Notes
Notes
ORG
CAIE IGCSE
COMPUTER
SCIENCE
SUMMARIZED NOTES ON THE THEORY SYLLABUS
CAIE IGCSE COMPUTER SCIENCE
1100 C 12
Final Answer: 0010000111111101
1101 D 13
1110 E 14 Converting Binary to Hexadecimal
1111 F 15
Divide the binary value into groups of 4 starting from the
right. If at the end, the last division is less than 4, add 0s
1.2. Number Conversions until it reaches 4
For each group, find the denary value as shown above,
Converting Binary to Denary and then convert each denary value to its corresponding
hexadecimal value (if less than 10, then itself, else, 10 is
Place the binary value in columns of 2 raised to the power A, 11 is B, 12 is C, 13 is D, 14 is E and 15 is F).
of the number of values from the right starting from 0.
After conversion, just put all the hexadecimal values in
e.g. For binary value 11101110, place it in a table like this: order to get the final answer
WWW.ZNOTES.ORG
CAIE IGCSE COMPUTER SCIENCE
Convert the value to binary, and then convert it to Shifting 10101010 - 1 place left:
hexadecimal as explained above 1. The furthest bit in the direction to be logically
shifted is removed ( in this case, one at the LHS is
removed) - ==(if it were two places, 2 bits would
1.3. Binary Calculations have been removed)==
2. Every bit is moved in given places to the given
Binary values are not added the way denary values are
direction ( every bit is moved one place to the left
added, as when adding 1 and 1, we cannot write two
in this case, and the leftover bit in the right is
because it doesn’t exist in binary.
marked 0, so 10101010 would become 01010100)
Steps to add Two Values (With Example) Converting negative values to two complement
The values we will add are 1 1 0 1 1 1 0 and 1 1 0 1 1 1 1 0
Find the binary equivalent of the value ignoring the - sign
1. Convert both the bytes into 8 bits (add zero to the
Convert the binary value to two’s complement
left-hand side to match them).
Make the MSB 1, if not already
e.g., 1 1 0 1 1 1 0 would become 0 1 1 0 1 1 1 0
2. Add the values as follows with the points given
Converting Two’s Complement Value to Denary:
above
We do it the same way as a normal value is converted
Carry 1 1 1 1 1 1 1
from binary to denary; we only replace 128 with -12,8 e.g.,
Byte 1 0 1 1 0 1 1 1 0 for 1011101,0 we do the:
Byte 2 1 1 0 1 1 1 1 0
OVERFLOW -128 64 32 16 8 4 2 1
Solution 1 0 1 0 0 1 1 0 0 1 0 1 1 1 0 1 0
Note: We move from RHS to LHS, and when adding values, we -128 + 32 + 16 + 8 + 2 = -70
use the rules given above. If the bit crosses the limit
1.4. Use of the Hexadecimal System
WWW.ZNOTES.ORG
CAIE IGCSE COMPUTER SCIENCE
WWW.ZNOTES.ORG
CAIE IGCSE COMPUTER SCIENCE
the bit can either be 0 or 1, with 0 being white and 1 being The size of a mono sound file is calculated as: sample rate
black) (in Hz) × sample resolution (in bits) × length of sample (in
Increasing colour depth increases the size of the file when seconds). (For a stereo sound file, you would then
storing an image. multiply the result by two.)
IECB System (Most Common) Uses technology known as Audio Compression to convert
music and other sounds into an MP3 file format
Name of memory No. of This compression reduces the normal file size by 90%
Equivalent Denary Value Done using file compression algorithms which use
size Bytes
Perceptual Music Shaping
1 kibibyte (1KB) 210 1 024 bytes
Removes sounds that the human ear cannot hear
1 mibibyte (1MB) 220 1 048 576 bytes properly
Certain sounds are removed without affecting the
1 gibibyte (1GB) 230 1 073 741 824 bytes
quality too much
1 tibibyte (1TB) 240 1 099 511 627 776 bytes CD files are converted using File Compression Software
1 125 899 906 842 624 Use lossy format as the original file is lost following the
1 pibibyte (1PB) 250 compression algorithm
bytes
MP4
Conventional System
This format allows the storage of multimedia files rather
Name of memory No. of than just sound
Equivalent Denary Value
size Bytes Music, videos, photos and animations can be stored
1 kilobyte (1KB) 103 1 000 bytes Videos could be streamed without losing any real
discernible quality
1 megabyte (1MB) 106 1 000 000 bytes
Joint Photographic Experts Group (JPEG)
1 gigabyte (1GB) 109 1 000 000 000 bytes
1 terabyte (1TB) 1012 1 000 000 000 000 bytes JPEG is a file format used to reduce photographic file sizes
1 000 000 000 000 000 Reducing picture resolution is changing the number of
1 petabyte (1PB) 1015 bytes pixels per centimetre
When a photographic file undergoes compression, file
size is reduced
Calculation of File Size
JPEG will reduce the raw bitmap image by a factor
between 5 and 15
The file size of an image is calculated as: image resolution
(in pixels) × colour depth (in bits)
WWW.ZNOTES.ORG
CAIE IGCSE COMPUTER SCIENCE
Data Packets
2.2. Universal Serial Bus (USB)
Packet Structure -
USB is an asynchronous serial data transmission method
Header
USB consists of:
Contains the IP address of the sender and the
Four-wire shielded cable
receiver
Two wires are used for power and earth
The sequence number of the packet
Two wires are used in data transmission
WWW.ZNOTES.ORG
CAIE IGCSE COMPUTER SCIENCE
Parity Checks Check digits are calculated from all the other digits in the
data (ex-codes). The check digit would be the last digit of
It uses the number of 1-bits in a byte the code.
Type Types - These are used to identify mistyping errors such as -
Even - Even number of 1-bits 6372 typed as 6379
Odd - Odd numbers of 1-bits 8432 typed as 842
Example (Even Parity) -
Automatic Repeat Requests (ARQs)
0 1 0 1 1 0 1 0
Uses acknowledgements and timeouts to make sure the
The LMB (Left-Most Bit) is the parity bit. As the number of user received the data
1s is even, the parity bit would be set to even. The receiver would check the data for any errors; if none
Limitations with Parity Checks are found, a positive acknowledgement is sent to the
Two bits may change during transmission; therefore error sender. However, if errors are found, a negative
is not found acknowledgement will be sent, and the data will be sent
Even though the parity checks would reveal the errors, the again.
bit(s) changed wouldn’t be identified The sender uses timeouts to wait for a pre-determined
amount for the acknowledgement.
Parity Blocks If no acknowledgements are received after the timeout,
the data will be sent again to the receiver.
To overcome the limitations of parity bits, Parity blocks
would be used.
2.4. Encryption
Encryption is a process of turning the data into an
unreadable form so it doesn’t make sense to hackers and
other attackers.
Any changes in bits would be identified through the rows Symmetric and Asymmetric Encryption
and columns
Symmetric Encryption:
Checksum It uses an encryption key for the encryption process;
the same key is used for encrypting and decrypting
Whenever a block of data needs to be sent, the sender
the data.
would calculate the checksum value using a specific
Asymmetric Encryption:
algorithm. Uses a public key and a private key. The public key is
Once the data has been sent, The receiver would available to everyone, whereas the private key is only
calculate the checksum again with the same set of data
available to the user.
and the same algorithm used before.
The receiver would have the private key, and they
The receiver would then compare the value received and
would send the public key to the sender. The sender
the newly calculated value. If they aren’t matched, A
WWW.ZNOTES.ORG
CAIE IGCSE COMPUTER SCIENCE
can encrypt the message with the public key, and the
data can be decrypted using the private key.
3. Hardware
3.1. Computer Architecture & Von
Neumann Architecture
The central processing unit (CPU) (also known as a
Source: Cambridge IGCSE and O Level Computer
microprocessor or processor) is central to all modern
Science - Second Edition (Hodder Education)
computer systems
Overclocking
WWW.ZNOTES.ORG
CAIE IGCSE COMPUTER SCIENCE
Using a clock speed higher than the computer was designed 3D scanners can scan solid objects and produce a three-
for. dimensional image
It leads to multiple issues. Scanners take images at several points, x, y and z (lasers,
magnetic, white light)
Operations become unsynchronised - (the computer The scanned images can be used in Computer Aided
would frequently crash and become unstable) Design (CAD) or to a 3D printer to produce a working
can lead to serious overheating of the CPU model
The wider the data buses, the better the performance of the Make use of (OCR) to produce digital images which
computer represent the passport pages
Text can be stored in ASCII format
Cache The 2D photograph in the passport is also scanned and
stored as jpeg image
Cache memory is located within the CPU itself The passenger’s face is also photographed using a digital
-- allows faster access to the CPU camera and compared using face recognition software
-- stores frequently used instructions and data that need to be Key parts of the face are compared (distance between
accessed faster, which improves CPU performance eyes, width of nose)
The larger the cache memory size, the better the CPU
performance Barcode readers/scanners
WWW.ZNOTES.ORG
CAIE IGCSE COMPUTER SCIENCE
WWW.ZNOTES.ORG
CAIE IGCSE COMPUTER SCIENCE
Use dry powder ink (toner) and static electricity to CCFL uses two fluorescent tubes behind the LCD screen,
produce text and images which supplies the light source
Prints the whole page in one go
Light Projectors:
1. (steps 1-4 same as inkjet)
2. Printing drum is given a positive charge; as the drum Two common types of light projectors:
rotates, a the laser beam is scanned across it, Digital Light Projector (DLP)
removing the positive charge leaves negatively LCD Projector
charged areas which match the text/image Projectors are used to project computer output onto
3. The drum is then coated with positively charged toner; larger screens/interactive whiteboards
it only sticks to negatively charged parts of the drum
Digital Light Projectors (DLP)
4. A negatively charged sheet is rolled over the drum
5. The toner on the drum now sticks to the paper to Uses millions of micromirrors
produce a copy of the page the number of micromirrors and the way they are
6. Paper finally goes through a fuser (set of heated arranged on the DLP chip determines the resolution of the
rollers); heat melts the ink so it is permanent image
7. The discharge lamp removes all electric charge from When the micromirrors tilt towards the light source they
the drum, ready to print next page are on
When the micromirrors tilt away from the light source,
3D Printers
they are off
Used for models of cars This creates a light or dark pixel on the projection screen
Produce solid objects that work A bright white light source passes through a colour filter
Built up layer by layer, using powdered resin, ceramic on its way to the DLP chip
powder White light splits into primary colours
A design is made using Computer-aided Design (CAD)
LCD Projectors
2D and 3D Cutters
Older technology than DLP
3D cutters can recognise objects in x, y, z direction A powerful beam of white light is generated from a bulb
3D laser cutters can cut; glass, crystal, metal, wood This beam of light is then sent to a group of chromatic-
coated mirrors; these reflect the light back at different
Actuators wavelengths
When the white light hits the mirrors, the reflected light
The actuators convert electrical signals to mechanical has wavelengths corresponding to red, green, and blue
processes. These three different lights pass through three LCD
Used in many control applications involving sensors and screens; these screens show the image to be projected as
devices (ADC and DAC) millions of pixels in grayscale
When the coloured light passes through the LCD screens,
Loudspeakers/Headphones
a red, green and blue version of the grey image emerges
Sound is produced by passing the digital data through a Finally, the image passes through the projector lens onto
DAC then through an amplifier and then emerges from the screen
the loudspeaker
Produced by voltage differences vibrating a cone in the
speaker at different frequencies
WWW.ZNOTES.ORG
CAIE IGCSE COMPUTER SCIENCE
The CPU does not directly access secondary storage Avoids the need to install/upgrade RAM, as it could be
RAM, ROM, and cache memory are some examples expensive
HDD, SSD, DVD, memory stick, and Blu-ray disc are some The system wastes no storage on unwanted/unused
examples data.
Blu-ray Disks
You may be expected to draw a diagram like the above. Uses a blue laser to carry out read-and-write operations
The main advantages of virtual memory are The wavelength of laser light is less than CD and DVD
They can be larger than the physical memory provided (stores up to five times more data than DVD)
in the RAM. Automatically come with secure encryption (prevent
piracy and copyright infringement)
WWW.ZNOTES.ORG
CAIE IGCSE COMPUTER SCIENCE
WWW.ZNOTES.ORG
CAIE IGCSE COMPUTER SCIENCE
Assigned manually to a device. It also receives incoming data packets from the
Does not change over time. internet and routes them to the appropriate devices
Dynamic IP addresses: on the local network.
Assigned automatically by a DHCP (Dynamic Host
Configuration Protocol) server.
Changes periodically or when the device connects to a 4. # Operating Systems
different network.
IPv4 (Internet Protocol version 4): Operating Systems are designed to establish
Widely used protocol. communication between the user and the computer
Consists of four groups of decimal numbers separated Functions of a typical operating system -
by dots (e.g., 192.168.0.1). -managing files
Provides approximately 4.3 billion unique addresses. – handling interrupts
IPv6 (Internet Protocol version 6): – providing an interface
Developed to address the limitations of IPv4. – managing peripherals and drivers
Uses eight groups of hexadecimal numbers separated – managing memory
by colons (e.g., – managing multitasking
2001:0db8:85a3:0000:0000:8a2e:0370:7334). – providing a platform for running applications
Provides an extremely large number of unique – providing system security
addresses (approximately 340 undecillion). – managing user accounts
Differences between IPv4 and IPv6: WIMP - Windows, Icons, Menu, and Pointing Devices
Address format: IPv4 uses a 32-bit address, while IPv6
uses a 128-bit address. Advantages and Disadvantages of CLI and GUI
Address space: IPv4 provides approximately 4.3 billion
addresses, whereas IPv6 offers around 340
undecillion addresses.
Address allocation: IPv4 addresses are allocated
manually using DHCP, while IPv6 addresses are
primarily assigned using stateless autoconfiguration.
Routers
Router functionality:
A router is a networking device that directs data
packets between different networks.
It determines the most efficient path for data
transmission.
Sending data to a specific destination on a network: Source: Cambridge IGCSE and O Level Computer Science -
A router examines the destination IP address of Second Edition (Hodder Education)
incoming data packets.
It uses routing tables to determine the next hop or the Memory Management - Manages the RAM and the
next router on the path to the destination. HDD/SSD during the execution of programs
The router forwards the data packet to the Security Management - Providing security features such
appropriate next hop. as Anti-Virus, System updates and so on
Router's role in IP address assignment: Hardware Peripheral Management - Managing the device
A router can act as a DHCP server (Dynamic Host drives, Inputs, Outputs, Queues and buffers
Configuration Protocol) and assign IP addresses to File Management - Opening, Creating, Deleting,
devices on a local network. Renaming, and many more functions
It dynamically allocates IP addresses from a Multitasking - OS would share the hardware resources
predefined range to connected devices. with each of the processes
DHCP allows for automatic IP address configuration Management of User Accounts - OS would allow multiple
and simplifies network management. users to customise their accounts individually.
Connecting a local network to the Internet:
A router serves as the gateway between a local 4.1. Running of Applications
network and the internet.
The computer starts its OS (booting up the computer)
It connects the local network to an internet service
through the bootstrap loader.
provider (ISP) network.
The BIOS (Basic Input/Output System) tells the computer
The router receives data packets from devices on the
the location of the OS in the storage.
local network and forwards them to the internet.
WWW.ZNOTES.ORG
CAIE IGCSE COMPUTER SCIENCE
BIOS is often referred to as the firmware Assembly language must be translated into machine
code using an assembler to run.
Translators
Compiler
WWW.ZNOTES.ORG
CAIE IGCSE COMPUTER SCIENCE
Compiler Interpreter Assembler Device driver: Software that enables hardware devices to
A compiled An interpreter is An assembled communicate with a computer's operating system,
without which a device like a printer would be unable to
program is usually often used when a program is usually
work.
distributed for program is being distributed for
Operating system: Software that manages basic
general use. developed. general use.
computer functions such as input/output operations,
program loading and running, and security management,
Source: Cambridge IGCSE and O Level Computer
making computers more user-friendly.
Science - Second Edition (Hodder Education)
Utility programs: Software that manages, maintains, and
controls computer resources by carrying out specific
Integrated Development Environments (IDEs)
tasks, such as virus checking, disk repair and analysis, file
An IDE would usually have these features - management, and security.
Code Editor
Translator
Application Software:
Debugger
Word Processor: Software used for manipulating text
Error Reports
documents, including creating, editing, and formatting
Auto-Completion and Auto-Correction
text with tools for copying, deleting, spell-checking, and
Auto-Documenter
importing images.
Pretty Printing
Spreadsheet: Organizes and manipulates numerical data
using a grid of lettered columns and numbered rows, with
4.3. Types of Software and Interrupts each cell identified using a unique combination of
columns and rows. It can calculate using formulas,
Types of Software produce graphs, and do modelling and "what if"
calculations.
1. System Software e.g. Operating System, Utility Database: Software used to organize, analyze, and
programs and device drivers manipulate data consisting of one or more tables that
2. Application Software e.g. spreadsheet, word hold records and fields. It provides the ability to query and
processor, etc. report on data and add, delete, and modify records in a
table.
System Software: Control and Measuring Software: A program designed to
interface with sensors and allow a computer or
these are a set of programs which control and manage
microprocessor to measure physical quantities and
the operations of hardware
control applications by comparing sensor data with stored
gives a platform for other software to run
data and altering process parameters accordingly.
it is required to allow hardware and software to run
Apps: Software designed to run on mobile phones or
without problems
tablets, downloaded from an "App Store" and ranging
provides a human-computer interface (HCI) to the user
from games to sophisticated software such as phone
controls the allocation and usage of hardware resources
banking. Common examples include video and music
streaming, GPS, and camera facilities.
Application Software: Photo and Video Editing Software: Software that allows
users to manipulate digital photographs or videos,
allows a user to perform specific tasks using the
including changing colour, brightness, and contrast,
computer’s resources
applying filters and other enhancements, and creating
maybe a single program (for example, NotePad) or a suite
transitions between clips.
of programs (for example, Microsoft Office)
Graphics Manipulation Software: Software that allows the
user can execute the software as and when they require
manipulation of bitmap and vector images, with bitmap
and it is mostly not automatic
graphics editors changing pixels to produce a different
image, while vector graphics editors manipulate lines,
Examples
curves, and text to alter the stored image as required.
System Software:
Interrupts
Compiler: Translates high-level language into machine
An interrupt is a signal sent to the microprocessor, either
code, allowing for direct use by a computer to perform
from a device or software, prompting the microprocessor to
tasks without re-compilation.
pause its ongoing tasks and handle the interrupt temporarily.
Linker: Combines object files produced by a compiler into
Various factors can trigger interrupts, including:
a single program, allowing the use of separately written
code modules in the final program.
WWW.ZNOTES.ORG
CAIE IGCSE COMPUTER SCIENCE
Timing signals: Scheduled signals prompt the Defragmentation software rearranges the data blocks on
microprocessor to pause and handle tasks at specific a hard disk drive (HDD) to store files in contiguous
intervals. sectors, reducing head movements and improving data
Input/Output processes: Events such as a disk drive or access time.
printer requiring additional data cause an interruption in As an HDD becomes full, blocks used for files become
the microprocessor's activities. scattered all over the disk surface, making it slower to
Hardware faults: Issues like a paper jam in a printer, retrieve data as the HDD read-write head needs several
signalling the microprocessor to halt its operations and movements to find the data.
address the hardware problem. When a file is deleted or extended, new data does not fill
User interaction: Instances like a user pressing specific the vacant sectors immediately, causing the files to
keys on a keyboard (e.g., ), leading to an interrupt in the become more scattered throughout the disk surfaces.
system's operation. A disk defragmenter rearranges the data blocks to store
Software errors: Problems such as missing .exe files files in contiguous sectors wherever possible, allowing for
needed to initiate a program, conflicts like two processes faster data access and retrieval.
accessing the exact memory location, or attempts to The defragmentation process can free up previously
divide by zero. These errors trigger interrupts, prompting occupied sectors and empty some tracks.
the microprocessor to handle the issues.
Backup Software
WWW.ZNOTES.ORG
CAIE IGCSE COMPUTER SCIENCE
5. The Internet and Its Uses The browser sends a request to the IP of the webserver
Browser interprets the HTML
WWW.ZNOTES.ORG
CAIE IGCSE COMPUTER SCIENCE
The first block is called the genesis block as it doesn’t point to Malware
any previous block (Previous Hash Value - 0000) Stands for Malicious Software. A few examples are -
Virus - A program that can replicate itself with the
5.3. Cyber Security intention of deleting or corrupting files, causing a
computer malfunction
Brute Force Attack: Ransomware - Attackers encrypt the user’s data until a
certain amount of money is paid
Hackers try to guess your password by trying all the Adware - Displays unwanted ads on the user’s screen
different combinations of letters, numbers and symbols. Trojan Horse - Programs that are disguised as
Effect:
legitimate software
Hacker gets access to user’s personal data (credit Spyware - Sends data about all the activities of the
cards, passwords and more) user to the attacker
To remove risk: Worms - Programs that can replicate themselves with
Use stronger passwords with more characters and the intention of corrupting the entire network instead
symbols of the computer alone
Data Interception:
Phishing
This involves stealing data by tapping into a wired or a Attackers send legitimate-looking emails to bait the user
wireless transmission line into giving out their information.
Wardriving - The act of locating and using wireless To remove risk:
internet connections illegally
Don’t open links from unknown receivers
Packet Sniffing - Uses Packet sniffers to examine Use anti-phishing tools
packets sent over a line; all the data collected is sent Block pop-up ads
back to the attacker Have an up-to-date browser
Effect:
It can cause a computer to crash Pharming
Can delete or corrupt files/data
To remove risk: The attacker installs a malicious code on the computer,
Install anti-virus software which redirects the user to fake websites
Don’t use software from unknown sources Effect:
Be careful when opening emails from unknown The user gives out login details and other personal
details
Distributed Denial of Service Attacks (DDoS) To remove risk:
Using anti-virus software
An attempt at preventing users from accessing part of a Checking the spelling and the weblink carefully
network Make sure that the green padlock is present in the
Usually temporary but may be damaging URL bar
An attacker may be able to prevent the user from:
WWW.ZNOTES.ORG
CAIE IGCSE COMPUTER SCIENCE
Social Engineering Attacks like DDoS and Hacking attack the proxy
server, keeping the web server safe.
Attackers create a social situation which leads to victims Acts as a firewall as well.
giving out their details (For example - Spam calls Privacy Settings - Used to limit who can access and see a
informing them that their account has been hacked) user’s profile
SSL (Secure Socket Layer) - Set of rules used while
Keeping data safe from threats communicating with other users on the internet.
WWW.ZNOTES.ORG
CAIE IGCSE COMPUTER SCIENCE
WWW.ZNOTES.ORG
CAIE IGCSE
Computer Science