CAIE-IGCSE-Computer Science - Theory
CAIE-IGCSE-Computer Science - Theory
ZNOTES.ORG
CAIE IGCSE
COMPUTER SCIENCE
SUMMARIZED NOTES ON THE THEORY SYLLABUS
Prepared for Veer for personal use only.
https://znotes.org/caie/igcse/computer-science-0478/theory/data-representation/ Page 1 of 28
CAIE-IGCSE-Computer Science - Theory 02/02/2025, 13:07
Base 2 number system Take the value and successively divide it by 2, creating a
It has two possible values only (0 and 1) table like follows:
0 represents OFF, and 1 represents ON
A point to be noted is that the most left bit is called the 2 142
MSB (Most Significant Bit) 2 71 Remainder: 0
2 35 Remainder: 1
Denary System 2 17 Remainder: 1
2 8 Remainder: 1
Base 10 number system 2 4 Remainder: 0
Has values from 0 to 9 2 2 Remainder: 0
2 1 Remainder: 0
Hexadecimal (aka Hex) 0 Remainder: 1
Base 16 number system Note that when the value itself is not divisible by 2, it is
Have values from 0 to 9 followed by A to F divided by the previous value of the current number and
A represents 10, B represents 11 and so on until 15, 1 is added to the remainder column for that specific
which is F number
When you reach 0, the remainder has to be read from
Binary Value Hexadecimal Value Denary Value bottom to top giving us the binary value ( as in this case,
0000 0 0 it is 1 0 0 0 1 1 1 0 )
0001 1 1
0010 2 2 Converting Hexadecimal to Binary
0011 3 3
0100 4 4 Separate each value from each other and convert them
0101 5 5 to denary
0110 6 6 Each separate denary value to be converted to binary
0111 7 7 All the binary values to be merged together
1000 8 8 e.g.
1001 9 9
1010 A 10 Hexadecimal : 2 1 F D
1011 B 11 Denary : 2 1 15 13
1100 C 12
Binary : 0010 0001 1111 1101
1101 D 13
Final Answer: 0010000111111101
1110 E 14
1111 F 15
Converting Binary to Hexadecimal
128 64 32 16 8 4 2 1
1 1 1 0 1 1 1 0
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Veer at Norwegian International School on 02/02/25.
https://znotes.org/caie/igcse/computer-science-0478/theory/data-representation/ Page 2 of 28
CAIE-IGCSE-Computer Science - Theory 02/02/2025, 13:07
Divide the binary value into groups of 4 starting from the The values we will add are 1 1 0 1 1 1 0 and 1 1 0 1 1 1 1
right. If at the end, the last division is less than 4, add 0s 0
until it reaches 4 1. Convert both the bytes into 8 bits (add zero to the
For each group, find the denary value as shown above, left-hand side to match them).
and then convert each denary value to its corresponding e.g., 1 1 0 1 1 1 0 would become 0 1 1 0 1 1 1 0
hexadecimal value (if less than 10, then itself, else, 10 is 2. Add the values as follows with the points given
A, 11 is B, 12 is C, 13 is D, 14 is E and 15 is F). above
After conversion, just put all the hexadecimal values in
order to get the final answer Carry 1 1 1 1 1 1 1
Byte 1 0 1 1 0 1 1 1 0
Given Value : 1 0 0 0 0 1 1 1 1 1 1 1 0 1 Byte 2 1 1 0 1 1 1 1 0
When grouped: 10 0001 1111 1101 OVERFLOW
Solution 1 0 1 0 0 1 1 0 0
After 2 values added to left: 0010 0001 1111 1101
Note: We move from RHS to LHS, and when adding values,
After Conversion to Denary: 2 1 15 13 we use the rules given above. If the bit crosses the limit
(overflows), we put the value in brackets, denoting it is
Denary to Hexadecimal: 21FD overflow.
Convert the value to binary as shown above, and then Logical Shifts
convert the final answer to denary
The logical shift means moving a binary value to the left
Converting Denary to Hexadecimal or the right
When doing a logical shift, keep in mind that the bit
Convert the value to binary, and then convert it to being emptied is going to become 0
hexadecimal as explained above
Explanation with Example
1.3. Binary Calculations Shifting 10101010 - 1 place left:
1. The furthest bit in the direction to be logically
Binary values are not added the way denary values are
shifted is removed ( in this case, one at the LHS is
added, as when adding 1 and 1, we cannot write two
removed) - ==(if it were two places, 2 bits would
because it doesn’t exist in binary.
have been removed)==
2. Every bit is moved in given places to the given
Points to Note:
direction ( every bit is moved one place to the left
in this case, and the leftover bit in the right is
0+0=0
marked 0, so 10101010 would become 01010100)
1+0/0+1=1
1 + 1 = 0 (1 carry)
Two’s Complement (Binary Numbers)
1 + 1 + 1 = 1 (1 carry)
Two’s complement is a method used to represent
Overflow negative values in binary. Here, the MSB ( Most
Significant Bit) is replaced from 128 to -128; thus, the
When adding two values, if the solution exceeds the limit
range of values in a two’s complement byte is -128 to 127
of given values, e.g., the solution has 9 bits, but the
question had 8 bits per value, the 9th bit (most left bit) is
Converting Binary Values to Two’s Complement
called overflow.
This indicates that the memory doesn’t have enough Firstly, write the binary value and locate the first one
space to store the answer to the addition done in the from the right; e.g., 1101100 would have the first one at
previous part. the third position from the right.
Now, switch every value to the left of the first one
Steps to add Two Values (With Example) located above (not switching the one), e.g., the value in
our example becomes 0010100, which is the two’s
complement of itself.
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Veer at Norwegian International School on 02/02/25.
https://znotes.org/caie/igcse/computer-science-0478/theory/data-representation/ Page 3 of 28
CAIE-IGCSE-Computer Science - Theory 02/02/2025, 13:07
Converting negative values to two complement The standard ASCII code character set consists of 7-bit
code that represents the letters, numbers and characters
Find the binary equivalent of the value ignoring the - sign found on a standard keyboard, together with 32 control
Convert the binary value to two’s complement codes
Make the MSB 1, if not already Uppercase and lowercase characters have di!erent ASCII
values
Converting Two’s Complement Value to Denary: Every subsequent value in ASCII is the previous value + 1.
e.g. “a” is 97 in ASCII, “b” will be 98 (which is 97 + 1)
We do it the same way as a normal value is converted Important ASCII values (in denary) to remember are as
from binary to denary; we only replace 128 with -12,8 follows:
e.g., for 1011101,0 we do the:
0 is at 48
-128 64 32 16 8 4 2 1 A is at 65
1 0 1 1 1 0 1 0 a is at 97
Assembly code and machine code (low-level languages) Sound is analogue, and for it to be converted to digital
form, it is sampled
Computer memory is machine code/ assembly code
The sound waves are sampled at regular time intervals
Using hexadecimal makes writing code easier, faster, and
where the amplitude is measured. However, it cannot be
less error-prone than binary.
measured precisely, so approximate values are stored
Using machine code (binary) takes a long time to key in
values and is prone to errors. How is Sound Recorded
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Veer at Norwegian International School on 02/02/25.
https://znotes.org/caie/igcse/computer-science-0478/theory/data-representation/ Page 4 of 28
CAIE-IGCSE-Computer Science - Theory 02/02/2025, 13:07
The amplitude of the sound wave is first determined at Image resolution refers to the number of pixels that
set time intervals make up an image; for example, an image could contain
The value is converted to digital form 4096 × 3072 pixels.
Each sample of the sound wave is then encoded as a Photographs with a lower resolution have less detail
series of binary digits than those with a higher resolution.
A series of readings gives an approximate representation When a bitmap image is ‘ blurry ‘ or ‘ fizzy ’ due to having
of the sound wave a low amount of pixels in it or when zoomed, it is known
as being pixelated.
Sampling Resolution: High-resolution images use high amounts of memory as
compared to low-resolution ones.
The number of bits per sample is known as the sampling
resolution (aka bit depth) 1.6. Measurement of the Size of
Increasing the sampling resolution increases the
accuracy of the sampled sound as more detail is stored Computer Memories
about the amplitude of the sound.
Increasing the sampling resolution also increases the A binary digit is referred to as a BIT
memory usage of the file as more bits are being used to 8 bits is a byte
store the data. 4 bits is a nibble
Byte is used to measure memory size
Sampling Rate
IECB System (Most Common)
The sampling rate is the number of sound samples taken
per second, which is measured in Hertz (Hz) Name of memory No. of
Equivalent Denary Value
A higher sampling rate would allow more accurate sound size Bytes
as fewer estimations will be done between samples. 1 kibibyte (1KiB) 210 1 024 bytes
1 mebibyte (1MiB) 220 1 048 576 bytes
Images 1 gibibyte (1GiB) 230 1 073 741 824 bytes
Bitmap Images 1 tebibyte (1TiB) 240 1 099 511 627 776 bytes
1 125 899 906 842 624
1 pebibyte (1PiB) 250 bytes
Bitmap images are made up of pixels
A bitmap image is stored in a computer as a series of
binary numbers Conventional System
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Veer at Norwegian International School on 02/02/25.
https://znotes.org/caie/igcse/computer-science-0478/theory/data-representation/ Page 5 of 28
CAIE-IGCSE-Computer Science - Theory 02/02/2025, 13:07
This format allows the storage of multimedia files rather The file compression algorithm eliminates unnecessary
than just sound data bits like in MP3 and JPEG formats.
Music, videos, photos and animations can be stored It is impossible to get the original file back once it is
Videos could be streamed without losing any real compressed
Reduces file quality
discernible quality
In this, the image's resolution and colour depth are
Joint Photographic Experts Group (JPEG) reduced.
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Veer at Norwegian International School on 02/02/25.
https://znotes.org/caie/igcse/computer-science-0478/theory/data-representation/ Page 6 of 28
CAIE-IGCSE-Computer Science - Theory 02/02/2025, 13:07
Data Transmission
2.3. Methods of Error Detection
Simplex data transmission is in one direction only (e.g.
computer to printer) Parity Checks
Half-duplex data transmission is in both directions but
It uses the number of 1-bits in a byte
not at the same time (e.g., walkie-talkie)
Full-duplex data transmission is in both directions Type Types -
simultaneously (e.g. broadband connection on the phone Even - Even number of 1-bits
line) Odd - Odd numbers of 1-bits
Serial data transmission is when data is sent one bit at a Example (Even Parity) -
time over a single wire
0 1 0 1 1 0 1 0
Parallel data transmission is when data of several bits (1
byte) are sent down several wires at the same time.
The LMB (Left-Most Bit) is the parity bit. As the number
of 1s is even, the parity bit would be set to even.
Comparison of Serial and Parallel Data
Limitations with Parity Checks
Transmission Two bits may change during transmission; therefore
error is not found
Even though the parity checks would reveal the errors,
the bit(s) changed wouldn’t be identified
Parity Blocks
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Veer at Norwegian International School on 02/02/25.
https://znotes.org/caie/igcse/computer-science-0478/theory/data-representation/ Page 7 of 28
CAIE-IGCSE-Computer Science - Theory 02/02/2025, 13:07
To overcome the limitations of parity bits, Parity blocks Uses acknowledgements and timeouts to make sure the
would be used. user received the data
The receiver would check the data for any errors; if none
are found, a positive acknowledgement is sent to the
sender. However, if errors are found, a negative
acknowledgement will be sent, and the data will be sent
again.
The sender uses timeouts to wait for a pre-determined
amount for the acknowledgement.
If no acknowledgements are received after the timeout,
the data will be sent again to the receiver.
2.4. Encryption
Any changes in bits would be identified through the rows
and columns Encryption is a process of turning the data into an
unreadable form so it doesn’t make sense to hackers and
Checksum other attackers.
Check Digits
3. Hardware
Check digits are calculated from all the other digits in the
data (ex-codes). The check digit would be the last digit of
the code. 3.1. Computer Architecture & Von
These are used to identify mistyping errors such as -
Neumann Architecture
6372 typed as 6379
8432 typed as 842
The central processing unit (CPU) (also known as a
microprocessor or processor) is central to all modern
Automatic Repeat Requests (ARQs) computer systems
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Veer at Norwegian International School on 02/02/25.
https://znotes.org/caie/igcse/computer-science-0478/theory/data-representation/ Page 8 of 28
CAIE-IGCSE-Computer Science - Theory 02/02/2025, 13:07
Processor: The processor contains the Arithmetic and 1. PC contains the address of the next instruction to be
Logic Unit (ALU) fetched
Control Unit: The control unit controls the operation of 2. This address is copied to the MAR via the address bus
the memory, processor and input/output devices 3. The instruction of the address is copied into the MDR
Arithmetic Logic Unit: Carries out the logic system like temporarily
calculations 4. The instruction in the MDR is then placed in the CIR
System Clock: The system clock is used to produce 5. The value in the PC is incremented by 1, pointing to
timing signals on the control bus the next instruction to be fetched
6. The instruction is finally decoded and then executed
Buses: Carry data through components. The following are its
types. Stored Program Concept
Address bus – unidirectional
Instructions are stored in the main memory
Data Bus – bi-directional
Instructions are fetched, decoded, and executed by
Control Bus – bi-directional
the processor
Immediate Access Store: Stores the instructions that are to Programs can be moved to and from the main memory
be processed, which are fetched by the CPU
Memory Concept
The following registers also exist in the architecture:
A computer’s memory is divided into partitions: Each
REGISTER ABBREVIATION FUNCTION partition consists of an address and its contents, e.g.
Stores the instruction the
Current instruction
CIR CPU is currently decoding or MEMORY LOCATION CONTENT
register
executing 10101010 01010110
Stores the Address of the
Memory address
MAR instruction, copy it, and Instruction Set:
register
sends it to MDR
An instruction set is a list of all the commands that a CPU
Stores the Data from the
can process, and the commands are machine code
MDR Memory data register address received from the
MAR and sends data to CIR
Stores the address of the 3.2. Cores, Cache and Internal Clock
PC Program counter next instruction to be
fetched from memory
System’s Clock
During calculations, data is
ACC Accumulator
temporarily held in it
The clock defines the clock cycle that synchronises all
computer operations. By increasing the clock speed, the
computer's processing speed also increases. This doesn’t
mean that the computer's performance is increased,
however.
Overclocking
Cache
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Veer at Norwegian International School on 02/02/25.
https://znotes.org/caie/igcse/computer-science-0478/theory/data-representation/ Page 9 of 28
CAIE-IGCSE-Computer Science - Theory 02/02/2025, 13:07
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Veer at Norwegian International School on 02/02/25.
https://znotes.org/caie/igcse/computer-science-0478/theory/data-representation/ Page 10 of 28
CAIE-IGCSE-Computer Science - Theory 02/02/2025, 13:07
Connected to a computer with a USB connection or by Devices that read or measure physical properties
wireless connection Data needs to be converted to digital
Each character has an ASCII value and is converted into a Analogue-to-digital converter (ADC) converts physical
digital signal values into digital
Slow method Sensors and their purposes:
Prone to errors Acoustic - These sensors act like a microphone that
converts sound to electric pulses.
Pointing devices Accelerometer - These sensors measure an object's
Mouse/trackball acceleration or deceleration and motion.
Flow - This sensor measures the flow of liquid or gas.
Traditional mechanical ball, connected by USB port
Gas - These sensors measure the amount/level of any
Modern type: red LEDs to detect movement
gas in the environment.
Microphones Humidity - This sensor measures the water vapour in
the air or any sample.
Used to input sound to a computer Infra-red (active) - This IR sensor uses an invisible
When a microphone picks up sound, a diaphragm infrared beam. When the beam is broken/disturbed,
vibrates, producing an electric signal it changes the amount of infrared light reaching the
The signal goes to a sound card and is converted into detector.
digital values and stored in a computer Infra-red (passive) - These sensors detect the heat
Voice recognition: voice is detected and converted into emitted by any object.
digital Level - This sensor detects the solids, liquids, or gas
level.
Touchscreens Light - These devices use light-sensitive cells that
generate electric current based on light brightness.
Capacitive (medium cost tech)
Magnetic field - This sensor detects the change in
Made up of many layers of glass
magnetic field.
Creating electric fields between glass plates in layers
Moisture - This type of sensor detects the water
When the top layer of glass is touched, electric
content wherever this sensor has been installed.
current changes
pH - This measures the acidity or alkalinity.
Co-ordinates where the screen was touched are
Pressure - This sensor measures the pressure applied
determined by an on-board microprocessor
Proximity - This sensor detects the nearby objects
Infra-red heat (expensive)
around the sensor
Use glass as the screen material
Temperature - These sensors measure the
Needs a warm object to carry an input operation
temperature of the environment.
Infra-red optical (expensive)
(Note: You do not need to know the working principle of
Uses glass as screen material
the sensor. But have an idea of their purposes.)
Uses an array of sensors (grid form)
Point of contact is based on which grid co-ordinate is Control of Street Lighting
touched
Resistive (inexpensive) The light sensor sends data to the ADC
The upper layer of polyester, the bottom layer of The data is digitised and sent to the microprocessor
glass Microprocessor samples data every minute
When the top polyester is touched, the top layer and If data from sensor < value stored in memory:
bottom layer complete a circuit Signal sent from microprocessor to street lamp
Signals are then sent out, which are interpreted by a Lamp switched on
microprocessor to determine where the screen was
touched
Sensors
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Veer at Norwegian International School on 02/02/25.
https://znotes.org/caie/igcse/computer-science-0478/theory/data-representation/ Page 11 of 28
CAIE-IGCSE-Computer Science - Theory 02/02/2025, 13:07
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Veer at Norwegian International School on 02/02/25.
https://znotes.org/caie/igcse/computer-science-0478/theory/data-representation/ Page 12 of 28
CAIE-IGCSE-Computer Science - Theory 02/02/2025, 13:07
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Veer at Norwegian International School on 02/02/25.
https://znotes.org/caie/igcse/computer-science-0478/theory/data-representation/ Page 13 of 28
CAIE-IGCSE-Computer Science - Theory 02/02/2025, 13:07
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Veer at Norwegian International School on 02/02/25.
https://znotes.org/caie/igcse/computer-science-0478/theory/data-representation/ Page 14 of 28
CAIE-IGCSE-Computer Science - Theory 02/02/2025, 13:07
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Veer at Norwegian International School on 02/02/25.
https://znotes.org/caie/igcse/computer-science-0478/theory/data-representation/ Page 15 of 28
CAIE-IGCSE-Computer Science - Theory 02/02/2025, 13:07
System Software:
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Veer at Norwegian International School on 02/02/25.
https://znotes.org/caie/igcse/computer-science-0478/theory/data-representation/ Page 16 of 28
CAIE-IGCSE-Computer Science - Theory 02/02/2025, 13:07
these are a set of programs which control and manage Word Processor: Software used for manipulating text
the operations of hardware documents, including creating, editing, and formatting
gives a platform for other software to run text with tools for copying, deleting, spell-checking, and
it is required to allow hardware and software to run importing images.
without problems Spreadsheet: Organizes and manipulates numerical data
provides a human-computer interface (HCI) to the user using a grid of lettered columns and numbered rows,
controls the allocation and usage of hardware resources with each cell identified using a unique combination of
columns and rows. It can calculate using formulas,
Application Software: produce graphs, and do modelling and "what if"
calculations.
allows a user to perform specific tasks using the Database: Software used to organize, analyze, and
computer’s resources manipulate data consisting of one or more tables that
maybe a single program (for example, NotePad) or a hold records and fields. It provides the ability to query
suite of programs (for example, Microsoft O#ce) and report on data and add, delete, and modify records
user can execute the software when they require, and it in a table.
is mostly not automatic Control and Measuring Software: A program designed to
interface with sensors and allow a computer or
Examples microprocessor to measure physical quantities and
control applications by comparing sensor data with
System Software: stored data and altering process parameters accordingly.
Apps: Software designed to run on mobile phones or
Compiler: Translates high-level language into machine tablets, downloaded from an "App Store" and ranging
code, allowing for direct use by a computer to perform from games to sophisticated software such as phone
tasks without re-compilation. banking. Common examples include video and music
Linker: Combines object files produced by a compiler streaming, GPS, and camera facilities.
into a single program, allowing the use of separately Photo and Video Editing Software: Software that allows
written code modules in the final program. users to manipulate digital photographs or videos,
Device driver: Software that enables hardware devices to including changing colour, brightness, and contrast,
communicate with a computer's operating system, applying filters and other enhancements, and creating
without which a device like a printer would be unable to transitions between clips.
work. Graphics Manipulation Software: Software that allows
Operating system: Software that manages basic the manipulation of bitmap and vector images, with
computer functions such as input/output operations, bitmap graphics editors changing pixels to produce a
program loading and running, and security management, di!erent image, while vector graphics editors manipulate
making computers more user-friendly. lines, curves, and text to alter the stored image as
Utility programs: Software that manages, maintains, and required.
controls computer resources by carrying out specific
tasks, such as virus checking, disk repair and analysis, file Interrupts
management, and security.
An interrupt is a signal sent to the microprocessor, either
Application Software: from a device or software, prompting the microprocessor to
pause its ongoing tasks and handle the interrupt
temporarily. Various factors can trigger interrupts, including:
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Veer at Norwegian International School on 02/02/25.
https://znotes.org/caie/igcse/computer-science-0478/theory/data-representation/ Page 17 of 28
CAIE-IGCSE-Computer Science - Theory 02/02/2025, 13:07
Timing signals: Scheduled signals prompt the Virus checkers or anti-virus software are important for
microprocessor to pause and handle tasks at specific protecting computers from malware.
intervals. They should be kept up to date and run in the
Input/Output processes: Events such as a disk drive or background to maintain their e!ectiveness.
printer requiring additional data cause an interruption in Anti-virus software checks files before they are run or
the microprocessor's activities. loaded and compares possible viruses against a
Hardware faults: Issues like a paper jam in a printer, database of known viruses.
signalling the microprocessor to halt its operations and Heuristic checking is used to identify possible viruses
address the hardware problem. that are not yet on the database.
User interaction: Instances like a user pressing specific Infected files are put into quarantine for automatic
keys on a keyboard (e.g., ), leading to an interrupt in the deletion or for the user to decide.
system's operation. Anti-virus software must be updated as new viruses are
Software errors: Problems such as missing .exe files constantly discovered.
needed to initiate a program, conflicts like two processes Full system scans should be carried out regularly to
accessing the exact memory location, or attempts to detect dormant viruses.
divide by zero. These errors trigger interrupts, prompting
the microprocessor to handle the issues. Disk Defragmentation Software
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Veer at Norwegian International School on 02/02/25.
https://znotes.org/caie/igcse/computer-science-0478/theory/data-representation/ Page 18 of 28
CAIE-IGCSE-Computer Science - Theory 02/02/2025, 13:07
Backup software is a utility software that helps create Device drivers translate data into a format that can be
and manage backup copies of data files and programs. understood by the hardware device they are associated
Manual backups using memory sticks or portable hard with.
drives are good practices, but operating system backup Without the appropriate device driver, a hardware device
utilities are also recommended. cannot work with a computer and may not be recognised
Backup utilities allow scheduling backups and only by the operating system.
backup files if changes have been made to them. USB device drivers contain descriptors, which include a
There could be three file versions for total security: the vendor ID (VID), product ID (PID) and unique serial
current version stored on the internal HDD/SSD, a locally number that allow the operating system to identify the
backed-up copy on a portable SSD, and a remote backup device.
on cloud storage. Serial numbers must be unique to avoid confusion if two
devices with the same serial number are plugged into a
Security Software computer simultaneously.
Device Drivers
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Veer at Norwegian International School on 02/02/25.
https://znotes.org/caie/igcse/computer-science-0478/theory/data-representation/ Page 19 of 28
CAIE-IGCSE-Computer Science - Theory 02/02/2025, 13:07
Memory Management - Manages the RAM and the It is easier to read and understand as the language is
HDD/SSD during the execution of programs closer to human language.
Security Management - Providing security features such Easier to write in a shorter time
as Anti-Virus, System updates and so on Easier to debug at the development stage
Hardware Peripheral Management - Managing the device Easier to maintain once in use
drives, Inputs, Outputs, Queues and bu!ers
File Management - Opening, Creating, Deleting, Low-Level Languages
Renaming, and many more functions
Refer to machine code
Multitasking - OS would share the hardware resources
Binary instructions that the computer understands
with each of the processes
Management of User Accounts - OS would allow multiple
users to customise their accounts individually.
Running of Applications
High-Level Languages
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Veer at Norwegian International School on 02/02/25.
https://znotes.org/caie/igcse/computer-science-0478/theory/data-representation/ Page 20 of 28
CAIE-IGCSE-Computer Science - Theory 02/02/2025, 13:07
Executes a high-language program a statement at a time An IDE would usually have these features -
No executable file of machine code produced Code Editor
One high-level language program statement may require Translator
several machine code instructions to be executed. Debugger
Interpreted programs cannot be used without an Error Reports
interpreter Auto-Completion and Auto-Correction
Used when the program is being developed Auto-Documenter
Pretty Printing
Assembler
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Veer at Norwegian International School on 02/02/25.
https://znotes.org/caie/igcse/computer-science-0478/theory/data-representation/ Page 21 of 28
CAIE-IGCSE-Computer Science - Theory 02/02/2025, 13:07
Cookies
Blockchain Network
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Veer at Norwegian International School on 02/02/25.
https://znotes.org/caie/igcse/computer-science-0478/theory/data-representation/ Page 22 of 28
CAIE-IGCSE-Computer Science - Theory 02/02/2025, 13:07
This involves stealing data by tapping into a wired or a Stands for Malicious Software. A few examples are -
wireless transmission line Virus - A program that can replicate itself with the
Wardriving - The act of locating and using wireless intention of deleting or corrupting files, causing a
internet connections illegally computer malfunction
Packet Sni#ng - Uses Packet sni!ers to examine Ransomware - Attackers encrypt the user’s data until
packets sent over a line; all the data collected is sent a certain amount of money is paid
back to the attacker Adware - Displays unwanted ads on the user’s screen
E!ect: Trojan Horse - Programs that are disguised as
It can cause a computer to crash legitimate software
Can delete or corrupt files/data Spyware - Sends data about all the activities of the
To remove risk: user to the attacker
Install anti-virus software Worms - Programs that can replicate themselves with
Don’t use software from unknown sources the intention of corrupting the entire network instead
Be careful when opening emails from unknown of the computer alone
An attempt at preventing users from accessing part of a Attackers send legitimate-looking emails to bait the user
network into giving out their information.
Usually temporary but may be damaging To remove risk:
An attacker may be able to prevent the user from: Don’t open links from unknown receivers
Accessing their emails Use anti-phishing tools
Accessing websites Block pop-up ads
Accessing online services Have an up-to-date browser
Hacking Pharming
The act of gaining illegal access to a computer system The attacker installs a malicious code on the computer,
E!ect: which redirects the user to fake websites
This leads to identity theft, gaining personal E!ect:
information The user gives out login details and other personal
Data can be deleted, changed or corrupted details
To remove risk: To remove risk:
Firewalls Using anti-virus software
Strong passwords/ user IDs Checking the spelling and the weblink carefully
Use of anti-hacking software Make sure that the green padlock is present in the
Di!erence between hacking and cracking URL bar
Hacking breaks into computer systems to steal data
Social Engineering
Cracking is when someone edits a program code,
malicious Attackers create a social situation which leads to victims
giving out their details (For example - Spam calls
Malware
informing them that their account has been hacked)
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Veer at Norwegian International School on 02/02/25.
https://znotes.org/caie/igcse/computer-science-0478/theory/data-representation/ Page 23 of 28
CAIE-IGCSE-Computer Science - Theory 02/02/2025, 13:07
Access Levels - Having Di!erent levels of access for Two-Step Verification - Requires two methods of
di!erent people (for example - Only doctors can have authentication to prove who the user is
access to patient’s data) Automatic Software Updates - Latest updates contain
Antivirus - Protects user’s computer from malware patches which improve device security
attacks Spelling and Tone - Fake emails tend to have wrong
Authentication - User proving who they are. The most spelling and grammar (amazonn instead of amazon), and
common methods are passwords, PINs, Mobiles (OTPs), the tone would also seem urgent
biometrics and more) Firewalls - Hardware or Software which monitors the
tra#c between a network and the user’s computer
Benefits and Drawbacks of Biometric Method Proxy Servers - Acts as an intermediate between the
Biometric user’s computer and the web server. They are used for -
Benefits Drawbacks
Methods
Filtering Internet tra#c
Most development
Intrusive as used to Keeping the user’s IP Address Confidential
methods are very easy
identify criminals, Can’t Blocking access to certain websites
Fingerprint to use and require very
be used if the finger
Scans low storage space to Attacks like DDoS and Hacking attack the proxy
gets dirty or damaged
store the biometric server, keeping the web server safe.
(e.g. cuts)
data. Acts as a firewall as well.
With very high It is very intrusive, Privacy Settings - Used to limit who can access and see a
accuracy, it Impossible Takes longer to verify,
Retina Scan user’s profile
to replicate a person’sExpensive to install and
retina set up SSL (Secure Socket Layer) - Set of rules used while
Can’t identify if there communicating with other users on the internet.
Face Non-intrusive method, are any changes in the
Recognition Relatively cheaper lighting, change in age
or person’s age. 5. Automated and Emerging
Voices can be recorded
and used for Technologies
verification, but low
Non-Intrusive method,
accuracy and illnesses
Voice verification is done
Recognition quickly and relatively
such as colds or coughs 5.1. Automated Systems
can a!ect a person’s
cheaper
voice, making
Automated Systems are a combination of software and
identification
impossible. hardware designed to function without human
intervention.
Process of Automated Systems
Sensors take inputs, and they are sent to the
microprocessor. The data is usually analogue, so it
has to go through Analogue-to-Digital Converter
(ADC)
The microprocessor processes the data and makes
the necessary decisions based on its program
The actions are then executed by the actuators
(Motors, wheels and so on)
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Veer at Norwegian International School on 02/02/25.
https://znotes.org/caie/igcse/computer-science-0478/theory/data-representation/ Page 24 of 28
CAIE-IGCSE-Computer Science - Theory 02/02/2025, 13:07
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Veer at Norwegian International School on 02/02/25.
https://znotes.org/caie/igcse/computer-science-0478/theory/data-representation/ Page 25 of 28
CAIE-IGCSE-Computer Science - Theory 02/02/2025, 13:07
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Veer at Norwegian International School on 02/02/25.
https://znotes.org/caie/igcse/computer-science-0478/theory/data-representation/ Page 26 of 28
CAIE-IGCSE-Computer Science - Theory 02/02/2025, 13:07
CAIE IGCSE
Computer Science
© ZNotes Education Ltd. & ZNotes Foundation 2024. All rights reserved.
This version was created by Veer on Sun Feb 02 2025 for strictly personal use only.
These notes have been created by Abdullah Aamir, Abhiram Mydi and Shriram Srinivas for the 2023-2025 syllabus.
The document contains images and excerpts of text from educational resources available on the internet and printed books.
If you are the owner of such media, test or visual, utilized in this document and do not accept its usage then we urge you to contact us
and we would immediately replace said media. No part of this document may be copied or re-uploaded to another website.
Under no conditions may this document be distributed under the name of false author(s) or sold for financial gain.
"ZNotes" and the ZNotes logo are trademarks of ZNotes Education Limited (registration UK00003478331).
https://znotes.org/caie/igcse/computer-science-0478/theory/data-representation/ Page 27 of 28
CAIE-IGCSE-Computer Science - Theory 02/02/2025, 13:07
https://znotes.org/caie/igcse/computer-science-0478/theory/data-representation/ Page 28 of 28