caie-igcse-computer-science-2210-theory-v5
caie-igcse-computer-science-2210-theory-v5
1100 C 12
Final Answer: 0010000111111101
1101 D 13
1110 E 14 Converting Binary to Hexadecimal
1111 F 15
Divide the binary value into groups of 4 starting from the
right. If at the end, the last division is less than 4, add 0s
1.2. Number Conversions until it reaches 4
For each group, find the denary value as shown above,
Converting Binary to Denary and then convert each denary value to its corresponding
hexadecimal value (if less than 10, then itself, else, 10 is
Place the binary value in columns of 2 raised to the power A, 11 is B, 12 is C, 13 is D, 14 is E and 15 is F).
of the number of values from the right starting from 0.
After conversion, just put all the hexadecimal values in
e.g. For binary value 11101110, place it in a table like this: order to get the final answer
WWW.ZNOTES.ORG
CAIE IGCSE COMPUTER SCIENCE
Convert the value to binary, and then convert it to Shifting 10101010 - 1 place left:
hexadecimal as explained above 1. The furthest bit in the direction to be logically
shifted is removed ( in this case, one at the LHS is
removed) - ==(if it were two places, 2 bits would
1.3. Binary Calculations have been removed)==
2. Every bit is moved in given places to the given
Binary values are not added the way denary values are
direction ( every bit is moved one place to the left
added, as when adding 1 and 1, we cannot write two
in this case, and the leftover bit in the right is
because it doesn’t exist in binary.
marked 0, so 10101010 would become 01010100)
Steps to add Two Values (With Example) Converting negative values to two complement
The values we will add are 1 1 0 1 1 1 0 and 1 1 0 1 1 1 1 0
Find the binary equivalent of the value ignoring the - sign
1. Convert both the bytes into 8 bits (add zero to the
Convert the binary value to two’s complement
left-hand side to match them).
Make the MSB 1, if not already
e.g., 1 1 0 1 1 1 0 would become 0 1 1 0 1 1 1 0
2. Add the values as follows with the points given
Converting Two’s Complement Value to Denary:
above
We do it the same way as a normal value is converted
Carry 1 1 1 1 1 1 1
from binary to denary; we only replace 128 with -12,8 e.g.,
Byte 1 0 1 1 0 1 1 1 0 for 1011101,0 we do the:
Byte 2 1 1 0 1 1 1 1 0
OVERFLOW -128 64 32 16 8 4 2 1
Solution 1 0 1 0 0 1 1 0 0 1 0 1 1 1 0 1 0
Note: We move from RHS to LHS, and when adding values, we -128 + 32 + 16 + 8 + 2 = -70
use the rules given above. If the bit crosses the limit
1.4. Use of the Hexadecimal System
WWW.ZNOTES.ORG
CAIE IGCSE COMPUTER SCIENCE
Sampling Resolution:
1.5. Text
The number of bits per sample is known as the sampling
ASCII resolution (aka bit depth)
Increasing the sampling resolution increases the accuracy
The standard ASCII code character set consists of 7-bit of the sampled sound as more detail is stored about the
code that represents the letters, numbers and characters amplitude of the sound.
found on a standard keyboard, together with 32 control Increasing the sampling resolution also increases the
codes memory usage of the file as more bits are being used to
Uppercase and lowercase characters have different ASCII store the data.
values
Every subsequent value in ASCII is the previous value + 1. Sampling Rate
e.g. “a” is 97 in ASCII, “b” will be 98 (which is 97 + 1)
Important ASCII values (in denary) to remember are as The sampling rate is the number of sound samples taken
follows: per second, which is measured in Hertz (Hz)
A higher sampling rate would allow more accurate sound
0 is at 48 as fewer estimations will be done between samples.
A is at 65
a is at 97 Images
ASCII uses one byte to store the value Bitmap Images
When the ASCII value of a character is converted to
binary, it can be seen that the sixth-bit changes from 1 to Bitmap images are made up of pixels
0 when going from lowercase to uppercase of a A bitmap image is stored in a computer as a series of
character, and the rest remains the same. e.g. binary numbers
Colour Depth
WWW.ZNOTES.ORG
A 1-bit colour depth means each pixel can store 1 colour seconds). (For a stereo sound file, you would then
(because 2 to the power of 1 is 2) - ( This is done as the bit multiply the result by two.)
can either be 0 or 1, with 0 being white and 1 being black)
Increasing colour depth increases the size of the file when 1.7. File Types
storing an image.
Musical Instrument Digital Format (MIDI)
Image Resolution
Storage of music files
Image resolution refers to the number of pixels that make A communications protocol that allows electronic musical
up an image; for example, an image could contain 4096 × instruments to interact with each other
3072 pixels. Stored as a series of demands but no actual music notes
Photographs with a lower resolution have less detail than Uses 8-bit serial transmission (asynchronous)
those with a higher resolution. Each MIDI command has a sequence of bytes:
When a bitmap image is ‘ blurry ‘ or ‘ fizzy ’ due to having a The first byte is the status byte – which informs the
low amount of pixels in it or when zoomed, it is known as MIDI device what function to perform
being pixelated. Encoded in the status byte is the MIDI channel
High-resolution images use high amounts of memory as (operates on 16 different channels)
compared to low-resolution ones. Examples of MIDI commands:
Note on/off: indicates that a key has been pressed
1.6. Measurement of the Size of Key pressure: indicates how hard it has been pressed
(loudness of music)
Computer Memories Needs a lot of memory storage
1 megabyte (1MB) 106 1 000 000 bytes Joint Photographic Experts Group (JPEG)
1 gigabyte (1GB) 109 1 000 000 000 bytes
JPEG is a file format used to reduce photographic file sizes
1 terabyte (1TB) 1012 1 000 000 000 000 bytes Reducing picture resolution is changing the number of
1 000 000 000 000 000 pixels per centimetre
1 petabyte (1PB) 1015 bytes When a photographic file undergoes compression, file
size is reduced
JPEG will reduce the raw bitmap image by a factor
Calculation of File Size
between 5 and 15
The file size of an image is calculated as: image resolution
(in pixels) × colour depth (in bits) 1.8. Lossless and Lossy File
The size of a mono sound file is calculated as: sample rate
(in Hz) × sample resolution (in bits) × length of sample (in
Compression
WWW.ZNOTES.ORG
CAIE IGCSE COMPUTER SCIENCE
WWW.ZNOTES.ORG
CAIE IGCSE COMPUTER SCIENCE
0 1 0 1 1 0 1 0
Automatic Repeat Requests (ARQs)
Symmetric Encryption:
Checksum
It uses an encryption key for the encryption process,
Whenever a block of data needs to be sent, the sender The same key is used for both encrypting and
would calculate the checksum value using a specific decrypting the data.
algorithm. Asymmetric Encryption:
Once the data has been sent, The receiver would Uses a public key and a private key. The public key is
calculate the checksum again with the same set of data available to everyone whereas the private key is only
and the same algorithm used before. available to the user
The receiver would then compare the value received and The receiver would have the private key and they
the newly calculated value. If they aren’t matched, A would send the public key to the sender. The sender
request is made to re-send the data. can encrypt the message with the public key and the
data can be on decrypted using the private key.
WWW.ZNOTES.ORG
CAIE IGCSE COMPUTER SCIENCE
3. Hardware
3.1. Computer Architecture & Von
Neumann architecture
The central processing unit (CPU) (also known as a
microprocessor or processor) is central to all modern
computer systems
The CPU consists of the following architecture: Source: Cambridge IGCSE and O Level Computer
Science - Second Edition (Hodder Education)
Processor: The processor contains the Arithmetic and
Logic Unit (ALU) The Fetch-Execute Cycle
Control Unit: The control unit controls the operation of the
memory, processor and input/output devices 1. PC contains the address of the next instruction to be
Arithmetic Logic Unit: Carries out the logic system like fetched
calculations 2. This address is copied to the MAR via the address bus
System Clock: The system clock is used to produce timing 3. The instruction of the address is copied into the MDR
signals on the control bus temporarily
4. The instruction in the MDR is then placed in the CIR
Busses: Carry data through components. The following are its
5. The value in the PC is incremented by 1, pointing to
types.
the next instruction to be fetched
Address bus – unidirectional 6. The instruction is finally decoded and then executed
Data Bus – bi-directional
Control Bus – unidirectional and bi-directional Stored Program Concept:
Immediate Access Store: Stores the instructions that are to Instructions are stored in the main memory
be processed, which are fetched by the CPU Instructions are fetched, decoded and executed by
the processor
The following registers also exist in the architecture: Programs can be moved to and from the main memory
Overclocking
WWW.ZNOTES.ORG
CAIE IGCSE COMPUTER SCIENCE
Using a clock speed higher than the computer was designed 3D scanners can scan solid objects and produce a three-
for. dimensional image
It leads to multiple issues. Scanners take images at several points, x, y and z (lasers,
magnetic, white light)
Operations become unsynchronised - (the computer The scanned images can be used in Computer Aided
would frequently crash and become unstable) Design (CAD) or to a 3D printer to produce a working
can lead to serious overheating of the CPU model
The wider the data buses, the better the performance of the Make use of (OCR) to produce digital images which
computer represent the passport pages
Text can be stored in ASCII format
Cache The 2D photograph in the passport is also scanned and
stored as jpeg image
Cache memory is located within the CPU itself The passenger’s face is also photographed using a digital
-- allows faster access to the CPU camera and compared using face recognition software
-- stores frequently used instructions and data that need to be Key parts of the face are compared (distance between
accessed faster, which improves CPU performance eyes, width of nose)
The larger the cache memory size, the better the CPU
performance Barcode readers/scanners
WWW.ZNOTES.ORG
CAIE IGCSE COMPUTER SCIENCE
WWW.ZNOTES.ORG
CAIE IGCSE COMPUTER SCIENCE
Use dry powder ink (toner) and static electricity to CCFL uses two fluorescent tubes behind the LCD screen,
produce text and images which supplies the light source
Prints the whole page in one go
Light Projectors:
1. (steps 1-4 same as inkjet)
2. Printing drum is given a positive charge; as the drum Two common types of light projectors:
rotates, a the laser beam is scanned across it, Digital Light Projector (DLP)
removing the positive charge leaves negatively LCD Projector
charged areas which match the text/image Projectors are used to project computer output onto
3. The drum is then coated with positively charged toner; larger screens/interactive whiteboards
it only sticks to negatively charged parts of the drum
Digital Light Projectors (DLP)
4. A negatively charged sheet is rolled over the drum
5. The toner on the drum now sticks to the paper to Uses millions of micromirrors
produce a copy of the page the number of micromirrors and the way they are
6. Paper finally goes through a fuser (set of heated arranged on the DLP chip determines the resolution of the
rollers); heat melts the ink so it is permanent image
7. The discharge lamp removes all electric charge from When the micromirrors tilt towards the light source they
the drum, ready to print next page are on
When the micromirrors tilt away from the light source,
3D Printers
they are off
Used for models of cars This creates a light or dark pixel on the projection screen
Produce solid objects that work A bright white light source passes through a colour filter
Built up layer by layer, using powdered resin, ceramic on its way to the DLP chip
powder White light splits into primary colours
A design is made using Computer-aided Design (CAD)
LCD Projectors
2D and 3D Cutters
Older technology than DLP
3D cutters can recognise objects in x, y, z direction A powerful beam of white light is generated from a bulb
3D laser cutters can cut; glass, crystal, metal, wood This beam of light is then sent to a group of chromatic-
coated mirrors; these reflect the light back at different
Actuators wavelengths
When the white light hits the mirrors, the reflected light
The actuators convert electrical signals to mechanical has wavelengths corresponding to red, green, and blue
processes. These three different lights pass through three LCD
Used in many control applications involving sensors and screens; these screens show the image to be projected as
devices (ADC and DAC) millions of pixels in grayscale
When the coloured light passes through the LCD screens,
Loudspeakers/Headphones
a red, green and blue version of the grey image emerges
Sound is produced by passing the digital data through a Finally, the image passes through the projector lens onto
DAC then through an amplifier and then emerges from the screen
the loudspeaker
Produced by voltage differences vibrating a cone in the
speaker at different frequencies
WWW.ZNOTES.ORG
CAIE IGCSE COMPUTER SCIENCE
The CPU does not directly access secondary storage Avoids the need to install/upgrade RAM, as it could be
RAM, ROM, and cache memory are some examples expensive
HDD, SSD, DVD, memory stick, and Blu-ray disc are some The system wastes no storage on unwanted/unused
examples data.
Blu-ray Disks
You may be expected to draw a diagram like the above. Uses a blue laser to carry out read-and-write operations
The main advantages of virtual memory are The wavelength of laser light is less than CD and DVD
They can be larger than the physical memory provided (stores up to five times more data than DVD)
in the RAM. Automatically come with secure encryption (prevent
piracy and copyright infringement)
WWW.ZNOTES.ORG
CAIE IGCSE COMPUTER SCIENCE
Combination of Hardware and Software which is designed Media Access Control (MAC)
to carry out a specific set of tasks.
Embedded systems may contain - A MAC address comprises 48 bits which are shown as six
groups of hexadecimal digits. The first six display the
Microcontrollers - CPU, RAM, ROM and other
peripherals on one single chip manufacturer’s code, and the second half shows the device
serial number.
Microprocessor - Integrated circuit with CPU only
System on Chips (SoC) - microprocessor with I/O ports,
These do not change and are primarily constant for every
storage and memory
device
Process of Embedded Devices -
there are two types of MAC addresses: the Universally
Input from the user is sent to the microprocessor Administered MAC Address (UAA) and the Locally
(ADC needed if the data is analogue)
Administered MAC Address (LAA)
Data from the user interface is also sent to the
microprocessor The only difference between the two types are that UAA is
Microprocessor then sends signals to actuators which made Universally and cannot be changed, but it is the
is the output opposite for LAA.
Non-programmable devices need to be replaced if they
need a software update. IP Addresses
Programmable devices have two methods of updating -
Connecting the device to a computer and downloading IP address allocation:
the update The network allocates IP addresses.
Two types of IP addresses: static and dynamic.
WWW.ZNOTES.ORG
CAIE IGCSE COMPUTER SCIENCE
Static IP addresses: The router receives data packets from devices on the
Assigned manually to a device. local network and forwards them to the internet.
Does not change over time. It also receives incoming data packets from the
Dynamic IP addresses: internet and routes them to the appropriate devices
Assigned automatically by a DHCP (Dynamic Host on the local network.
Configuration Protocol) server.
Changes periodically or when the device connects to a
different network. 4. Software
IPv4 (Internet Protocol version 4):
Widely used protocol. 4.1. Types of Software
Consists of four groups of decimal numbers separated
by dots (e.g., 192.168.0.1). 1. System Software e.g. Operating System, Utility
Provides approximately 4.3 billion unique addresses. programs and device drivers
IPv6 (Internet Protocol version 6): 2. Application Software e.g. spreadsheet, word
Developed to address the limitations of IPv4. processor etc.
Uses eight groups of hexadecimal numbers separated
by colons (e.g., System Software:
2001:0db8:85a3:0000:0000:8a2e:0370:7334).
Provides an extremely large number of unique these are a set of programs which control and manage
addresses (approximately 340 undecillion). the operations of hardware
Differences between IPv4 and IPv6: gives a platform for other software to run
Address format: IPv4 uses a 32-bit address, while IPv6 it is required to allow hardware and software to run
uses a 128-bit address. without problems
Address space: IPv4 provides approximately 4.3 billion provides a human-computer interface (HCI) to the user
addresses, whereas IPv6 offers around 340 controls the allocation and usage of hardware resources
undecillion addresses.
Address allocation: IPv4 addresses are allocated using Application Software:
DHCP or manually, while IPv6 addresses are primarily
assigned using stateless autoconfiguration. allows a user to perform specific tasks using the
computer’s resources
Routers maybe a single program (for example, NotePad) or a suite
of programs (for example, Microsoft Office)
Router functionality: user can execute the software as and when they require,
A router is a networking device that directs data and is mostly not automatic
packets between different networks.
It determines the most efficient path for data
Examples
transmission.
Sending data to a specific destination on a network:
System Software:
A router examines the destination IP address of
incoming data packets.
Compiler: Translates high-level language into machine
It uses routing tables to determine the next hop or the
code, allowing for direct use by a computer to perform
next router on the path to the destination.
tasks without re-compilation.
The router forwards the data packet to the
Linker: Combines object files produced by a compiler into
appropriate next hop.
a single program, allowing the use of separately written
Router's role in IP address assignment:
code modules in the final program.
A router can act as a DHCP server (Dynamic Host
Device driver: Software that enables hardware devices to
Configuration Protocol) and assign IP addresses to
communicate with a computer's operating system,
devices on a local network.
without which a device like a printer would be unable to
It dynamically allocates IP addresses from a
work.
predefined range to connected devices.
Operating system: Software that manages basic
DHCP allows for automatic IP address configuration
computer functions such as input/output operations,
and simplifies network management.
program loading and running, and security management,
Connecting a local network to the Internet:
making computers more user-friendly.
A router serves as the gateway between a local
Utility programs: Software that manages, maintains, and
network and the internet.
controls computer resources by carrying out specific
It connects the local network to an internet service
tasks, such as virus checking, disk repair and analysis, file
provider (ISP) network.
management, and security.
WWW.ZNOTES.ORG
CAIE IGCSE COMPUTER SCIENCE
WWW.ZNOTES.ORG
CAIE IGCSE COMPUTER SCIENCE
A disk defragmenter rearranges the data blocks to store number that allow the operating system to identify the
files in contiguous sectors wherever possible, allowing for device.
faster data access and retrieval. Serial numbers must be unique to avoid confusion if two
The defragmentation process can free up previously devices with the same serial number are plugged into a
occupied sectors and empty some tracks. computer simultaneously.
Screensavers
WWW.ZNOTES.ORG
CAIE IGCSE COMPUTER SCIENCE
The BIOS (Basic Input/Output System) tells the computer Write code that doesn’t take up much space
the location of the OS in the storage. Write code that runs very quickly
BIOS is often referred to as the firmware Assembly language must be translated into machine
code using an assembler to run.
Translators
Compiler
Computers can only understand machine code; therefore, Translates a low-level language program into machine
code
translators are needed
Executable file of machine code produced
High-Level Languages One low-level language translated into one machine code
instructions
It is easier to read and understand as the language is It can be used without an assembler
closer to human language. Used for general use
Easier to write in a shorter time
Easier to debug at the development stage Compiler Interpreter Assembler
Easier to maintain once in use Executes a high-
Translates a high- Translates a low-
level language
Low-Level Languages level language level assembly
program one
program into language program
Refer to machine code statement at a
machine code. into machine code.
Binary instructions that the computer understands time.
An executable file No executable file An executable file
of machine code is of machine code is of machine code is
produced. produced. produced.
One high-level
One high-level One low-level
language program
language language
statement may
statement can be statement is usually
require several
translated into translated into one
machine code
several machine machine code
instructions to be
code instructions. instruction.
executed.
Source: Cambridge IGCSE and O Level Computer
Interpreted Assembled
Science - Second Edition (Hodder Education) Compiled programs
programs cannot programs are used
Assembly Language are run without the
be run without the without the
compiler.
Few programmers use assembly language to - interpreter. assembler.
Make use of special hardware
WWW.ZNOTES.ORG
CAIE IGCSE COMPUTER SCIENCE
WWW.ZNOTES.ORG
CAIE IGCSE COMPUTER SCIENCE
Blockchain Network involves several interconnected Distributed Denial of Service Attacks (DDoS)
computers where the transaction data is stored
Hacking isn’t possible here as transaction details would be An attempt at preventing users from accessing part of a
sent to all the computers, and the data can’t be changed network
without the consent of all the network members Usually temporary but may be damaging
An attacker may be able to prevent the user from:
How do blockchains work Accessing their emails
Every time a transaction takes place, A block is created. The Accessing websites
block would contain - Accessing online services
Malware
The first block is called the genesis block as it doesn’t point to
any previous block (Previous Hash Value - 0000) Stands for Malicious Software, A few examples are -
Virus - A program that can replicate itself with the
5.3. Cyber Security intention of deleting or corrupting files, cause
computer malfunction
Brute Force Attack: Ransomware - Attackers encrypt the user’s data until a
certain amount of money is paid
Hackers try to guess your password by trying all the Adware - Displays unwanted ads on the user’s screen
different combinations of letters, numbers and symbols. Trojan Horse - Programs that are disguised as
Effect: legitimate software
Hacker gets access to user’s personal data (credit
Spyware - Sends data about all the activities of the
cards, passwords and more) user to the attacker
To remove risk: Worms - Programs that can replicate itself with the
Use stronger passwords with more characters and intention of corrupting the entire network instead of
symbols
the computer alone
Data Interception: Phishing
This involves stealing data by tapping into a wired or a Attackers send legitimate-looking emails to bait the user
wireless transmission line into giving out their information.
Wardriving - The act of locating and using wireless To remove risk:
internet connections illegally Don’t open links from unknown receivers
Packet Sniffing - Uses Packet sniffers to examine Use anti-phishing tools
packets sent over a line, all the data collected is sent Block pop-up ads
back to the attacker Have an up-to-date browser
Effect:
It can cause a computer to crash Pharming
Can delete or corrupt files/data
To remove risk: The attacker installs a malicious code on the computer,
Install anti-virus software which redirects the user to fake websites
Don’t use software from unknown sources Effect:
Be careful when opening emails from unknown The user gives out login details and other personal
details
WWW.ZNOTES.ORG
CAIE IGCSE COMPUTER SCIENCE
WWW.ZNOTES.ORG
CAIE IGCSE COMPUTER SCIENCE
WWW.ZNOTES.ORG