levels – for example:
• Can the target audience afford the game that is being designed?
• Should the game be made simpler to code, so that it costs less to develop?
• Should there be in-game purchases?
Other games they like – for example:
• Are there similar games available that this audience likes, e.g. space exploration
games, driving games?
• What features of those games does the audience like/dislike?
Other interests – for example:
• Could other audience interests influence the game?
• For instance, if they like rock music will that influence the kind of music that plays in
the game?
Additional needs – for example:
• Are there ways in which the game should cater for additional needs, such as reading
out on-screen text, making use of high-contrast colours?
c Understanding how the audience is made up, and what they are attracted to, helps you to
design a game that appeals directly to them. Similarly, you can also understand what is
likely to put them off the game. For instance:
• If the audience is made up of older people, or people with visual impairments then it is
important to make sure the game has clear-to-read fonts.
• Complex language can be off-putting to children or people where English is their
second language; the text needs to be clear and easy to read.
• Difficult games are attractive to some audiences but unattractive to others – ensuring
the right level of difficulty is critical to a successful game. It is necessary to hold the
attention of the users, otherwise they will give up using the game.
• Good, attractive screen designs will attract users to the game.
• Keeping interfaces clear and easy to use attracts people.

Cambridge IGCSE Information and Communication Technology Teacher's Guide 63


© David Watson 2021
Cambridge IGCSE Information and Communication Technology Theory Workbook answers

5 a product key:
• string of letters and numbers (hex notation)
• supplied with original software
• this key needs to be keyed in when software is being installed to check its authenticity.
b software piracy:
• making an illegal copy of software and then selling it or giving it away to a friend or
colleague
• using software on a network or in multiple computers without a licence
• using coding from copyright software in your own software without the permission of
the copyright holders
• renting out software without permission to do so from the publishers
• using the name of copyrighted software on other software without agreement to do so.
c a dongle:
• a small device plugged into a USB port used to protect the software
• it may contain important files and the software will only run if the dongle is present
which is therefore an additional layer of security.
d infringement of software copyright:
• illegal copying or distribution of software, for all of the reasons given in b above.
6 True False
Statement
(✓) (✓)

A very young audience requires a fairly short presentation ✓

Sound, video and animation will always detract from the message given

in a presentation
The gender of a target audience when developing new products does not

need to be considered
When developing a new product, it is irrelevant to consider the income

levels of the target group
A hologram on the cover of a new CD/DVD is used to indicate it is a

genuine copy
It is illegal to make copies of software and then give copies of it to friends

and family

Cambridge IGCSE Information and Communication Technology Teacher's Guide 64


© David Watson 2021
Cambridge IGCSE Information and Communication Technology Theory Workbook answers

10 Communication
1 a Three from:
• Many countries require senders of emails to obtain 'opt in' permission before the emails
are sent out.
• Companies must provide a subscriber with a very clear way to unsubscribe from their
listings.
• Companies and organisations must make their privacy policy very clear to subscribers
and they must be made aware of such policies.
• Many countries do not allow companies or organisations to harvest email addresses
(this is the process of capturing lists of email addresses).
• A valid postal address must accompany emails from companies or organisations.
• It is important that emails must not be sent out with a false or misleading subject line.
b Passive attacks include the release of email material to other users without your consent.
Active attacks involve the modification of your messages or even denial of service (i.e.
overloading your system by sending you thousands of emails, which 'clogs up' your
computer and makes internet access almost impossible). Active attacks can also involve
viruses or phishing attacks.
c Three from:
• It is easier for a user to send out multiple emails if the addresses are all grouped
together under a single name; the user only needs to use that single name in the 'to'
box.
• Companies and organisations can group people together for marketing purposes, for
example according to age, hobbies, favourite music and so on – this means that each
email can target specific groups.
• Companies use email groups to set up meetings (for example, for a video conference)
to ensure that everybody is always invited to attend – it would be easy to forget a
person if the email addresses were all typed in individually; this way you can be sure
all the correct recipients are sent messages.
2 a Internet Intranets
Feature
(✓) (✓)
Information available to users is specific to a particular

company or organisation only
Requires passwords and user IDs to be entered to gain access to

the network

Allows public access to information on a global scale ✓

Sits behind a firewall to give protection from hackers and from



viruses
Using an ISP account, it is possible to access the network from

anywhere in the world

Cambridge IGCSE Information and Communication Technology Teacher's Guide 65


© David Watson 2021
Cambridge IGCSE Information and Communication Technology Theory Workbook answers

b A = external users, B = firewall, C = extranet server


c Three from:
• Intranets are safer because there is less chance of external hacking or viruses.
• It is easier to prevent external links to, for example, certain websites.
• Companies can ensure that the information available is specific to their needs.
• It is easier to send out sensitive messages in the knowledge that they will remain within
the company.
• Intranets offer better bandwidth than the internet, thus there are fewer connection limits
than with the internet (that is, the number of bits per second that can be transmitted are
usually higher within an intranet).
3 a The use of 'https' in the address bar, and the presence of a green padlock.
b i hypertext transfer protocol (B)
ii file transfer protocol (D)
iii blind carbon copy (B)
iv uniform resource locator (C)
v internet service provider (D)
4 a Feature Blogs Wikis
(✓) (✓)

Updated on a regular basis by the author only ✓

Anyone can edit, delete or modify the content ✓

Organised in reverse chronological order ✓

Can only be updated and edited by the author ✓

Can be easily edited using a web browser ✓

b Four from:
• Each member is provided with free web space.
• Each member can build their own private and public profiles.
• It is possible to upload content such as text messages, photos and videos.
• It is possible to post public messages to others on the site.
• Members are given free instant messaging and video chatting.
• It is possible to email other members within the community.
• Members can create pages where they can post photos, articles, and so on.
• It is possible to invite people to become friends.
• Members have control over who can access their private or personal data.

Cambridge IGCSE Information and Communication Technology Teacher's Guide 66


© David Watson 2021
Cambridge IGCSE Information and Communication Technology Theory Workbook answers

c i ISP:
• stands for internet service provider
• company that provides users with access to the internet
• requires a monthly fee
• has equipment and infrastructure to allow internet access.
ii netiquette:
• stands for interNET etIQUETTE
• it means the need to respect other users views and …
• … display common courtesy when posting views in online discussion groups or
when sending out emails.
iii microblog:
• used in social networking sites to …
• … make short, frequent posts (blogs)
• posts can be created using instant messaging, emails, or, for example, tweets
• social networking sites use microblogs to allow members to update their profiles.
iv URL:
• stands for uniform resource locator
• used by browsers to find and access websites on webservers
• represented by a series of numbers (for example 109:108:158:1) or by
alphanumeric format: protocol://website address/path/filename.
5 Advantages, three from:
• a very fast and easy way to search for information
• information available is vast, therefore a search engine is needed to sift through potential
websites based on search criteria
• there is no need to go to a library to do research
• searching is free.
Disadvantages, three from:
• the internet is not regulated – anything can be posted on a web page and, consequently,
information may be biased or totally incorrect (books, on the other hand, usually undergo
some form of review before being published)
• there is a risk of accessing inappropriate websites when using search engines; these can
take many forms and can be very distressing
• it is too easy to be distracted when searching on the internet – users can find computer
games or enter social networking sites instead of doing their work
• there is a risk of 'information overload' if the user lacks the necessary experience or
expertise when using search engines

Cambridge IGCSE Information and Communication Technology Teacher's Guide 67


© David Watson 2021
Cambridge IGCSE Information and Communication Technology Theory Workbook answers

• because it is very easy to copy material from the internet, there is a huge risk of plagiarism;
this is more likely to occur than when using hard-copy books because this requires
considerably more effort than a simple copy and paste
• some research skills are lost when using the internet as search engines do all the work
for you.
6 a Four from:
• Do not be abusive and do not threaten people.
• Do not send spam – do not repeatedly send somebody the same information.
• Be clear and succinct with your message – do not write long messages full of irrelevant
information.
• Respect people’s privacy and do not discuss or publish information that might
embarrass somebody.
• Forgive people’s mistakes – do not be compelled to respond to an error.
• Do not use capital letters to highlight comments – this is seen as 'shouting' in emails,
text messages or online forums.
• Do not plagiarise – always acknowledge quotes used in any messages you write.
• Do not use too many emoticons because they might annoy your readers.
b • There is a need to respect other users' views.
• There is a need to display common courtesy.
• Users cannot see facial expressions or body language, therefore clear writing rules help
to make sure communications are clear.
7 a Internet World wide web (WWW)
• a collection of multimedia web pages
and other information on websites

• users can send and receive emails • uses http(s) protocols to transmit pages
written in hypertext mark-up language
• allows online chatting (via text, audio (HTML)
and video)
• uniform resource locators (URLs) are
• makes use of transmission protocols used to specify the location of web
(TCP) and Internet protocols (IP) pages
• a worldwide collection of • web resources are accessed by web
interconnected networks and devices browsers
• uses the internet to access information
from web servers

Cambridge IGCSE Information and Communication Technology Teacher's Guide 68


© David Watson 2021
Cambridge IGCSE Information and Communication Technology Theory Workbook answers

b i extranet:
• computer network based on internet technology
• … but designed to meet the internal needs of a company or organisation
• access restricted via passwords and user IDs
• access from specific computers or using a virtual private network (VPN).
ii virtual private network:
• secure connection to a private network (e.g. company’s secure server) made via the
internet
• secret keys used to encrypt all communications between the user and the private
network so no-one can 'eavesdrop', but user can access all of the resources.
8 a i https
ii www.hodder.com
iii .com
iv IGCSE_ICT
b True False
Statement
(✓) (✓)
It is regarded as adequate by law to simply delete images and

messages, declared as offensive, from social media, blogs or wikis
If part of a sender’s email address contains a company name, then
there is a need for the material in the email to follow company ✓
policies
A strong password contains any eight characters ✓
Unsolicited text messages sent to a recipient are known as spam

SMS
ISPs allow the user to view web pages ✓
The internet is an example of a moderated forum ✓
Web browsers provide the user with access to the internet (for a

monthly fee)
One of the problems with using search engines is known as

information overload

9 a i Copies of an email are sent to those in the 'cc' field – they are being sent the email for
reference but it is not addressed to them. The main recipients and 'cc' recipients can all
see the main recipients and the 'cc' recipients.
ii Like a carbon copy except that those in the 'bcc' field are invisible to everyone,
including each other. The only person who can see the 'bcc' recipients is the person
who sent the email. The main recipients and any 'cc' recipients can be seen by all the
'bcc' recipients.
iii This is a file that is added to an email.

Cambridge IGCSE Information and Communication Technology Teacher's Guide 69


© David Watson 2021
Cambridge IGCSE Information and Communication Technology Theory Workbook answers

b i Only Nicole and the sender can see her name as a recipient.
ii All users can see that Ahmed received the email.
c Some spam emails may contain malicious attachments and forwarding them only makes it
more likely that the malware will spread.
Emails sent to you may contain personal, sensitive, or confidential information.
Forwarding this information may break company policy, put people's security at risk, put
someone in an awkward position or simply embarrass someone.
Emails containing photographs of other people should never be forwarded without
permission.
10

Cambridge IGCSE Information and Communication Technology Teacher's Guide 70


© David Watson 2021
Cambridge IGCSE Information and Communication Technology Theory Workbook answers

11 Discussion should include some of the following:


• Is the information accurate? (cross-check with other sources)
• Is the information/website up to date? (when was it last reviewed)
• Is it unbiased? (check origin of authors)
• Is it a trusted source? (for example, .ac, .gov. etc.)
• Have reliable resources been used? (check list of any references given)
• Does the website contain advertising? (it may therefore be biased)
• Check spelling and grammar – many errors should raise some doubt as to the information
being fully checked and accurate.
• Avoid anonymous authors.
• Check any links to other websites.
• If it is a wiki then be careful since wikis can be edited by anyone.
• Are any quotes fully referenced? (if not then they may be false).
12 There should be a series of points made for and against the internet being policed, along with a
conclusion. It does not matter which conclusion the student comes to as long as it is a
reasonable argument backed up by the points made.
• Pros:
• It would prevent illegal material or activities being posted on websites (for example,
hate speech, offensive content and so on).
• It would prevent the publishing of undesirable information which can have serious
consequences (for example, how to be a hacker).
• Some form of control would prevent children and other vulnerable groups being
subjected to undesirable websites, including criminal material.
• Some form of control would stop incorrect information being published on websites.
• Cons:
• Material published on websites is already available from other sources.
• It would be very expensive to 'police' all websites and users would have to pay for this
somehow.
• It would be difficult to enforce rules and regulations on a global scale.
• It can be argued that policing would go against freedom of information/speech.
• Many topics and comments posted on websites are already illegal and laws already
exist to deal with the offenders.
• Who is to decide how the global internet is to be policed? Different countries and
different people have different ideas about what should and should not be permitted.

Cambridge IGCSE Information and Communication Technology Teacher's Guide 71


© David Watson 2021

You might also like