Computer Scinece
Computer Scinece
ORG
CAIE IGCSE
COMPUTER
SCIENCE
SUMMARIZED NOTES ON THE THEORY SYLLABUS
CAIE IGCSE COMPUTER SCIENCE
128 64 32 16 8 4 2 1
1. Data Representation 1 1 1 0 1 1 1 0
Binary Value Hexadecimal Value Denary Value Note that when the value itself is not divisible by 2, it is
0000 0 0 divided by the previous value of the current number and 1
0001 1 1 is added to the remainder column for that specific
0010 2 2 number
When you reach 0, the remainder has to be read from
0011 3 3
bottom to top giving us the binary
value ( as in this case, it
0100 4 4 is 1 0 0 0 1 1 1 0 )
0101 5 5
0110 6 6 Converting Hexadecimal to Binary
0111 7 7
1000 8 8 Separate each value from each other and convert them to
1001 9 9 denary
Each separate denary value to be converted to binary
1010 A 10
All the binary values to be merged together
1011 B 11 e.g.
1100 C 12
1101 D 13 Hexadecimal : 2 1 F D
Denary : 2 1 15 13
1110 E 14
Binary : 0010 0001 1111 1101
1111 F 15
Number Conversions
Converting Binary To Hexadecimal
1.2. Converting Binary to Denary Divide the binary value into groups of 4 starting from the
right. If at the end, the last division is less than 4, add 0s
Take the binary value and place it in columns of 2 raised until it reaches 4
to the power of the number of values from the right For each group, find the denary value as shown above,
starting from 0.e.g. For binary value 11101110, place it in and then convert each denary value to its corresponding
a table like this: hexadecimal value (if less than 10, then itself, else, 10 is
A, 11 is B, 12 is C, 13 is D, 14 is E and 15 is F).
WWW.ZNOTES.ORG
CAIE IGCSE COMPUTER SCIENCE
WWW.ZNOTES.ORG
CAIE IGCSE COMPUTER SCIENCE
-128 + 32 + 16 + 8 + 2 = -70
Unicode
1.4. Use of the Hexadecimal System
ASCII does not contain all of the international languages,
Examples: thus Unicode is used to solve this problem
Defining colours in Hypertext Markup Language (HTML) For the first 128 values, it is the same to ASCII
Media Access Control (MAC) addresses (a number which Unicode supports up to four bytes per character allowing
uniquely identifies a device on a network) mutliple languages and more data to be stored
Assembly languages and machine code
Memory Dumps
Debugging (method to find errors in a program)
Sound
Display error codes (numbers refer to the memory
Sound is analogue, and for it to be converted to digital
location of the error)
form, it is sampled
IP (Internet Protocol) addresses
The sound waves are sampled at regular time intervals
Memory Dumps where the amplitude is measured, however, it cannot be
measured precisely, so approximate values are stored
Hexadecimal is used when developing new software or
when trying to trace errors How is sound recorded
Memory dump is when the memory contents are output
to a printer, monitor. The amplitude of the sound wave is first determined at set
time intervals
Assembly code and machine code (low level languages) The value is converted to digital form
Each sample of the sound wave is then encoded as a
Computer memory is machine code/ assembly code
series of binary digits
Using hexadecimal makes it easier, faster, less error
A series of readings gives an approximate representation
prone to write code compared to binary.
of the sound wave
Using machine code (binary) takes a long time to key in
values and prone to errors
Sampling Resolution:
0 is at 48
WWW.ZNOTES.ORG
CAIE IGCSE COMPUTER SCIENCE
The number of bits used to represent each colour is called Calculation of file size
the colour depth.
An 8 bit colour depth means that each pixel can be one of
The file size of an image is calculated as: image resolution
256 colours (because 2 to the power of 8 = 256) (in pixels) × colour depth (in bits)
A 1 bit color depth means each pixel can store 1 color The size of a mono sound file is calculated as: sample rate
(because 2 to the power of 1 is 2) - ( This is done as the bit (in Hz) × sample resolution (in bits) × length of sample (in
can either be 0 or 1, with 0 being white and 1 being black)
seconds). (For a stereo sound file, you would then
Increasing colour depth increases the size of the file when
multiply the result by two.)
storing an image
Image resolution refers to the number of pixels that make Musical Instrument Digital Format (MIDI)
up an image; for example, an image could contain 4096 ×
Storage of music files
3072 pixels
Communications protocol that allows electronic musical
Photographs with a lower resolution have less detail than
instruments
to interact with each other
those with a higher resolution
Stored as a series of demands but no actual music notes
When a bitmap image is ‘ blurry ‘ or ‘ fizzy ’ due to having
Uses 8-bit serial transmission (asynchronous)
low amount of pixels in it or when zoomed, it is known as
Each MIDI command has a sequence of bytes:
being pixelated.
First byte is the status byte – informs the MIDI device
High resolution images use high amounts of memory as
what
function to preform
compared to low resoultion ones
Encoded in the status byte is the MIDI channel
(operates on 16
different channels)
1.6. Measurement of the Size of Examples of MIDI commands:
Computer Memories Note on/off: indicates that a key has been pressed
Key pressure: indicates how hard it has been pressed
A binary digit is referred to as a BIT (loudness
of music)
8 bits is a byte Needs a lot of memory storage
4 bits is a nibble
MP3
Byte is used to measure memory size
Uses technology known as Audio Compression to convert
IECB System (more commonly used):
music and
other sounds into an MP3 file format
Name of memory No. of This compression reduces the normal file size by 90%
Equivalent Denary Value
size Bytes Done using file compression algorithms which use
1 kibibyte (1KB) 210 1 024 bytes Perceptual
Music Shaping
Removes sounds that human ear cannot hear properly
1 mibibyte (1MB) 220 1 048 576 bytes
Certain sounds are removed without affecting the
1 gibibyte (1GB) 230 1 073 741 824 bytes quality too
much
CD files are converted using File Compression Software
1 tibibyte (1TB) 240 1 099 511 627 776 bytes
Use lossy format as the original file is lost following the
1 125 899 906 842 624
1 pibibyte (1PB) 250 compression algorithm
bytes
MP4
Conventional System:
Name of memory No. of This format allows the storage of multimedia files rather
Equivalent Denary Value than just
sound
size Bytes
WWW.ZNOTES.ORG
CAIE IGCSE COMPUTER SCIENCE
Joint Photographic Experts Group (JPEG) 2.1. Types and Methods of Data
JPEG is a file formats used to reduce photographic file
Transmission
sizes
Data Packets
Reducing picture resolution is changing the number of
pixels per
centimetre
Packet Structure -
When photographic file undergoes compression, file size
Header
is reduced
Contains the IP address of the sender and the
JPEG will reduce the raw bitmap image by a factor
receiver
between 5 and 15
Sequence number of the packet
Size of the packet
Lossless and Lossy File Payload
Contains the actual data
Compression Trailer
Includes a method of identifying the end of the
packet
1.8. Lossless File Compression Error-Checking methods
Packet Switching - Method of data transmission where the
All the data bits from the original file are reconstructed data is broken into multiple packets. Packets are then sent
when the
file again is uncompressed independently from start to end and reassembled at the
Important for files where loss of data would be disastrous receiver’s computer.
(spreadsheet)
An algorithm is used to compress data Advantages Disadvantages
No data is lost No need to create a single
Packets may be lost
Repeated patterns/text are grouped together in indexes line of communication
Possible to overcome failed or More prone to errors in real-
Run-Length Encoding busy nodes time streaming
It reduces the size of a string of adjacent, identical data Delay at the receiver while
(e.g. repeated colours in an image) High data transmission speed the packets are being re-
A repeating string is encoded into two values: the first ordered
value represents the number of identical data items (e.g. Easy to expand package
characters) and the second value represents the code of usage
the data item (such as ASCII code if it is a keyboard
character) e.g. ‘aaaaabbbbccddddd’ becomes “05 97 04 Data Transmission
98 02 99 05 100”
RLE is only effective where there is a long run of repeated Simplex data transmission is in one direction only (e.g.
units/bits computer to printer)
One difficulty is that RLE compression isn't very good for Half-duplex data transmission is in both directions but not
strings like "cdcdcdcdcd". We use a flag to solve this, e.g. at the same time (e.g. phone conversation where only one
255 can be made the flag. Now 255 will be put before person speaks)
every repeating value, e.g. our previous example Full-duplex data transmission is in both directions
becomes 255 05 97 255 04 98 255 02 99 255 05 100 simultaneously (e.g. broadband connection on phone line)
where 255 now indicated that now the next character/set Serial data transmission is when data is sent one bit at a
of characters is approaching time over a single wire
Parallel data transmission is when data several bits (1
Lossy File Compression byte) are sent down several wires at the same time
The file compression algorithm eliminates unnecessary Comparsion of Serial and Parallel data transmission
bits of data
like MP3 and JPEG formats
Impossible to get original file back once compressed Serial Parallel
Reduces file quality Better for longer distances Better for short distances
(Telephone Lines) (Internal circuits)
WWW.ZNOTES.ORG
CAIE IGCSE COMPUTER SCIENCE
Serial Parallel
Expensive (More hardware
Cheaper Option
required)
Used when the size of data Used when speed is
transmitted is small necessary
Slower Option Faster than Serial
WWW.ZNOTES.ORG
CAIE IGCSE COMPUTER SCIENCE
WWW.ZNOTES.ORG
CAIE IGCSE COMPUTER SCIENCE
integrated circuits
Factors that determine the Software produces a digital image from the electronic
form
performance of a CPU Optical Character Recognition (OCR) is a software which
converts
scanned documents into a text file format
3.2. System Clock If the original document was a photo/image, then the
scanned image
forms an image file such as JPEG
The clock defines the clock cycle that synchronises all
Three-dimensional Scanners
computer operations. By increasing clock speed, the
processing speed of the computer is also increased. This 3D scanners can scan solid objects and produce a three-
doesn’t mean that the performance of the computer is dimensional
image
increased however. Scanners take images at several points, x, y and z (lasers,
magnetic, white light)
Overclocking The scanned images can be used in Computer Aided
Design (CAD) or
to a 3D printer to produce a working
Using a clock speed higher than the computer was designed model
for.
It leads to multiple issues Application of 2D Scanners at an Airport:
Operations become unsyncronised - (the computer would Make use of (OCR) to produce digital images which
frequently crash and become unstable) represent the
passport pages
can lead to serious overheating of the CPU Text can be stored in ASCII format
The 2D photograph in the passport is also scanned and
Length of data buses stored as jpeg
image
The passenger’s face is also photographed using a digital
The wider the data buses, the better the performance of the camera and
compared using face recognition software
computer Key parts of the face are compared (distance between
eyes, width of
nose)
Cache memory is located within the CPU itself A barcode is a series of dark and light parallel lines of
-- allows faster access to CPU varying
thicknesses
-- stores frequently used instructions and data that need to be The numbers 0 -9 are each represented by a unique
accessed faster, which improves CPU performance series of lines
The larger the cache memory size the better the CPU The left and right hand sides of the barcode are separate
performance using
guard bars
Allows barcode to be scanned in any direction
Barcode is read by a red laser or red LED
Cores
Light is reflected back off the barcode; dark areas
reflect
little light which allows the bars to be read
More the cores in the CPU, the better and faster the
Reflected light is read by sensors (photoelectric cells)
performance
Pattern is generated which is converted to digital
WWW.ZNOTES.ORG
CAIE IGCSE COMPUTER SCIENCE
WWW.ZNOTES.ORG
CAIE IGCSE COMPUTER SCIENCE
3D cutters can recognise objects in x, y, z direction This beam of light is then sent to a group of chromatic-
3D laser cutters can cut; glass, crystal, metal, wood coated
mirrors; these reflect the light back at different
wavelengths
Actuators When the white light hits the mirrors, the reflected light
has
wavelengths corresponding to red, green and blue
Used in many control applications involving sensors and
These three different light pass through three LCD
devices (ADC
and DAC)
screens; these
screens show the image to be projected as
Loudspeakers/Headphones millions of pixels in
grayscale
When the coloured light passes through the LCD screens,
Sound is produced by passing the digital data through a a red, green
and blue version of the grey image emerges
DAC then
through amplifier and then emerges from Finally, the image passes through the projector lens onto
loudspeaker the screen
Produced by voltage differences vibrating a cone in the
speaker at
different frequencies
WWW.ZNOTES.ORG
CAIE IGCSE COMPUTER SCIENCE
Used to store start up instruction (basic input/output Cloud storage is a method of data storage where data is
systems) stored on remote servers
Data/contents of a ROM chip can only be read, cannot The same data is stored on more than one server in case
be changed of maintenance or repair, allowing clients to access data
at any time. This is known as data redundancy.
Secondary Storage: The following are it’s types:
Hard Disk Drives (HDD) » Public cloud – this is a storage environment where the
customer/client and cloud storage provider are different
Data is stored in a digital format on the magnetic surface
companies
of the
disks (platter)
» Private cloud – this is storage provided by a dedicated
Number of read/write heads can access all of the
environment behind a company firewall; customer/client
surfaces of the
disk
and cloud storage provider are integrated and operate as
Each platter will have two surfaces which can be used to
a single entity
store the
data
» Hybrid cloud – this is a combination of the two above
Data is stored on the surfaces in sectors and tracks
environments; some data resides in the private cloud and
HDD have very slow data access compared to RAM
less sensitive/less commercial data can be accessed from
Solid-State Drive (SSD) a public cloud storage provider
\
No moving parts and all data is received at the same time There is a risk that important and irreplaceable data could
(not like
HDD) be lost from the cloud storage facilities.
Store data by controlling the movement of electrons
within NAND
chips, as 1s and 0s
Non-volatile rewritable memory
3.6. Embedded Systems
Benefits of using SSD rather than HDD:
Combination of Hardware and Software which is designed
More reliable (no moving parts)
to carry out a specific set of tasks.
Considerably lighter (suitable for laptops)
Embedded systems may contain -
Lower power consumption
Microcontrollers - CPU, RAM, ROM and other
Run much cooler than HDDs
peripherals on one single chip
Very thin
Microprocessor - Integrated circuit with CPU only
Data access is faster than HDD
System on Chips (SoC) - microprocessor with I/O ports,
Drawback – questionable longevity (20GB per day)
storage and memory
Off-Line Storage: Process of Embedded Devices -
CD/DVD Disks Input from the user is sent to the microprocessor
(ADC needed if the data is analogue)
Laser (red) light is used to read and write data in the Data from the user interface is also sent to the
surface of
the disk microprocessor
Use a thin layer of metal alloy to store data Microprocessor then sends signals to actuators which
Both systems use a single, spiral track which runs from is the output
the centre
of the disk to the edge Non-programmable devices need to be replaced if they
DVD uses Dual-Layering which increases the storage need a software update.
capacity (two
individual recoding layers) Programmable devices have two methods of updating -
Connecting the device to a computer and downloading
Blu-ray Disks the update
Updating automatically via a satellite, cellular or Wi-Fi
Uses blue laser to carry out read and write operations
link
Wavelength of laser light is less than CD and DVD (stores
up to five
times more data than DVD) < centre>Advantages and Disadvantages of using embedded
Automatically come with secure encryption (prevent systems
piracy and
copyright infringement)
Advantages Disadvantages
Used as back-up systems
Small in size, therefore can
Can be difficult to upgrade
USB Flash Memories easily fit into devices
The interface can be
Very small, lightweight suitable from transferring files Low cost to make
confusing sometimes
Small back-up devices for photo, music
Troubleshooting is a
Solid state so need to be treated with care Requires very little power
specialist’s job
Cloud Storage:
WWW.ZNOTES.ORG
CAIE IGCSE COMPUTER SCIENCE
The only differences between the two types are UAA is made Word Processor: Software used for manipulating text
Universally and cannot be changed, but it is opposite for LAA documents including creating, editing, and formatting text
with tools for copying, deleting, spell-checking, and
importing images.
4. SOFTWARE Spreadsheet: Organizes and manipulates numerical data
using a grid of lettered columns and numbered rows, with
4.1. Types of Softwares: each cell identified using a unique combination of
columns and rows. It can carry out calculations using
1. System Software e.g. Operating System, Utility formulas, produce graphs, and do modeling and "what if"
programs and device drivers calculations.
2. Application Software e.g. spreadsheet, word Database: Software used to organize, analyze, and
processor etc. manipulate data consisting of one or more tables that
hold records and fields. Provides the ability to query and
System Software: report on data, as well as add, delete, and modify records
in a table.
these are a set of programs which control and manage Control and Measuring Software: A program designed to
operations of hardware interface with sensors and allow a computer or
gives a platform for other softwares to run microprocessor to measure physical quantities and
WWW.ZNOTES.ORG
CAIE IGCSE COMPUTER SCIENCE
control applications by comparing sensor data with stored retrieve data as the HDD read-write head needs several
data and altering process parameters accordingly. movements to find the data.
Apps: A type of software designed to run on mobile When a file is deleted or extended, the vacant sectors are
phones or tablets, which are downloaded from an "App not filled up straight away by new data, causing the files to
Store" and range from games to sophisticated software become more scattered throughout the disk surfaces.
such as phone banking. Common examples include video A disk defragmenter rearranges the blocks of data to
and music streaming, GPS, and camera facilities. store files in contiguous sectors wherever possible,
Photo and Video Editing Software: Software that allows allowing for faster data access and retrieval.
users to manipulate digital photographs or videos, The defragmentation process can free up previously
including changing color, brightness, contrast, applying occupied sectors and leave some tracks empty.
filters and other enhancements, and creating transitions
between clips. Backup Software
Graphics Manipulation Software: Software that allows the
manipulation of bitmap and vector images, with bitmap Backup software is a utility software that helps in creating
graphics editors changing pixels to produce a different and managing backup copies of data files and programs.
image, while vector graphics editors manipulate lines, Manual backups using memory sticks or portable hard
curves, and text to alter the stored image as required. drives are good practices, but using operating system
backup utilities is also recommended.
Utility Software Backup utilities allow scheduling backups and only backup
files if changes have been made to them.
For total security, there could be three versions of a file:
Computer users have access to utility programs as part of
the current version stored on the internal HDD/SSD, a
system software locally backed-up copy on a portable SSD, and a remote
Utility programs can be initiated by the user or run in the
backup on cloud storage.
background without user input
Common utility programs include virus checkers,
defragmentation software, disk analysis and repair tools, Security Software
file compression and management software, backup
software, security tools, and screensavers. Security software is a utility software that manages
access control, user accounts, and links to other utilities
\n such as virus and spyware checkers.
It also protects network interfaces using firewalls to
4.2. Virus Checker / Anti Virus software prevent unauthorized access.
Security software uses encryption and decryption to
Virus checkers or anti-virus software are important for ensure intercepted data is unreadable without a
decryption key.
protecting computers from malware.
They should be kept up to date and run in the background It oversees software updates to verify legitimate sources
and prevent malicious software from installing.
to maintain their effectiveness.
Access control and user accounts use IDs and passwords
Anti-virus software checks files before they are run or
loaded and compares possible viruses against a database to secure user data and prevent unauthorized access.
of known viruses.
Heuristic checking is used to identify possible viruses that Screensavers
are not yet on the database.
Infected files are put into quarantine for automatic Screensavers display moving and still images on the
deletion or for the user to decide. monitor screen after a period of computer inactivity.
Anti-virus software must be kept up to date as new They were originally developed to protect CRT monitors
viruses are constantly discovered. from 'phosphor burn'.
Full system scans should be carried out regularly to detect Screensavers are now mostly used for customizing a
dormant viruses. device and as a part of computer security system.
They are used to automatically log out the user after a
certain period of inactivity.
Disk Defragmenting Software
Some screensavers activate useful background tasks like
virus scans and distributed computing applications.
Defragmentation software is used to rearrange the blocks
of data on a hard disk drive (HDD) to store files in
contiguous sectors, reducing head movements and Device Drivers
improving data access time.
As an HDD becomes full, blocks used for files become Device drivers translate data into a format that can be
scattered all over the disk surface, making it slower to understood by the hardware device they are associated
WWW.ZNOTES.ORG
CAIE IGCSE COMPUTER SCIENCE
Low-Level Languages
Memory Management - Manages the RAM and the Source: Cambridge IGCSE and O Level Computer Science
HDD/SSD during the execution of programs - Second Edition (Hodder Education)
Security Management - Providing security features such
as Anti-Virus, System updates and so on Assembly Language
Hardware Peripheral Management - Managing the device
Few programmers use assembly language to -
drives, Inputs, Outputs, Queues and buffers
Make use of special hardware
File Management - Opening, Creating, Deleting, Renaming
Write code that doesn’t take up much space
and many more functions
Write code that runs very quickly
Multitasking - OS would share the hardware resources
with each of the processes
Management of User Accounts - OS would allow multiple 4.4. Translators
users where each individually customize their account.
Compiler
4.3. Running of Applications
WWW.ZNOTES.ORG
CAIE IGCSE COMPUTER SCIENCE
Translates a program written in high-level language into Uniform Resource Locator (URLs)
machine code
Used without compiler URLs are used to locate and access web pages. The
Executable file of machine code produced typical format of URLs is -
One high-level language translated into several machine
code instructions protocol://website address/path/file name
Used for general use
The protocol would usually be HTTP or HTTPS
Interpreter The website address would contain -
domain host (www)
Executes a high-language program a statement at a time domain name (website name)
No executable file of machine code produced domain type (.com, .org, .net, .gov) or sometimes
One high-level language program statement may require country codes (.uk, .in, .cy)
several machine code instructions to be executed The path would usually contain the file directory roots
Interpreted programs cannot be used without interpreter The file name would be the web page
Used when program is being developed
HTTP and HTTPS
Assembler
HTTP stands for Hypertext transfer protocol and HTTPS
Translates a low-level language program into machine
stands for Hypertext transfer protocol secure
code
They are safety protocols maintained while transmitting
Executable file of machine code produced
data.
One low-level language translated into one machine code
instructions
Web Browsers
Can be used without assembler
Used for general use It is software used to connect to the internet
It translates the HTML code
Integrated Development Environments (IDEs) ensures SSL & TLS security can be established
Offers additional features like search history & ad
An IDE would usually have these features -
blockers
Code Editor
Translator Retrieval and Location of web pages
Debugger
Error Reports Browser sends URL to the domain name server (DNS)
Auto-Completion and Auto-Correction DNS stores index and matches with the IP
Auto-Documenter IP is sent to browser if it exists
Pretty Printing Browser sends request to IP of webserver
Browser interprets the HTML
WWW.ZNOTES.ORG
CAIE IGCSE COMPUTER SCIENCE
Malware
The first block is called the genesis block as it doesn’t
point to any previous block (Previous Hash Value - 0000) Stands for Malicious Software, A few examples are -
Virus - Program that can replicate itself with the
intention of deleting or corrupting files, cause
Cyber Security computer malfunction
Ransomware - Attackers encrypt the user’s data until a
Brute Force Attack: certain amount of money is paid
Adware - Displays unwanted ads on user’s screen
Hackers try to guess your password by trying all the Trojan Horse - Programs that are disguised as
different combinations of letters, numbers and symbols. legitimate software
Effect: Spyware - Sends data about all the activities of the
Hacker gets access to user’s personal data (credit user to the attacker
cards, passwords and more) Worms - Programs that can replicate itself with the
To remove risk: intention of corrupting the entire network instead of
Use stronger passwords with more characters and the computer alone
symbols
Phishing
Data Interception:
WWW.ZNOTES.ORG
CAIE IGCSE COMPUTER SCIENCE
WWW.ZNOTES.ORG
CAIE IGCSE COMPUTER SCIENCE
NOTE - ROBOTS DO NOT POSSESS AI, THEY TEND TO DO Advantages and Disadvantages of Expert Systems
REPETITIVE TASKS RATHER THAN REQUIRING HUMAN Advantages Disadvantages
CHARACTERISTICS
Setup and Maintenance costs
High level of Expertise
Types of Robots - are very high
Independent - Have no human intervention, They can Can only rely on the
High Accuracy and Consistent
completely replace humans information in the system
Dependent - Needs human intervention through an Tend to give cold responses
interface, can supplement but can’t completely High response times
sometimes
replace humans
Machine Learning - Subset of AI in which machines are
Advantages and Disadvantages of Robots
trained to learn from their past experiences.
Advantages Disadvantages
Robots can find it difficult to Difference Between AI and Machine Learning
Robots can work 24/7
do non-standard tasks AI Machine Learning
Robots can lead to higher Machines are trained to make
Robots can work in hazardous Representation of human
unemployment decisions without being
intelligence in machines
They are less expensive in the Risk of deskilling as robots programmed to
long run replace humans in some task The aim is to make machines
The aim is to build machines
They have high productive Expensive to install and learn through data
that think like humans
and are more consistent maintain in the short run acquisitions
WWW.ZNOTES.ORG
CAIE IGCSE
Computer Science