Comp Sci Notes O Levels
Comp Sci Notes O Levels
ZNOTES.ORG
CAIE IGCSE
COMPUTER SCIENCE
SUMMARIZED NOTES ON THE THEORY SYLLABUS
Prepared for Yushika for personal use only.
https://znotes.org/caie/igcse/computer-science-0478/theory/data-representation/ Page 1 of 26
CAIE-IGCSE-Computer Science - Theory 22/04/25, 08:02
1. Data Representation 2
2
2
35
17
8
Remainder:
Remainder:
Remainder:
1
1
1
2 4 Remainder: 0
2 2 Remainder: 0
1.1. Number Systems 2 1
0
Remainder:
Remainder:
0
1
Binary System Note that when the value itself is not divisible by 2, it is
divided by the previous value of the current number and
Base 2 number system 1 is added to the remainder column for that specific
It has two possible values only (0 and 1) number
0 represents OFF, and 1 represents ON When you reach 0, the remainder has to be read from
A point to be noted is that the most left bit is called the bottom to top giving us the binary value ( as in this case,
MSB (Most Significant Bit) it is 1 0 0 0 1 1 1 0 )
Given Value : 1 0 0 0 0 1 1 1 1 1 1 1 0 1
Converting Binary to Denary When grouped: 10 0001 1111 1101
Place the binary value in columns of 2 raised to the After 2 values added to left: 0010 0001 1111 1101
power of the number of values from the right starting
from 0. e.g. For binary value 11101110, place it in a table After Conversion to Denary: 2 1 15 13
like this:
128 64 32 16 8 4 2 1
Denary to Hexadecimal: 21FD
1 1 1 0 1 1 1 0
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Yushika at Jayshree Periwal International School on 22/04/25.
https://znotes.org/caie/igcse/computer-science-0478/theory/data-representation/ Page 2 of 26
CAIE-IGCSE-Computer Science - Theory 22/04/25, 08:02
iii. The solution would now be (1) 0 1 0 0 1 1 0 0 Defining colours in Hypertext Markup Language (HTML)
Media Access Control (MAC) addresses (a number that
Logical Shifts uniquely identifies a device on a network)
Assembly languages and machine code
The logical shift means moving a binary value to the left Memory Dumps
or the right Debugging (method to find errors in a program)
When doing a logical shift, keep in mind that the bit Display error codes (numbers refer to the memory
being emptied is going to become 0 location of the error)
IP (Internet Protocol) addresses
Explanation with Example
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Yushika at Jayshree Periwal International School on 22/04/25.
https://znotes.org/caie/igcse/computer-science-0478/theory/data-representation/ Page 3 of 26
CAIE-IGCSE-Computer Science - Theory 22/04/25, 08:02
Images
Bitmap Images
Colour Depth
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Yushika at Jayshree Periwal International School on 22/04/25.
https://znotes.org/caie/igcse/computer-science-0478/theory/data-representation/ Page 4 of 26
CAIE-IGCSE-Computer Science - Theory 22/04/25, 08:02
The number of bits representing each colour is called the The file size of an image is calculated as image resolution
colour depth. (in pixels) × colour depth (in bits)
An 8-bit colour depth means that each pixel can be one The size of a mono sound file is calculated as sample rate
of 256 colours (because 2 to the power of 8 = 256) (in Hz) × sample resolution (in bits) × length of sample (in
A 1-bit colour depth means each pixel can store one seconds). (For a stereo sound file, you would
colour (because 2 to the power of 1 is 2) - ( This is done then multiply the result by two.)
as the bit can either be 0 or 1, with 0 being white and 1
being black) 1.7. File Types
Increasing colour depth increases the size of the file
when storing an image.
Musical Instrument Digital Format (MIDI)
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Yushika at Jayshree Periwal International School on 22/04/25.
https://znotes.org/caie/igcse/computer-science-0478/theory/data-representation/ Page 5 of 26
CAIE-IGCSE-Computer Science - Theory 22/04/25, 08:02
value represents the number of identical data items (e.g. Possible to overcome failed or busy nodes More prone to errors in real-time streaming
Delay at the receiver while the packets are
High data transmission speed
characters), and the second value represents the code of being re-ordered
Easy to expand package usage
the data item (such as ASCII code if it is a keyboard
character), e.g. ‘aaaaabbbbccddddd’ becomes “05 97 04
98 02 99 05 100.”
Data Transmission
RLE is only e!ective where there is a long run of
Simplex data transmission is in one direction only (e.g.
repeated units/bits
computer to printer)
One di#culty is that RLE compression isn't perfect for
Half-duplex data transmission is in both directions but
strings like "cdcdcdcdcd". We use a flag to solve this; e.g.,
not at the same time (e.g., walkie-talkie)
255 can be made as the flag. Now 255 will be put before
Full-duplex data transmission is in both directions
every repeating value, e.g. our previous example
simultaneously (e.g. broadband connection on the phone
becomes 255 05 97 255 04 98 255 02 99 255 05
line)
100 where 255 now indicates that the next character/set
Serial data transmission is when data is sent one bit at a
of characters is approaching
time over a single wire
Parallel data transmission is when data of several bits (1
Lossy File Compression
byte) are sent down several wires at the same time.
The file compression algorithm eliminates unnecessary
data bits like in MP3 and JPEG formats.
Comparison of Serial and Parallel Data
It is impossible to get the original file back once it is Transmission
compressed
Reduces file quality
In this, the image's resolution and colour depth are
reduced.
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Yushika at Jayshree Periwal International School on 22/04/25.
https://znotes.org/caie/igcse/computer-science-0478/theory/data-representation/ Page 6 of 26
CAIE-IGCSE-Computer Science - Theory 22/04/25, 08:02
Advantages Disadvantages Any changes in bits would be identified through the rows
Automatically detected Transmission rate is less than 120 MB/sec
Only fit one way, prevents incorrect
and columns
connections Maximum cable length is about 5 metres
Di"erent data transmission rates
Backwards compatible Checksum
Industry-standard
Once the data has been sent, The receiver will send the
The LMB (Left-Most Bit) is the parity bit. As the number data back to the sender for verification.
of 1s is even, the parity bit would be set to even. The sender would compare the received and original
Limitations with Parity Checks data for errors.
Two bits may change during transmission; therefore The only downside is that we wouldn’t know if the error
error is not found occurred when sending the data or sending the data
Even though the parity checks would reveal the errors, back for verification.
the bit(s) changed wouldn’t be identified
Check Digits
Parity Blocks
Check digits are calculated from all the other digits in the
data (ex-codes). The check digit would be the last digit of
the code.
These are used to identify mistyping errors such as -
6372 typed as 6379
8432 typed as 842
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Yushika at Jayshree Periwal International School on 22/04/25.
https://znotes.org/caie/igcse/computer-science-0478/theory/data-representation/ Page 7 of 26
CAIE-IGCSE-Computer Science - Theory 22/04/25, 08:02
Uses acknowledgements and timeouts to make sure the Processor: The processor contains the Arithmetic and
user received the data Logic Unit (ALU)
The receiver would check the data for any errors; if none Control Unit: The control unit controls the operation of
are found, a positive acknowledgement is sent to the the memory, processor and input/output devices
sender. However, if errors are found, a negative Arithmetic Logic Unit: Carries out the logic system like
acknowledgement will be sent, and the data will be sent calculations
again. System Clock: The system clock is used to produce
The sender uses timeouts to wait for a pre-determined timing signals on the control bus
amount for the acknowledgement.
If no acknowledgements are received after the timeout, Buses: Carry data through components. The following are its
the data will be sent again to the receiver. types.
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Yushika at Jayshree Periwal International School on 22/04/25.
https://znotes.org/caie/igcse/computer-science-0478/theory/data-representation/ Page 8 of 26
CAIE-IGCSE-Computer Science - Theory 22/04/25, 08:02
Instructions are stored in the main memory But if any number of cores are used, it could slow down
Instructions are fetched, decoded, and executed by the system performance as the communication between
the processor each core increases, and so do the data cables between
Programs can be moved to and from the main memory each. Which in turn reduces the potential system
performance.
Memory Concept You might have heard about quad and dual cores as well
as septa and octa cores as they are becoming
A computer’s memory is divided into partitions: Each increasingly common.
partition consists of an address and its contents, e.g.
Two-dimensional Scanners:
Instruction Set:
An instruction set is a list of all the commands that a CPU Used to input hard-copy documents
can process, and the commands are machine code The image is converted into an electronic form, which
can be stored in the computer
3.2. Cores, Cache and Internal Clock The document is placed on a glass panel
A bright light illuminates the document
System’s Clock A scan head moves across the document until the
whole page is scanned. An image of the document is
The clock defines the clock cycle that synchronises all produced and sent to a lens using a series of mirrors
computer operations. By increasing the clock speed, the The lens focuses on the document image
computer's processing speed also increases. This doesn’t The focused image now falls onto a charge-coupled
mean that the computer's performance is increased, device (CCD), which consists of several integrated
however. circuits
The software produces a digital image in the
Overclocking electronic form
Optical Character Recognition (OCR) is a software which
Using a clock speed higher than the computer was designed converts scanned documents into a text file format
for. If the original document was a photo/image, then the
It leads to multiple issues. scanned image forms an image file such as JPEG
Cores
The more cores in the CPU, the better and faster the
performance
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Yushika at Jayshree Periwal International School on 22/04/25.
https://znotes.org/caie/igcse/computer-science-0478/theory/data-representation/ Page 9 of 26
CAIE-IGCSE-Computer Science - Theory 22/04/25, 08:02
Make use of (OCR) to produce digital images which Connected to a computer with a USB connection or by
represent the passport pages wireless connection
Text can be stored in ASCII format Each character has an ASCII value and is converted into a
The 2D photograph in the passport is also scanned and digital signal
stored as jpeg image Slow method
The passenger’s face is also photographed using a digital Prone to errors
camera and compared to using face recognition software
Key parts of the face are compared (distance between Pointing devices
eyes, width of nose)
Mouse/trackball
Barcode readers/scanners Traditional mechanical ball, connected by USB port
Modern type: red LEDs to detect movement
A barcode is a series of dark and light parallel lines of
varying thicknesses Microphones
The numbers 0 -9 are each represented by a unique
Used to input sound to a computer
series of lines
When a microphone picks up sound, a diaphragm
The left and right-hand sides of the barcode are separate
vibrates, producing an electric signal
using guard bars
The signal goes to a sound card and is converted into
Allows barcode to be scanned in any direction
digital values and stored in a computer
The barcode is read by a red laser or red LED
Voice recognition: voice is detected and converted into
Light is reflected o! the barcode; dark areas reflect
digital
little light, which allows the bars to be read
Reflected light is read by sensors (photoelectric cells) Touchscreens
The pattern is generated, which is converted to digital
Capacitive (medium cost tech)
Quick Response (QR) Codes Made up of many layers of glass
Creating electric fields between glass plates in layers
Another type of barcode is the QR codes
When the top layer of glass is touched, electric
Made up of a matrix of filled-in dark squares on a light
current changes
background
Co-ordinates where the screen was touched are
Can hold more storage (7000 digits)
determined by an on-board microprocessor
Advantages of QR codes:
Infra-red heat (expensive)
No need for the user to write down the website
Use glass as the screen material
address
Needs a warm object to carry an input operation
QR codes can store website addresses
Infra-red optical (expensive)
QR Codes are easier to use as they can be read by
Uses glass as screen material
phone cameras
Uses an array of sensors (grid form)
Digital Cameras Point of contact is based on which grid co-ordinate is
touched
It is controlled by a microprocessor that adjusts the Resistive (inexpensive)
shutter speed, focuses the image, etc. The upper layer of polyester, the bottom layer of
Photo is captured when light passes through the lens glass
onto a light sensitive cell When the top polyester is touched, the top layer and
The cell is made up of pixels bottom layer complete a circuit
The number of pixels determines the size of the file Signals are then sent out, which are interpreted by a
microprocessor to determine where the screen was
Keyboards touched
Sensors
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Yushika at Jayshree Periwal International School on 22/04/25.
https://znotes.org/caie/igcse/computer-science-0478/theory/data-representation/ Page 10 of 26
CAIE-IGCSE-Computer Science - Theory 22/04/25, 08:02
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Yushika at Jayshree Periwal International School on 22/04/25.
https://znotes.org/caie/igcse/computer-science-0478/theory/data-representation/ Page 11 of 26
CAIE-IGCSE-Computer Science - Theory 22/04/25, 08:02
The actuators convert electrical signals to mechanical Older technology than DLP
processes. A powerful beam of white light is generated from a bulb
Used in many control applications involving sensors and This beam of light is then sent to a group of chromatic-
devices (ADC and DAC) coated mirrors; these reflect the light at di!erent
wavelengths
Loudspeakers/Headphones When the white light hits the mirrors, the reflected light
has wavelengths corresponding to red, green, and blue
Sound is produced by passing the digital data through a
These three di!erent lights pass through three LCD
DAC, then through an amplifier, and then emerges from
screens; these screens show the image to be projected
the loudspeaker
as millions of pixels in grayscale
Produced by voltage di!erences vibrating a cone in the
When the coloured light passes through the LCD screens,
speaker at di!erent frequencies
a red, green and blue version of the grey image emerges
LCD and LED Monitors Finally, the image passes through the projector lens onto
the screen
The front layer of the monitor is made up of Liquid
Crystal Display (LCD); these tiny diodes are grouped in
threes as pixels (LCD doesn’t emit any light)
LCD monitors are backlit using Light Emitting Diode (LED)
because:
LEDs reach their maximum brightness immediately
LEDs sharpen image (higher resolution), and CCFL
has a yellow tint
LEDs improve the colour image
Monitors using LED are much thinner than CCFL
LEDs consume very little power
Before LEDs, LCD monitors were backlit using CCFL Source: Cambridge IGCSE and O Level Computer
CCFL uses two fluorescent tubes behind the LCD screen, Science - Second Edition (Hodder Education)
which supplies the light source
3.5. Memory, Storage Devices & Media
Light Projectors:
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Yushika at Jayshree Periwal International School on 22/04/25.
https://znotes.org/caie/igcse/computer-science-0478/theory/data-representation/ Page 12 of 26
CAIE-IGCSE-Computer Science - Theory 22/04/25, 08:02
Features of ROM
Non-volatile/permanent memories (contents remain
even when ROM is turned o!)
Used to store start-up instructions (basic
input/output systems)
Source: Cambridge IGCSE and O Level Computer Data/contents of a ROM chip can only be read and
Science - Second Edition (Hodder Education) cannot be changed
Virtual memory
Secondary Storage:
When RAM runs out of memory, there is a problem with Hard Disk Drives (HDD)
memory management; thus, the system has a high
chance of crashing. This is why virtual memory comes Data is stored in a digital format on the magnetic surface
into the picture. of the disks (platter)
The virtual memory can be either HDD or SSD (these A number of read/write heads can access all of the
storages are discussed below) surfaces of the disk
Each platter will have two surfaces which can be used to
store the data
Data is stored on the surfaces in sectors and tracks
HDD has very slow data access compared to RAM
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Yushika at Jayshree Periwal International School on 22/04/25.
https://znotes.org/caie/igcse/computer-science-0478/theory/data-representation/ Page 13 of 26
CAIE-IGCSE-Computer Science - Theory 22/04/25, 08:02
There are no moving parts, and all data is received at the Public cloud – this is a storage environment where the
same time (not like HDD) customer/client and cloud storage provider are di!erent
Store data by controlling the movement of electrons companies
within NAND chips, as 1s and 0s Private cloud – this is storage provided by a dedicated
Non-volatile rewritable memory environment behind a company firewall; customer/client
Benefits of using SSD rather than HDD: and cloud storage provider are integrated and operate
More reliable (no moving parts) as a single entity
Considerably lighter (suitable for laptops) Hybrid cloud – this is a combination of the two above
Lower power consumption environments; some data resides in the private cloud,
Run much cooler than HDDs and less sensitive/less commercial data can be accessed
Very thin from a public cloud storage provider
Data access is faster than HDD
Drawback – questionable longevity (20GB per day)
O!-Line Storage:
CD/DVD Disks
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Yushika at Jayshree Periwal International School on 22/04/25.
https://znotes.org/caie/igcse/computer-science-0478/theory/data-representation/ Page 14 of 26
CAIE-IGCSE-Computer Science - Theory 22/04/25, 08:02
IP Addresses
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Yushika at Jayshree Periwal International School on 22/04/25.
https://znotes.org/caie/igcse/computer-science-0478/theory/data-representation/ Page 15 of 26
CAIE-IGCSE-Computer Science - Theory 22/04/25, 08:02
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Yushika at Jayshree Periwal International School on 22/04/25.
https://znotes.org/caie/igcse/computer-science-0478/theory/data-representation/ Page 16 of 26
CAIE-IGCSE-Computer Science - Theory 22/04/25, 08:02
3.10. Translators
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Yushika at Jayshree Periwal International School on 22/04/25.
https://znotes.org/caie/igcse/computer-science-0478/theory/data-representation/ Page 17 of 26
CAIE-IGCSE-Computer Science - Theory 22/04/25, 08:02
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Yushika at Jayshree Periwal International School on 22/04/25.
https://znotes.org/caie/igcse/computer-science-0478/theory/data-representation/ Page 18 of 26
CAIE-IGCSE-Computer Science - Theory 22/04/25, 08:02
Timing signals: Scheduled signals prompt the Virus checkers or anti-virus software are important for
microprocessor to pause and handle tasks at specific protecting computers from malware.
intervals. They should be kept up to date and run in the
Input/Output processes: Events such as a disk drive or background to maintain their e!ectiveness.
printer requiring additional data cause an interruption in Anti-virus software checks files before they are run or
the microprocessor's activities. loaded and compares possible viruses against a
Hardware faults: Issues like a paper jam in a printer, database of known viruses.
signalling the microprocessor to halt its operations and Heuristic checking is used to identify possible viruses
address the hardware problem. that are not yet on the database.
User interaction: Instances like a user pressing specific Infected files are put into quarantine for automatic
keys on a keyboard (e.g., ), leading to an interrupt in the deletion or for the user to decide.
system's operation. Anti-virus software must be updated as new viruses are
Software errors: Problems such as missing .exe files constantly discovered.
needed to initiate a program, conflicts like two processes Full system scans should be carried out regularly to
accessing the exact memory location, or attempts to detect dormant viruses.
divide by zero. These errors trigger interrupts, prompting
the microprocessor to handle the issues. Disk Defragmentation Software
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Yushika at Jayshree Periwal International School on 22/04/25.
https://znotes.org/caie/igcse/computer-science-0478/theory/data-representation/ Page 19 of 26
CAIE-IGCSE-Computer Science - Theory 22/04/25, 08:02
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Yushika at Jayshree Periwal International School on 22/04/25.
https://znotes.org/caie/igcse/computer-science-0478/theory/data-representation/ Page 20 of 26
CAIE-IGCSE-Computer Science - Theory 22/04/25, 08:02
Hacking
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Yushika at Jayshree Periwal International School on 22/04/25.
https://znotes.org/caie/igcse/computer-science-0478/theory/data-representation/ Page 21 of 26
CAIE-IGCSE-Computer Science - Theory 22/04/25, 08:02
The act of gaining illegal access to a computer system The attacker installs a malicious code on the computer,
E!ect: which redirects the user to fake websites
This leads to identity theft, gaining personal E!ect:
information The user gives out login details and other personal
Data can be deleted, changed or corrupted details
To remove risk: To remove risk:
Firewalls Using anti-virus software
Strong passwords/ user IDs Checking the spelling and the weblink carefully
Use of anti-hacking software Make sure that the green padlock is present in the
Di!erence between hacking and cracking URL bar
Hacking breaks into computer systems to steal data
Cracking is when someone edits a program code, Social Engineering
malicious
Attackers create a social situation which leads to victims
Malware giving out their details (For example - Spam calls
informing them that their account has been hacked)
Stands for Malicious Software. A few examples are -
Virus - A program that can replicate itself with the Keeping data safe from threats
intention of deleting or corrupting files, causing a
computer malfunction Access Levels - Having Di!erent levels of access for
Ransomware - Attackers encrypt the user’s data until di!erent people (for example - Only doctors can have
a certain amount of money is paid access to patient’s data)
Adware - Displays unwanted ads on the user’s screen Antivirus - Protects user’s computer from malware
Trojan Horse - Programs that are disguised as attacks
legitimate software Authentication - User proving who they are. The most
Spyware - Sends data about all the activities of the common methods are passwords, PINs, Mobiles (OTPs),
user to the attacker biometrics and more)
Worms - Programs that can replicate themselves with
the intention of corrupting the entire network instead Benefits and Drawbacks of Biometric Method
Biometric Benefits Drawbacks
of the computer alone Methods
Most development methods are Intrusive as used to identify
Fingerprint very easy to use and require very criminals, Can’t be used if the finger
Phishing Scans low storage space to store the
biometric data. gets dirty or damaged (e.g. cuts)
With very high accuracy, it It is very intrusive, Takes longer to
Attackers send legitimate-looking emails to bait the user Retina Scan Impossible to replicate a person’s
retina
verify, Expensive to install and set
up
into giving out their information. Face Non-intrusive method, Relatively Can’t identify if there are any
Recognition cheaper changes in the lighting, change in
To remove risk: age or person’s age.
Voices can be recorded and used
Don’t open links from unknown receivers Voice Non-Intrusive method, verification is
for verification, but low accuracy
and illnesses such as colds or
Use anti-phishing tools Recognition done quickly and relatively cheaper coughs can a"ect a person’s voice,
making identification impossible.
Block pop-up ads
Have an up-to-date browser
Pharming
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Yushika at Jayshree Periwal International School on 22/04/25.
https://znotes.org/caie/igcse/computer-science-0478/theory/data-representation/ Page 22 of 26
CAIE-IGCSE-Computer Science - Theory 22/04/25, 08:02
Less Expensive in the long run Over-reliance on automated systems may cause
humans to lose skills
Higher Productivity and E!ciency 6.3. Artificial Intelligence
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Yushika at Jayshree Periwal International School on 22/04/25.
https://znotes.org/caie/igcse/computer-science-0478/theory/data-representation/ Page 23 of 26
CAIE-IGCSE-Computer Science - Theory 22/04/25, 08:02
Types of AI
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Yushika at Jayshree Periwal International School on 22/04/25.
https://znotes.org/caie/igcse/computer-science-0478/theory/data-representation/ Page 24 of 26
CAIE-IGCSE-Computer Science - Theory 22/04/25, 08:02
CAIE IGCSE
Computer Science
© ZNotes Education Ltd. & ZNotes Foundation 2025. All rights reserved.
This version was created by Yushika on Tue Apr 22 2025 for strictly personal use only.
These notes have been created by Abdullah Aamir, Shriram S, Abhiram Mydi, Maimoona Junjunia & Adarsh SR Nalamalapu for the 2023-
2025 syllabus.
The document contains images and excerpts of text from educational resources available on the internet and printed books.
If you are the owner of such media, test or visual, utilized in this document and do not accept its usage then we urge you to contact us
and we would immediately replace said media. No part of this document may be copied or re-uploaded to another website.
Under no conditions may this document be distributed under the name of false author(s) or sold for financial gain.
"ZNotes" and the ZNotes logo are trademarks of ZNotes Education Limited (registration UK00003478331).
https://znotes.org/caie/igcse/computer-science-0478/theory/data-representation/ Page 25 of 26
CAIE-IGCSE-Computer Science - Theory 22/04/25, 08:02
https://znotes.org/caie/igcse/computer-science-0478/theory/data-representation/ Page 26 of 26