CAIE IGCSE Computer Science Theory
CAIE IGCSE Computer Science Theory
What is the base The Binary System is a **Base 2** number system that has two possible values: **0** (OFF) and **1** (ON).
of the Binary
System and what
values does it
represent?
What does the The **Most Significant Bit (MSB)** refers to the leftmost bit in a binary number, which holds the highest value in the
Most Significant number's representation.
Bit (MSB) refer to
in a binary
number?
How do you To convert a binary number to denary, place the binary value in columns of **2 raised to the power** of the number of
convert a binary values from the right starting from 0, then add the values corresponding to the bits that are **1**.
number to
denary?
What is the To convert denary to binary, successively divide the value by **2**, recording the remainders. Read the remainders from
process for bottom to top to get the binary value.
converting
denary to binary?
How do you To convert hexadecimal to binary, separate each hexadecimal digit, convert each to denary, then convert each denary
convert value to binary, and finally merge all binary values together.
hexadecimal to
binary?
What is the To convert binary to hexadecimal, divide the binary value into groups of **4** starting from the right, convert each group
method for to its denary value, and then to its corresponding hexadecimal value, combining them for the final answer.
converting
binary to
hexadecimal?
What is the 1. Group the binary value into sets of four bits.
process to 2. Convert each group to denary.
convert a binary 3. Combine the denary values to get the final result.
value to denary?
What is the The hexadecimal equivalent of the denary value 21FD is 21FD itself, as it is already in hexadecimal format.
hexadecimal
equivalent of the
denary value
21FD?
What is overflow Overflow occurs when the result of a binary addition exceeds the number of bits allocated for the values, resulting in a
in binary carry that cannot be represented within the given bit limit.
addition?
How do you 1. Move all bits in the binary number to the left or right by the specified number of places.
perform a logical 2. Fill the emptied bit positions with 0.
shift on a binary
number?
What is two's Two's complement is a method for representing negative binary values. It allows for the representation of values from
complement and -128 to 127 in an 8-bit binary format by inverting the bits to the left of the first 1 from the right and adding 1.
how is it used?
How do you 1. Find the binary equivalent of the absolute value of the negative number.
convert a 2. Convert this binary value to two's complement.
negative denary 3. Ensure the most significant bit (MSB) is set to 1 to indicate negativity.
value to two's
complement?
What is the range The range of values in a two's complement byte is from -128 to 127.
of values in a
two's
complement
byte?
binary value to
denary?
Why is Using hexadecimal makes writing code easier, faster, and less error-prone than binary. Machine code (binary) takes a long
hexadecimal time to key in values and is prone to errors.
preferred over
binary in writing
assembly code
and machine
code?
What is the The standard ASCII code character set consists of a 7-bit code that represents letters, numbers, and characters found on a
standard ASCII standard keyboard, along with 32 control codes.
code character
set?
How does the The sixth bit changes from 1 to 0 when going from lowercase to uppercase of a character, while the rest remains the
ASCII value same.
change from
lowercase to
uppercase
characters?
What is the Unicode is used to represent characters from multiple languages, as ASCII does not contain all international languages.
purpose of The first 128 values in Unicode are the same as ASCII.
Unicode?
How is sound Sound is sampled at regular time intervals where the amplitude is measured, and approximate values are stored in digital
converted from form.
analogue to
digital form?
What is sampling Sampling resolution, also known as bit depth, is the number of bits per sample. Increasing it increases the accuracy of the
resolution in sampled sound and the memory usage of the file.
sound recording?
What is the The **sampling rate** is the number of sound samples taken per second, measured in **Hertz (Hz)**. A higher sampling
sampling rate rate allows for more accurate sound as it results in fewer estimations between samples.
and how does it
affect sound
accuracy?
What are bitmap **Bitmap images** are made up of **pixels** and are stored in a computer as a series of **binary numbers**.
images and how
are they stored in
a computer?
What is colour **Colour depth** refers to the number of bits representing each colour. An **8-bit colour depth** allows each pixel to be
depth and how one of **256 colours**. A **1-bit colour depth** allows each pixel to store one colour (0 for white, 1 for black). Increasing
does it affect the colour depth increases the file size when storing an image.
number of
colours in a
bitmap image?
How does image **Image resolution** refers to the number of pixels that make up an image. Higher resolution images contain more pixels,
resolution resulting in greater detail, while lower resolution images have less detail and can appear **pixelated** when zoomed in.
impact the detail
of a photograph?
What is a BIT and A **binary digit** is referred to as a **BIT**. **8 bits** make up a **byte**, and **4 bits** make up a **nibble**. The byte is
how does it commonly used to measure memory size.
relate to
measuring
memory size?
What is the | System | Name of Memory Size | No. of Bytes | Equivalent Denary Value |
Question Answer
difference |---------------|---------------------|--------------|-----------------------------|
between the IEC | IEC | 1 kibibyte (1KiB) | 2^10 | 1,024 bytes |
and | IEC | 1 mebibyte (1MiB) | 2^20 | 1,048,576 bytes |
Conventional | IEC | 1 gibibyte (1GiB) | 2^30 | 1,073,741,824 bytes |
systems of | IEC | 1 tebibyte (1TiB) | 2^40 | 1,099,511,627,776 bytes |
measuring | IEC | 1 pebibyte (1PiB) | 2^50 | 1,125,899,906,842,624 bytes |
memory size? | Conventional | 1 kilobyte (1KB) | 10^3 | 1,000 bytes |
| Conventional | 1 megabyte (1MB) | 10^6 | 1,000,000 bytes |
| Conventional | 1 gigabyte (1GB) | 10^9 | 1,000,000,000 bytes |
| Conventional | 1 terabyte (1TB) | 10^12 | 1,000,000,000,000 bytes |
| Conventional | 1 petabyte (1PB) | 10^15 | 1,000,000,000,000,000 bytes |
What is MIDI and **MIDI** (Musical Instrument Digital Interface) is a protocol for storing music files and allows electronic musical
how does it instruments to interact. It is stored as a series of demands without actual music notes and uses **8-bit serial
function in music transmission**. Each MIDI command consists of a **status byte** that informs the device what function to perform,
storage? operating on **16 different channels**. Examples include commands for note on/off and key pressure.
What is the Audio Compression reduces the normal file size by 90% using file compression algorithms that employ Perceptual Music
purpose of Audio Shaping, which removes sounds that the human ear cannot hear properly without significantly affecting quality.
Compression in
converting
sounds to MP3
format?
What types of The MP4 format allows the storage of multimedia files, including music, videos, photos, and animations, and enables
files can be streaming of videos without losing discernible quality.
stored in the MP4
format?
How does JPEG JPEG reduces photographic file sizes by lowering picture resolution, which changes the number of pixels per centimeter,
file compression and can reduce the raw bitmap image size by a factor between 5 and 15.
reduce
photographic file
sizes?
What is the main In Lossless File Compression, all data bits from the original file are reconstructed when the file is uncompressed, ensuring
characteristic of no data is lost, which is crucial for files where data loss would be disastrous.
Lossless File
Compression?
What is Run-Length Encoding (RLE) reduces the size of a string of adjacent, identical data by encoding a repeating string into two
Run-Length values: the count of identical items and the code of the data item, making it effective for long runs of repeated units.
Encoding (RLE)
and how does it
work?
What is a key A key disadvantage of Lossy File Compression is that it eliminates unnecessary data bits, making it impossible to recover
disadvantage of the original file once it is compressed, and it can reduce file quality.
Lossy File
Compression?
What is packet Packet switching is a method of data transmission where data is broken into multiple packets. These packets are sent
switching and independently from the sender to the receiver and are reassembled at the receiver's computer.
how does it
work?
What are the 1. **Simplex**: Data transmission in one direction only (e.g., computer to printer).
Question Answer
three types of 2. **Half-duplex**: Data transmission in both directions but not at the same time (e.g., walkie-talkie).
data 3. **Full-duplex**: Data transmission in both directions simultaneously (e.g., broadband connection on the phone line).
transmission?
What are the two The two types of parity checks are:
types of parity
checks used in 1. **Even Parity**: The number of 1-bits in a byte is even.
error detection? 2. **Odd Parity**: The number of 1-bits in a byte is odd.
What are the 1. Two bits may change during transmission, which means the error may not be detected.
limitations of 2. Even though parity checks can reveal that an error has occurred, they do not identify which bit(s) have changed.
parity checks in
error detection?
How do parity Parity blocks improve upon the limitations of parity bits by allowing for the identification of changes in bits through the
blocks improve use of rows and columns, making it easier to detect errors in the transmitted data.
upon the
limitations of
parity bits?
What is the A **checksum** is calculated by the sender using a specific algorithm before sending data. The receiver recalculates the
purpose of a checksum with the same data and algorithm. If the values do not match, a request is made to re-send the data.
checksum in
data
transmission?
What is the In **Echo Check**, after data is sent, the receiver sends the data back to the sender for verification. The sender compares
process of Echo the received data with the original data to check for errors. However, it does not indicate when the error occurred (during
Check in data sending or returning).
verification?
How do Check **Check digits** are calculated from the other digits in the data (e.g., codes) and are used to identify mistyping errors. For
Digits help in example, if '6372' is mistyped as '6379', the check digit can help detect this error.
error detection?
What is the **Automatic Repeat Requests (ARQs)** use acknowledgements and timeouts to ensure data is received correctly. If the
function of receiver finds no errors, a positive acknowledgement is sent. If errors are found, a negative acknowledgement prompts
Automatic the sender to resend the data. Timeouts are used to resend data if no acknowledgement is received.
Repeat Requests
(ARQs) in data
transmission?
What is the **Plaintext** is the original data being sent, while **Ciphertext** is the unreadable text produced after encryption,
difference making it secure against unauthorized access.
between
Plaintext and
Ciphertext?
What is **Symmetric Encryption** uses the same encryption key for both encrypting and decrypting data, ensuring that the same
Symmetric key is shared between the sender and receiver for secure communication.
Encryption?
What is **Asymmetric Encryption** uses a pair of keys: a public key, which is available to everyone, and a private key, which is
Asymmetric kept secret by the user. The sender encrypts the message with the public key, and only the receiver can decrypt it using
Encryption and their private key.
how does it
work?
Question Answer
What is the The **Current Instruction Register (CIR)** stores the instruction that the CPU is currently decoding or executing.
function of the
Current
Instruction
Register (CIR)?
What does the The **Memory Address Register (MAR)** stores the address of the instruction, copies it, and sends it to the Memory Data
Memory Address Register (MDR).
Register (MAR)
do in the CPU?
Explain the role The **Memory Data Register (MDR)** stores the data from the address received from the MAR and sends this data to the
of the Memory Current Instruction Register (CIR).
Data Register
(MDR).
What is the The **Program Counter (PC)** stores the address of the next instruction to be fetched from memory.
purpose of the
Program Counter
(PC)?
Describe the 1. The PC contains the address of the next instruction to be fetched.
steps involved in 2. This address is copied to the MAR via the address bus.
the 3. The instruction at the address is copied into the MDR temporarily.
Fetch-Execute 4. The instruction in the MDR is then placed in the CIR.
Cycle. 5. The value in the PC is incremented by 1, pointing to the next instruction to be fetched.
6. The instruction is finally decoded and executed.
What is the The **Stored Program Concept** states that instructions are stored in the main memory and are fetched, decoded, and
Stored Program executed by the processor. Programs can be moved to and from the main memory.
Concept?
How does the The **system clock** defines the clock cycle that synchronizes all computer operations. Increasing the clock speed can
system clock increase processing speed, but it does not necessarily improve overall performance.
affect computer
operations?
How does cache **Cache memory** is located within the CPU and allows faster access to frequently used instructions and data, which
memory improve improves CPU performance. The larger the cache memory size, the better the CPU performance.
CPU
performance?
What is the Having more cores in a CPU generally improves performance, but if too many cores are used, it can slow down system
impact of having performance due to increased communication between cores and data cables.
multiple cores in
a CPU?
What is Optical Optical Character Recognition (OCR) is software that converts scanned documents into a text file format, allowing the text
Character to be editable and searchable.
Recognition
(OCR) and its
function in
scanning
documents?
How do 3D 3D scanners capture images at several points in three dimensions (x, y, and z) using technologies such as lasers, magnetic
scanners capture fields, or white light to produce a three-dimensional image.
images of solid
objects?
What are the 1. Use of OCR to produce digital images of passport pages.
applications of 2. Storing text in ASCII format.
2D scanners at 3. Scanning the 2D photograph in the passport as a JPEG image.
an airport? 4. Photographing the passenger's face for comparison using face recognition software, focusing on key facial features.
What is a A barcode is a series of dark and light parallel lines of varying thicknesses representing numbers 0-9. It is read by a red
barcode and how laser or LED, where light reflects off the barcode, and sensors detect the reflected light to generate a digital pattern.
is it read?
What are the 1. QR codes can hold more information (up to 7000 digits).
advantages of 2. They eliminate the need for users to write down website addresses.
QR codes 3. QR codes can be easily scanned using phone cameras, making them more user-friendly.
compared to
traditional
barcodes?
How does a A digital camera captures a photo when light passes through the lens onto a light-sensitive cell made up of pixels. The
digital camera number of pixels determines the size of the file.
capture a photo?
What is the A keyboard is connected to a computer via USB or wirelessly, where each character has an ASCII value that is converted
function of a into a digital signal. However, it is a slow method and prone to errors.
keyboard in data
input?
What are the two 1. **Mouse**: A traditional mechanical device with a ball that detects movement, connected via USB.
types of pointing 2. **Trackball**: A modern type that uses red LEDs to detect movement, allowing for more precise control.
devices
mentioned, and
how do they
function?
What is the A microphone picks up sound, causing a diaphragm to vibrate and produce an electric signal, which is then converted
function of a into digital values by a sound card and stored in the computer.
microphone in
sound input to a
computer?
How does a A capacitive touchscreen creates electric fields between layers of glass, and when the top layer is touched, the electric
capacitive current changes. The coordinates of the touch are determined by an on-board microprocessor.
touchscreen
determine the
point of contact?
What is the role An Analogue-to-Digital Converter (ADC) converts physical values measured by sensors into digital data for processing.
of an Analogue-t
o-Digital
Converter (ADC)
in sensors?
What An active infrared sensor uses an invisible infrared beam that changes when disturbed, while a passive infrared sensor
distinguishes an detects the heat emitted by objects without emitting any beam.
active infrared
sensor from a
passive infrared
sensor?
What type of A humidity sensor measures the water vapor in the air or any sample.
sensor would
you use to
measure
humidity in the
air?
What is the A proximity sensor detects nearby objects around the sensor.
purpose of a
proximity
sensor?
What are the 1. Data from the document is sent to the printer driver.
main steps 2. The printer driver ensures the data is in the correct format and checks if the printer is available.
involved in the 3. Data is sent to the printer and stored in the printer buffer.
operation of an 4. A sheet of paper is fed, and the sensor detects if paper is available.
inkjet printer? 5. The print head moves across the paper, spraying four ink colors in the exact amount until the buffer is empty.
6. Once done, the printer sends an interrupt to the processor for more data.
What is the Actuators convert electrical signals into mechanical processes and are used in various control applications involving
purpose of sensors and devices, such as ADC and DAC.
actuators in
control
applications?
What is the Loudspeakers produce sound by passing digital data through a DAC, then through an amplifier, causing voltage
function of differences that vibrate a cone in the speaker at different frequencies.
loudspeakers in
sound
production?
What materials 3D printers use powdered resin and ceramic powder to build solid objects layer by layer, based on designs made using
are used in 3D Computer-aided Design (CAD).
printing to create
solid objects?
What is the The primary function of Liquid Crystal Display (LCD) in monitors is to serve as the front layer that displays images, as LCD
primary function itself does not emit any light.
of Liquid Crystal
Display (LCD) in
monitors?
compared to
Cold Cathode
Fluorescent
Lamp (CCFL)?
What are the two The two common types of light projectors are:
common types of
light projectors? 1. Digital Light Projector (DLP)
2. LCD Projector
How does a A Digital Light Projector (DLP) creates light or dark pixels by using millions of micromirrors:
Digital Light
Projector (DLP) - When the micromirrors tilt towards the light source, they are 'on', creating a light pixel.
create light or - When they tilt away from the light source, they are 'off', creating a dark pixel.
dark pixels on
the projection
screen?
What is a key A key disadvantage of Digital Light Projectors (DLP) is that the image tends to suffer from 'shadows' when displaying grey
disadvantage of components in the image.
Digital Light
Projectors (DLP)?
What is a A significant advantage of LCD projectors is that they have better color saturation than DLP projectors, making the colors
significant appear more vibrant.
advantage of
LCD projectors
over DLP
projectors?
What is the The CPU directly accesses primary storage, which includes RAM, ROM, and cache memory. In contrast, the CPU does not
difference directly access secondary storage, which includes HDD, SSD, DVD, memory sticks, and Blu-ray discs.
between primary
and secondary
storage in terms
of CPU access?
What is the RAM is used to store and access data that is actively being used or processed by the user immediately.
primary function
of RAM in a
computer
system?
What are the two The two types of RAM are **DRAM (Dynamic RAM)** and **SRAM (Static RAM)**.
types of RAM?
What is a key DRAM needs to be constantly refreshed, while SRAM doesn't need to be constantly refreshed.
difference
between DRAM
and SRAM
regarding data
refresh?
What happens When RAM runs out of memory, the processor has to access the hard drive to overwrite old data on RAM with new data,
when RAM runs which can slow down the system.
out of memory?
What is virtual Virtual memory is a memory management capability that allows the system to use hard drive or SSD space as additional
memory and why memory when RAM runs out, preventing system crashes.
is it used?
What is the main ROM is used to store start-up instructions (basic input/output systems) and retains its contents even when turned off.
purpose of Read
Only Memory
(ROM)?
How is data Data is stored in a digital format on the magnetic surface of the disks (platter), organized in sectors and tracks.
stored in Hard
Disk Drives
Question Answer
(HDD)?
What is the Laser (red) light is used to read and write data on the surface of the disk, utilizing a thin layer of metal alloy to store data.
primary method
used to read and
write data on
CD/DVD disks?
How does Blu-ray uses a blue laser with a shorter wavelength, allowing it to store up to five times more data than DVD and includes
Blu-ray secure encryption to prevent piracy.
technology differ
from CD and DVD
in terms of data
storage?
What is cloud Cloud storage is a method of data storage where data is stored on remote servers, with the key feature being **data
storage and what redundancy**, allowing access to data at any time from multiple servers.
is its key feature?
What are the 1. **Public cloud** - storage environment where the customer and provider are different companies.
three types of 2. **Private cloud** - dedicated storage behind a company firewall, integrated with the customer.
cloud storage? 3. **Hybrid cloud** - a combination of public and private cloud environments, with some data in the private cloud and
less sensitive data in the public cloud.
What are the - Microcontrollers (CPU, RAM, ROM, and other peripherals on one chip)
components that - Microprocessors (integrated circuit with CPU only)
may be found in - System on Chips (SoC) (microprocessor with I/O ports, storage, and memory)
embedded
systems?
What are the two 1. Connecting the device to a computer and downloading the update.
methods for 2. Updating automatically via a satellite, cellular, or Wi-Fi link.
updating
programmable
embedded
devices?
What is the A Network Interface Card (NIC) is essential for allowing a device to connect to a network, such as the Internet.
purpose of a
Network
Interface Card
(NIC)?
Question Answer
What is a MAC A MAC address is a unique identifier for a network device, comprising **48 bits** represented as six groups of hexadecimal
address and how digits. The first six digits indicate the **manufacturer's code**, while the last six represent the **device serial number**.
is it structured? MAC addresses are constant and do not change.
What are the two The two types of MAC addresses are:
types of MAC
addresses? - **Universally Administered MAC Address (UAA)**: Made universally and cannot be changed.
- **Locally Administered MAC Address (LAA)**: Can be changed by the user or administrator.
What is the The differences between static and dynamic IP addresses are:
difference
between static - **Static IP Address**:
and dynamic IP - Assigned **manually** to a device.
addresses? - **Does not change** over time.
- **Dynamic IP Address**:
- Assigned **automatically** by a DHCP server.
- **Changes periodically** or when the device connects to a different network.
What is the A router directs data packets between different networks and determines the most efficient path for data transmission.
primary function
of a router in a
network?
How does a A router examines the destination IP address of incoming data packets and uses routing tables to determine the next hop
router determine or the next router on the path to the destination.
the next hop for
data packets?
What role does a A router can act as a DHCP server, dynamically allocating IP addresses from a predefined range to connected devices on a
router play in IP local network, simplifying network management.
address
assignment?
How does a A router serves as the gateway between a local network and the internet, forwarding data packets from devices on the
router connect a local network to the internet and vice versa.
local network to
the Internet?
What is system System software is a set of programs that control and manage hardware operations, provide a platform for other software
software and its to run, and ensure hardware and software function without issues.
purpose?
What are the The main types of software are System Software (e.g., Operating System, Utility programs, device drivers) and Application
main types of Software (e.g., spreadsheet, word processor).
software?
What is the A device driver enables hardware devices to communicate with a computer's operating system, allowing devices like
function of a printers to function properly.
device driver in
system software?
What is the System software manages hardware operations and provides a platform for applications, while application software
difference allows users to perform specific tasks using the computer's resources.
between system
software and
application
software?
What is the A word processor is software used for manipulating text documents, including creating, editing, and formatting text with
primary function tools for copying, deleting, spell-checking, and importing images.
of a word
processor?
How does a A spreadsheet organizes and manipulates numerical data using a grid of lettered columns and numbered rows, with each
spreadsheet cell identified by a unique combination of columns and rows. It can calculate using formulas, produce graphs, and
organize data? perform modeling and 'what if' calculations.
Question Answer
What is the A database is software used to organize, analyze, and manipulate data consisting of one or more tables that hold records
purpose of a and fields. It allows querying and reporting on data, as well as adding, deleting, and modifying records in a table.
database in
software
applications?
What is the role Control and measuring software is designed to interface with sensors, allowing a computer or microprocessor to measure
of control and physical quantities and control applications by comparing sensor data with stored data and altering process parameters
measuring accordingly.
software?
What types of Apps are software designed to run on mobile phones or tablets, downloaded from an 'App Store', and can range from
applications are games to sophisticated software such as phone banking. Common examples include video and music streaming, GPS,
typically referred and camera facilities.
to as 'apps'?
What Photo and video editing software allows users to manipulate digital photographs or videos, including changing colour,
functionalities brightness, and contrast, applying filters and enhancements, and creating transitions between clips.
does photo and
video editing
software
provide?
What Graphics manipulation software allows the manipulation of bitmap and vector images, with bitmap graphics editors
distinguishes changing pixels to produce a different image, while vector graphics editors manipulate lines, curves, and text to alter the
graphics stored image as required.
manipulation
software from
other types of
software?
What is an An interrupt is a signal sent to the microprocessor, prompting it to pause its ongoing tasks and handle the interrupt
interrupt in the temporarily. It can be triggered by timing signals, input/output processes, hardware faults, user interaction, or software
context of micro errors.
processors?
What are some Common utility programs include virus checkers, defragmentation software, disk analysis and repair tools, file
common types of compression and management software, backup software, security tools, and screensavers.
utility software?
How can utility Utility programs can be initiated by the user or run in the background without user input, providing essential
programs maintenance and support for the system software.
operate in
relation to user
input?
What is the The primary function of anti-virus software is to protect computers from malware by checking files before they are run or
primary function loaded and comparing them against a database of known viruses.
of anti-virus
software?
What is heuristic Heuristic checking is a method used by anti-virus software to identify possible viruses that are not yet in the database by
checking in analyzing the behavior and characteristics of files.
anti-virus
software?
Why is it It is important to regularly update anti-virus software because new viruses are constantly discovered, and updates ensure
important to that the software can detect and protect against these new threats.
regularly update
anti-virus
software?
What does disk Disk defragmentation software rearranges the data blocks on a hard disk drive (HDD) to store files in contiguous sectors,
defragmentation reducing head movements and improving data access time.
software do?
How does Defragmentation improves data retrieval on an HDD by organizing scattered data blocks into contiguous sectors, allowing
defragmentation the read-write head to access data more quickly and efficiently.
improve data
retrieval on an
HDD?
What are the Backup software helps create and manage backup copies of data files and programs, allows scheduling of backups, and
benefits of using can back up only files that have changed, ensuring data security and recovery options.
Question Answer
backup
software?
What role does Security software manages access control, user accounts, and links to other utilities like virus checkers, while also
security software protecting network interfaces with firewalls and overseeing software updates to prevent malicious installations.
play in a
computer
system?
What was the Screensavers were originally developed to protect CRT monitors from 'phosphor burn' by displaying moving and still
original purpose images after a period of inactivity.
of screensavers?
How do Screensavers contribute to computer security by automatically logging out the user after a certain period of inactivity,
screensavers thus preventing unauthorized access to the system.
contribute to
computer
security?
What is the role Device drivers translate data into a format that can be understood by the associated hardware device. Without the
of device drivers appropriate device driver, a hardware device cannot work with a computer and may not be recognized by the operating
in a computer system.
system?
What USB device drivers contain descriptors, which include a vendor ID (VID), product ID (PID), and a unique serial number that
information do allow the operating system to identify the device.
USB device
drivers contain
to help the
operating system
identify a device?
What are the The main functions of a typical operating system include:
main functions of
a typical 1. Managing files
operating 2. Handling interrupts
system? 3. Providing an interface
4. Managing peripherals and drivers
5. Managing memory
6. Managing multitasking
7. Providing a platform for running applications
8. Providing system security
9. Managing user accounts
What is the Interrupts signal the microprocessor to stop its current task and service a new task, ensuring that important tasks are
purpose of handled on a priority basis. They can be generated by peripherals like keyboards and mice, and different interrupts have
interrupts in a different levels of priority. After servicing the interrupt, the previous process continues.
microprocessor?
What are the High-level programming languages are easier to read and understand, quicker to write, easier to debug, and easier to
advantages of maintain. They are independent of the type of computer being used, which allows for more flexibility in programming.
high-level
programming
languages?
What are the Low-level programming languages take longer to write and debug, and they are more difficult to understand compared to
disadvantages of high-level languages. However, they allow for special machine-dependent instructions and can perform tasks very
low-level quickly.
programming
languages?
Question Answer
What is the role A compiler translates a program written in a high-level language into machine code, producing an executable file. It
of a compiler in translates one high-level language statement into several machine code instructions and allows compiled programs to
programming? run without the compiler.
How does an An interpreter executes a high-level language program one statement at a time and does not produce an executable file.
interpreter differ In contrast, a compiler translates the entire program into machine code at once, producing an executable file that can be
from a compiler? run independently.
What is the An assembler translates a low-level assembly language program into machine code, producing an executable file. It
function of an typically translates one low-level language statement into one machine code instruction and allows assembled programs
assembler? to be used without the assembler.
What is a brute A brute force attack is when hackers try to guess your password by attempting all possible combinations of letters,
force attack in numbers, and symbols.
cyber security?
What are the The effect of a brute force attack is that the hacker gains access to the user's personal data, including credit cards,
effects of a brute passwords, and more.
force attack?
How can the risk To remove the risk of a brute force attack, use stronger passwords that include more characters and symbols.
of a brute force
Question Answer
attack be
mitigated?
What is data Data interception involves stealing data by tapping into a wired or wireless transmission line.
interception in
cyber security?
What is Wardriving is the act of locating and using wireless internet connections illegally.
wardriving?
What is packet Packet sniffing uses packet sniffers to examine packets sent over a line, allowing attackers to collect data being
sniffing? transmitted.
What are the Data interception can cause a computer to crash and can lead to the deletion or corruption of files/data.
potential effects
of data
interception?
How can the risk To reduce the risk of data interception, install anti-virus software, avoid software from unknown sources, and be cautious
of data when opening emails from unknown senders.
interception be
reduced?
What is a A DDoS attack is an attempt to prevent users from accessing part of a network, usually temporarily but potentially
Distributed damaging.
Denial of Service
(DDoS) attack?
What are the The effects of a DDoS attack may include preventing users from accessing their emails, websites, or online services.
effects of a DDoS
attack?
What is hacking? Hacking is the act of gaining illegal access to a computer system.
What are the Hacking can lead to identity theft, gaining personal information, and the deletion, alteration, or corruption of data.
effects of
hacking?
How can the risk To reduce the risk of hacking, use firewalls, strong passwords/user IDs, and anti-hacking software.
of hacking be
mitigated?
What is the Hacking involves breaking into computer systems to steal data, while cracking refers to editing a program's code
difference maliciously.
between hacking
and cracking?
What is Malware stands for malicious software, which includes viruses, ransomware, adware, Trojan horses, spyware, and worms.
malware?
What is a virus in A virus is a program that can replicate itself with the intention of deleting or corrupting files, causing a computer
the context of malfunction.
malware?
What is Ransomware is a type of malware that encrypts the user's data until a certain amount of money is paid.
ransomware?
What is adware? Adware is a type of malware that displays unwanted ads on the user's screen.
What is a Trojan A Trojan horse is a program that is disguised as legitimate software but is actually malicious.
horse in
malware?
What is spyware? Spyware is malware that sends data about the user's activities to the attacker.
What are worms Worms are programs that can replicate themselves with the intention of corrupting an entire network rather than just a
in the context of single computer.
malware?
What is phishing Phishing is when attackers send legitimate-looking emails to bait users into giving out their information. To protect
Question Answer
What is Pharming involves an attacker installing malicious code on a computer to redirect users to fake websites, leading to the
pharming and theft of login and personal details. To mitigate risks, users should:
what measures 1. Use anti-virus software
can be taken to 2. Check the spelling and the weblink carefully
mitigate its risks? 3. Ensure the green padlock is present in the URL bar
What is social Social engineering is a tactic used by attackers to create a social situation that leads victims to give out their personal
engineering in details, such as through spam calls claiming an account has been hacked.
the context of
cyber security?
What are the Access levels refer to having different levels of access for different people, ensuring that only authorized individuals, such
different access as doctors, can access sensitive data like patient information. This helps protect data from unauthorized access and
levels and their breaches.
importance in
data security?
What is two-step Two-step verification is a security process that requires two methods of authentication to verify a user's identity. It adds
verification and an extra layer of security, making it harder for unauthorized users to gain access to accounts.
why is it
important?
How do firewalls Firewalls are hardware or software that monitor traffic between a network and a user's computer, helping to block
contribute to unauthorized access and protect against cyber threats.
network
security?
What role do Proxy servers act as intermediaries between a user's computer and the web server, providing benefits such as:
proxy servers 1. Filtering Internet traffic
play in internet 2. Keeping the user's IP address confidential
security? 3. Blocking access to certain websites
4. Protecting against DDoS and hacking attacks
5. Acting as a firewall
What are Automated systems are combinations of software and hardware designed to operate without human intervention. They
automated function by:
systems and how 1. Sensors taking inputs and sending them to a microprocessor
do they function? 2. The microprocessor processing the data and making decisions
3. Actuators executing the actions based on the processed data