Computer Science 0478 Theory Notes
Computer Science 0478 Theory Notes
Number Systems
Binary System
A point to be noted is that the most left bit is called the MSB (Most Significant Bit)
Denary System
Hexadecimal
Binary Value Denary Value
Value
0000 0 0
0001 1 1
0010 2 2
0011 3 3
0100 4 4
0101 5 5
0110 6 6
0111 7 7
1000 8 8
1001 9 9
1|Page
Hexadecimal
Binary Value Denary Value
Value
1010 A 10
1011 B 11
1100 C 12
1101 D 13
1110 E 14
1111 F 15
Number Conversions
Converting Binary to Denary
Place the binary value in columns of 2 raised to the power of the number of values
from the right starting from 0. e.g. For binary value 11101110, place it in a table like
this:
12 3
64 16 8 4 2 1
8 2
1 1 1 0 1 1 1 0
As can be seen it starts from 1 and then goes to 128 from left to right
Now values with 1 are to be added together, giving the final answer, as for the
Take the value and successively divide it by 2, creating a table like follows:
2 142
2 71 Remainder: 0
2 35 Remainder: 1
2 17 Remainder: 1
2 8 Remainder: 1
2 4 Remainder: 0
2 2 Remainder: 0
2|Page
2 142
2 1 Remainder: 0
0 Remainder: 1
Note that when the value itself is not divisible by 2, it is divided by the previous value
of the current number and 1 is added to the remainder column for that specific
number
When you reach 0, the remainder has to be read from bottom to top giving us the
Separate each value from each other and convert them to denary
e.g.
Hexadecimal : 2 1 F D
Denary :2 1 15 13
Divide the binary value into groups of 4 starting from the right. If at the end, the last
For each group, find the denary value as shown above, and then convert each
denary value to its corresponding hexadecimal value (if less than 10, then itself, else,
10 is A, 11 is B, 12 is C, 13 is D, 14 is E and 15 is F).
After conversion, just put all the hexadecimal values in order to get the final answer
Given Value : 1 0 0 0 0 1 1 1 1 1 1 1 0 1
3|Page
When grouped: 10 0001 1111 1101
Convert the value to binary as shown above, and then convert the final answer to
denary
Convert the value to binary, and then convert it to hexadecimal as explained above
Binary Calculations
Binary values are not added the way denary values are added, as when adding 1
Points to Note:
0+0=0
1+0/0+1=1
1 + 1 = 0 (1 carry)
1 + 1 + 1 = 1 (1 carry)
Overflow
When adding two values, if the solution exceeds the limit of given values, e.g., the
solution has 9 bits, but the question had 8 bits per value, the 9th bit (most left bit) is
called overflow.
This indicates that the memory doesn’t have enough space to store the answer to
4|Page
Steps to add Two Values (With Example)
1. Convert both the bytes into 8 bits (add zero to the left-hand side to match them).
Carry 1 1 1 1 1 1 1
Byte 1 0 1 1 0 1 1 1 0
Byte 2 1 1 0 1 1 1 1 0
OVERFLOW
Solution 1 0 1 0 0 1 1 0 0
Note: We move from RHS to LHS, and when adding values, we use the rules given
above. If the bit crosses the limit (overflows), we put the value in brackets, denoting it
is overflow.
Logical Shifts
The logical shift means moving a binary value to the left or the right
When doing a logical shift, keep in mind that the bit being emptied is going to
become 0
1. The furthest bit in the direction to be logically shifted is removed ( in this case, one at
the LHS is removed) - ==(if it were two places, 2 bits would have been removed)==
2. Every bit is moved in given places to the given direction ( every bit is moved one
place to the left in this case, and the leftover bit in the right is marked 0,
5|Page
Two’s Complement (Binary Numbers)
the MSB ( Most Significant Bit) is replaced from 128 to -128; thus, the range of
Firstly, write the binary value and locate the first one from the right; e.g., 1101100
would have the first one at the third position from the right.
Now, switch every value to the left of the first one located above (not switching the
one), e.g., the value in our example becomes 0010100, which is the two’s
complement of itself.
-128 64 32 16 8 4 2 1
1 0 1 1 1 0 1 0
-128 + 32 + 16 + 8 + 2 = -70
Media Access Control (MAC) addresses (a number that uniquely identifies a device
on a network)
6|Page
Assembly languages and machine code
Memory Dumps
Display error codes (numbers refer to the memory location of the error)
Memory Dumps
Hexadecimal is used when developing new software or when trying to trace errors.
Memory dump is when the memory contents are output to a printer or monitor.
Using hexadecimal makes writing code easier, faster, and less error-prone than
binary.
Using machine code (binary) takes a long time to key in values and is prone to
errors.
The standard ASCII code character set consists of 7-bit code that represents the
control codes
Every subsequent value in ASCII is the previous value + 1. e.g. “a” is 97 in ASCII, “b”
will be 98 (which is 97 + 1)
0 is at 48
A is at 65
7|Page
a is at 97
When the ASCII value of a character is converted to binary, it can be seen that the
Unicode
ASCII does not contain all of the international languages thus, Unicode is used to
Unicode supports up to four bytes per character, storing multiple languages and
more data.
Sound
The sound waves are sampled at regular time intervals where the amplitude is
stored
The amplitude of the sound wave is first determined at set time intervals
Each sample of the sound wave is then encoded as a series of binary digits
8|Page
A series of readings gives an approximate representation of the sound wave
Sampling Resolution:
The number of bits per sample is known as the sampling resolution (aka bit depth)
Increasing the sampling resolution increases the accuracy of the sampled sound as
Increasing the sampling resolution also increases the memory usage of the file as
Sampling Rate
The sampling rate is the number of sound samples taken per second, which is
A higher sampling rate would allow more accurate sound as fewer estimations will be
Images
Bitmap Images
Colour Depth
The number of bits representing each colour is called the colour depth.
An 8-bit colour depth means that each pixel can be one of 256 colours (because 2 to
A 1-bit colour depth means each pixel can store one colour (because 2 to the power
of 1 is 2) - ( This is done as the bit can either be 0 or 1, with 0 being white and 1
being black)
Increasing colour depth increases the size of the file when storing an image.
9|Page
Image Resolution
Image resolution refers to the number of pixels that make up an image; for example,
Photographs with a lower resolution have less detail than those with a higher
resolution.
When a bitmap image is ‘ blurry ‘ or ‘ fizzy ’ due to having a low amount of pixels in it
ones.
8 bits is a byte
4 bits is a nibble
Name of memory
No. of Bytes Equivalent Denary Value
size
1 kibibyte (1KiB) 210 1 024 bytes
1 mibibyte (1MiB) 220 1 048 576 bytes
1 gibibyte (1GiB) 230 1 073 741 824 bytes
1 tibibyte (1TiB) 240 1 099 511 627 776 bytes
1 pibibyte (1PiB) 250 1 125 899 906 842 624 bytes
Conventional System
Name of memory
No. of Bytes Equivalent Denary Value
size
1 kilobyte (1KB) 103 1 000 bytes
1 megabyte (1MB) 106 1 000 000 bytes
10 | P a g e
Name of memory
No. of Bytes Equivalent Denary Value
size
1 gigabyte (1GB) 109 1 000 000 000 bytes
1 terabyte (1TB) 1012 1 000 000 000 000 bytes
1 petabyte (1PB) 1015 1 000 000 000 000 000 bytes
Calculation of File Size
The file size of an image is calculated as image resolution (in pixels) × colour depth
(in bits)
The size of a mono sound file is calculated as sample rate (in Hz) × sample
resolution (in bits) × length of sample (in seconds). (For a stereo sound file, you would then
multiply the result by two.)
File Types
Musical Instrument Digital Format (MIDI)
each other
o The first byte is the status byte – which informs the MIDI device what function to
perform
o Encoded in the status byte is the MIDI channel (operates on 16 different channels)
o Key pressure: indicates how hard it has been pressed (loudness of music)
MP3
11 | P a g e
It uses technology known as Audio Compression to convert music and other sounds
o Done using file compression algorithms, which use Perceptual Music Shaping
o Certain sounds are removed without affecting the quality, too much
Use lossy format as the original file is lost following the compression algorithm
MP4
This format allows the storage of multimedia files rather than just sound
JPEG will reduce the raw bitmap image by a factor between 5 and 15
All the data bits from the original file are reconstructed again when the file is
uncompressed.
Important for files where the loss of data would be disastrous (spreadsheet)
No data is lost
12 | P a g e
Run-Length Encoding
It reduces the size of a string of adjacent, identical data (e.g. repeated colours in an
image)
A repeating string is encoded into two values: the first value represents the number
of identical data items (e.g. characters), and the second value represents the code of
One difficulty is that RLE compression isn't perfect for strings like "cdcdcdcdcd". We
use a flag to solve this; e.g., 255 can be made as the flag. Now 255 will be put
before every repeating value, e.g. our previous example becomes 255 05 97 255 04 98
255 02 99 255 05 100 where 255 now indicates that the next character/set of characters
is approaching
The file compression algorithm eliminates unnecessary data bits like in MP3 and
JPEG formats.
13 | P a g e
Data Transmission
Types and Methods of Data Transmission
Data Packets
Packet Structure -
o Header
o Payload
o Trailer
Error-Checking methods
Packet Switching - Method of data transmission where the data is broken into
multiple packets. Packets are then sent independently from start to end and
Advantages Disadvantages
There is no need to create a single line
Packets may be lost
of communication
Possible to overcome failed or busy More prone to errors in real-time
nodes streaming
Delay at the receiver while the packets
High data transmission speed
are being re-ordered
Easy to expand package usage
Data Transmission
14 | P a g e
Half-duplex data transmission is in both directions but not at the same time (e.g.,
walkie-talkie)
Serial data transmission is when data is sent one bit at a time over a single wire
Parallel data transmission is when data of several bits (1 byte) are sent down several
Serial Parallel
Better for longer distances (Telephone Better for short distances (Internal
Lines) circuits)
Cheaper Option Expensive (More hardware required)
Used when the size of data transmitted is
Used when speed is necessary
small
Slower Option Faster than Serial
Advantages Disadvantages
Transmission rate is less than 120
Automatically detected
MB/sec
Only fit one way, prevents incorrect Maximum cable length is about 5
connections metres
Different data transmission rates
Backwards compatible
15 | P a g e
Advantages Disadvantages
Industry-standard
Type Types -
0 1 0 1 1 0 1 0
The LMB (Left-Most Bit) is the parity bit. As the number of 1s is even, the parity bit
Two bits may change during transmission; therefore error is not found
Even though the parity checks would reveal the errors, the bit(s) changed wouldn’t
be identified
Parity Blocks
Any changes in bits would be identified through the rows and columns
16 | P a g e
Checksum
Whenever a block of data needs to be sent, the sender would calculate the
Once the data has been sent, The receiver would calculate the checksum again with
the same set of data and the same algorithm used before.
The receiver would then compare the value received and the newly calculated value.
Echo Check
Once the data has been sent, The receiver will send the data back to the sender for
verification.
The sender would compare the received and original data for errors.
The only downside is that we wouldn’t know if the error occurred when sending the
Check Digits
Check digits are calculated from all the other digits in the data (ex-codes). The check
Uses acknowledgements and timeouts to make sure the user received the data
The receiver would check the data for any errors; if none are found, a positive
17 | P a g e
The sender uses timeouts to wait for a pre-determined amount for the
acknowledgement.
If no acknowledgements are received after the timeout, the data will be sent again to
the receiver.
Encryption
Encryption is a process of turning the data into an unreadable form so it doesn’t
Symmetric Encryption:
o It uses an encryption key for the encryption process; the same key is used for
Asymmetric Encryption:
o Uses a public key and a private key. The public key is available to everyone,
o The receiver would have the private key, and they would send the public key to the
sender. The sender can encrypt the message with the public key, and the data can
18 | P a g e
Hardware
Computer Architecture & Von Neumann
Architecture
The central processing unit (CPU) (also known as a microprocessor or processor) is
Processor: The processor contains the Arithmetic and Logic Unit (ALU)
Control Unit: The control unit controls the operation of the memory, processor and
input/output devices
Arithmetic Logic Unit: Carries out the logic system like calculations
System Clock: The system clock is used to produce timing signals on the control
bus
Busses: Carry data through components. The following are its types.
Immediate Access Store: Stores the instructions that are to be processed, which
REGISTE
ABBREVIATION FUNCTION
R
Current instruction Stores the instruction the CPU is currently
CIR
register decoding or executing
Memory address Stores the Address of the instruction, copy
MAR
register it, and sends it to MDR
Stores the Data from the address received
MDR Memory data register
from the MAR and sends data to CIR
19 | P a g e
REGISTE
ABBREVIATION FUNCTION
R
Stores the address of the next instruction to
PC Program counter
be fetched from memory
During calculations, data is temporarily held
ACC Accumulator
in it
Source: Cambridge IGCSE and O Level Computer Science - Second Edition (Hodder Education)
fetched
Memory Concept
20 | P a g e
A computer’s memory is divided into partitions: Each partition consists of an address
An instruction set is a list of all the commands that a CPU can process, and the
The clock defines the clock cycle that synchronises all computer operations. By
however.
Overclocking
Using a clock speed higher than the computer was designed for.
become unstable)
The wider the data buses, the better the performance of the computer
Cache
21 | P a g e
-- stores frequently used instructions and data that need to be accessed faster,
The larger the cache memory size, the better the CPU performance
Cores
The more cores in the CPU, the better and faster the performance
But if any number of cores are used, it could possibly slow down the system
data cables between each. Which in turn reduces the potential system performance.
You might have heard about quad and dual cores, not septa or octa cores.
Input Devices
Two-dimensional Scanners:
The image is converted into an electronic form, which can be stored in the computer
o A scan head moves across the document until the whole page is scanned. An image
o The focused image now falls onto a charge-coupled device (CCD), which consists of
If the original document was a photo/image, then the scanned image forms an image
22 | P a g e
Three-dimensional Scanners
Scanners take images at several points, x, y and z (lasers, magnetic, white light)
Make use of (OCR) to produce digital images which represent the passport pages
The 2D photograph in the passport is also scanned and stored as jpeg image
The passenger’s face is also photographed using a digital camera and compared to
Key parts of the face are compared (distance between eyes, width of nose)
Barcode readers/scanners
The left and right-hand sides of the barcode are separate using guard bars
o Light is reflected off the barcode; dark areas reflect little light, which allows the bars
to be read
23 | P a g e
Can hold more storage (7000 digits)
Advantages of QR codes:
Digital Cameras
image, etc.
Photo is captured when light passes through the lens onto a light sensitive cell
Keyboards
Each character has an ASCII value and is converted into a digital signal
Slow method
Prone to errors
Pointing devices
Mouse/trackball
Microphones
signal
The signal goes to a sound card and is converted into digital values and stored in a
computer
24 | P a g e
Voice recognition: voice is detected and converted into digital
Touchscreens
microprocessor
Resistive (inexpensive)
o When the top polyester is touched, the top layer and bottom layer complete a circuit
o Signals are then sent out, which are interpreted by a microprocessor to determine
Sensors
25 | P a g e
o Acoustic - These sensors act like a microphone that converts sound to electric
pulses.
motion.
o Gas - These sensors measure the amount/level of any gas in the environment.
o Humidity - This sensor measures the water vapour in the air or any sample.
o Infra-red (active) - This IR sensor uses an invisible infrared beam. When the beam is
o Infra-red (passive) - These sensors detect the heat emitted by any object.
o Light - These devices use light-sensitive cells that generate electric current based on
light brightness.
o Moisture - This type of sensor detects the water content wherever this sensor has
been installed.
o Proximity - This sensor detects the nearby objects around the sensor
(Note: You do not need to know the working principle of the sensor. But have an idea
of their purposes.)
26 | P a g e
Microprocessor samples data every minute
o Lamp switched on
Output Devices
Inkjet Printers
Data is sent to the printer and stored in a temporary memory (printer buffer)
A sheet of paper is fed; the sensor detects if the paper is available in the paper tray
The print head moves across paper printing text/image, four ink colours sprayed in
Once it is done, the printer sends an interrupt to the processor (request for more
data to be sent)
Laser Printers
Use dry powder ink (toner) and static electricity to produce text and images
27 | P a g e
2. The printing drum is given a positive charge; as the drum rotates, a laser beam is
scanned across it; removing the positive charge leaves negatively charged areas
3. The drum is then coated with positively charged toner; it only sticks to negatively
5. The toner on the drum now sticks to the paper to produce a copy of the page
6. Paper finally goes through a fuser (set of heated rollers); heat melts the ink so it is
permanent
7. The discharge lamp removes all electric charge from the drum, ready to print on the
next page
3D Printers
2D and 3D Cutters
Actuators
Used in many control applications involving sensors and devices (ADC and DAC)
Loudspeakers/Headphones
Sound is produced by passing the digital data through a DAC, then through an
28 | P a g e
Produced by voltage differences vibrating a cone in the speaker at different
frequencies
The front layer of the monitor is made up of Liquid Crystal Display (LCD); these tiny
diodes are grouped in threes as pixels (LCD doesn’t emit any light)
LCD monitors are backlit using Light Emitting Diode (LED) because:
o LEDs sharpen image (higher resolution), and CCFL has a yellow tint
CCFL uses two fluorescent tubes behind the LCD screen, which supplies the light
source
Light Projectors:
o LCD Projector
whiteboards
the number of micromirrors and the way they are arranged on the DLP chip
When the micromirrors tilt towards the light source they are on
29 | P a g e
When the micromirrors tilt away from the light source, they are off
A bright white light source passes through a colour filter on its way to the DLP chip
LCD Projectors
This beam of light is then sent to a group of chromatic-coated mirrors; these reflect
When the white light hits the mirrors, the reflected light has wavelengths
These three different lights pass through three LCD screens; these screens show the
When the coloured light passes through the LCD screens, a red, green and blue
Finally, the image passes through the projector lens onto the screen
Source: Cambridge IGCSE and O Level Computer Science - Second Edition (Hodder Education)
30 | P a g e
The CPU does not directly access secondary storage
HDD, SSD, DVD, memory stick, and Blu-ray disc are some examples
Primary Memory:
RAM is used by a system when it needs to store and access data that is actively
Features of RAM
o It can be written to or read from, and the contents of the memory can be changed
The larger the size of the RAM, the faster the computer will operate
As RAM becomes full, the processor has to access the continually hard drive to
Virtual memory
31 | P a g e
When RAM runs out of memory, there is a problem with memory management; thus,
the system has a high chance of crashing. This is why virtual memory comes into the
picture.
The virtual memory can be either HDD or SSD (these storages are discussed below)
o They can be larger than the physical memory provided in the RAM.
Features of ROM
Secondary Storage:
Data is stored in a digital format on the magnetic surface of the disks (platter)
A number of read/write heads can access all of the surfaces of the disk
Each platter will have two surfaces which can be used to store the data
32 | P a g e
Data is stored on the surfaces in sectors and tracks
There are no moving parts, and all data is received at the same time (not like HDD)
Store data by controlling the movement of electrons within NAND chips, as 1s and
0s
o Very thin
Off-Line Storage:
CD/DVD Disks
Laser (red) light is used to read and write data on the surface of the disk.
Both systems use a single spiral track that runs from the centre of the disk to the
edge
DVD uses Dual-Layering, which increases the storage capacity (two individual
recording layers)
Blu-ray Disks
33 | P a g e
The wavelength of laser light is less than CD and DVD (stores up to five times more
infringement)
Cloud Storage:
Cloud storage is a method of data storage where data is stored on remote servers
The same data is stored on more than one server in case of maintenance or repair,
allowing clients to access data at any time. This is known as data redundancy.
Public cloud – this is a storage environment where the customer/client and cloud
company firewall; customer/client and cloud storage provider are integrated and
Hybrid cloud – this is a combination of the two above environments; some data
resides in the private cloud, and less sensitive/less commercial data can be
34 | P a g e
Embedded System
A combination of hardware and software is designed to carry out a specific set of
tasks.
o Microcontrollers - CPU, RAM, ROM and other peripherals on one single chip
o System on Chips (SoC) - microprocessor with I/O ports, storage and memory
o Input from the user is sent to the microprocessor (ADC needed if the data is
analogue)
o The microprocessor then sends signals to actuators which are the output
Advantages Disadvantages
Small in size, therefore can easily
Can be difficult to upgrade
fit into devices
Low cost to make The interface can be confusing sometimes
Requires very little power Troubleshooting is a specialist’s job
35 | P a g e
Advantages Disadvantages
Very fast reaction to changing Often thrown away as difficult to upgrade and
input faults are harder to find
Dedicated to one task only Increased garbage as they are thrown away
Can be controlled remotely Any computerised system is prone to attacks
Applications of Embedded devices
o GPS systems
o Security Systems
o Vending Machines
o Washing Machines
o Oven
o Microwave
Network Hardware
Network Interface Card (NIC)
A MAC address comprises 48 bits which are shown as six groups of hexadecimal
digits. The first six display the manufacturer’s code, and the second half shows the
These do not change and are primarily constant for every device
there are two types of MAC addresses: the Universally Administered MAC Address
The only difference between the two types is that UAA is made Universally and
IP Addresses
36 | P a g e
IP address allocation:
Static IP addresses:
Dynamic IP addresses:
2001:0db8:85a3:0000:0000:8a2e:0370:7334).
undecillion).
o Address format: IPv4 uses a 32-bit address, while IPv6 uses a 128-bit address.
o Address space: IPv4 provides approximately 4.3 billion addresses, whereas IPv6
o Address allocation: IPv4 addresses are allocated manually using DHCP, while IPv6
37 | P a g e
Routers
Router functionality:
o A router is a networking device that directs data packets between different networks.
o It uses routing tables to determine the next hop or the next router on the path to the
destination.
o The router forwards the data packet to the appropriate next hop.
o A router can act as a DHCP server (Dynamic Host Configuration Protocol) and
management.
o A router serves as the gateway between a local network and the internet.
o The router receives data packets from devices on the local network and forwards
o It also receives incoming data packets from the internet and routes them to the
38 | P a g e
Types of Software and Interrupts
Types of Software
1. System Software e.g. Operating System, Utility programs and device drivers
System Software:
these are a set of programs which control and manage the operations of hardware
Application Software:
maybe a single program (for example, NotePad) or a suite of programs (for example,
Microsoft Office)
user can execute the software when they require, and it is mostly not automatic
Examples
39 | P a g e
System Software:
Compiler: Translates high-level language into machine code, allowing for direct use
Linker: Combines object files produced by a compiler into a single program, allowing
computer's operating system, without which a device like a printer would be unable
to work.
resources by carrying out specific tasks, such as virus checking, disk repair and
Application Software:
Word Processor: Software used for manipulating text documents, including creating,
editing, and formatting text with tools for copying, deleting, spell-checking, and
importing images.
columns and numbered rows, with each cell identified using a unique combination of
columns and rows. It can calculate using formulas, produce graphs, and do
one or more tables that hold records and fields. It provides the ability to query and
40 | P a g e
Control and Measuring Software: A program designed to interface with sensors and
applications by comparing sensor data with stored data and altering process
parameters accordingly.
"App Store" and ranging from games to sophisticated software such as phone
banking. Common examples include video and music streaming, GPS, and camera
facilities.
Photo and Video Editing Software: Software that allows users to manipulate digital
and vector images, with bitmap graphics editors changing pixels to produce a
different image, while vector graphics editors manipulate lines, curves, and text to
Interrupts
prompting the microprocessor to pause its ongoing tasks and handle the interrupt
Timing signals: Scheduled signals prompt the microprocessor to pause and handle
Hardware faults: Issues like a paper jam in a printer, signalling the microprocessor
41 | P a g e
User interaction: Instances like a user pressing specific keys on a keyboard (e.g., ),
Software errors: Problems such as missing .exe files needed to initiate a program,
conflicts like two processes accessing the exact memory location, or attempts to
Utility Software
Computer users have access to utility programs as part of system software
Utility programs can be initiated by the user or run in the background without user
input
analysis and repair tools, file compression and management software, backup
Virus checkers or anti-virus software are important for protecting computers from
malware.
They should be kept up to date and run in the background to maintain their
effectiveness.
Anti-virus software checks files before they are run or loaded and compares possible
42 | P a g e
Heuristic checking is used to identify possible viruses that are not yet on the
database.
Infected files are put into quarantine for automatic deletion or for the user to decide.
Full system scans should be carried out regularly to detect dormant viruses.
Defragmentation software rearranges the data blocks on a hard disk drive (HDD) to
store files in contiguous sectors, reducing head movements and improving data
access time.
As an HDD becomes full, blocks used for files become scattered all over the disk
surface, making it slower to retrieve data as the HDD read-write head needs several
When a file is deleted or extended, new data does not fill the vacant sectors
immediately, causing the files to become more scattered throughout the disk
surfaces.
A disk defragmenter rearranges the data blocks to store files in contiguous sectors
The defragmentation process can free up previously occupied sectors and empty
some tracks.
Backup Software
Backup software is a utility software that helps create and manage backup copies of
Manual backups using memory sticks or portable hard drives are good practices, but
43 | P a g e
Backup utilities allow scheduling backups and only backup files if changes have
There could be three file versions for total security: the current version stored on the
Security Software
Security software is a utility software that manages access control, user accounts,
Access control and user accounts use IDs and passwords to secure user data and
Screensavers
Screensavers display moving and still images on the monitor screen after computer
inactivity.
They were originally developed to protect CRT monitors from 'phosphor burn'.
Screensavers are now mostly used for customizing a device and as a part of
They automatically log out of the user after a certain period of inactivity.
Some screensavers activate useful background tasks like virus scans and distributed
computing applications.
Device Drivers
44 | P a g e
Device drivers translate data into a format that can be understood by the hardware
Without the appropriate device driver, a hardware device cannot work with a
USB device drivers contain descriptors, which include a vendor ID (VID), product ID
(PID) and unique serial number that allow the operating system to identify the
device.
Serial numbers must be unique to avoid confusion if two devices with the same serial
Operating Systems
Operating Systems are designed to establish communication between the user and
the computer
-managing files
– handling interrupts
– providing an interface
– managing memory
– managing multitasking
45 | P a g e
Source: Cambridge IGCSE
Memory Management - Manages the RAM and the HDD/SSD during the execution
of programs
updates and so on
functions
Multitasking - OS would share the hardware resources with each of the processes
accounts individually.
Running of Applications
The computer starts its OS (booting up the computer) through the bootstrap loader.
The BIOS (Basic Input/Output System) tells the computer the location of the OS in
the storage.
46 | P a g e
Interrupts
Signal that causes the operating system to stop what it’s doing and service a task
High-Level Languages
Low-Level Languages
47 | P a g e
Source: Cambridge IGCSE and O
Assembly Language
run.
Translators
Compiler
Interpreter
One high-level language program statement may require several machine code
instructions to be executed.
48 | P a g e
Interpreted programs cannot be used without an interpreter
Assembler
o Code Editor
o Translator
o Debugger
49 | P a g e
o Error Reports
o Auto-Documenter
o Pretty Printing
50 | P a g e
The Internet and Its Uses
The Internet and the World Wide Web
Internet World Wide Web (WWW)
Uses transmission protocols such as Collection of webpages and other
TCP and IP (Internet Protocols) information on websites
Allows the user to communicate with Uses HTTP(S) protocols that are written
other users via chat, email, calling and using Hypertext Mark-up Language
more (HTML)
Worldwide Collection of Interconnected URLs (Uniform Resource Locator) are
Networks and Devices used for the location of the web pages
Web browsers can access web pages.
Uniform Resource Locator (URLs)
URLs are used to locate and access web pages. The typical format of URLs is -
o domain type (.com, .org, .net, .gov) or sometimes country codes (.uk, .in, .cy)
The path would usually become the file directory roots. for
example, https://www.znotes.com/computer-science
HTTP stands for Hypertext Transfer Protocol, and HTTPS stands for Hypertext
Web Browsers
51 | P a g e
It is software used to connect to the internet
The browser sends the URL to the domain name server (DNS)
Cookies
They are used to track data about the users and autofill forms or give suggestions
accordingly
Types of Cookies -
Digital Currency
Form of payment to pay for goods and services
A few examples are Debit/Credit Cards, Apps (Paypal, Apple Pay, Bank Transfers
52 | P a g e
Cryptography was later introduced due to the problem in centralised banking
systems.
Blockchain Network
Hacking isn’t possible here as transaction details would be sent to all the computers,
and the data can’t be changed without the consent of all the network members
Every time a transaction takes place, A block is created. The block would contain -
Data - Name of the sender and the receiver, amount of money and more
Previous Hash Value - Hash Value of the previous block in the chain
genesis block as it doesn’t point to any previous block (Previous Hash Value - 0000)
Cyber Security
Brute Force Attack:
Hackers try to guess your password by trying all the different combinations of letters,
53 | P a g e
Effect:
o Hacker gets access to user’s personal data (credit cards, passwords and more)
To remove risk:
Data Interception:
This involves stealing data by tapping into a wired or a wireless transmission line
o Wardriving - The act of locating and using wireless internet connections illegally
o Packet Sniffing - Uses Packet sniffers to examine packets sent over a line; all the
Effect:
To remove risk:
o Accessing websites
Hacking
54 | P a g e
Effect:
To remove risk:
o Firewalls
Malware
o Virus - A program that can replicate itself with the intention of deleting or corrupting
o Ransomware - Attackers encrypt the user’s data until a certain amount of money is
paid
o Spyware - Sends data about all the activities of the user to the attacker
o Worms - Programs that can replicate themselves with the intention of corrupting the
Phishing
Attackers send legitimate-looking emails to bait the user into giving out their
information.
To remove risk:
55 | P a g e
o Don’t open links from unknown receivers
Pharming
The attacker installs a malicious code on the computer, which redirects the user to
fake websites
Effect:
o The user gives out login details and other personal details
To remove risk:
o Make sure that the green padlock is present in the URL bar
Social Engineering
Attackers create a social situation which leads to victims giving out their details (For
example - Spam calls informing them that their account has been hacked)
Access Levels - Having Different levels of access for different people (for example -
Authentication - User proving who they are. The most common methods are
56 | P a g e
Biometric
Benefits Drawbacks
Methods
Most development methods
are very easy to use and Intrusive as used to identify
Fingerprint
require very low storage criminals, Can’t be used if the finger
Scans
space to store the biometric gets dirty or damaged (e.g. cuts)
data.
With very high accuracy, it It is very intrusive, Takes longer to
Retina Scan Impossible to replicate a verify, Expensive to install and set
person’s retina up
Can’t identify if there are any
Face Non-intrusive method,
changes in the lighting, change in
Recognition Relatively cheaper
age or person’s age.
Voices can be recorded and used
Non-Intrusive method, for verification, but low accuracy
Voice
verification is done quickly and illnesses such as colds or
Recognition
and relatively cheaper coughs can affect a person’s voice,
making identification impossible.
Two-Step Verification - Requires two methods of authentication to prove who the
user is
Automatic Software Updates - Latest updates contain patches which improve device
security
Spelling and Tone - Fake emails tend to have wrong spelling and grammar
(amazonn instead of amazon), and the tone would also seem urgent
Firewalls - Hardware or Software which monitors the traffic between a network and
Proxy Servers - Acts as an intermediate between the user’s computer and the web
o Attacks like DDoS and Hacking attack the proxy server, keeping the web server safe.
57 | P a g e
o Acts as a firewall as well.
Privacy Settings - Used to limit who can access and see a user’s profile
SSL (Secure Socket Layer) - Set of rules used while communicating with other users
on the internet.
58 | P a g e
Automated and Emerging
Technologies
Automated Systems
Automated Systems are a combination of software and hardware designed to
o Sensors take inputs, and they are sent to the microprocessor. The data is usually
o The microprocessor processes the data and makes the necessary decisions based
on its program
o The actions are then executed by the actuators (Motors, wheels and so on)
Advantages Disadvantages
Faster and Safer Expensive to set up and maintain
Any changes can be
Any computerised systems are prone to attacks
identified quickly
Less Expensive in the long Over-reliance on automated systems may cause
run humans to lose skills
Higher Productivity and
Efficiency
You should be able to describe the advantages and disadvantages of an
industry
transport
agriculture
weather
59 | P a g e
gaming
lighting
science
Robotics
Robotics is the branch of computer science that combines robot design, construction
and operation.
o A robot must obey orders given by humans unless it comes into conflict with Law 1
Characteristics of a robot -
o Programmable
Types of Robots -
Advantages Disadvantages
Robots can find it difficult to do non-
Robots can work 24/7
standard tasks
Robots can work in hazardous
Robots can lead to higher unemployment
conditions
60 | P a g e
Advantages Disadvantages
They are less expensive in the long Risk of deskilling as robots replace
run humans in some task
They have high productivity and are Expensive to install and maintain in the
more consistent short run
Robots have the risk of getting hacked.
Artificial Intelligence
AI is the branch of computer science that simulates intelligent human behaviour.
Types of AI -
specific task
Characteristics of AI -
o Ability to Reason
Types of AI
They are usually used for answering questions using knowledge and inference.
They have many applications, including chatbots, diagnosis in the medical industry,
Advantages Disadvantages
High level of Expertise Setup and Maintenance costs are very high
High Accuracy and
Can only rely on the information in the system
Consistent
61 | P a g e
Advantages Disadvantages
High response times Tend to give cold responses sometimes
Machine Learning is a subset of AI in which machines are trained to learn
AI Machine Learning
Representation of human Machines are trained to make decisions
intelligence in machines without being programmed to
The aim is to build machines that The aim is to make machines learn through
think like humans data acquisitions
62 | P a g e