System Software
System Software
Utility software
File Management
What is file management?
Handling Interrupts
What is interrupt handling?
User Interface
What is a user interface?
• A user interface is how the user interacts with the operating system
• Examples of user interfaces include:
o Command Line Interface (CLI)
o Graphical User Interface (GUI)
o Menu
o Natural language (NLI)
What is a command line interface?
• A Command Line Interface (CLI) requires users to interact with the operating
system using text based commands
• CLIs are more commonly used by advanced users
• Examples of CLIs are MSDOS (Microsoft Disk Operating System) and
Raspbian (for Raspberry Pi)
• A Graphical User Interface (GUI) requires users to interact with the operating
system using visual elements such as windows, icons, menus & pointers
(WIMP)
• GUIs are optimised for mouse and touch gesture input
• Examples of GUIs are Windows, Android and MAC OS
What is multitasking?
User Management
What is user management?
• User management is a process carried out by the operating system enabling
different users to log onto a computer
• The OS is able to maintain settings for individual users, such as desktop
backgrounds, icons and colour schemes
• A system administrator is able to allocate different access rights for different
users on a network
Worked Example
• Break down the 6 marks, 1 mark each for identifying a function of the
operating system. For each function you need to make 2 points about how
they work
Answer
• Memory management
o Allocates memory to programs currently in use
o Gets data from RAM
o Stores data in RAM
• File management
o Creating/editing/renaming files
o Creating/editing/renaming folders
o Movement of files/folders
Hardware, Firmware & the
Operating System (Cambridge
(CIE) IGCSE Computer
Science)
What is firmware?
• An interrupt is a signal for the CPU to stop what it is currently doing and do
something else as a higher priority
• The CPU is in a continuous loop of carrying out the fetch-decode-execute
cycle, however there are occasions when this needs to be interrupted
• Hardware
o power button may have been pressed
o moving the mouse
o clicking an icon to open a new program
o keyboard presses e.g. ctrl, alt, delete
The main focus of interrupts is the importance of the interrupt service routine and
the role it plays in moving current instructions to the stack so that they can be
interrupted BUT continue again afterwards
Worked Example
[4]
Answer
Four from:
Low-Level Languages
What is a low-level language?
First generation
Second generation
Advantages Disadvantages
Complete control over the system
Difficult to write and understand
components
Occupy less memory and execute faster Machine dependent
Direct manipulation of hardware More prone to errors
Knowledge of computer architecture is key to program
effectively
High-Level Languages
What is a high-level language?
Advantages Disadvantages
The user is not able to directly manipulate the
Easier to read and write
hardware
Needs to be translated to machine code before
Easier to debug
running
Portable so can be used on any computer The program may be less efficient
One line of code can perform multiple
commands
Assembly
Language (Cambridge (CIE)
IGCSE Computer Science)
Assembly Language
What is assembly language?
Worked Example
Complete the table to identify whether each example of computer code is High-
level, Assembly language or Machine code
00110110
11100110
FOR X = 1 to 10
PRINT x
NEXT X
INP X
STA X
LDA Y
[3]
Answer
00110110 X
11100110
FOR X = 1 to 10
PRINT x X
NEXT X
INP X
STA X X
LDA Y
Advantages Disadvantages
Speed of execution Can be memory intensive
Optimises the code Difficult to debug
Original source code will not be seen Changes mean it must be recompiled
It is designed solely for one specific processor
What is an interpreter?
Advantages Disadvantages
Stops when it finds a specific syntax error in the
Slower execution
code
Every time the program is run it has to be
Easier to debug
translated
Require less RAM to process the code Executed as is, no optimisation
Worked Example
(a) State why the computer needs to translate the code before it is executed.[1]
(b) Either a compiler or an interpreter can translate the code. Describe two
differences between how a compiler and an interpreter would translate the code.[2]
Answer
(a)
• To convert it to binary/machine code
• The processor can only understand machine code
(b)
Editor
Error-diagnostics
• Tools that help to identify, understand and fix errors in code, such as:
o Identifying errors - highlight particular areas of code or provide direct
error messages where the error may have appeared e.g. indentation
errors etc
o Debugger - provide a 'step through' command which provides step by
step instructions and shows what is happening to the code line by line,
useful for finding logic errors
Run-time environment
• Gives users the ability to run and see the corresponding output of a high-
level language
Translator
• Built in to compile or interpret code without the need for an extra piece of
software
• The world wide web, or simply the web, is a collection of websites and web
pages that are accessed using the internet
• It was created in 1989 by Tim Berners-Lee, who envisioned it as a way
to share and access information on a global scale
• The web consists of interconnected documents and multimedia files that
are stored on web servers around the world
• Web pages are accessed using a web browser, which communicates with
web servers to retrieve and display the content
Function Description
Render HTML Display the web page
E.g. back/forward buttons and home button, to help users move
Provide navigation tools
between pages
Storing bookmarks & Allow users to save links to frequently visited websites and access them
favourites easily
Storing cookies Cookies
Record user history Allow users to quickly revisit recently viewed web pages
A place for user to type in the URL (link to URL page) of a web page
Provide address bar
to visit
Allow multiple web pages to be open at once so users can quickly
Multiple tabs
switch between them
Web Pages (Cambridge (CIE)
IGCSE Computer Science)
Loading a Web Page
How is a web page loaded?
• A web server is a remote computer that stores the files needed to display
a web page on the Internet
• Web servers are generally available 24/7 and security is managed by the
owner of the hardware
• Web servers provide access to multiple users at the same time
Uniform Resource
Locator (URL) (2)
What is a URL?
https://www.savemyexams.com/igcse/computer-science/cie/23/revision-notes/
HTML (4)
What is HTML?
Structure
<!DOCTYPE html>
<html>
<head>
<title>My Web Page</title>
</head>
<body>
<header>
<h1>Welcome to My Website</h1>
</header>
<main>
<section>
<h2>About Me</h2>
<p>This is a paragraph about me.</p>
</section>
<section>
<h2>My Projects</h2>
<p>This is a paragraph about my projects.</p>
</section>
</main>
<footer>
<p>Contact: [email protected]</p>
</footer>
</body>
</html>
• In this example, HTML is used to create a structure with a header, two
sections in the main body, and a footer
• Other examples of HTML being used for structure include:
o Creating lists to structure information
o Positioning of text on the screen
o Embedding media and interactive elements
Present
<!DOCTYPE html>
<html>
<body>
<h1>Welcome to My Website</h1>
<p>This is a paragraph introducing the content of the website.</p>
<h2>Subheading 1</h2>
<p>Here is some detailed information under the first subheading.</p>
<h2>Subheading 2</h2>
<p>Another section with more information.</p>
Worked Example
Explain how the information stored on the company’s website is requested by the
customer, sent to the customer’s computer and displayed on the screen.
[7]
Answer
Seven from:
Requested
Sent
Received
In the IGCSE exam digital currency and crypto currency are the same thing,
although in real life they are not strictly the same thing.
Blockchain
What is a blockchain?
Cyber Security
Threats (Cambridge (CIE)
IGCSE Computer Science)
Forms of cyber security threat
• Computers face a variety of forms of attack and they can cause a large
number of issues for a network and computers
• The main threats posed are:
o Brute-force attacks
o Data interception & theft
o DDos attack
o Hacking
o Malware
o Pharming
o Phishing
o Social engineering
Data interception
What is data interception & theft?
DDoS Attack
What is a DDoS attack?
Hacking
What is hacking?
• Hacking is the process of identifying and exploiting weaknesses in a
computer system or network to gain unauthorised access
• Access can be for various malicious purposes, such as stealing data,
installing malware, or disrupting operations
• Hackers seek out opportunities that make this possible, this includes:
o Unpatched software
o Out-of-date anti-malware
Malware
What is malware?
• Malware (malicious software) is the term used for any software that has been
created with malicious intent to cause harm to a computer system
• Examples of issues caused by malware include
o Files being deleted, corrupted or encrypted
o Internet connection becoming slow or unusable
o Computer crashing or shutting down
• Very similar to viruses, main difference being that they spread to other
drives and computers on the network
• Worms can infect other computers from
o Infected websites
Worms
o Instant message services
o Email
o Network connection
• Locks your computer or device and encrypts your documents and other important files
• A demand is made for money to receive the password that will allow the user to
Ransomware decrypt the files
• No guarantee paying the ransom will result in the user getting their data back
• There are various types of malware and each has slightly different issues
which they cause
Pharming
What is pharming?
Phishing
What is phishing?
Social Engineering
What is social engineering?
Worked Example
[4]
(ii) Suggest one security device that can be used to help prevent a DDoS attack.[1]
Answers
• Access levels ensure users of a network can access what they need to
access and do not have access to information/resources they shouldn't
• Users can have designated roles on a network
• Access levels can be set based on a user's role, responsibility, or
clearance level
o Full access - this allows the user to open, create, edit & delete files
o Read-only access - this only allows the user to open files without
editing or deleting
o No access - this hides the file from the user
• Some examples of different levels of access to a school network could
include:
o Administrators: Unrestricted - Can access all areas of the network
o Teaching Staff: Partially restricted - Can access all student data but
cannot access other staff members' data
o Students: Restricted - Can only access their own data and files
• Users and groups of users can be given specific file permissions
Anti Malware
What is anti-malware software?
Authentication
What is authentication?
• Automatic software updates take away the need for a user to remember to
keep software updated and reduce the risk of software
flaws/vulnerabilities being targeted in out of date software
• Automatic updates ensure fast deployment of updates as they release
Communication
What is communication?
URL
How to check a URL?
Firewalls
What is a firewall?
• A firewall monitors incoming and outgoing network traffic and uses a set
of rules to determine which traffic to allow
• A firewall prevents unwanted traffic from entering a network by filtering
requests to ensure they are legitimate
• It can be both hardware and software and they are often used together to
provide stronger security to a network
o Hardware firewalls will protect the whole network and prevent
unauthorised traffic
o Software firewalls will protect the individual devices on the network,
monitoring the data going to and from each computer
• Hackers
• Malware
• Unauthorised access to a network
Privacy Settings
What are privacy settings?
Proxy Servers
What is a proxy server?
SSL
What is SSL?
Worked Example
(i) ) Identify a security solution that could be used to protect a computer from a
computer virus, hacking and spyware.
(ii) Describe how each security solution you identified in (i) will help protect the
computer.
[6]
Answers
(i)
Passwords
Hacking
Biometrics
Two-step verification
Anti-malware/virus (software)
Firewall
(ii) Two marks for each description
• Anti-malware/virus (software)
o Scans the computer system (for viruses)
o Has a record of known viruses
o Removes/quarantines any viruses that are found
o Checks data before it is downloaded
o … and stops download if virus found/warns user may contain
virus
• Anti-malware/spyware (software)
o Scans the computer for spyware
o Removes/quarantines any spyware that is found
o Can prevent spyware being downloaded
• Firewall
o Monitors traffic coming into and out of the computer system
o Checks that the traffic meets any criteria/rules set
o Blocks any traffic that does not meet the criteria/rules set // set
blacklist/whitelist
• Passwords
o Making a password stronger // by example
o Changing it regularly
o Lock out after set number of attempts // stops brute force attacks
// makes it more difficult to guess
• Biometrics
o Data needed to enter is unique to individual
o … therefore it is very difficult to replicate
o Lock out after set number of attempts
• Two-step verification
o Extra data is sent to device, pre-set by user
o … making it more difficult for hacker to obtain it
o Data has to be entered into the same system
o … so if attempted from a remote location, it will not be accepted
Automated
Systems (Cambridge (CIE)
IGCSE Computer Science
Automated Systems
What is an automated system?
Advantages Disadvantages
Cost - long-term cost saving Cost - short-term expensive to set up
Testing - significant testing must be done before
Safer - timely interventions
being used
Safer - keeps humans away from hazardous
Security - open to cyber attacks
environments
Flexibility - will only react to programmed
Efficient - materials and resources
scenarios
Consistent - results are repeatable Maintenance - needs to be well maintained
Unethical - can result in major job losses
• There are also scenarios where specific advantages and disadvantages are
important such as:
• Accurate forecasting
• Dependence on accurate sensor data
Weather • Improved early warning systems
Worked Example
A theme park has a game where a player tries to run from the start to the finish
without getting wet.
The system for the game uses sensors and a microprocessor to spray water at a
player as they run past each sensor.
Describe how the sensors and the microprocessor are used in this system
[8]
Answer
Characteristics of a Robot
What are the characteristics of a robot?
A company uses robots in its factory to manufacture restaurant tables and chairs
[2]
[2]
(ii) Give one disadvantage to the company’s owners of using robots to manufacture
table and chairs
[1]
Answers
(i)
• Mechanical structure
• Programmable
(ii)
(iii)
• Expensive to install/purchase/setup
• High ongoing costs/maintenance costs
• May deskill the workforce
• If they malfunction, production may stop
(AI) (Cambridge (CIE) IGCSE
Computer Science)
Advantages Disadvantages
Increased efficiency Job losses
Increased accuracy Potential for biased decision making
Scalability Ethical concerns over its use
Characteristics of AI
• AI shares three common characteristics:
o Collection of data
o Rules for using data
o Ability to reason
Advantages Disadvantages
Consistent results Only as good as the data entered
Faster responses Responses can be cold and lack human emotion
Can store large amounts of data Requires training to use correctly
Unbiased
Machine Learning
What is machine learning?
• Machine learning is one method that can help to achieve an artificial
intelligence (AI)
• By giving a machine data so that it can 'learn over time' it helps
towards training a machine or software to perform a task and improve its
accuracy and efficiency
• Uses algorithms to analyse data and identify patterns or relationships
Worked Example
[3]
Answer
• Collects data
• Stores rules for using the data
• The ability to reason
• The ability to learn // uses machine learning
• … by adapting what it does
• … for example, from mistakes to not make them again // result from
previous decisions impacts future
• … by changing its own rules
• …by changing its own data
• …by being trained
• Makes one or more predictions (to make a decision)
• Find/analyse patterns