CAIE-IGCSE-Computer Science - Theory
CAIE-IGCSE-Computer Science - Theory
ZNOTES.ORG
CAIE IGCSE
COMPUTER SCIENCE
SUMMARIZED NOTES ON THE THEORY SYLLABUS
Prepared for Chin for personal use only.
https://znotes.org/caie/igcse/computer-science-0478/theory/data-representation/ Page 1 of 27
CAIE-IGCSE-Computer Science - Theory 21/11/2024, 08:54
Base 2 number system Take the value and successively divide it by 2, creating a
It has two possible values only (0 and 1) table like follows:
0 represents OFF, and 1 represents ON
A point to be noted is that the most left bit is called the 2 142
MSB (Most Significant Bit) 2 71 Remainder: 0
2 35 Remainder: 1
Denary System 2 17 Remainder: 1
2 8 Remainder: 1
Base 10 number system 2 4 Remainder: 0
Has values from 0 to 9 2 2 Remainder: 0
2 1 Remainder: 0
Hexadecimal (aka Hex) 0 Remainder: 1
Base 16 number system Note that when the value itself is not divisible by 2, it is
Have values from 0 to 9 followed by A to F divided by the previous value of the current number and
A represents 10, B represents 11 and so on until 15, 1 is added to the remainder column for that specific
which is F number
When you reach 0, the remainder has to be read from
Binary Value Hexadecimal Value Denary Value bottom to top giving us the binary value ( as in this case,
0000 0 0 it is 1 0 0 0 1 1 1 0 )
0001 1 1
0010 2 2 Converting Hexadecimal to Binary
0011 3 3
0100 4 4 Separate each value from each other and convert them
0101 5 5 to denary
0110 6 6 Each separate denary value to be converted to binary
0111 7 7 All the binary values to be merged together
1000 8 8 e.g.
1001 9 9
1010 A 10 Hexadecimal : 2 1 F D
1011 B 11 Denary : 2 1 15 13
1100 C 12
Binary : 0010 0001 1111 1101
1101 D 13
Final Answer: 0010000111111101
1110 E 14
1111 F 15
Converting Binary to Hexadecimal
1.2. Number Conversions Divide the binary value into groups of 4 starting from the
right. If at the end, the last division is less than 4, add 0s
Converting Binary to Denary until it reaches 4
For each group, find the denary value as shown above,
Place the binary value in columns of 2 raised to the and then convert each denary value to its corresponding
power of the number of values from the right starting hexadecimal value (if less than 10, then itself, else, 10 is
from 0. e.g. For binary value 11101110, place it in a table A, 11 is B, 12 is C, 13 is D, 14 is E and 15 is F).
like this: After conversion, just put all the hexadecimal values in
order to get the final answer
128 64 32 16 8 4 2 1
1 1 1 0 1 1 1 0
Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Chin at Forsan British School on 21/11/24.
https://znotes.org/caie/igcse/computer-science-0478/theory/data-representation/ Page 2 of 27
CAIE-IGCSE-Computer Science - Theory 21/11/2024, 08:54
Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Chin at Forsan British School on 21/11/24.
https://znotes.org/caie/igcse/computer-science-0478/theory/data-representation/ Page 3 of 27
CAIE-IGCSE-Computer Science - Theory 21/11/2024, 08:54
Defining colours in Hypertext Markup Language (HTML) ASCII does not contain all of the international languages
Media Access Control (MAC) addresses (a number that thus, Unicode is used to solve this problem
uniquely identifies a device on a network) The first 128 values are the same as ASCII.
Assembly languages and machine code Unicode supports up to four bytes per character, storing
Memory Dumps multiple languages and more data.
Debugging (method to find errors in a program) To represent text in binary, a computer uses a
Display error codes (numbers refer to the memory character set, a collection of characters and the
location of the error) corresponding binary codes that represent them.
IP (Internet Protocol) addresses
Sound
Memory Dumps
Sound is analogue, and for it to be converted to digital
Hexadecimal is used when developing new software or form, it is sampled
when trying to trace errors. The sound waves are sampled at regular time intervals
Memory dump is when the memory contents are output where the amplitude is measured. However, it cannot be
to a printer or monitor. measured precisely, so approximate values are stored
Assembly code and machine code (low-level languages)
How is Sound Recorded
Computer memory is machine code/ assembly code
Using hexadecimal makes writing code easier, faster, and The amplitude of the sound wave is first determined at
less error-prone than binary. set time intervals
Using machine code (binary) takes a long time to key in The value is converted to digital form
values and is prone to errors. Each sample of the sound wave is then encoded as a
series of binary digits
A series of readings gives an approximate representation
1.5. Text, Sound and Images of the sound wave
Colour Depth
Unicode
Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Chin at Forsan British School on 21/11/24.
https://znotes.org/caie/igcse/computer-science-0478/theory/data-representation/ Page 4 of 27
CAIE-IGCSE-Computer Science - Theory 21/11/2024, 08:54
The number of bits representing each colour is called the Calculation of File Size
colour depth.
An 8-bit colour depth means that each pixel can be one The file size of an image is calculated as image resolution
of 256 colours (because 2 to the power of 8 = 256) (in pixels) × colour depth (in bits)
A 1-bit colour depth means each pixel can store one The size of a mono sound file is calculated as sample rate
colour (because 2 to the power of 1 is 2) - ( This is done (in Hz) × sample resolution (in bits) × length of sample (in
as the bit can either be 0 or 1, with 0 being white and 1 seconds). (For a stereo sound file, you would
being black) then multiply the result by two.)
Increasing colour depth increases the size of the file
when storing an image.
1.7. File Types
Image Resolution
Musical Instrument Digital Format (MIDI)
Image resolution refers to the number of pixels that Storage of music files
make up an image; for example, an image could contain A communications protocol that allows electronic
4096 × 3072 pixels.
musical instruments to interact with each other
Photographs with a lower resolution have less detail Stored as a series of demands but no actual music notes
than those with a higher resolution.
Uses 8-bit serial transmission (asynchronous)
When a bitmap image is ‘ blurry ‘ or ‘ fizzy ’ due to having
Each MIDI command has a sequence of bytes:
a low amount of pixels in it or when zoomed, it is known
The first byte is the status byte – which informs the
as being pixelated.
MIDI device what function to perform
High-resolution images use high amounts of memory as
Encoded in the status byte is the MIDI channel
compared to low-resolution ones.
(operates on 16 di!erent channels)
Examples of MIDI commands:
1.6. Measurement of the Size of Note on/o!: indicates that a key has been pressed
Key pressure: indicates how hard it has been pressed
Computer Memories
(loudness of music)
A binary digit is referred to as a BIT It needs a lot of memory storage
8 bits is a byte
MP3
4 bits is a nibble
Byte is used to measure memory size It uses technology known as Audio Compression to
convert music and other sounds into an MP3 file format
IECB System (Most Common) This compression reduces the normal file size by 90%
Done using file compression algorithms, which use
Name of memory No. of Perceptual Music Shaping
Equivalent Denary Value
size Bytes Removes sounds that the human ear cannot hear
1 kibibyte (1KiB) 210 1 024 bytes properly
1 mibibyte (1MiB) 220 1 048 576 bytes Certain sounds are removed without a!ecting the
1 gibibyte (1GiB) 230 1 073 741 824 bytes quality, too much
CD files are converted using File Compression Software
1 tibibyte (1TiB) 240 1 099 511 627 776 bytes
Use lossy format as the original file is lost following the
1 125 899 906 842 624
1 pibibyte (1PiB) 250 bytes compression algorithm
MP4
Conventional System
This format allows the storage of multimedia files rather
Name of memory No. of than just sound
Equivalent Denary Value
size Bytes Music, videos, photos and animations can be stored
1 kilobyte (1KB) 103 1 000 bytes Videos could be streamed without losing any real
1 megabyte (1MB) 106 1 000 000 bytes discernible quality
1 gigabyte (1GB) 109 1 000 000 000 bytes
Joint Photographic Experts Group (JPEG)
1 terabyte (1TB) 1012 1 000 000 000 000 bytes
1 000 000 000 000 000
1 petabyte (1PB) 1015
bytes
Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Chin at Forsan British School on 21/11/24.
https://znotes.org/caie/igcse/computer-science-0478/theory/data-representation/ Page 5 of 27
CAIE-IGCSE-Computer Science - Theory 21/11/2024, 08:54
2. Data Transmission
Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Chin at Forsan British School on 21/11/24.
https://znotes.org/caie/igcse/computer-science-0478/theory/data-representation/ Page 6 of 27
CAIE-IGCSE-Computer Science - Theory 21/11/2024, 08:54
Echo Check
Parity Checks
Once the data has been sent, The receiver will send the
It uses the number of 1-bits in a byte
data back to the sender for verification.
Type Types -
The sender would compare the received and original
Even - Even number of 1-bits
data for errors.
Odd - Odd numbers of 1-bits
The only downside is that we wouldn’t know if the error
Example (Even Parity) -
occurred when sending the data or sending the data
0 1 0 1 1 0 1 0 back for verification.
The LMB (Left-Most Bit) is the parity bit. As the number Check Digits
of 1s is even, the parity bit would be set to even.
Check digits are calculated from all the other digits in the
Limitations with Parity Checks
data (ex-codes). The check digit would be the last digit of
Two bits may change during transmission; therefore
the code.
error is not found
These are used to identify mistyping errors such as -
Even though the parity checks would reveal the errors,
6372 typed as 6379
the bit(s) changed wouldn’t be identified
8432 typed as 842
Parity Blocks
Automatic Repeat Requests (ARQs)
Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Chin at Forsan British School on 21/11/24.
https://znotes.org/caie/igcse/computer-science-0478/theory/data-representation/ Page 7 of 27
CAIE-IGCSE-Computer Science - Theory 21/11/2024, 08:54
Uses acknowledgements and timeouts to make sure the Processor: The processor contains the Arithmetic and
user received the data Logic Unit (ALU)
The receiver would check the data for any errors; if none Control Unit: The control unit controls the operation of
are found, a positive acknowledgement is sent to the the memory, processor and input/output devices
sender. However, if errors are found, a negative Arithmetic Logic Unit: Carries out the logic system like
acknowledgement will be sent, and the data will be sent calculations
again. System Clock: The system clock is used to produce
The sender uses timeouts to wait for a pre-determined timing signals on the control bus
amount for the acknowledgement.
If no acknowledgements are received after the timeout, Buses: Carry data through components. The following are its
the data will be sent again to the receiver. types.
Plaintext and Ciphertext The following registers also exist in the architecture:
3. Hardware
3.1. Computer Architecture & Von
Neumann Architecture
The central processing unit (CPU) (also known as a
microprocessor or processor) is central to all modern The Fetch-Execute Cycle
computer systems
Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Chin at Forsan British School on 21/11/24.
https://znotes.org/caie/igcse/computer-science-0478/theory/data-representation/ Page 8 of 27
CAIE-IGCSE-Computer Science - Theory 21/11/2024, 08:54
Cache
Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Chin at Forsan British School on 21/11/24.
https://znotes.org/caie/igcse/computer-science-0478/theory/data-representation/ Page 9 of 27
CAIE-IGCSE-Computer Science - Theory 21/11/2024, 08:54
Keyboards
Pointing devices
Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Chin at Forsan British School on 21/11/24.
https://znotes.org/caie/igcse/computer-science-0478/theory/data-representation/ Page 10 of 27
CAIE-IGCSE-Computer Science - Theory 21/11/2024, 08:54
Devices that read or measure physical properties Used to print one-o! pictures and documents
Data needs to be converted to digital Data from the document sent to the printer driver
Analogue-to-digital converter (ADC) converts physical The printer driver ensures data is in the correct format
values into digital Check made by printer driver that the chosen printer is
Sensors and their purposes: available
Acoustic - These sensors act like a microphone that Data is sent to the printer and stored in a temporary
converts sound to electric pulses. memory (printer bu!er)
Accelerometer - These sensors measure an object's A sheet of paper is fed; the sensor detects if the paper is
acceleration or deceleration and motion. available in the paper tray
Flow - This sensor measures the flow of liquid or gas. The print head moves across paper printing text/image,
Gas - These sensors measure the amount/level of any four ink colours sprayed in the exact amount
gas in the environment. Paper is advanced, so the next line is printed
Humidity - This sensor measures the water vapour in Repeated until the bu!er is empty
the air or any sample. Once it is done, the printer sends an interrupt to the
Infra-red (active) - This IR sensor uses an invisible processor (request for more data to be sent)
infrared beam. When the beam is broken/disturbed,
it changes the amount of infrared light reaching the Laser Printers
detector.
Used to print flyers, high quality
Infra-red (passive) - These sensors detect the heat
Use dry powder ink (toner) and static electricity to
emitted by any object.
produce text and images
Level - This sensor detects the solids, liquids, or gas
Prints the whole page in one go
level.
Light - These devices use light-sensitive cells that 1. (steps 1-4 same as inkjet)
generate electric current based on light brightness. 2. The printing drum is given a positive charge; as the
Magnetic field - This sensor detects the change in drum rotates, a laser beam is scanned across it;
magnetic field. removing the positive charge leaves negatively
Moisture - This type of sensor detects the water charged areas which match the text/image
content wherever this sensor has been installed. 3. The drum is then coated with positively charged
pH - This measures the acidity or alkalinity. toner; it only sticks to negatively charged parts of the
Pressure - This sensor measures the pressure applied drum
Proximity - This sensor detects the nearby objects 4. A negatively charged sheet is rolled over the drum
around the sensor 5. The toner on the drum now sticks to the paper to
Temperature - These sensors measure the produce a copy of the page
temperature of the environment. 6. Paper finally goes through a fuser (set of heated
(Note: You do not need to know the working principle of rollers); heat melts the ink so it is permanent
the sensor. But have an idea of their purposes.) 7. The discharge lamp removes all electric charge from
the drum, ready to print on the next page
Control of Street Lighting
3D Printers
The light sensor sends data to the ADC
The data is digitised and sent to the microprocessor Used for models of cars
Microprocessor samples data every minute Produce solid objects that work
If data from sensor < value stored in memory: Built up layer by layer, using powdered resin, ceramic
Signal sent from microprocessor to street lamp powder
Lamp switched on A design is made using Computer-aided Design (CAD)
2D and 3D Cutters
3.4. Output Devices
3D cutters can recognise objects in x, y, z direction
Inkjet Printers 3D laser cutters can cut glass, crystal, metal, wood
Actuators
Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Chin at Forsan British School on 21/11/24.
https://znotes.org/caie/igcse/computer-science-0478/theory/data-representation/ Page 11 of 27
CAIE-IGCSE-Computer Science - Theory 21/11/2024, 08:54
The actuators convert electrical signals to mechanical Older technology than DLP
processes. A powerful beam of white light is generated from a bulb
Used in many control applications involving sensors and This beam of light is then sent to a group of chromatic-
devices (ADC and DAC) coated mirrors; these reflect the light at di!erent
wavelengths
Loudspeakers/Headphones When the white light hits the mirrors, the reflected light
has wavelengths corresponding to red, green, and blue
Sound is produced by passing the digital data through a
These three di!erent lights pass through three LCD
DAC, then through an amplifier, and then emerges from
screens; these screens show the image to be projected
the loudspeaker
as millions of pixels in grayscale
Produced by voltage di!erences vibrating a cone in the
When the coloured light passes through the LCD screens,
speaker at di!erent frequencies
a red, green and blue version of the grey image emerges
LCD and LED Monitors Finally, the image passes through the projector lens onto
the screen
The front layer of the monitor is made up of Liquid
Crystal Display (LCD); these tiny diodes are grouped in
threes as pixels (LCD doesn’t emit any light)
LCD monitors are backlit using Light Emitting Diode (LED)
because:
LEDs reach their maximum brightness immediately
LEDs sharpen image (higher resolution), and CCFL
has a yellow tint
LEDs improve the colour image
Monitors using LED are much thinner than CCFL
LEDs consume very little power
Source: Cambridge IGCSE and O Level Computer
Before LEDs, LCD monitors were backlit using CCFL
Science - Second Edition (Hodder Education)
CCFL uses two fluorescent tubes behind the LCD screen,
which supplies the light source
3.5. Memory, Storage Devices & Media
Light Projectors:
Primary vs. Secondary Storage
Two common types of light projectors:
Digital Light Projector (DLP) The CPU directly accesses primary storage
LCD Projector The CPU does not directly access secondary storage
Projectors are used to project computer output onto RAM, ROM, and cache memory are some examples
larger screens/interactive whiteboards HDD, SSD, DVD, memory stick, and Blu-ray disc are some
examples
Digital Light Projectors (DLP)
Primary Memory:
Uses millions of micromirrors
Random Access Memory (RAM)
the number of micromirrors and the way they are
arranged on the DLP chip determines the resolution of
the image
When the micromirrors tilt towards the light source they
are on
When the micromirrors tilt away from the light source,
they are o!
This creates a light or dark pixel on the projection screen
A bright white light source passes through a colour filter
on its way to the DLP chip
White light splits into primary colours
LCD Projectors
Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Chin at Forsan British School on 21/11/24.
https://znotes.org/caie/igcse/computer-science-0478/theory/data-representation/ Page 12 of 27
CAIE-IGCSE-Computer Science - Theory 21/11/2024, 08:54
RAM is used by a system when it needs to store and You may be expected to draw a diagram like the above.
access data that is actively being used or processed by The main advantages of virtual memory are
the user immediately. They can be larger than the physical memory
Features of RAM provided in the RAM.
Volatile/temporary memory (contents lost if RAM is Avoids the need to install/upgrade RAM, as it could
turned o!) be expensive
Used to store; data, files The system wastes no storage on unwanted/unused
It can be written to or read from, and the contents of data.
the memory can be changed
The larger the size of the RAM, the faster the computer Read Only Memory (ROM)
will operate
Features of ROM
RAM never runs out of memory and continues to run
Non-volatile/permanent memories (contents remain
slow
even when ROM is turned o!)
As RAM becomes full, the processor has to access the
Used to store start-up instructions (basic
continually hard drive to overwrite old data on RAM with
input/output systems)
new data
Data/contents of a ROM chip can only be read and
RAM is of two types:
cannot be changed
DRAM (Dynamic RAM) and SRAM (Static RAM)
Secondary Storage:
Hard Disk Drives (HDD)
O!-Line Storage:
CD/DVD Disks
Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Chin at Forsan British School on 21/11/24.
https://znotes.org/caie/igcse/computer-science-0478/theory/data-representation/ Page 13 of 27
CAIE-IGCSE-Computer Science - Theory 21/11/2024, 08:54
Laser (red) light is used to read and write data on the A combination of hardware and software is designed to
surface of the disk. carry out a specific set of tasks.
A thin layer of metal alloy is used to store data. Embedded systems may contain -
Both systems use a single spiral track that runs from the Microcontrollers - CPU, RAM, ROM and other
centre of the disk to the edge peripherals on one single chip
DVD uses Dual-Layering, which increases the storage Microprocessor - Integrated circuit with CPU only
capacity (two individual recording layers) System on Chips (SoC) - microprocessor with I/O
ports, storage and memory
Blu-ray Disks Process of Embedded Devices -
Input from the user is sent to the microprocessor
Uses a blue laser to carry out read-and-write operations
(ADC needed if the data is analogue)
The wavelength of laser light is less than CD and DVD
Data from the user interface is also sent to the
(stores up to five times more data than DVD)
microprocessor
Automatically come with secure encryption (prevent
The microprocessor then sends signals to actuators
piracy and copyright infringement)
which are the output
Used as backup systems
Non-programmable devices need to be replaced if they
USB Flash Memories need a software update.
Programmable devices have two methods of updating
Very small, lightweight, and suitable for transferring files Connecting the device to a computer and
Small back-up devices for photo, music downloading the update
Solid state, so needs to be treated with care Updating automatically via a satellite, cellular or Wi-Fi
link
Cloud Storage:
Advantages and Disadvantages of using embedded
Cloud storage is a method of data storage where data is systems
stored on remote servers Advantages Disadvantages
The same data is stored on more than one server in case
Small in size, therefore can
of maintenance or repair, allowing clients to access data Can be di#cult to upgrade
easily fit into devices
at any time. This is known as data redundancy. The interface can be confusing
Low cost to make
sometimes
The following are its types:
Troubleshooting is a specialist’s
Requires very little power
job
Public cloud – this is a storage environment where the
Often thrown away as di#cult
customer/client and cloud storage provider are di!erent Very fast reaction to changing
to upgrade and faults are
companies input
harder to find
Private cloud – this is storage provided by a dedicated Increased garbage as they are
environment behind a company firewall; customer/client Dedicated to one task only
thrown away
and cloud storage provider are integrated and operate Any computerised system is
Can be controlled remotely
as a single entity prone to attacks
Hybrid cloud – this is a combination of the two above
environments; some data resides in the private cloud, Applications of Embedded devices
and less sensitive/less commercial data can be accessed GPS systems
from a public cloud storage provider Security Systems
Vending Machines
Washing Machines
Oven
Microwave
Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Chin at Forsan British School on 21/11/24.
https://znotes.org/caie/igcse/computer-science-0478/theory/data-representation/ Page 14 of 27
CAIE-IGCSE-Computer Science - Theory 21/11/2024, 08:54
Routers
Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Chin at Forsan British School on 21/11/24.
https://znotes.org/caie/igcse/computer-science-0478/theory/data-representation/ Page 15 of 27
CAIE-IGCSE-Computer Science - Theory 21/11/2024, 08:54
Router functionality:
A router is a networking device that directs data
packets between di!erent networks.
It determines the most e#cient path for data
transmission.
Sending data to a specific destination on a network:
A router examines the destination IP address of
incoming data packets.
It uses routing tables to determine the next hop or
the next router on the path to the destination.
The router forwards the data packet to the
appropriate next hop.
Router's role in IP address assignment:
Source: Cambridge IGCSE and O Level Computer Science -
A router can act as a DHCP server (Dynamic Host
Second Edition (Hodder Education)
Configuration Protocol) and assign IP addresses to
devices on a local network. Memory Management - Manages the RAM and the
It dynamically allocates IP addresses from a
HDD/SSD during the execution of programs
predefined range to connected devices. Security Management - Providing security features such
DHCP allows for automatic IP address configuration as Anti-Virus, System updates and so on
and simplifies network management. Hardware Peripheral Management - Managing the device
Connecting a local network to the Internet: drives, Inputs, Outputs, Queues and bu!ers
A router serves as the gateway between a local File Management - Opening, Creating, Deleting,
network and the internet. Renaming, and many more functions
It connects the local network to an internet service Multitasking - OS would share the hardware resources
provider (ISP) network. with each of the processes
The router receives data packets from devices on the Management of User Accounts - OS would allow multiple
local network and forwards them to the internet. users to customise their accounts individually.
It also receives incoming data packets from the
internet and routes them to the appropriate devices Running of Applications
on the local network.
The computer starts its OS (booting up the computer)
3.8. Operating Systems through the bootstrap loader.
The BIOS (Basic Input/Output System) tells the computer
Operating Systems are designed to establish the location of the OS in the storage.
communication between the user and the computer BIOS is often referred to as the firmware
Functions of a typical operating system -
-managing files
– handling interrupts
– providing an interface
– managing peripherals and drivers
– managing memory
– managing multitasking
– providing a platform for running applications
– providing system security
– managing user accounts
WIMP - Windows, Icons, Menu, and Pointing Devices
Interrupts
Advantages and Disadvantages of CLI and GUI
Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Chin at Forsan British School on 21/11/24.
https://znotes.org/caie/igcse/computer-science-0478/theory/data-representation/ Page 16 of 27
CAIE-IGCSE-Computer Science - Theory 21/11/2024, 08:54
Signal that causes the operating system to stop what it’s Translates a program written in a high-level language
doing and service a task into machine code
Ensures important tasks are dealt with on a priority basis Used without compiler
It can be a software or a hardware interrupt Executable file of machine code produced
Peripherals like a keyboard & mouse can generate it One high-level language translated into several machine
Di!erent interrupts have di!erent levels of priority code instructions
After interruption is dealt with, the previous process Used for general use
continues
Interpreter
Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Chin at Forsan British School on 21/11/24.
https://znotes.org/caie/igcse/computer-science-0478/theory/data-representation/ Page 17 of 27
CAIE-IGCSE-Computer Science - Theory 21/11/2024, 08:54
An IDE would usually have these features - Compiler: Translates high-level language into machine
Code Editor code, allowing for direct use by a computer to perform
Translator tasks without re-compilation.
Debugger Linker: Combines object files produced by a compiler
Error Reports into a single program, allowing the use of separately
Auto-Completion and Auto-Correction written code modules in the final program.
Auto-Documenter Device driver: Software that enables hardware devices to
Pretty Printing communicate with a computer's operating system,
without which a device like a printer would be unable to
work.
3.11. Types of Software and Interrupts Operating system: Software that manages basic
computer functions such as input/output operations,
Types of Software program loading and running, and security management,
making computers more user-friendly.
1. System Software e.g. Operating System, Utility Utility programs: Software that manages, maintains, and
programs and device drivers controls computer resources by carrying out specific
2. Application Software e.g. spreadsheet, word tasks, such as virus checking, disk repair and analysis, file
processor, etc. management, and security.
Application Software:
Examples
System Software:
Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Chin at Forsan British School on 21/11/24.
https://znotes.org/caie/igcse/computer-science-0478/theory/data-representation/ Page 18 of 27
CAIE-IGCSE-Computer Science - Theory 21/11/2024, 08:54
Word Processor: Software used for manipulating text Timing signals: Scheduled signals prompt the
documents, including creating, editing, and formatting microprocessor to pause and handle tasks at specific
text with tools for copying, deleting, spell-checking, and intervals.
importing images. Input/Output processes: Events such as a disk drive or
Spreadsheet: Organizes and manipulates numerical data printer requiring additional data cause an interruption in
using a grid of lettered columns and numbered rows, the microprocessor's activities.
with each cell identified using a unique combination of Hardware faults: Issues like a paper jam in a printer,
columns and rows. It can calculate using formulas, signalling the microprocessor to halt its operations and
produce graphs, and do modelling and "what if" address the hardware problem.
calculations. User interaction: Instances like a user pressing specific
Database: Software used to organize, analyze, and keys on a keyboard (e.g., ), leading to an interrupt in the
manipulate data consisting of one or more tables that system's operation.
hold records and fields. It provides the ability to query Software errors: Problems such as missing .exe files
and report on data and add, delete, and modify records needed to initiate a program, conflicts like two processes
in a table. accessing the exact memory location, or attempts to
Control and Measuring Software: A program designed to divide by zero. These errors trigger interrupts, prompting
interface with sensors and allow a computer or the microprocessor to handle the issues.
microprocessor to measure physical quantities and
control applications by comparing sensor data with
stored data and altering process parameters accordingly.
Apps: Software designed to run on mobile phones or
tablets, downloaded from an "App Store" and ranging
from games to sophisticated software such as phone
banking. Common examples include video and music
streaming, GPS, and camera facilities.
Source: Cambridge IGCSE and O Level Computer
Photo and Video Editing Software: Software that allows
Science - Second Edition (Hodder Education)
users to manipulate digital photographs or videos,
including changing colour, brightness, and contrast,
applying filters and other enhancements, and creating 3.12. Utility Software
transitions between clips.
Graphics Manipulation Software: Software that allows Computer users have access to utility programs as part
the manipulation of bitmap and vector images, with of system software
bitmap graphics editors changing pixels to produce a Utility programs can be initiated by the user or run in the
di!erent image, while vector graphics editors manipulate background without user input
lines, curves, and text to alter the stored image as Common utility programs include virus checkers,
required. defragmentation software, disk analysis and repair tools,
file compression and management software, backup
Interrupts software, security tools, and screensavers.
An interrupt is a signal sent to the microprocessor, either Virus Checkers & Anti-Virus Software
from a device or software, prompting the microprocessor to
pause its ongoing tasks and handle the interrupt
temporarily. Various factors can trigger interrupts, including:
Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Chin at Forsan British School on 21/11/24.
https://znotes.org/caie/igcse/computer-science-0478/theory/data-representation/ Page 19 of 27
CAIE-IGCSE-Computer Science - Theory 21/11/2024, 08:54
Virus checkers or anti-virus software are important for Security software is a utility software that manages
protecting computers from malware. access control, user accounts, and links to other utilities
They should be kept up to date and run in the such as virus and spyware checkers.
background to maintain their e!ectiveness. It also protects network interfaces using firewalls to
Anti-virus software checks files before they are run or prevent unauthorized access.
loaded and compares possible viruses against a Security software uses encryption and decryption to
database of known viruses. ensure intercepted data is unreadable without a
Heuristic checking is used to identify possible viruses decryption key.
that are not yet on the database. It oversees software updates to verify legitimate sources
Infected files are put into quarantine for automatic and prevent malicious software from being installed.
deletion or for the user to decide. Access control and user accounts use IDs and passwords
Anti-virus software must be updated as new viruses are to secure user data and prevent unauthorized access.
constantly discovered.
Full system scans should be carried out regularly to Screensavers
detect dormant viruses.
Screensavers display moving and still images on the
Disk Defragmentation Software monitor screen after computer inactivity.
They were originally developed to protect CRT monitors
Defragmentation software rearranges the data blocks on from 'phosphor burn'.
a hard disk drive (HDD) to store files in contiguous Screensavers are now mostly used for customizing a
sectors, reducing head movements and improving data device and as a part of computer security systems.
access time. They automatically log out of the user after a certain
As an HDD becomes full, blocks used for files become period of inactivity.
scattered all over the disk surface, making it slower to Some screensavers activate useful background tasks like
retrieve data as the HDD read-write head needs several virus scans and distributed computing applications.
movements to find the data.
When a file is deleted or extended, new data does not fill Device Drivers
the vacant sectors immediately, causing the files to
become more scattered throughout the disk surfaces. Device drivers translate data into a format that can be
A disk defragmenter rearranges the data blocks to store understood by the hardware device they are associated
files in contiguous sectors wherever possible, allowing with.
for faster data access and retrieval. Without the appropriate device driver, a hardware device
The defragmentation process can free up previously cannot work with a computer and may not be recognised
occupied sectors and empty some tracks. by the operating system.
USB device drivers contain descriptors, which include a
Backup Software vendor ID (VID), product ID (PID) and unique serial
number that allow the operating system to identify the
Backup software is a utility software that helps create device.
and manage backup copies of data files and programs. Serial numbers must be unique to avoid confusion if two
Manual backups using memory sticks or portable hard devices with the same serial number are plugged into a
drives are good practices, but operating system backup computer simultaneously.
utilities are also recommended.
Backup utilities allow scheduling backups and only
backup files if changes have been made to them. 4. The Internet and Its Uses
There could be three file versions for total security: the
current version stored on the internal HDD/SSD, a locally
4.1. The Internet and the World Wide
backed-up copy on a portable SSD, and a remote backup
on cloud storage. Web
Security Software
Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Chin at Forsan British School on 21/11/24.
https://znotes.org/caie/igcse/computer-science-0478/theory/data-representation/ Page 20 of 27
CAIE-IGCSE-Computer Science - Theory 21/11/2024, 08:54
Blockchain Network
HTTP and HTTPS
Blockchain Network involves several interconnected
HTTP stands for Hypertext Transfer Protocol, and HTTPS
computers where the transaction data is stored
stands for Hypertext Transfer Protocol secure
Hacking isn’t possible here as transaction details would
They are safety protocols maintained while transmitting
be sent to all the computers, and the data can’t be
data.
changed without the consent of all the network
members
Web Browsers
How do blockchains work
It is software used to connect to the internet Every time a transaction takes place, A block is created. The
It translates the HTML code block would contain -
ensures SSL & TLS security can be established
O!ers additional features like search history & ad Data - Name of the sender and the receiver, amount of
blockers money and more
Hash Value - Unique value generated by an algorithm
Retrieval and Location of web pages Previous Hash Value - Hash Value of the previous block
in the chain
The browser sends the URL to the domain name server
(DNS)
DNS stores the index and matches it with the IP
IP is sent to the browser if it exists
The browser sends a request to the IP of the webserver
Browser interprets the HTML
Cookies
Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Chin at Forsan British School on 21/11/24.
https://znotes.org/caie/igcse/computer-science-0478/theory/data-representation/ Page 21 of 27
CAIE-IGCSE-Computer Science - Theory 21/11/2024, 08:54
Brute Force Attack: Stands for Malicious Software. A few examples are -
Virus - A program that can replicate itself with the
Hackers try to guess your password by trying all the intention of deleting or corrupting files, causing a
di!erent combinations of letters, numbers and symbols. computer malfunction
E!ect: Ransomware - Attackers encrypt the user’s data until
Hacker gets access to user’s personal data (credit a certain amount of money is paid
cards, passwords and more) Adware - Displays unwanted ads on the user’s screen
To remove risk: Trojan Horse - Programs that are disguised as
Use stronger passwords with more characters and legitimate software
symbols Spyware - Sends data about all the activities of the
user to the attacker
Data Interception: Worms - Programs that can replicate themselves with
the intention of corrupting the entire network instead
This involves stealing data by tapping into a wired or a
of the computer alone
wireless transmission line
Wardriving - The act of locating and using wireless Phishing
internet connections illegally
Packet Sni#ng - Uses Packet sni!ers to examine Attackers send legitimate-looking emails to bait the user
packets sent over a line; all the data collected is sent into giving out their information.
back to the attacker To remove risk:
E!ect: Don’t open links from unknown receivers
It can cause a computer to crash Use anti-phishing tools
Can delete or corrupt files/data Block pop-up ads
To remove risk: Have an up-to-date browser
Install anti-virus software
Pharming
Don’t use software from unknown sources
Be careful when opening emails from unknown The attacker installs a malicious code on the computer,
which redirects the user to fake websites
Distributed Denial of Service Attacks (DDoS)
E!ect:
An attempt at preventing users from accessing part of a The user gives out login details and other personal
network details
Usually temporary but may be damaging To remove risk:
An attacker may be able to prevent the user from: Using anti-virus software
Accessing their emails Checking the spelling and the weblink carefully
Accessing websites Make sure that the green padlock is present in the
Accessing online services URL bar
Hacking
Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Chin at Forsan British School on 21/11/24.
https://znotes.org/caie/igcse/computer-science-0478/theory/data-representation/ Page 22 of 27
CAIE-IGCSE-Computer Science - Theory 21/11/2024, 08:54
Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Chin at Forsan British School on 21/11/24.
https://znotes.org/caie/igcse/computer-science-0478/theory/data-representation/ Page 23 of 27
CAIE-IGCSE-Computer Science - Theory 21/11/2024, 08:54
Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Chin at Forsan British School on 21/11/24.
https://znotes.org/caie/igcse/computer-science-0478/theory/data-representation/ Page 24 of 27
CAIE-IGCSE-Computer Science - Theory 21/11/2024, 08:54
Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Chin at Forsan British School on 21/11/24.
https://znotes.org/caie/igcse/computer-science-0478/theory/data-representation/ Page 25 of 27
CAIE-IGCSE-Computer Science - Theory 21/11/2024, 08:54
CAIE IGCSE
Computer Science
© ZNotes Education Ltd. & ZNotes Foundation 2024. All rights reserved.
This version was created by Chin on Thu Nov 21 2024 for strictly personal use only.
These notes have been created by Abdullah Aamir, Abhiram Mydi and Shriram Srinivas for the 2023-2025 syllabus.
The document contains images and excerpts of text from educational resources available on the internet and printed books.
If you are the owner of such media, test or visual, utilized in this document and do not accept its usage then we urge you to contact us
and we would immediately replace said media. No part of this document may be copied or re-uploaded to another website.
Under no conditions may this document be distributed under the name of false author(s) or sold for financial gain.
"ZNotes" and the ZNotes logo are trademarks of ZNotes Education Limited (registration UK00003478331).
https://znotes.org/caie/igcse/computer-science-0478/theory/data-representation/ Page 26 of 27
CAIE-IGCSE-Computer Science - Theory 21/11/2024, 08:54
https://znotes.org/caie/igcse/computer-science-0478/theory/data-representation/ Page 27 of 27