CAIE-AS Level-Computer Science - Theory
CAIE-AS Level-Computer Science - Theory
ORG
CAIE AS LEVEL
COMPUTER SCIENCE
SUMMARIZED NOTES ON THE THEORY SYLLABUS
Prepared for Tinodiwanashe for personal use only.
Prepared for Tinodiwanashe for personal use only.
CAIE AS LEVEL COMPUTER SCIENCE
Screen Resolution
Definition: The number of pixels that can be viewed
horizontally and vertically on a device’s screen.
Calculation: N umber of pixels = width × height
(e.g., 1680 × 1080 pixels).
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Tinodiwanashe at St Ignatius College on 20/03/25.
WWW.ZNOTES.ORG authorised for personal use only by Tinodiwanashe at St Ignatius College on 20/03/25.
CAIE AS LEVEL COMPUTER SCIENCE
Sampling Rate
Vector Graphics
Definition: Number of samples taken per unit of time.
Definition: Made up of drawing objects.
E!ect: Increasing the sampling rate improves the
Drawing Objects: Mathematically defined constructs
accuracy of the digitized sound wave representation
(e.g., rectangles, lines, circles).
but increases file size.
Drawing List: A set of commands defining the vector.
Properties: Basic geometric data that determine the
shape and appearance of each object. Sampling Resolution
Encoding: Data is encoded using mathematical Definition: Number of bits used to encode each
formulas to generate properties for drawing lines sample.
and curves to create the image. E!ect: Increasing sampling resolution improves the
Scalability: Objects can be resized without losing accuracy of digitized sound waves but increases file
quality, unlike bitmaps. size.
Applications: Company logos and other graphics that
require scaling.
Bit Rate
Definition: Number of bits used to store 1 second of
sound.
Calculation: Bit Rate = Sampling Rate ∗
Sampling Resolution
Length of Sound: Measured in seconds.
1.3. Compression
Definition: Compression is the process of reducing file
size without significant loss in quality, resulting in:
Reduced time needed to search for data.
Faster transfer of compressed files, using less
bandwidth than uncompressed files.
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Tinodiwanashe at St Ignatius College on 20/03/25.
WWW.ZNOTES.ORG authorised for personal use only by Tinodiwanashe at St Ignatius College on 20/03/25.
CAIE AS LEVEL COMPUTER SCIENCE
LAN WAN
A network that connects devices within a small A network that connects devices within a larger Thin Clients vs. Thick Clients
geographical area, often within the same geographical area, such as a city, country, or
building. globally. Peer-to-Peer network model (P2P)
Only private ownership. Private or public ownership.
Transmission medium: Twisted Pair Cables ,
Definition: A decentralized network where each
Transmission medium: PSTN or Satlink.
Coaxial Cables or Wi-Fi.
Higher data transfer rate. Lower data transfer rate.
connected computer stores data and operates
Less congestion. Higher congestion. independently as a ‘peer’, acting as both a client and
a server.
Applications: Internet and Ad hoc networks.
Client-Server Peer-to-Peer
Centralized backup. Lesser initial setup cost.
Lesser network tra%c: Each peer can
Files & resources centralized in server:
simultaneously receive data from di!erent
Prevents illegal resource usage.
sources.
Improved security: Files are stored on a central It can work even if a device goes down, but the
server, which would be regularly scanned for client-server model can’t work if the server
malware. goes down.
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Tinodiwanashe at St Ignatius College on 20/03/25.
WWW.ZNOTES.ORG authorised for personal use only by Tinodiwanashe at St Ignatius College on 20/03/25.
CAIE AS LEVEL COMPUTER SCIENCE
Real-time On-demand
Existing digital files are converted to encoded
Client-Server vs. Peer-to-Peer models The event is captured live via a video camera
bit-streaming format for broadcasting on the
that is connected to a computer.
internet by uploading to a dedicated server.
Network Topologies A link for encoded video is placed on the
Video signal converted to an encoded
Bus streaming video signal.
website, and the user clicks on the link to view
encoded streaming video.
A single line (bus) connects all devices with Encoded video signal uploaded from computer The data is streamed to a bu!er in the user’s
to a dedicated streaming server via cables or computer, and the bu!er stops the video from
terminators at each end. high-speed wireless internet connection. being paused as the bits are streamed.
The server then sends live images to all users As the bu!er is emptied, it’s filled again, thus
Other computers can read data being sent requesting them as a real-time video. providing continuous viewing.
It cannot be paused, fast-forwarded, etc. Can be paused, fast-forwarded, etc.
between any two computers.
Unsuitable for heavy tra%c due to frequent
Ethernet
collisions.
The most common wired medium for data
Star
transmission in LANs or WANs.
Consists of a central server (switch) with all other
Typically used in bus topology; data collisions are
computers connected via dedicated connections.
managed by the CSMA/CD (Carrier Sense Multiple
The server can send packets to di!erent devices
Access with Collision Detection) method.
simultaneously and bidirectionally. CSMA/CD Process:
No collisions are possible.
Device checks if the channel is busy before
Mesh
transmitting.
Every device (node) is directly interconnected with If busy, the device waits a random time before
each of the other devices (nodes).
retrying.
Commonly used for wireless networks, such as
During transmission, the device listens for other
the Internet, through the mesh connection of transmissions.
routers. If a collision occurs, transmission is aborted, and
Hybrid
both devices wait random times before retrying.
A combination of two or more topologies.
Bit Streaming
Example: A connection between two or more Sequence of digital signals (bits) transferred over a
LANs of di!erent topologies. communication path at high speeds, requiring a fast
Benefits Drawbacks broadband connection and bu!ers.
Copper Cable
Less expensive and easier to
install. Flexible. Easier to make
Doesn’t perform well with small Bit Streaming Types:
charges. A!ected by electromagnetism.
terminations. Real-time: Live events captured and transmitted
Greater bandwidth, improved security,
Fiber-Optic lightweight, easy to install, and less Needs expensive optical transmitters directly.
Cables signal boosting are required; used in and receivers.
long-distance communications. On-demand: Pre-existing files are converted and
streamed as requested.
Wired Networks Importance of High Broadband Speed/Bit-Rate
Use copper (twisted-pair cable or coaxial cable) or The user has to download and display bits at the
fiber-optic cables. same time.
Cables are connected to an Ethernet port on the Higher quality media requires faster speeds due
network router. to larger data frames as well.
Benefits Drawbacks Real-time streaming needs higher speeds due to
Radio
Can travel over large distances with a
wide range of wavelengths. Relatively
Low frequency means less data can be
transmitted at one time. A!ected by
simultaneous data requests coming from multiple
waves inexpensive. Used for TV signals and
mobile phone communications.
interference from radio stations with
similar frequencies.
di!erent users.
Expensive to build emitting towers.
Larger bandwidth allows more data
Microwaves Physical obstacles can interfere with
transfer.
signals.
Cost-e!ective for long-distance
Susceptible to interference. Expensive
Satellites communication, used in satellite phones
setup.
and radio broadcasts.
Wireless Networks
Use radio waves (including WiFi), microwaves, and
satellites to connect devices to networks without
cables.
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Tinodiwanashe at St Ignatius College on 20/03/25.
WWW.ZNOTES.ORG authorised for personal use only by Tinodiwanashe at St Ignatius College on 20/03/25.
CAIE AS LEVEL COMPUTER SCIENCE
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Tinodiwanashe at St Ignatius College on 20/03/25.
WWW.ZNOTES.ORG authorised for personal use only by Tinodiwanashe at St Ignatius College on 20/03/25.
CAIE AS LEVEL COMPUTER SCIENCE
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Tinodiwanashe at St Ignatius College on 20/03/25.
WWW.ZNOTES.ORG authorised for personal use only by Tinodiwanashe at St Ignatius College on 20/03/25.
CAIE AS LEVEL COMPUTER SCIENCE
Static vs. Dynamic IP addresses A laser beam and rotating mirrors are used to draw an
image of the page on a photosensitive drum
The image is converted into an electric charge, which
URL (Uniform Resource Locator)
attracts charged toner such that it sticks to the image
Unique reference address for the exact location of an
Electrostatic-charged paper rolled against the drum
internet resource on the WWW Charge pulls toner away from drum and onto paper
Protocol: Enables the browser to know what protocol is
Heat applied in the fuser to fuse toner to the paper
used to access information in the domain.
The electrical charge was removed from the drum, and
Host-name: The domain name.
excess toner was collected
Location of Server: The path indicating the server
location. 3D Printer:
Domain Name Service (DNS)
Definition: A naming system used for computers or The process starts with a saved digital file that holds the
resources having an internet connection. blueprint of the object to be printed
Structure: Consists of a hierarchy of DNS servers The object is then built by sequentially adding layers of a
which have a URL database and their corresponding material (e.g. polymer resin) until the object created
IP addresses. The object is then cured (e.g. resin-made objects are
hardened by UV light)
3. Hardware Microphone:
Benefits Drawbacks
Di%cult to program functions since there is no
Reliable since there are no moving parts
interface
Require less power Expensive expert help is needed for the repair
Cheap to mass-produce
Laser printer:
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Tinodiwanashe at St Ignatius College on 20/03/25.
WWW.ZNOTES.ORG authorised for personal use only by Tinodiwanashe at St Ignatius College on 20/03/25.
CAIE AS LEVEL COMPUTER SCIENCE
Hard disks have platters whose surfaces are covered Virtual (Reality) Headset:
with a magnetisable material. Virtual headsets consist of 2 lenses, (an LCD) display,
Platters are mounted on a central spindle and rotated at a circuit board with sensors, a cover and foam
high speed padding
The surface of platters is divided into concentric tracks & The display provides a simulation of a 3D
sectors, where data is encoded as magnetic patterns environment generated by a 3D graphics package
Each surface is accessed by read/write heads The user can ‘move’ in the virtual environment by
When writing, current variation in the head causes moving their head or using controllers
magnetic field variation on the disk Bu!ers:
When reading, magnetic field variation from the disk A queue that temporarily stores data to balance
produces current variation in the read head input/output speed of data, while the cache is the
short-term memory storage that stores frequently
Solid State (Flash) Memory: used data.
Random Access Memory vs. Read-Only Memory
Most use NAND-based flash memory
Consist of a grid of columns & rows that has 2 transistors RAM ROM
Volatile memory: loses content when power is Non-volatile memory: does not lose content
at each intersection turned o! when power is turned o!
Two transistors: It can be read and altered It can only be read
Used for storing OS kernel and boot-up
Used to store currently executing program
Floating Gate: stores electrons, and the presence or instructions
Touchscreen:
Resistive Capacitive
Consists of two charged plates Made from materials that store electric charge
Pressure causes plates to touch, completing When touched, the charge is transferred to the
the circuit finger
Point of contact registered with coordinates
used to calculate the position
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Tinodiwanashe at St Ignatius College on 20/03/25.
WWW.ZNOTES.ORG authorised for personal use only by Tinodiwanashe at St Ignatius College on 20/03/25.
CAIE AS LEVEL COMPUTER SCIENCE
A B Output
0 0 0
0 1 0
1 0 0
1 1 1
A B Output
0 0 1
0 1 1
1 0 1
1 1 0
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Tinodiwanashe at St Ignatius College on 20/03/25.
WWW.ZNOTES.ORG authorised for personal use only by Tinodiwanashe at St Ignatius College on 20/03/25.
CAIE AS LEVEL COMPUTER SCIENCE
Registers
4. Processor Fundamentals
4.1. Central Processing Unit (CPU)
Architecture
Von Neumann model
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Tinodiwanashe at St Ignatius College on 20/03/25.
WWW.ZNOTES.ORG authorised for personal use only by Tinodiwanashe at St Ignatius College on 20/03/25.
CAIE AS LEVEL COMPUTER SCIENCE
Arithmetic and Logic Unit (ALU): part of the processor Clock Speed
that processes instructions which require some form of Number of pulses the clock sends out in a given time
arithmetic or logical operation interval, which determines the number of cycles
Control Unit (CU): part of the CPU that fetches (processes) the CPU executes in a given time interval
instructions from memory, decodes them & Usually measured in Gigahertz (GHz)
synchronizes operations before sending signals to the If the clock speed is increased, then the execution
computer’s memory, ALU and I/O devices to direct how time for instructions decreases. Hence, more cycles
to respond to instructions sent to the processor per unit time, which increases performance.
Immediate Access Store (IAS): memory unit that the However, there is a limit on clock speed since the
processor can directly access heat generated by higher clock speeds cannot be
System Clock: a timing device connected to a processor removed fast enough, which leads to overheating.
that synchronises all components. Bus Width
Determines the number of bits that can be
Buses
simultaneously transferred
Set of parallel wires that allow the transfer of data Refers to the number of lines in a bus
between components in a computer system Increasing bus width increases the number of bits
Data bus: bidirectional bus that carries data transferred simultaneously, increasing processing
speed and performance.
instructions between processor, memory, and I/O
Cache Memory
devices.
Address bus: unidirectional bus that carries the Commonly used instructions are stored in the cache
address of the main memory location or input/output memory area of the CPU.
device about to be used, from processor to memory If the cache memory size is increased, more
address register (MAR) commonly executed instructions can be stored, and
Control bus the need for the CPU to wait for instructions to be
Bidirectional loaded reduces. Hence, the CPU executes more
used to transmit control signals from the control unit cycles per unit of time, thus improving performance.
Number of Cores
to ensure access/use of data & address buses by
components of the system does not lead to conflict Most CPU chips are multi-core — have more than
one core (essentially a processor)
Performance of Computer System Factors Each core simultaneously processes di!erent
instructions through multithreading, improving
computer performance.
Ports
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Tinodiwanashe at St Ignatius College on 20/03/25.
WWW.ZNOTES.ORG authorised for personal use only by Tinodiwanashe at St Ignatius College on 20/03/25.
CAIE AS LEVEL COMPUTER SCIENCE
Hardware which provides a physical interface between a A signal from a program seeking the processor’s
device with CPU and a peripheral device attention
Peripheral (I/O) devices cannot be directly connected to Handles the interrupt by controlling the processor
the CPU, hence connected through ports. Di!erent ISRs used for di!erent sources of interrupt
Universal Serial Bus (USB): Can connect both input and
output devices to the processor through a USB port. A typical sequence of actions when an interrupt occurs:
High Definition Multimedia Interface (HDMI) The processor checks the interrupt register for
Can only connect output devices (e.g. LCD) to the interrupt at the end of the F-E cycle for the current
processor through a HDMI port instruction
HDMI cables transmit high-bandwidth and high- If the interrupt flag is set in the interrupt register, the
resolution video & audio streams through HDMI interrupt source is detected
ports If the interrupt is low priority, then an interrupt is
Video Graphics Array (VGA) disabled
Can only connect output devices (e.g. second If interrupting is a high priority:
monitor/display) to the processor through a VGA port All contents of registers of the running process
VGA ports allow only the transmission of video are saved on the stack
streams but not audio components PC is loaded with the ISR and is executed
Once ISR is completed, the processor pops the
Fetch-Execute (F-E) cycle registers’ contents from the stack, and the
interrupted program continues its execution.
Fetch stage
Interrupts re-enabled and
PC holds the address of the next instruction to be Return to the start of the cycle
fetched
The address on the PC is copied to MAR
PC is incremented 4.2. Assembly Language
Instruction loaded to MDR from the address held in
MAR
Instruction from MDR loaded to CIR
Decode stage: The opcode and operand parts of
instruction are identified
Execute stage: Instructions executed by the control unit
sending control signals
Register Transfer Notation (RTN)
MAR [PC]
PC [PC] + 1
MDR [[MAR]]
CIR [MDR]
Decode
Execute
Return to start
Square brackets: value currently in that register
Double square brackets: CPU is getting value stored
at the address in the register
Interrupts
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Tinodiwanashe at St Ignatius College on 20/03/25.
WWW.ZNOTES.ORG authorised for personal use only by Tinodiwanashe at St Ignatius College on 20/03/25.
CAIE AS LEVEL COMPUTER SCIENCE
Op Code Operand Explanation
Addressing
Assembly language: low-level programming language LDM #n Immediate: Load n into ACC
with instructions made up of an op code and an operand LDD Direct: load contents at address into the ACC
Indirect: load contents of address at given address into
Machine code: code written in binary that uses the LDI
ACC
processor’s basic machine operations LDX
Data Movement
Indexed: load contents of given address + IR into ACC
Relationship between machine and assembly language: STO Store contents of ACC into address
Arithmetic Operations
every assembly language instruction (source code) ADD Add contents of register to ACC
translates into exactly one machine code instruction INC Add 1 to contents of the register
Comparing
(object code) CMP Compare contents of ACC with that of given address
Symbolic addressing CMP #n Compare contents of ACC with n
Conditional Jumps
Symbols used to represent operation codes JPE Jump to address if compare TRUE
Labels can be used for addresses JPN Jump to address if compare FALSE
Unconditional Jumps
Absolute addressing: a fixed address in memory JMP Jump to given address
I/O Data
Assembler IN Input any character and store ASCII value in ACC
Software that changes assembly language into OUT Output character whose ASCII value is stored in ACC
Ending
machine code for the processor to understand END Return Control to operating system
The assembler replaces all mnemonics and labels
with their respective binary values (that are #denotes immediate addressing
predefined before by the assembler software) B denotes a binary number, e.g. B01001010 & denotes a
One pass assembler hexadecimal number, e.g. &4A
Assembler converts mnemonic source code into
Modes of Addressing
machine code in one sweep of program
Cannot handle code that involves forward Direct Addressing: loads contents at address into ACC
referencing Indirect Addressing: The address to be used is at
Two pass assembler: software makes 2 passes thru code given address. Load contents of this second address
On the first pass: to ACC
Indexed addressing: form the address to be used as
Symbol table created to enter symbolic addresses
and labels into specific addresses + the contents of the IR (Index Register)
Relative addressing: next instruction to be carried out
All errors are suppressed
On the second pass: is an o!set number of locations away, relative to
address of current instruction held in PC; allows for
Jump instructions access memory addresses via
relocatable code
table
Conditional jump: has a condition that will be
Whole source code translates into machine code
checked (like using an IF statements)
Error reported if they exist
Unconditional jump: no condition to be followed,
Grouping the Processor’s Instruction Set
simply jump to the next instruction as specified
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Tinodiwanashe at St Ignatius College on 20/03/25.
WWW.ZNOTES.ORG authorised for personal use only by Tinodiwanashe at St Ignatius College on 20/03/25.
CAIE AS LEVEL COMPUTER SCIENCE
Binary numbers can be multiplied or divided by shifting Each bit can represent an individual flag.
Left shift (LSL #n) ∴ by altering the bits, flags could be operated upon.
Bits are shifted to the left to multiply Bit manipulation operations:
E.g. to multiply by four, all digits shift two places to Masking: an operation that defines which bits you
left want to keep and which bits you want to clear.
Right shift (LSR #n) Masking to 1: The OR operation is used with a 1.
Bits are shifted to the right to divide Masking to 0: The AND operation is used with a 0.
E.g. to divide by four, all digits shift two places to right Matching: an operation that allows the accumulator
Logical shift: zeros replace the vacated bit position to compare the value it contains to the given value in
Arithmetic shift: Used to carry out multiplication and order to change the state of the status register.
division of signed integers represented by bits in the Practical applications of Bit Masking:
accumulator by ensuring that the sign-bit (usually the Setting an individual bit position:
MSB) is the same after the shift. Mask the content of the register with a mask
Cyclic shift: the bit that is removed from one end by the pattern which has 0 in the ‘mask out’ positions
shift is added to the other end. and 1 in the ‘retain’ positions.
Set the result with the match pattern by using the
Bit Masking AND command with a direct address.
Testing one or more bits:
Mask the content of the register with a mask
pattern which has 0 in the ‘mask out’ positions
and 1 in the ‘retain’ positions.
Compare the result with the match pattern by
using the CMP command or by “Checking the
pattern”.
Checking the pattern
Use AND operation to mask bits and obtain
resultant.
Now subtract matching bit pattern from resultant.
The final ‘non-zero’ result confirms the patterns
are not the same else vice versa.
5. System Software
5.1. Operating System
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Tinodiwanashe at St Ignatius College on 20/03/25.
WWW.ZNOTES.ORG authorised for personal use only by Tinodiwanashe at St Ignatius College on 20/03/25.
CAIE AS LEVEL COMPUTER SCIENCE
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Tinodiwanashe at St Ignatius College on 20/03/25.
WWW.ZNOTES.ORG authorised for personal use only by Tinodiwanashe at St Ignatius College on 20/03/25.
CAIE AS LEVEL COMPUTER SCIENCE
Integrity
6.1. Data Security
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Tinodiwanashe at St Ignatius College on 20/03/25.
WWW.ZNOTES.ORG authorised for personal use only by Tinodiwanashe at St Ignatius College on 20/03/25.
CAIE AS LEVEL COMPUTER SCIENCE
Data Security: ensuring data is protected against loss and User Accounts and Passwords
unauthorized access. Usernames & passwords to deny access to
Data Integrity: making sure that data is valid and does unauthorized users
not corrupt after transmission User-assigned privilege, which accesses to only the
Data Privacy: ability to determine what data is shared user’s workplace, preventing the user to have admin
with a third party rights.
Data Security and Computer System Security Can assign privileges to files so users with low
privileges do not have access.
Data Security System Security
Protection of data on a computer system Protection of the computer system Firewalls
To prevent corruption of data and prevent
To prevent access of viruses to the system and
prevent hackers from entering your computer
Hardware or software that filters information
hackers from using data
system
travelling between the computer system and the
E.g. encryption E.g. ID & Password
internet
Threats to Computer & Data Security* (software) firewall can make decisions about what to
allow and block by detecting illegal attempts by
Malware specific software to connect to the internet
software intentionally designed to damage a Authentication
computer or computer network Process of determining whether someone is who
Includes Virus & Spyware they claim to be.
Virus: Software that replicates itself by inserting a Helps prevent unauthorized access
copy of itself into another piece of software, which Log-on using digital signatures, passwords and
may cause the computer to crash and can lead to biometric scans.
deletion or corruption of data Anti-virus software
Spyware: software that gathers information about Runs in the background to detect & remove viruses.
users' online and o$ine activity, including accessed Checks files for known malicious patterns
sites, applications, and downloaded files. Anti-spyware software: detects & removes spyware.
Risk restriction: Ensure anti-virus and anti-spyware Encryption:
software is installed, regularly updated and run. Conversion of data to code by encoding it
Hacking It doesn’t stop illegal access but appears meaningless
illegal access to a computer system Necessary to use decryption software to decode data
Hackers can obtain user’s confidential data which can Data Security Measures
cause identity theft Encryption
Can lead to the deletion or corruption of data Access Rights to data (authorization): di!erent users
Risk restriction: Use strong passwords and ensure assigned di!erent authorization levels which prevent
firewall them from accessing all data ∴ increases security
Phishing Data Backup
Attempt through emails to obtain user’s confidential An exact copy of an original piece of data in case the
data which can cause identity theft original is lost or corrupted
Risk restriction: Ignore suspicious mails and ensure Within the same computer system or at di!erent site
firewall criteria include SPAM filters, blacklist, etc. Disk-mirroring strategy
Pharming Real-time strategy that writes data to two or more
Redirects user to a fake website that appears disks at the same time.
legitimate to gain confidential data If one fails, the other is still there to be read o! of
Risk restriction: use a reliable ISP; check that links are
genuine and ensure https is present in the URL
6.2. Data Integrity
Computer System Security Measures
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Tinodiwanashe at St Ignatius College on 20/03/25.
WWW.ZNOTES.ORG authorised for personal use only by Tinodiwanashe at St Ignatius College on 20/03/25.
CAIE AS LEVEL COMPUTER SCIENCE
Data validation and data verification help protect the Errors may occur when data moved in system.
integrity of data by checking whether the data entered is Parity Check
sensible and accurate, respectively. All data transmitted as bits
Data Validation: checks if data entered is valid, but not its Number of 1s in a byte must always be either an odd
accuracy number or an even number
Data Validation Methods Parity can be set either as even or odd
Range check: data must be between a set of values E.g. two communicating devices decide there will
Format check: data must follow correct pattern/order always be an odd number of 1s. A byte is received
Length check: data must have exact no. of characters that has even number of 1s so error occurred and
Presence check: checks if some data has been receiving device would ask for it to be sent again
entered Used also when data sent between parts of the CPU
Existence check: data entered must exist Not foolproof: if 2 bits are transposed, data accepted
Limit check: checks whether a value entered is within Checksum Check
acceptable minimum and maximum values. Data sent from one place to another as block of bytes
Check digit: A digit is used as the answer to an rather than individual bytes
arithmetic operation of other digits in data. If not Computer adds together all bytes being sent
matched, then data entered incorrectly Any bits lost at most-significant end as carry ignored
Data Verification: checks data entered is accurate during so answer is an 8-bit number
data entry and data transfer Checksum calculated before and after data sent
Data Entry Verification Methods If two bytes di!erent, error occurred therefore block
Visual Check: Person manually compares original of bytes must be sent again
data with that entered to check if correct
Double Entry: Enter data into computer twice and
compares. 7. Ethics and Ownership
If di!erences found, go back to raw data to fix error
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Tinodiwanashe at St Ignatius College on 20/03/25.
WWW.ZNOTES.ORG authorised for personal use only by Tinodiwanashe at St Ignatius College on 20/03/25.
CAIE AS LEVEL COMPUTER SCIENCE
Software Licencing
Artificial Intelligence (AI): the ability of a computer to
Free Software Foundation: perform tasks in such a way that is conventionally
A license gives users freedom to run, copy, distribute, associated with human intelligence:
study, change, and improve the software. AI can learn from past mistakes
Condition: any redistributed version of software must they adapt to stop the same problem from
be distributed with original terms of free use, occurring again
modification, and distribution (aka copyleft) they learn to predict what might happen & raise
The Open Source Initiative: alert
The source code of open-source software is readily AI can learn to work more e%ciently
available to users under copyright; it does enable when an action slows the system down, it can
users to re-distribute the software. prevent this from happening again
The concept of an open-source program relies on the when an action increases the speed of the
fact that users can review source code to eliminate system, it can repeat this when necessary to
bugs in it improve e%ciency
Shareware: AI Applications
Demonstration software that is distributed for free Developing autonomous mechanical products
but for a specific evaluation period only Machine learning through data sets
Distributed on a trial basis and with an AI Impacts
understanding that sometime later, a user may be Social
interested in paying for it Replacement of manual labour with automation
Used for marketing purposes could lead to massive unemployment.
Commercial: Requires payment before it can be used, However, it could lead to increased leisure time.
but includes all program's features, with no restrictions Economic: Due to increased innovation and e%ciency
with automation provided by AI, there’d be lower
Artifical intelligence (AI)
manufacturing costs in general
Environmental: Detrimental impact on the
environment due to robot manufacture with limited
resources and its waste disposal
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Tinodiwanashe at St Ignatius College on 20/03/25.
WWW.ZNOTES.ORG authorised for personal use only by Tinodiwanashe at St Ignatius College on 20/03/25.
CAIE AS LEVEL COMPUTER SCIENCE
Tools in a DBMS:
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Tinodiwanashe at St Ignatius College on 20/03/25.
WWW.ZNOTES.ORG authorised for personal use only by Tinodiwanashe at St Ignatius College on 20/03/25.
CAIE AS LEVEL COMPUTER SCIENCE
Queries:
Creating a query:
3rd Normal Form (3NF): it is in 1NF and 2NF and all non-key SELECT <field-name>
elements are fully dependent on the primary key. No inter- FROM <table-name>
dependencies between attributes. WHERE <search-condition>
ORDER BY <field-name>
8.6. Data Definition Language (DDL)
Arrange identical data into groups:
Creation/modification of the database structure using GROUP BY <field-name>
this language
written in SQL Joining together fields of di!erent tables:
Creating a database:
INNER JOIN
CREATE DATABASE <database-name>
Data Maintenance:
Creating a table:
Adding data to table:
CREATE TABLE <table-name> (…)
INSERT INTO <table-name>(field1, field2, field3)
Changing a table: VALUES (value1, value2, value3)
Example:
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Tinodiwanashe at St Ignatius College on 20/03/25.
WWW.ZNOTES.ORG authorised for personal use only by Tinodiwanashe at St Ignatius College on 20/03/25.
CAIE AS Level
Computer Science
© ZNotes Education Ltd. & ZNotes Foundation 2024. All rights reserved.
This version was created by Tinodiwanashe on Thu Mar 20 2025 for strictly personal use only.
These notes have been created by Nethul Dulwan Gunasekara for the 2024-2025 syllabus.
The document contains images and excerpts of text from educational resources available on the internet and printed books.
If you are the owner of such media, test or visual, utilized in this document and do not accept its usage then we urge you to contact us
and we would immediately replace said media. No part of this document may be copied or re-uploaded to another website.
Under no conditions may this document be distributed under the name of false author(s) or sold for financial gain.
"ZNotes" and the ZNotes logo are trademarks of ZNotes Education Limited (registration UK00003478331).