Computer Science Igcse Paper1 Note
Computer Science Igcse Paper1 Note
pregramme/ metrusitons that, run the, computer
Other applications of RAM & ROM xom Question)
Other applications of RAM & ROM Gam Question)
fete word file —> store m RAM
the Indwuctions rm fie —7 Store m ROM
Fler editing, file save > stove m secondary storage
Virtilal Memory - 0 ype of memory con be wstal as extension
of RAM J part of ne hard drive.
when RAM full the nob immectiartery data is wansfereol
Yo virtual memory \-? exteecl datr transfered to virtual in stugtwe
of paCloud Storage > dota storage oumeol ing thirel party and
ber access whiry Intemet,
— dota can be acceied anytime unc anywhere
Benefits and drawbacks of cloud storage
— potenrtiad limitless storage
— datx is aceesseble wring tenes,pry fancton- send/ recieve pockets
— NLC CNetwore mterface » enalles devices conhech network
— vouter
— trongmigion meolia
(MAC Address ee
— MAC address used, to tWentify devices Ye: EAB) 15 =h2
— given by manufacture m NIC monwtiactue nibs
— 2 darts, —> heradecimal
UP addzers Cintornet protaco)
Pv: LP vie MAG odlvers:
NB bes bY bits US baes
Hesedectmad- Binay Hexadecimad
static) dynamic static) dynomic Storie
Asaighed by AP asigned by AGP Oe gped Ry (manufecine
Gumic seh up hy 19P5 © mmaarually
Dywane sev up by 19?> L ductomatedly)
pre cand Cong
Poxsaser Dynan, [moore
= Atel eee, | Mole oar ipower
recuiesnocteonclaetp | access
1 Sopot mate sentap ens
+ Less pron tomacing + Can coun dovetine shan score
Describe the role of router ina network
OG
router sends date too specifi destination
‘Sno network
1+ Can asignse lacalP ederess to each device
nthe network
+ creates feewal to prevent sunt breaches
4+ Monoges the trate on your netwere
+ Handles ony Porentol Contros.on a Home LAN netrkSoftware
ji manages the Yanning of hardware ancl softunl
Opevationsystem: manages the computer, allow wcer/softwore Yan
ceuiintgmprOgraNNS: perfums hase keeping sotlity
aoftuare that allow wer +o parfovm function
word, procevver:
opreadcheet=
data.tare =
web browser:
invevnapyMThanler. tu progyom that, Orginise
Intenupt ware pon Priovitie,
low level —> non— portable
0 assembly longuage> code wrivten in mnemonics that allows
direct manipulation of harcware
High-level language —? Assembly language > Binary code
Omophnemeodle> 0s unk Is
High- bevel longuage» progromme language uses Englioh Dee commano
portableTPARBIOTOP = type of Goptuare convert one code into onother Programming
language
O Asembler= convert assembly language into machine code
@ dysterpietore convert, high-level to low-level, when coding
@ compilers convert, high-level to Inw-level, before running the program
Franviate the code | transite lbiins of
zane ance aw une | code into machine cree
a
useful when Useful when datelnaal
worneiing progeome — | and. ready 4» t06b
code wee Wewrance | code dane need to
euch vine, revranslaze
Gource code wequarace | Waimnead Yor searce
when programme ran code
hen nase mane
@
File
ve Se
wrthoue complet
Integrated Development Enviroment [ LvE)
> a piece of Software that allows user to edrt . run he Programe code
fearturee de hugging feartwes
~ Awto completion — break pormt > “pm ie i
Rute correction = variable wath window vito enn
— Prettyprint Re pig > rane pron ie ye
— block minimizing<— Gnitemed- « large global network that allow users +o worl
wide web the internet % w huge network all the computers and
devices jeinec together
a type of (aide area network
TS wn TRPUSYAIZAULONL physical stmcture)
(CGH: collecthe term for alk the websites ond.
web pages —> accessed whiny internet
OREDTOIRE software that allow usere 40 alters +0
acce® and display web pages en devie
© home page D history © abilivy allow wher navigote website
O stores waers' favorve O jpoges open sometime © wies of cookies
@ data store os cache § hyperlinks allo navigation between website ond pages
URLS Lumiferm resowee locator)
ieeys,- HY wow am bridge. Org | eoucoaition
protocel domain name webpage name | file nome
‘Protocols
HITES Hypervext Transfer Protocol
refines how communication -voke place between braucer
anc wer seyver
HITPS® HTTP with encryption
wits 1L9 LGbL)> tv cnoypt
TWA Transport Layer Seuurity L euctersar of SoU)
TU Geawe Yorker layers
Provide Seowe communication protocol
wse combinection of syme-tric | amy mmetie enciyrtionGOD - sperote ut trampwt layer of OF model, ensue dova iy
encrypt befme 6° wor the net work
THE made of 2 layer
(HaRLGnAREMMaYe® = establish secure connection
ReceveNAye § trunsmmioring dora seomrely betwen
@O browser vequest Gecuve coynectim +40 Gener
O brome requery server identify V5 ef
@ sever provide digrtal cartificatin
@ browser validity
@ browser Senet aignol +0 start dota -tyarsimmission
0 encryption yme-thool te agreed
and location of web pages
sonco™
—
st
peauest 30,
es
2s
DNS Server
Domain nome Server ib
& gystem for finding LP eee DNS Server
according 40 URL ZO tenets
tee + EG)
User with Web
Coes ‘Server (t 1215.90)
Protocol - ott of vues for wansmivtiny lata
FATIAD > Hyper ved Morkup language
a scripriny longuoge that wel to Create web pages
WEBESEVE = netwok component where webpage of wobnite ove
Grored
Digitol Currency
type ef Currency that edists only in elec tyrone form anc not backed
by any physical commodity or governmentacy a mag ean
Sensor
WMicyoprocessar
Actuators
Featuwe: Robot
a mechanical structwe
Electrical components
Programmadle
Range area of AL
Imoge Yecognition
speech recognition
natural language recognition
gome
Ding novis systems
Components of Bl
Colleetim of data
a seb of programm rules
dpi ley +o Yeaom
ability 40 feam and oldape,
Expert System
a rule base
& knowledge base
a inference engine
a User inter Foucenadysis + Study | tdentifying problems
Investigate quertion sing:
abstraction =
vemoviny wnimportont details of the problems
RLOMPOSTHIGA) = tabing system and GPlEIND into omaller qysten
Design: created algorithms and ready for cooiny
decomposition:
Sbrucwe_ diagram: flowchart pseudocode
Desision
Steet! step
2 Process
D Input) Outpt
Coding = writing program wang program longuage
Py thon) CHD -.
Testing. Yepeated use ayston to ry pwsibiliues te owe work
make swe program. Fully works don't crach. meet vegwirment,
Wormal- data program accert
Abnormal? data. progrom vejeow
BxweMe? on edge of data cdlow
Bubble con undnnes decta. on edge of IRjeob unl uceert jee Geach
PSEUDOCODE ALGORITHM — ID ARRAY?
DECTARE Initial: ARRAY(1:4] OF CHAR
or Fon oucer € 1 70 uEMmH(Zeore) = 2 ee
FOR Inner € 1 70 LENGTH (Score) ~ 1 SearchValue € A
TF Score (Ianer] > Seore(Inner + 1) sen || Found € False
temp € Score [Inner] FOR X € 1 TO LENGTH(rnitial)
Score{Inner] € Score[Inner + 1)
4F nitial[x} = Searchvalue
=)elel=]= Seore(Inner +1] © temp vrae
ENOIE
NEXT Inner Bound € True
[w]e [wef] [et outer ENDIF
NEXT X
IF Found = True
THEN
OUTPUT “Value is found”
ELSE
‘OUTPUT “Value not found”
ENDIF
toAL aaa
Three different way of design
Y) Ted aL
v Gog
a ree
TAD
UM egal Ce) o Boundary Cary
Oe oe a <7 Sc CoO La)
Validation in od
D Range check make swe date between mar anc min
an Vola Pe cn a aa
OT oe RR Ro
Dr na a
Ce eee eee ee ea Me a aR
a SR 2
a Ot ae a
UT Ly ed
Se Se
el ea oa Yee ree re by > charmete
Taye mPey aT ren
Ce ead Cee
a ae Ln
IeclingUT 2
Oo a ee. 7a
Lease FOR Index <— 1 To ¥0
eee ed S tudentnumbo [ Index} <—"
PRO att ey
BY WHILE) Pre -concii tien
Ua SS or
ead
[Saas
py erro
O FOR Indes <— 1 To ¥0
Cee et oe Whos el
NEXT Index
OF ad
NS Oa
TF < condrsion> RY ee
3g THEN
Sea Sota d ade ed
10g ELSE
ead
ays rele
CASE OF