0% found this document useful (0 votes)
37 views6 pages

Note

The document provides comprehensive notes for IGCSE ICT Paper 1, covering topics such as unauthorized access, malware, phishing, data security, online payment systems, and the impact of the internet on employment. It highlights the importance of strong passwords, anti-malware software, and backup procedures, while also discussing legal and ethical considerations in information use. Additionally, it addresses online safety, environmental impacts, and includes exam-style questions for practice.

Uploaded by

Ariful Hasan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
37 views6 pages

Note

The document provides comprehensive notes for IGCSE ICT Paper 1, covering topics such as unauthorized access, malware, phishing, data security, online payment systems, and the impact of the internet on employment. It highlights the importance of strong passwords, anti-malware software, and backup procedures, while also discussing legal and ethical considerations in information use. Additionally, it addresses online safety, environmental impacts, and includes exam-style questions for practice.

Uploaded by

Ariful Hasan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

Full Descriptive and Informative Notes for IGCSE ICT Paper 1

(Theory)

1. Unauthorized Access & Accidental Deletion

Unauthorized Access: Unauthorized access refers to situations where individuals gain access to computer
systems, networks, or data without the required permission. This is a major concern for organizations because it
can result in data breaches, theft, or misuse of sensitive information.

 Direct Entry: This includes methods such as brute force attacks where a user attempts to guess
passwords repeatedly using software.
 Indirect Entry: This involves exploiting software bugs or manipulating users into revealing access
credentials (e.g., through social engineering).
 Botnets: A collection of compromised computers (often infected by malware) controlled remotely to
perform malicious activities without the owner's knowledge.

Accidental Deletion: Data may be deleted accidentally due to human error. Examples include:

 Pressing the wrong key


 Formatting a drive unintentionally
 Sudden power loss during data write operations

To reduce the risk of accidental deletion, regular backups and permission-based access control should be used.

2. Malware

Malware (Malicious Software): Malware refers to any software intentionally designed to cause damage to a
computer, server, or computer network.

 Virus: A program that can replicate itself and spreads to other files. It can corrupt files, delete data, or
make the system unstable.
 Worm: Similar to a virus but spreads automatically across a network without user action.
 Trojan Horse: A malicious program disguised as legitimate software. Often creates a backdoor for
hackers.
 Spyware: Installed secretly to monitor user activity and gather sensitive information.
 Ransomware: Encrypts files and demands payment for a decryption key. Paying does not guarantee
data recovery.

Prevention:

 Use updated anti-malware software.


 Avoid opening unknown email attachments or visiting unsafe websites.
 Regularly update operating systems and software.
3. Phishing & Pharming

Phishing: A type of social engineering attack where attackers send fake emails or messages that look like
they're from trustworthy sources to steal information.

 Effects: Identity theft, bank fraud, data breaches.


 Prevention: Use spam filters, staff awareness training, verify email sources.

Pharming: Redirects a user from a legitimate website to a fraudulent one using DNS poisoning.

 Effects: User unknowingly enters login info to fake site.


 Prevention: Anti-malware, checking for HTTPS, and padlock icon.

4. Securing Data

Passwords: Strong passwords contain a mix of letters, numbers, and symbols. Change regularly.

Biometrics: Uses unique human features for identification (fingerprint, retina, face scan). Harder to forge than
passwords.

CAPTCHA: Tests like selecting images or entering distorted text to confirm the user is human.

Anti-malware Software: Detects and removes malicious software. Includes antivirus, anti-spam, anti-spyware.

Access Rights: Control who can view or edit files. Levels include full, read-only, and no access.

HTTPS: Encrypts communication between browser and server. Safer than HTTP.

Email Safety: Be cautious of unknown senders, attachments, and suspicious links.

Backup Procedures:

 Full Backup: All files saved; time-consuming.


 Incremental Backup: Only new or changed files saved; faster.
 Storage: Local (hard drives) or remote (cloud).

5. Online Payment Systems

Types:

 Bank cards (credit/debit)


 Third-party processors (PayPal, Stripe)
 Contactless (NFC)

Security Features:

 Encryption
 Two-Factor Authentication (2FA)
 HTTPS
 Bank monitoring and fraud alerts

6. Impact of Internet on Employment & Working Practices

Skill Requirements: Increased demand for tech literacy, critical thinking, and problem-solving.

New Opportunities:

 Cyber security professionals


 AI/ML engineers
 Digital marketers
 Data scientists

Job Losses: Automation replaces some manual roles. Lifelong learning is essential.

Working Practices:

 Flexible/Remote work allows employees to work from anywhere.


 Benefits: No commuting, better work-life balance.
 Drawbacks: Lack of social contact, harder to manage employees.

7. Access to Information

Internet Advantages:

 Real-time updates (news, sports, weather)


 24/7 access
 Interactive learning (VLEs, gamification, social learning)

Digital Divide: Gap between those with access to digital tech and those without. Influenced by income,
geography, politics, and education.

8. Online Communities

Types:

 Social Networks (Facebook, LinkedIn)


 Online Gaming (Steam, Xbox Live)
 Workspaces (Slack, Google Workspace)
 VLEs (Moodle, Google Classroom)

Features:
 Profiles, status updates, messaging
 Groups, friend lists, forums
 Notifications, commenting, reactions
 Sharing content and collaboration tools

9. User-Generated Content

Wikis: Websites edited by users collaboratively.

Forums: Online message boards for structured discussion.

Video/Photo Sharing Sites: YouTube, TikTok, Instagram. Allow uploads, comments, likes.

Social Bookmarking: Save/share links (Pinterest, Reddit).

10. Legal & Ethical Use of Information

Data Protection Act (DPA): Protects personal data from misuse. Includes principles such as:

 Data must be accurate and up to date


 Collected for specified, lawful purposes
 Not kept longer than necessary

Copyright: Protects original work. Illegal to copy, distribute, or alter without permission. Includes software
piracy.

Plagiarism: Presenting someone else’s work as your own. Avoid by referencing sources.

11. Monitoring Individuals

Methods:

 CCTV, GPS, ANPR


 Social media activity
 Internet browsing and communication logs

Pros: Public safety, crime prevention, locate missing persons. Cons: Privacy invasion, high costs, public
distrust.

12. Health & Physical Safety

Health Risks:
 RSI (from repetitive typing)
 Eye strain (staring at screens)
 Back/neck pain (poor posture)
 Headaches (lighting, screen flicker)

Prevention:

 Ergonomic furniture
 Anti-glare screens
 Regular breaks
 Proper screen brightness

Physical Safety Risks:

 Electrocution (spills, damaged cables)


 Fire (overloaded sockets)
 Trip hazards (loose wires)

13. Online Safety

Why It's Needed: To protect users from scams, cyberbullying, privacy threats, and online predators.

Good Practices:

 Avoid sharing personal information


 Use privacy settings on social media
 Use anonymous usernames in games
 Block/report harmful users
 Respect others online (digital citizenship)

14. Environmental Impact

Carbon Footprint: Emissions from device manufacturing and usage.

E-Waste: Toxic electronic waste harming the environment.

Resource Use: Digital devices use rare materials.

Energy Use: Data centers and homes consume significant power.

Sustainability Solutions:

 Recycling programs
 Renewable energy
 Energy-efficient devices
15. Evaluating Information

Criteria to Check:

 Accuracy: Is the source reliable and evidence-based?


 Age: Is the info current?
 Relevance: Does it meet the research need?
 Reliability: Does it match other credible sources?
 Bias: Is it balanced or one-sided?

Types of Sources:

 Primary: Created by you (surveys, photos)


 Secondary: Created by others (books, articles)

IGCSE Paper 1 - Exam Style Questions (Edexcel Format)

Section A: Multiple Choice

1. Which of the following best describes a 'botnet'? A. A type of antivirus software


B. A group of interconnected printers
C. A network of infected computers controlled by a hacker
D. A firewall designed to prevent spam
[1 mark]
2. What is the main purpose of a CAPTCHA? A. Encrypt user data
B. Prevent automated access to websites
C. Speed up internet browsing
D. Scan emails for viruses [1 mark]

Section B: Short Answer

3. Explain two ways a user can prevent unauthorised access to their computer system.
[4 marks]
4. Describe what is meant by ‘ransomware’ and explain one way to reduce the risk of infection.
[4 marks]
5. State three features of a Virtual Learning Environment (VLE).
[3 marks]
6. Give two reasons why someone might evaluate the accuracy of an online article.
[2 marks]

Section C: Extended Response

7. A student is creating an online project and wants to protect it from loss or damage. Discuss the methods
they can use to secure their work. Include reference to backups and access controls.
[6 marks]
8. Discuss the environmental effects of using digital devices and explain how these effects can be reduced.
[6 marks]
9. Explain the advantages and disadvantages of working from home for both employers and employees.
[6 marks]

You might also like