CAIE-IGCSE-Computer Science - Theory
CAIE-IGCSE-Computer Science - Theory
ORG
CAIE IGCSE
COMPUTER SCIENCE
SUMMARIZED NOTES ON THE THEORY SYLLABUS
Prepared for Alvina for personal use only.
CAIE IGCSE COMPUTER SCIENCE
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Alvina at Cambridge International School, Dubai on 19/02/25.
CAIE IGCSE COMPUTER SCIENCE
Carry 1 1 1 1 1 1 1
Given Value : 1 0 0 0 0 1 1 1 1 1 1 1 0 1 Byte 1 0 1 1 0 1 1 1 0
Byte 2 1 1 0 1 1 1 1 0
When grouped: 10 0001 1111 1101 OVERFLOW
Solution 1 0 1 0 0 1 1 0 0
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Alvina at Cambridge International School, Dubai on 19/02/25.
CAIE IGCSE COMPUTER SCIENCE
Examples:
Defining colours in Hypertext Markup Language (HTML)
Media Access Control (MAC) addresses (a number that
uniquely identifies a device on a network) Unicode
Assembly languages and machine code
Memory Dumps ASCII does not contain all of the international languages
Debugging (method to find errors in a program) thus, Unicode is used to solve this problem
Display error codes (numbers refer to the memory The first 128 values are the same as ASCII.
location of the error) Unicode supports up to four bytes per character, storing
IP (Internet Protocol) addresses multiple languages and more data.
To represent text in binary, a computer uses a
Memory Dumps character set, a collection of characters and the
corresponding binary codes that represent them.
Hexadecimal is used when developing new software or
when trying to trace errors.
Sound
Memory dump is when the memory contents are output
to a printer or monitor. Sound is analogue, and for it to be converted to digital
Assembly code and machine code (low-level languages) form, it is sampled
The sound waves are sampled at regular time intervals
Computer memory is machine code/ assembly code where the amplitude is measured. However, it cannot be
Using hexadecimal makes writing code easier, faster, and measured precisely, so approximate values are stored
less error-prone than binary.
Using machine code (binary) takes a long time to key in How is Sound Recorded
values and is prone to errors.
The amplitude of the sound wave is first determined at
set time intervals
1.5. Text, Sound and Images The value is converted to digital form
Each sample of the sound wave is then encoded as a
ASCII series of binary digits
A series of readings gives an approximate representation
The standard ASCII code character set consists of 7-bit
of the sound wave
code that represents the letters, numbers and characters
found on a standard keyboard, together with 32 control Sampling Resolution:
codes
Uppercase and lowercase characters have different ASCII
values
Every subsequent value in ASCII is the previous value + 1.
e.g. “a” is 97 in ASCII, “b” will be 98 (which is 97 + 1)
Important ASCII values (in denary) to remember are as
follows:
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Alvina at Cambridge International School, Dubai on 19/02/25.
CAIE IGCSE COMPUTER SCIENCE
Images
Conventional System
Bitmap Images Name of memory size No. of Bytes Equivalent Denary Value
1 kilobyte (1KB) 103 1 000 bytes
Bitmap images are made up of pixels 1 megabyte (1MB) 106 1 000 000 bytes
A bitmap image is stored in a computer as a series of 1 gigabyte (1GB) 109 1 000 000 000 bytes
1 terabyte (1TB) 1012 1 000 000 000 000 bytes
binary numbers 1 petabyte (1PB) 1015 1 000 000 000 000 000 bytes
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Alvina at Cambridge International School, Dubai on 19/02/25.
CAIE IGCSE COMPUTER SCIENCE
Storage of music files JPEG is a file format used to reduce photographic file
A communications protocol that allows electronic sizes
musical instruments to interact with each other Reducing picture resolution is changing the number of
Stored as a series of demands but no actual music notes pixels per centimetre
Uses 8-bit serial transmission (asynchronous) When a photographic file undergoes compression, file
Each MIDI command has a sequence of bytes: size is reduced
The first byte is the status byte – which informs the JPEG will reduce the raw bitmap image by a factor
MIDI device what function to perform between 5 and 15
Encoded in the status byte is the MIDI channel
(operates on 16 different channels) 1.8. Lossless and Lossy File
Examples of MIDI commands:
Note on/off: indicates that a key has been pressed Compression
Key pressure: indicates how hard it has been pressed
(loudness of music) Lossless File Compression
It needs a lot of memory storage
All the data bits from the original file are reconstructed
MP3 again when the file is uncompressed.
Important for files where the loss of data would be
It uses technology known as Audio Compression to disastrous (spreadsheet)
convert music and other sounds into an MP3 file format An algorithm is used to compress data
This compression reduces the normal file size by 90% No data is lost
Done using file compression algorithms, which use Repeated patterns/text are grouped together in indexes
Perceptual Music Shaping
Removes sounds that the human ear cannot hear Run-Length Encoding
properly
Certain sounds are removed without affecting the It reduces the size of a string of adjacent, identical data
quality, too much (e.g. repeated colours in an image)
CD files are converted using File Compression Software A repeating string is encoded into two values: the first
Use lossy format as the original file is lost following the value represents the number of identical data items (e.g.
compression algorithm characters), and the second value represents the code of
the data item (such as ASCII code if it is a keyboard
MP4
character), e.g. ‘aaaaabbbbccddddd’ becomes “05 97 04
This format allows the storage of multimedia files rather 98 02 99 05 100.”
than just sound RLE is only effective where there is a long run of
Music, videos, photos and animations can be stored repeated units/bits
Videos could be streamed without losing any real One difficulty is that RLE compression isn't perfect for
discernible quality strings like "cdcdcdcdcd". We use a flag to solve this; e.g.,
255 can be made as the flag. Now 255 will be put before
Joint Photographic Experts Group (JPEG) every repeating value, e.g. our previous example
becomes 255 05 97 255 04 98 255 02 99 255 05 100
where 255 now indicates that the next character/set of
characters is approaching
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Alvina at Cambridge International School, Dubai on 19/02/25.
CAIE IGCSE COMPUTER SCIENCE
The file compression algorithm eliminates unnecessary Simplex data transmission is in one direction only (e.g.
data bits like in MP3 and JPEG formats. computer to printer)
It is impossible to get the original file back once it is Half-duplex data transmission is in both directions but
compressed not at the same time (e.g., walkie-talkie)
Reduces file quality Full-duplex data transmission is in both directions
In this, the image's resolution and colour depth are simultaneously (e.g. broadband connection on the phone
reduced. line)
Serial data transmission is when data is sent one bit at a
2. Data Transmission time over a single wire
Parallel data transmission is when data of several bits (1
byte) are sent down several wires at the same time.
2.1. Types and Methods of Data Comparison of Serial and Parallel Data
Transmission Transmission
Data Packets Serial Parallel
Better for longer distances (Telephone Lines) Better for short distances (Internal circuits)
Cheaper Option Expensive (More hardware required)
Packet Structure - Used when the size of data transmitted is small Used when speed is necessary
Header Slower Option Faster than Serial
Easier to synchronise as there's only one data Difficult to synchronise due to skew between
Contains the IP address of the sender and the stream. bits.
receiver
The sequence number of the packet 2.2. Universal Serial Bus (USB)
Size of the packet
Payload USB is an asynchronous serial data transmission method
Contains the actual data USB consists of:
Trailer Four-wire shielded cable
Includes a method of identifying the end of the Two wires are used for power and earth
packet Two wires are used in data transmission
Error-Checking methods
Advantages Disadvantages
Packet Switching - Method of data transmission where Automatically detected Transmission rate is less than 120 MB/sec
the data is broken into multiple packets. Packets are Only fit one way, prevents incorrect connections Maximum cable length is about 5 metres
Different data transmission rates
then sent independently from start to end and Backwards compatible
reassembled at the receiver’s computer. Industry-standard
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Alvina at Cambridge International School, Dubai on 19/02/25.
CAIE IGCSE COMPUTER SCIENCE
The LMB (Left-Most Bit) is the parity bit. As the number Check digits are calculated from all the other digits in the
of 1s is even, the parity bit would be set to even. data (ex-codes). The check digit would be the last digit of
Limitations with Parity Checks the code.
Two bits may change during transmission; therefore These are used to identify mistyping errors such as -
error is not found 6372 typed as 6379
Even though the parity checks would reveal the errors, 8432 typed as 842
the bit(s) changed wouldn’t be identified
Automatic Repeat Requests (ARQs)
Parity Blocks
Uses acknowledgements and timeouts to make sure the
To overcome the limitations of parity bits, Parity blocks user received the data
would be used. The receiver would check the data for any errors; if none
are found, a positive acknowledgement is sent to the
sender. However, if errors are found, a negative
acknowledgement will be sent, and the data will be sent
again.
The sender uses timeouts to wait for a pre-determined
amount for the acknowledgement.
If no acknowledgements are received after the timeout,
the data will be sent again to the receiver.
2.4. Encryption
Any changes in bits would be identified through the rows
and columns Encryption is a process of turning the data into an
unreadable form so it doesn’t make sense to hackers and
Checksum other attackers.
Whenever a block of data needs to be sent, the sender Plaintext and Ciphertext
would calculate the checksum value using a specific
algorithm. Plaintext is the original data that is being sent
Once the data has been sent, The receiver would Ciphertext is the text produced after encryption
calculate the checksum again with the same set of data
and the same algorithm used before.
Symmetric and Asymmetric Encryption
The receiver would then compare the value received and Symmetric Encryption:
the newly calculated value. If they aren’t matched, A It uses an encryption key for the encryption process;
request is made to re-send the data. the same key is used for encrypting and decrypting
the data.
Echo Check Asymmetric Encryption:
Uses a public key and a private key. The public key is
Once the data has been sent, The receiver will send the
data back to the sender for verification. available to everyone, whereas the private key is only
The sender would compare the received and original available to the user.
data for errors. The receiver would have the private key, and they
The only downside is that we wouldn’t know if the error would send the public key to the sender. The sender
can encrypt the message with the public key, and the
occurred when sending the data or sending the data
back for verification. data can be decrypted using the private key.
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Alvina at Cambridge International School, Dubai on 19/02/25.
CAIE IGCSE COMPUTER SCIENCE
Overclocking
Using a clock speed higher than the computer was designed
for.
It leads to multiple issues.
Cache
Cache memory is located within the CPU itself
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Alvina at Cambridge International School, Dubai on 19/02/25.
CAIE IGCSE COMPUTER SCIENCE
-- allows faster access to the CPU
-- stores frequently used instructions and data that need to 3D scanners can scan solid objects and produce a three-
be accessed faster, which improves CPU performance dimensional image
The larger the cache memory size, the better the CPU Scanners take images at several points, x, y and z (lasers,
performance magnetic, white light)
The scanned images can be used in Computer-Aided
Cores Design (CAD) or in a 3D printer to produce a working
model
The more cores in the CPU, the better and faster the
performance Application of 2D Scanners at an Airport:
But if any number of cores are used, it could slow down Make use of (OCR) to produce digital images which
the system performance as the communication between represent the passport pages
each core increases, and so do the data cables between Text can be stored in ASCII format
each. Which in turn reduces the potential system The 2D photograph in the passport is also scanned and
performance. stored as jpeg image
You might have heard about quad and dual cores, not The passenger’s face is also photographed using a digital
septa or octa cores. camera and compared to using face recognition software
Key parts of the face are compared (distance between
eyes, width of nose)
3.3. Input Devices
Barcode readers/scanners
Two-dimensional Scanners:
A barcode is a series of dark and light parallel lines of
Used to input hard-copy documents varying thicknesses
The image is converted into an electronic form, which The numbers 0 -9 are each represented by a unique
can be stored in the computer series of lines
The document is placed on a glass panel The left and right-hand sides of the barcode are separate
A bright light illuminates the document using guard bars
A scan head moves across the document until the Allows barcode to be scanned in any direction
whole page is scanned. An image of the document is The barcode is read by a red laser or red LED
produced and sent to a lens using a series of mirrors Light is reflected off the barcode; dark areas reflect
The lens focuses on the document image little light, which allows the bars to be read
The focused image now falls onto a charge-coupled Reflected light is read by sensors (photoelectric cells)
device (CCD), which consists of several integrated The pattern is generated, which is converted to digital
circuits
The software produces a digital image in the Quick Response (QR) Codes
electronic form Another type of barcode is the QR codes
Optical Character Recognition (OCR) is a software which
Made up of a matrix of filled-in dark squares on a light
converts scanned documents into a text file format
background
If the original document was a photo/image, then the
Can hold more storage (7000 digits)
scanned image forms an image file such as JPEG Advantages of QR codes:
Three-dimensional Scanners No need for the user to write down the website
address
QR codes can store website addresses
Digital Cameras
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Alvina at Cambridge International School, Dubai on 19/02/25.
CAIE IGCSE COMPUTER SCIENCE
Touchscreens
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Alvina at Cambridge International School, Dubai on 19/02/25.
CAIE IGCSE COMPUTER SCIENCE
Devices that read or measure physical properties The light sensor sends data to the ADC
Data needs to be converted to digital The data is digitised and sent to the microprocessor
Analogue-to-digital converter (ADC) converts physical Microprocessor samples data every minute
values into digital If data from sensor < value stored in memory:
Sensors and their purposes: Signal sent from microprocessor to street lamp
Acoustic - These sensors act like a microphone that Lamp switched on
converts sound to electric pulses.
Accelerometer - These sensors measure an object's 3.4. Output Devices
acceleration or deceleration and motion.
Flow - This sensor measures the flow of liquid or gas. Inkjet Printers
Gas - These sensors measure the amount/level of any
gas in the environment. Used to print one-off pictures and documents
Humidity - This sensor measures the water vapour in Data from the document sent to the printer driver
the air or any sample. The printer driver ensures data is in the correct format
Infra-red (active) - This IR sensor uses an invisible Check made by printer driver that the chosen printer is
infrared beam. When the beam is broken/disturbed, available
it changes the amount of infrared light reaching the Data is sent to the printer and stored in a temporary
detector. memory (printer buffer)
Infra-red (passive) - These sensors detect the heat A sheet of paper is fed; the sensor detects if the paper is
emitted by any object. available in the paper tray
Level - This sensor detects the solids, liquids, or gas The print head moves across paper printing text/image,
level. four ink colours sprayed in the exact amount
Light - These devices use light-sensitive cells that Paper is advanced, so the next line is printed
generate electric current based on light brightness. Repeated until the buffer is empty
Magnetic field - This sensor detects the change in Once it is done, the printer sends an interrupt to the
magnetic field. processor (request for more data to be sent)
Moisture - This type of sensor detects the water
content wherever this sensor has been installed. Laser Printers
pH - This measures the acidity or alkalinity. Used to print flyers, high quality
Pressure - This sensor measures the pressure applied Use dry powder ink (toner) and static electricity to
Proximity - This sensor detects the nearby objects produce text and images
around the sensor Prints the whole page in one go
Temperature - These sensors measure the
temperature of the environment.
(Note: You do not need to know the working principle of
the sensor. But have an idea of their purposes.)
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Alvina at Cambridge International School, Dubai on 19/02/25.
CAIE IGCSE COMPUTER SCIENCE
1. (steps 1-4 same as inkjet) The front layer of the monitor is made up of Liquid
2. The printing drum is given a positive charge; as the Crystal Display (LCD); these tiny diodes are grouped in
drum rotates, a laser beam is scanned across it; threes as pixels (LCD doesn’t emit any light)
removing the positive charge leaves negatively LCD monitors are backlit using Light Emitting Diode (LED)
charged areas which match the text/image because:
3. The drum is then coated with positively charged LEDs reach their maximum brightness immediately
toner; it only sticks to negatively charged parts of the LEDs sharpen image (higher resolution), and CCFL
drum has a yellow tint
4. A negatively charged sheet is rolled over the drum LEDs improve the colour image
5. The toner on the drum now sticks to the paper to Monitors using LED are much thinner than CCFL
produce a copy of the page LEDs consume very little power
6. Paper finally goes through a fuser (set of heated Before LEDs, LCD monitors were backlit using CCFL
rollers); heat melts the ink so it is permanent CCFL uses two fluorescent tubes behind the LCD screen,
7. The discharge lamp removes all electric charge from which supplies the light source
the drum, ready to print on the next page
Light Projectors:
3D Printers
Two common types of light projectors:
Used for models of cars Digital Light Projector (DLP)
Produce solid objects that work LCD Projector
Built up layer by layer, using powdered resin, ceramic Projectors are used to project computer output onto
powder larger screens/interactive whiteboards
A design is made using Computer-aided Design (CAD)
Digital Light Projectors (DLP)
2D and 3D Cutters
Uses millions of micromirrors
3D cutters can recognise objects in x, y, z direction the number of micromirrors and the way they are
3D laser cutters can cut glass, crystal, metal, wood arranged on the DLP chip determines the resolution of
the image
Actuators When the micromirrors tilt towards the light source they
are on
The actuators convert electrical signals to mechanical
processes. When the micromirrors tilt away from the light source,
Used in many control applications involving sensors and they are off
devices (ADC and DAC) This creates a light or dark pixel on the projection screen
A bright white light source passes through a colour filter
Loudspeakers/Headphones on its way to the DLP chip
White light splits into primary colours
Sound is produced by passing the digital data through a
DAC, then through an amplifier, and then emerges from LCD Projectors
the loudspeaker
Produced by voltage differences vibrating a cone in the
speaker at different frequencies
LCD and LED Monitors
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Alvina at Cambridge International School, Dubai on 19/02/25.
CAIE IGCSE COMPUTER SCIENCE
Older technology than DLP RAM is used by a system when it needs to store and
A powerful beam of white light is generated from a bulb access data that is actively being used or processed by
This beam of light is then sent to a group of chromatic- the user immediately.
coated mirrors; these reflect the light at different Features of RAM
wavelengths Volatile/temporary memory (contents lost if RAM is
When the white light hits the mirrors, the reflected light turned off)
has wavelengths corresponding to red, green, and blue Used to store; data, files
These three different lights pass through three LCD It can be written to or read from, and the contents of
screens; these screens show the image to be projected the memory can be changed
as millions of pixels in grayscale The larger the size of the RAM, the faster the computer
When the coloured light passes through the LCD screens, will operate
a red, green and blue version of the grey image emerges RAM never runs out of memory and continues to run
Finally, the image passes through the projector lens onto slow
the screen As RAM becomes full, the processor has to access the
continually hard drive to overwrite old data on RAM with
new data
RAM is of two types:
3.5. Memory, Storage Devices & Media Science - Second Edition (Hodder Education)
Virtual memory
Primary vs. Secondary Storage When RAM runs out of memory, there is a problem with
The CPU directly accesses primary storage memory management; thus, the system has a high
RAM, ROM, and cache memory are some examples of chance of crashing. This is why virtual memory comes
primary storage into the picture.
The CPU does not directly access secondary storage The virtual memory can be either HDD or SSD (these
HDD, SSD, DVD, memory stick, and Blu-ray disc are some storages are discussed below)
examples of secondary storage
Primary Memory:
Random Access Memory (RAM)
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Alvina at Cambridge International School, Dubai on 19/02/25.
CAIE IGCSE COMPUTER SCIENCE
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Alvina at Cambridge International School, Dubai on 19/02/25.
CAIE IGCSE COMPUTER SCIENCE
Advantages and Disadvantages of using embedded
Public cloud – this is a storage environment where the systems
customer/client and cloud storage provider are different Advantages Disadvantages
companies Small in size, therefore can easily fit into
devices Can be difficult to upgrade
Private cloud – this is storage provided by a dedicated Low cost to make The interface can be confusing sometimes
Requires very little power Troubleshooting is a specialist’s job
environment behind a company firewall; customer/client Often thrown away as difficult to upgrade and
Very fast reaction to changing input
and cloud storage provider are integrated and operate Dedicated to one task only
faults are harder to find
Increased garbage as they are thrown away
as a single entity Can be controlled remotely Any computerised system is prone to attacks
Hybrid cloud – this is a combination of the two above
environments; some data resides in the private cloud, Applications of Embedded devices
and less sensitive/less commercial data can be accessed GPS systems
from a public cloud storage provider Security Systems
Vending Machines
Washing Machines
Oven
Microwave
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Alvina at Cambridge International School, Dubai on 19/02/25.
CAIE IGCSE COMPUTER SCIENCE
System Software:
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Alvina at Cambridge International School, Dubai on 19/02/25.
CAIE IGCSE COMPUTER SCIENCE
these are a set of programs which control and manage Word Processor: Software used for manipulating text
the operations of hardware documents, including creating, editing, and formatting
gives a platform for other software to run text with tools for copying, deleting, spell-checking, and
it is required to allow hardware and software to run importing images.
without problems Spreadsheet: Organizes and manipulates numerical data
provides a human-computer interface (HCI) to the user using a grid of lettered columns and numbered rows,
controls the allocation and usage of hardware resources with each cell identified using a unique combination of
columns and rows. It can calculate using formulas,
Application Software: produce graphs, and do modelling and "what if"
calculations.
allows a user to perform specific tasks using the Database: Software used to organize, analyze, and
computer’s resources manipulate data consisting of one or more tables that
maybe a single program (for example, NotePad) or a hold records and fields. It provides the ability to query
suite of programs (for example, Microsoft Office) and report on data and add, delete, and modify records
user can execute the software when they require, and it in a table.
is mostly not automatic Control and Measuring Software: A program designed to
interface with sensors and allow a computer or
Examples microprocessor to measure physical quantities and
control applications by comparing sensor data with
System Software: stored data and altering process parameters accordingly.
Apps: Software designed to run on mobile phones or
Compiler: Translates high-level language into machine tablets, downloaded from an "App Store" and ranging
code, allowing for direct use by a computer to perform from games to sophisticated software such as phone
tasks without re-compilation. banking. Common examples include video and music
Linker: Combines object files produced by a compiler streaming, GPS, and camera facilities.
into a single program, allowing the use of separately Photo and Video Editing Software: Software that allows
written code modules in the final program. users to manipulate digital photographs or videos,
Device driver: Software that enables hardware devices to including changing colour, brightness, and contrast,
communicate with a computer's operating system, applying filters and other enhancements, and creating
without which a device like a printer would be unable to transitions between clips.
work. Graphics Manipulation Software: Software that allows
Operating system: Software that manages basic the manipulation of bitmap and vector images, with
computer functions such as input/output operations, bitmap graphics editors changing pixels to produce a
program loading and running, and security management, different image, while vector graphics editors manipulate
making computers more user-friendly. lines, curves, and text to alter the stored image as
Utility programs: Software that manages, maintains, and required.
controls computer resources by carrying out specific
tasks, such as virus checking, disk repair and analysis, file Interrupts
management, and security.
An interrupt is a signal sent to the microprocessor, either
Application Software: from a device or software, prompting the microprocessor to
pause its ongoing tasks and handle the interrupt
temporarily. Various factors can trigger interrupts, including:
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Alvina at Cambridge International School, Dubai on 19/02/25.
CAIE IGCSE COMPUTER SCIENCE
Timing signals: Scheduled signals prompt the Virus checkers or anti-virus software are important for
microprocessor to pause and handle tasks at specific protecting computers from malware.
intervals. They should be kept up to date and run in the
Input/Output processes: Events such as a disk drive or background to maintain their effectiveness.
printer requiring additional data cause an interruption in Anti-virus software checks files before they are run or
the microprocessor's activities. loaded and compares possible viruses against a
Hardware faults: Issues like a paper jam in a printer, database of known viruses.
signalling the microprocessor to halt its operations and Heuristic checking is used to identify possible viruses
address the hardware problem. that are not yet on the database.
User interaction: Instances like a user pressing specific Infected files are put into quarantine for automatic
keys on a keyboard (e.g., ), leading to an interrupt in the deletion or for the user to decide.
system's operation. Anti-virus software must be updated as new viruses are
Software errors: Problems such as missing .exe files constantly discovered.
needed to initiate a program, conflicts like two processes Full system scans should be carried out regularly to
accessing the exact memory location, or attempts to detect dormant viruses.
divide by zero. These errors trigger interrupts, prompting
the microprocessor to handle the issues. Disk Defragmentation Software
Defragmentation software rearranges the data blocks on
a hard disk drive (HDD) to store files in contiguous
sectors, reducing head movements and improving data
access time.
As an HDD becomes full, blocks used for files become
scattered all over the disk surface, making it slower to
Source: Cambridge IGCSE and O Level Computer retrieve data as the HDD read-write head needs several
Science - Second Edition (Hodder Education) movements to find the data.
When a file is deleted or extended, new data does not fill
the vacant sectors immediately, causing the files to
3.9. Utility Software become more scattered throughout the disk surfaces.
A disk defragmenter rearranges the data blocks to store
Computer users have access to utility programs as part
files in contiguous sectors wherever possible, allowing
of system software
for faster data access and retrieval.
Utility programs can be initiated by the user or run in the
The defragmentation process can free up previously
background without user input
occupied sectors and empty some tracks.
Common utility programs include virus checkers,
defragmentation software, disk analysis and repair tools, Backup Software
file compression and management software, backup
software, security tools, and screensavers.
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Alvina at Cambridge International School, Dubai on 19/02/25.
CAIE IGCSE COMPUTER SCIENCE
Backup software is a utility software that helps create Device drivers translate data into a format that can be
and manage backup copies of data files and programs. understood by the hardware device they are associated
Manual backups using memory sticks or portable hard with.
drives are good practices, but operating system backup Without the appropriate device driver, a hardware device
utilities are also recommended. cannot work with a computer and may not be recognised
Backup utilities allow scheduling backups and only by the operating system.
backup files if changes have been made to them. USB device drivers contain descriptors, which include a
There could be three file versions for total security: the vendor ID (VID), product ID (PID) and unique serial
current version stored on the internal HDD/SSD, a locally number that allow the operating system to identify the
backed-up copy on a portable SSD, and a remote backup device.
on cloud storage. Serial numbers must be unique to avoid confusion if two
devices with the same serial number are plugged into a
Security Software computer simultaneously.
Device Drivers
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Alvina at Cambridge International School, Dubai on 19/02/25.
CAIE IGCSE COMPUTER SCIENCE
Interrupts
Signal that causes the microprocessor to stop what it's
doing and service the task
Ensures important tasks are dealt with on a priority basis
It can be a software or a hardware interrupt
Peripherals like a keyboard & mouse can generate it
Different interrupts have different levels of priority
After interruption is dealt with, the previous process
continues
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Alvina at Cambridge International School, Dubai on 19/02/25.
CAIE IGCSE COMPUTER SCIENCE
Web Browsers
It is software used to connect to the internet
It translates the HTML code
ensures SSL & TLS security can be established
Offers additional features like search history & ad
blockers
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Alvina at Cambridge International School, Dubai on 19/02/25.
CAIE IGCSE COMPUTER SCIENCE
Retrieval and Location of web pages
The browser sends the URL to the domain name server
(DNS)
DNS stores the index and matches it with the IP
IP is sent to the browser if it exists
The browser sends a request to the IP of the webserver
Browser interprets the HTML
Cookies
Cookies are small files stored on the user’s computer
They are used to track data about the users and autofill The first block is called the genesis block as it doesn’t point
forms or give suggestions accordingly to any previous block (Previous Hash Value - 0000)
Types of Cookies -
Session Cookie Persistent Cookie
4.3. Cyber Security
Remembers the user’s login details so the user
Temporary cookies are stored in the RAM till
the browser is closed. doesn’t have to log in every time they visit a
website Brute Force Attack:
Doesn’t collect any information on the user Stored on the hard disk on the computer until
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Alvina at Cambridge International School, Dubai on 19/02/25.
CAIE IGCSE COMPUTER SCIENCE
An attempt at preventing users from accessing part of a Attackers send legitimate-looking emails to bait the user
network into giving out their information.
Usually temporary but may be damaging To remove risk:
An attacker may be able to prevent the user from: Don’t open links from unknown receivers
Accessing their emails Use anti-phishing tools
Accessing websites Block pop-up ads
Accessing online services Have an up-to-date browser
Hacking Pharming
The act of gaining illegal access to a computer system The attacker installs a malicious code on the computer,
Effect: which redirects the user to fake websites
This leads to identity theft, gaining personal Effect:
information The user gives out login details and other personal
Data can be deleted, changed or corrupted details
To remove risk: To remove risk:
Firewalls Using anti-virus software
Strong passwords/ user IDs Checking the spelling and the weblink carefully
Use of anti-hacking software Make sure that the green padlock is present in the
Difference between hacking and cracking URL bar
Hacking breaks into computer systems to steal data
Cracking is when someone edits a program code, Social Engineering
malicious Attackers create a social situation which leads to victims
Malware giving out their details (For example - Spam calls
informing them that their account has been hacked)
Stands for Malicious Software. A few examples are -
Virus - A program that can replicate itself with the Keeping data safe from threats
intention of deleting or corrupting files, causing a
computer malfunction Access Levels - Having Different levels of access for
Ransomware - Attackers encrypt the user’s data until different people (for example - Only doctors can have
a certain amount of money is paid access to patient’s data)
Adware - Displays unwanted ads on the user’s screen Antivirus - Protects user’s computer from malware
Trojan Horse - Programs that are disguised as attacks
legitimate software Authentication - User proving who they are. The most
Spyware - Sends data about all the activities of the common methods are passwords, PINs, Mobiles (OTPs),
user to the attacker biometrics and more)
Worms - Programs that can replicate themselves with
Benefits and Drawbacks of Biometric Method
the intention of corrupting the entire network instead Biometric Benefits Drawbacks
of the computer alone Methods
Most development methods are very Intrusive as used to identify criminals,
easy to use and require very low
Fingerprint Scans storage
Phishing space to store the biometric Can’t be used if the finger gets dirty
or damaged (e.g. cuts)
data.
Retina Scan With very high accuracy, it Impossible It is very intrusive, Takes longer to
to replicate a person’s retina verify, Expensive to install and set up
Non-intrusive method, Relatively Can’t identify if there are any changes
Face Recognition cheaper in the lighting, change in age or
person’s age.
Voices can be recorded and used for
verification, but low accuracy and
Voice Recognition Non-Intrusive method, verification is
done quickly and relatively cheaper illnesses such as colds or coughs can
affect a person’s voice, making
identification impossible.
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Alvina at Cambridge International School, Dubai on 19/02/25.
CAIE IGCSE COMPUTER SCIENCE
Advantages Disadvantages
Two-Step Verification - Requires two methods of Faster and Safer
Any changes can be identified quickly
Expensive to set up and maintain
Any computerised systems are prone to attacks
authentication to prove who the user is Less Expensive in the long run Over-reliance on automated systems may cause
humans to lose skills
Automatic Software Updates - Latest updates contain Higher Productivity and Efficiency
patches which improve device security
Spelling and Tone - Fake emails tend to have wrong You should be able to describe the advantages and
spelling and grammar (amazonn instead of amazon), and disadvantages of an automated system used for a given
the tone would also seem urgent scenario.
Firewalls - Hardware or Software which monitors the Including scenarios from:
traffic between a network and the user’s computer
Proxy Servers - Acts as an intermediate between the industry
user’s computer and the web server. They are used for - transport
Filtering Internet traffic agriculture
Keeping the user’s IP Address Confidential weather
Blocking access to certain websites gaming
Attacks like DDoS and Hacking attack the proxy lighting
server, keeping the web server safe. science
Acts as a firewall as well.
Privacy Settings - Used to limit who can access and see a 5.2. Robotics
user’s profile
SSL (Secure Socket Layer) - Set of rules used while Robotics is the branch of computer science that
communicating with other users on the internet. combines robot design, construction and operation.
Isaac Asimov’s Laws of Robotics -
5. Automated and Emerging A robot may not injure a human through action or
inaction
Technologies A robot must obey orders given by humans unless it
comes into conflict with Law 1
a robot must protect itself unless this conflicts with
5.1. Automated Systems either law 1 or 2.
Characteristics of a robot -
Automated Systems are a combination of software and Ability to sense their surroundings
hardware designed to function without human Have a degree of movement
intervention. Programmable
Process of Automated Systems
NOTE - ROBOTS DO NOT POSSESS AI; THEY TEND TO DO
Sensors take inputs, and they are sent to the
REPETITIVE TASKS RATHER THAN REQUIRING HUMAN
microprocessor. The data is usually analogue, so it
CHARACTERISTICS
has to go through Analogue-to-Digital Converter
(ADC) Types of Robots -
The microprocessor processes the data and makes Independent - Have no human intervention; they can
the necessary decisions based on its program completely replace humans
The actions are then executed by the actuators Dependent - Needs human intervention through an
(Motors, wheels and so on) interface, can supplement but can’t completely
replace humans
Advantages and Disadvantages of Automated Systems
Advantages and Disadvantages of Robots
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Alvina at Cambridge International School, Dubai on 19/02/25.
CAIE IGCSE COMPUTER SCIENCE
Advantages Disadvantages
Robots can work 24/7 Robots can find it difficult to do non-standard
tasks
Robots can work in hazardous conditions Robots can lead to higher unemployment
They are less expensive in the long run Risk of deskilling as robots replace humans in
some task
They have high productivity and are more Expensive to install and maintain in the short
consistent run
Robots have the risk of getting hacked.
Types of AI
Expert System - AI that is developed to mimic human
knowledge and experiences. They are usually used for
answering questions using knowledge and inference.
They have many applications, including chatbots,
diagnosis in the medical industry, financial calculations
and so on
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Alvina at Cambridge International School, Dubai on 19/02/25.
CAIE IGCSE
Computer Science
© ZNotes Education Ltd. & ZNotes Foundation 2024. All rights reserved.
This version was created by Alvina on Wed Feb 19 2025 for strictly personal use only.
These notes have been created by Abdullah Aamir, Abhiram Mydi and Shriram Srinivas for the 2023-2025 syllabus.
The document contains images and excerpts of text from educational resources available on the internet and printed books.
If you are the owner of such media, test or visual, utilized in this document and do not accept its usage then we urge you to contact us
and we would immediately replace said media. No part of this document may be copied or re-uploaded to another website.
Under no conditions may this document be distributed under the name of false author(s) or sold for financial gain.
"ZNotes" and the ZNotes logo are trademarks of ZNotes Education Limited (registration UK00003478331).