0478 IGCSE Quick Theory Notes Only
0478 IGCSE Quick Theory Notes Only
Binary shift
Each shift left – value doubled (value multiply by 2)
o Left most value (most significant bit) may be lost; value becomes inaccurate.
Each shift right – value halved (value divide by 2)
o Right most value (least significant bit) maybe lost; value becomes inaccurate.
Binary addition
1 1 1 1 1 1 1 0
+ 1 1 1 1 1
(1) 0 0 0 1 1 1 0 1
Overflow occurs when the resulting binary number added exceeds the total bits.
8 4 2 1 8 4 2 1
4 C (12)
Example: 76 in denary is equal to 64 + 8 + 4 = 0100 1100 in binary = 4C in hexadecimal
1…1 4…4 7…7 10 … A 13 … D
2…2 5…5 8…8 11 … B 14 … E
3…3 6…6 9…9 12 … C 15 … F
Exam requirements
IGCSE requirements (from 2023)
What you should know and understand R A G
1 Understand how and why computers use binary to represent all forms of data
ASCII
American standard for information interchange
Character set that consists of 7-bit codes (can be binary or hexadecimal) to
represent letters, numbers, and characters. Example: 65 is A, 97 is a
Extended version consists of 8-bits to allow non-English characters/symbols.
Does not represent non-western characters like Chinese.
Unicode
Character set that consists of 16-bits or 32-bits in the extended version.
Can represent non-English characters like Vietnamese and Japanese
Sound
Sound waves consist of frequency, wavelength, and amplitude.
Frequency – measured in Hertz (Hz). Can be high pitch or low pitch.
Amplitude – measured in decibels (dB). Can be loud or soft (volume)
Wavelength – measured in Hertz. Lower frequency, longer wavelength.
Sampling
Amplitude is measured at regular times and converted to bits (digital values).
Sampling resolution (bit depth) is the number of bits per sample.
Sampling rate is the number of sounds taken per second.
Benefits (advantage) of higher sampling resolution:
o Larger dynamic range (more instruments can be clearly heard)
o Better sound quality
o More accurate sound (less distortion)
Drawbacks (disadvantage) of higher sampling resolution:
o Produces larger files (consumes larger storage space).
o Takes longer time to transmit (upload/download files)
o Requires greater processing power.
Images
Bitmap images are made of pixels (picture elements).
Pixels are the smallest representation of a single colour in binary or hexadecimal.
Image resolution is the number of pixels in an image.
Bit depth is the number of bits required to represent the colours in an image
Exam requirements
IGCSE requirements (from 2023)
What you should know and understand R A G
1 Understand how and why a computer represents text and the use of
character sets, including American standard code for information
interchange (ASCII) and Unicode
2 Understand how and why a computer represents sound, including
effects of the sample rate and sample resolution
3 Understand how and why a computer represents an image including the
effects of the resolution and colour depth
Exam requirements
IGCSE requirements (from 2023)
What you should know and understand R A G
1 Understand how data storage is measured
2 Calculate file size of an image file and sound file, using given information
Packet switching – each data packet is sent independently from the sender to the
receiver through many routers. Each router will decide which route the packet will need to
take to reach its destination. The shortest available path is always chosen. At the
destination, the data packet is reassembled in the correct order.
*Data packet & packet switching is a new topic introduced for 2023 syllabus.
Data transmission mode
Simplex – ONE DIRECTION (example: computer to printer)
Half duplex – BOTH DIRECTION, but not simultaneously (example: walkie-talkie)
Full duplex – BOTH DIRECTION, SIMULTANEOUSLY (example: internet
broadband)
Serial Parallel
Less risk of external interference that parallel due Faster rate of data transmission than serial
to fewer wires
More reliable transmission over long distance Works well over short distance
Transmitted bit won’t have the risk of being Since several wires are used to transmit data,
skewed (distorted or out of synch) the bits arrived can be skewed
Used if the amount of data is relatively small since Preferred method when speed is important
transmission rate is slower than parallel (example
USB uses serial transmission)
Used to send data over long distance If data is time-sensitive, parallel is most
appropriate transmission method
Less expensive than parallel due to lesser Parallel ports require more hardware, making
hardware requirements them more expensive to implement than serial
ports
2.2 Universal Serial Bus (USB)
USB is a common/standard method for data transfer between devices and a computer.
USB allows both half-duplex and full-duplex data transmission. When plugged in to a
computer,
The computer automatically detects the device.
Once recognised, the device driver software is loaded so the computer and the
device can communicate effectively.
If the device is new, the computer will find the device driver software that matches
the device. If not found, the computer will prompt the user to download the device
driver software (sometimes, this is done automatically)
Benefits Drawbacks
Device plugged into the computer are automatically detected Standard USB only supports a
and drivers automatically loaded maximum cable length of 5m;
Connections can only fit one way preventing incorrect beyond that, USB hubs are
connections being made needed to extend the cable
It has become industry standard; therefore, support is available length
Can support different transmission rates USB is backward compatible,
No need for external power source since cable can supply 5V but earlier USB versions may
power not be supported by newer
USB protocol notifies the transmitter to re-transmit data in any computers.
errors are detected; this leads to error-free data transmission
*Textbook says USB is slower
than other methods like ethernet
It is relatively easy to add more USB ports, if necessary, by but that’s comparison of older
using USB hubs models
USB is backward compatible
Symmetric encryption
An encryption key is used to encrypt and decrypt a text.
Encryption key is 256-bits long, but it still can get cracked.
Dangerous to send encryption key via internet as it can get intercepted.
Asymmetric encryption
To overcome the security issue, a public key and private key is used.
Public key can be shared with anyone for encryption ONLY.
Private key cannot be shared and is only known by the user for decryption ONLY.
John Doe shares his public key with Jane Doe. Jane Doe uses John’s public key to
encrypt the message before sending the cyphered text to John Doe. Only John Doe
can decrypt the message by using his own private key. Jane Doe and John Doe
cannot decrypt the message using the public key.
Symmetric & asymmetric encryption application – Secure Socket Layer
(Details in Chapter 5: Internet and it’s uses)
Client request identification from web server
Web server sends SSL certificate with the public key.
Client’s browser authenticates the SSL / digital certificate.
Once authenticated, a secure connection is established.
Any data sent is encrypted public key and decrypted using private key.
Exam requirements
IGCSE requirements (from 2023)
What you should know and understand R A G
Types and methods of data transmission
1 a. Understand that data is broken down into packets to be
transmitted.
b. Describe structure of a data packet.
c. Describe the process of packet switching.
2 a. Describe how data is transmitted from one device to another
using different data transmission.
b. Explain the sustainability of each method of data transmission, for
a given scenario.
Methods of error detection
1 Understand the need to check for errors after data transmission and how
these errors can occur
2 Describe the process involved in each of the following error detection
methods for detecting errors in data after transmission: parity check (odd
and even), checksum and echo check
3 Describe how a check digit is used to detect errors in data entry and
identify examples of when a check digit is used, including international
standard book numbers (ISBN) and barcodes
4 Describe how an automatic repeat query (ARQ) can be used to establish
that data is received without error.
Encryption
1 Understand the need for and purpose of encryption when transmitting
data
2 Understand how data is encrypted using symmetric and asymmetric
encryption
03 Hardware
Computer architecture
Central Processing Unit – CPU can also be called a processor, or a smaller version
called microprocessor. The CPU consists of
o Control Unit (CU) – read instruction from memory.
o Arithmetic Logic Unit (ALU) – performs mathematical or logical operations.
o Registers – components that execute data/instructions.
o Bus – pathways that moves data/instructions between CPU, memory and
input/output devices.
Buses Purpose/function
Address bus Unidirectional – carries address only between memory and CPU
Data bus Bidirectional – carries data between memory and CPU
Control bus Bidirectional – carries signals from control unit to all other computer components
Fetch-Decode-Execute cycle.
MAR ← [PC] Address in the Program Counter (PC) is loaded into the Memory Address
Register (MAR)
MDR ← [[MAR]] Instructions from the memory location contained in the MAR is placed in the
Memory Data Register (MDR)
CIR ← [MDR] Instructions is copied from the MDR to the Current Instruction Register (CIR)
PC ← [PC +1] Program counter is incremented to fetch the next instruction set.
Instruction set.
Opcode – informs the CPU what operations needs to be done.
Operand – data which needs to be acted on or it can refer to a register in the
memory.
Embedded system
Microcontrollers – CPU with additional RAM and ROM and other peripherals
(input/output devices) embedded into a single chip.
Microprocessor – Integrated circuit with the CPU only. No RAM, ROM, or other
peripherals on the chip.
Example of embedded systems: modern cars (in-car entertainment system), security
system, automatic lighting system, and washing machines.
Input devices
Input devices – hardware/peripherals on a computer that when clicked/press/moved by the
user, signal/data is sent into the computer. For details on how each input devices work,
please refer to page 88 on the Hodder textbook.
Input devices include:
Barcode scanner
Digital camera
Keyboard
Microphone
Optical mouse
QR code scanner
Touch screen (resistive, capacitive, and infra-red)
2D and 3D scanners
Output devices
Output devices – hardware/peripherals that receives data from a computer and response
accordingly to the given data. For details on how each output devices work, please refer to
page 101 on the Hodder textbook.
Output devices include:
Actuator
Digital light processing (DLP) projector
Liquid crystal display (LCD) projector
Ink jet printer
Laser printer
Light emitting diode (LED) screen
Liquid crystal display (LCD) screen
Speaker / headphones
3D printer
Sensors
Sensors are input devices that read/measure physical properties from their environment.
Data from the sensors are analogue signals. An analogue to digital converter ADC is used
to convert analogue signals to digital signals. The microprocessor then compares the
sensor’s readings with the stored values and respond accordingly. For details on how each
sensor work, please refer to page 111 on the Hodder textbook.
Sensor Purpose is to measure… Example application
Acoustic Measure sound Detect noise in a security system
Accelerometer motion When phone change from portrait to landscape
Flow rate moving liquid or gas Respiratory devices in hospital
Gas oxygen or CO2 Greenhouse / factory
Humidity water vapour Greenhouse / factory / hospital
Infra-red IR beam is broken Security system if burglar breaks the IR beam
Level Liquid level Monitor amount of petrol in a petrol tank
Light brightness Street / car / room
Magnetic field magnetic field Anti-lock braking system in cars
Moisture water level Greenhouse
pH Acidity/alkalinity Greenhouse
Pressure Weight Gas pressure or weight of an object
Proximity distance Car reverse sensor
Temperature temperature Air conditioning
Storage devices
Primary storage devices
Primary storage devices can be accessed directly by the CPU.
Random Access Memory (RAM)
o Can read and write data into this storage device.
o A temporary memory device
o Use to store data that is currently in use.
o It is volatile – meaning data is lost when computer is turned off.
Read Only Memory (ROM)
o Can read ONLY from this storage device.
o A permanent memory device.
o Use to store BIOS and other startup programs.
o It is non-volatile – meaning data is not lost when computer is turned off.
Virtual memory
RAM is a physical memory.
Virtual memory is created on the secondary storage device (HDD or SSD) to give
the illusion that the RAM has a larger storage capacity.
The operating system creates pages on the HDD/SSD and copy lower priority
programs into the RAM. This frees up the RAM to run higher priority programs
efficiently.
Disadvantage of VM in HDD (only). When read write happens too many times, the
HDD can get damaged easily. This is known as disk thrashing. To overcome this
problem, add more RAM or use SSD instead.
Cloud storage
Cloud storage is data stored in remote servers. Often used to backup data.
Public cloud storage – client and provider are different companies.
Private cloud storage – client and provider integrated and operate as a single entity
Hybrid cloud storage – a mix of both public and private cloud. Often non-sensitive
data stored in public cloud and sensitive data stored in private cloud
Advantages Disadvantages
Data can be accessed anywhere, anytime with Unstable or slow internet access makes it
internet access difficult for users to access the data
Users do not need to carry external drives or Cloud storage requires subscription / payment
use the same machine to access the data which can be costly.
Cloud storage provides backup to allow users to Upload/download large data can be limited by
recover the data the internet service provider (ISP)
Cloud storage has unlimited storage capacity Security is controlled by the cloud provider
which users have no control over
Network hardware
Network interface card (NIC) allows the device to connect to the network (internet)
The NIC contains the MAC (Media Access Control) address provided by the
manufacturer.
o Consist of 48-bits in hexadecimal
o First half is the manufacturer code.
o Second half is the device identification.
o MAC address is unique to help identify the device on the network.
o MAC address cannot be changed.
o Used by router/switch to send data packet to the correct device.
Internet Protocol (IP) address
o Address provided by the router or internet service provider (ISP) when the
user is connected to the network.
o There are two versions of IP address IPv4 and IPv6
o IPv4 is 32-bit denary value. Older version.
o IPv6 is 128-bit hexadecimal value. Newer version.
o IP addresses can be static (fixed) or dynamic (change each time you
connect)
Dynamic has greater privacy because IP address can change.
Dynamic is less reliable in voice over internet protocol (VoIP), when a
disconnection occurs, the new IP is not recognised.
Static IP address to allow the device to be fully traceable.
Static IP address allows faster upload and download speeds.
Static IP address is more expensive than dynamic IP address to
maintain.
o Used by routers when routing packets across the internet.
Router
o Enable data packets to be routed between different networks.
Exam requirements
IGCSE requirements (from 2023)
What you should know and understand R A G
Computer architecture
1 d. Understand the role of the central processing unit (CPU) in a
computer.
e. Understand what is meant by a microprocessor.
2 a. Understand the purpose of the components in a CPU, in a
computer that has a Von Neumann architecture.
b. Describe the process of the fetch-decode-execute cycle including
the role of each component in the process
3 Understand what is meant by core, cache and clock in a CPU and
explain how they can affect the performance of a CPU
4 Understand the purpose and use of an instruction set for a CPU
System software
System software is a set of programs to control and manage the computer’s
hardware.
System software provides a platform where other software can run.
System software is required to allow hardware and software programs for smooth
execution.
System software can provide human computer interface (to make it user friendly)
System software controls the allocation and usage of hardware resources.
Example: Operating system, utility programs and device drivers.
Utility programs
Software that carries out specific tasks on a computer. Example includes.
o Anti-virus software
Checks files or software for viruses
Uses heuristic checking (using trial and error) to identify potential
virus.
Potential viruses are quarantined and/or deleted by the anti-virus.
o Disk analysis and repair (scan for fault and fix it)
o File management and compression
o Security
Manage access control and user’s accounts.
Links to other utility software like virus checkers or spyware checkers
Protects network interface by using firewalls.
Uses encryption and decryption to ensure data is meaningless without
decryption key.
o Screensavers
Screensavers are loaded when the computer is idling (not in use).
Screensavers can be used as extra security by automatically logging
the user out of the computer when the screen saver is loaded.
o Defragmentation software
Only applicable to hard disk drives (HDD)
To sort and store files in contiguous (next to each other) sectors.
o Backup software
Device drivers
Device drivers are software that communicates with the operating system and
translates data into a format understood by the hardware.
Without device drivers, a message such as “device not recognized" would appear
on the screen.
Example when you plug in a device (like memory stick or printer cable) into a USB
port for the first time.
Operating system
Function Description/purpose
Managing Files follow a naming convention, so the correct application software reads the
files correct files.
To ensure access-controlled mechanism is maintained (example: access rights and
password protected data)
Handling Stopping a task that is running and allowing a higher priority task to be executed
interrupts
Providing To provide a user-friendly Graphical User Interface (GUI) for the new users to use
an interface easily. However, the user is restricted to limited icons provided on the screen and
GUI needs an operating system, therefore uses more memory.
To provide Command Line Interface (CLI) for advance users who know how to
code instructions and communicate directly with the computer. However, it is not
user friendly like GUI as users have to know the correct code instructions (spelling
and format is important).
Managing Manage input and output devices.
peripherals To ensure each hardware resource has a priority so they can be used efficiently.
and drivers
Managing Manage RAM and SSD/HDD during execution of the program. This is to ensure no
memory data is lost or placed in the wrong location
Multitasking To carry out more than one task at the same time
Each task will share the hardware resources allocated by the operating system
Providing a Firmware (BIOS) is a program that provides low level control of devices.
platform to An interface between the firmware and operating system (OS) to allow the OS to
run communicate or control the hardware.
applications The application software communicates with the OS to gain access/control of the
hardware.
Providing Carry out updates to ensure operating system and software is up to date.
system Maintaining access rights to all users
security Recover and restore data that could be lost or corrupted
Managing Computers can allow more than one user. Therefore, it is important for the user’s
user data is kept secured and separated. The operating system can provide customized
accounts settings and security level for each user, which will be managed by an administrator.
Application software
Application software is used to perform tasks on a computer.
Application software allows the user to perform tasks using the computer’s
resources.
Application software may be a single program or a collection/suite of programs.
The user can execute the software as and when they need it.
Example of application software: Spreadsheet, database, internet browser and
games.
Software Interrupts
Signal sent from device or other software to the microprocessor.
Signals received by the microprocessor needs to be identified the level of interrupt
priority (how important is this interrupt compared to the current job)
Examples of interrupts:
o Timing signals (in the fetch execute cycle)
o User interaction (for example: user’s keyboard/mouse is clicked/pressed)
o Hardware fault (for example: paper jam in the printer, buffer requires more
data, printer runs out of ink or paper)
o Software error (for example: attempt to divide by zero; two processes trying
to access the same memory location)
From fetch decode execute cycle (F/E cycle) …
o Current task is stopped and stored/transferred to storage (RAM or
HDD/SSD)
o Interrupt Service Routine (ISR) is loaded to the Program Counter (PC) for
execution.
o When interrupted task is completed, new interrupts are checked before
reloading task from storage for execution.
Programming languages
High level language
Easy for human to read, understand and code because it is closer to English.
High level language is debugged at the development stage.
It can be easily maintained once in use.
Example high level language: C++, Python, and Java.
Translators
Software/Program must be translated to a format that machines can process.
Compiler
o translates high-level language to machine codes.
o High-level language programs are compiled before reading/translating.
o Compiler produces an error report at the end of translating.
o Compiler creates an executable file (.exe) at the end of translating.
o Compiler is used before final testing or before distributing (users do not need
to see the source code of the final program)
Complied program can be executed without a compiler.
Complied program takes up less memory space when executed.
Compiled program can be stored and ready to use.
Interpreter
o Translates high-level language to machine codes.
o High-level language programs are read/translated one line at a time.
o Interpreter stops when an error is identified.
o Interpreter is used during development or during testing.
Easier and quicker for developers to test program during
development.
Easier to edit program codes without the need to re-compile.
However, takes longer time to execute.
Assembler
o Translates low level language to machine codes.
o Creates an executable file therefore, assembled codes do not need
assembler again.
Exam requirements
IGCSE requirements (from 2023)
What you should know and understand R A G
Types of software and interrupts
1 Describe the difference between system software and application
software and provide examples of each
2 Describe the role and basic functions of an operating system
Cookies
Cookie is a file that stores data as a text file.
A cookie is sent from the web server to the user’s computer when the user visits the
website.
The cookie is stored in the user’s computer.
The cookie is read by the user’s browser.
When the user visits the same website again, the browser will send the cookie back
to the web server.
Uses of cookies
To store personal information / data
To store login details (encrypted format)
To save items in an online shopping basket
To save internet surfing habits
To carry out targeted advertising
To store payment details
To customise a website
Store process in online games / quizzes
Types of cookies
Session cookies
o Temporary cookies that are created and replaced every time a user visits the
website (or when the browser is closed)
o Session cookie is temporarily stored in RAM.
o Doesn’t collect any information on the user.
o Example: shopping basket on e-commerce websites
Persistent (permanent) cookie
o Created and saved on the first visit to the website.
o Persistent cookie is stored in computer’s secondary storage.
o Cookie is retained until they expire or when the user deletes them.
o Example: remember the user’s login details so the user doesn’t have the log
in every time they visit the website.
Digital currency
What is digital currency?
Digital currency is money that only exist electronically – there is no physical notes or coins
that you can hold and carry around like fiat currency (like $, ₫, £, ¥).
Digital currency relies on a central banking system for all monetary transaction.
Maintaining security and confidentiality is a big problem for central banking systems.
Cryptocurrency
Blockchain
There is no central database/server to store block chain.
Each computer on the network has a copy of the data.
To update or change the blockchain, ALL the members on the network must agree.
Purpose is to
Sensor Example application
measure…
pH Acidity/alkalinity Greenhouse
3 Understand the roles that robots can perform and describe the
advantages and disadvantages of their use
Artificial intelligence
1 Understand what is meant by artificial intelligence (AI)
Exam requirements
IGCSE requirements (from 2023)
What you should know and understand R A G
1 Define a single-table database from given data storage requirements
Note:
IGCSE: Logic notation is compulsory. Boolean algebra is optional.
AS and A-Level: Both logic notation and Boolean algebra is compulsory.
Exam requirements
IGCSE requirements (from 2023) Paper 2
What you should know and understand R A G
1 Identify and use the standard symbols for logic gates
Exam Pro-tip:
Solve the equation inside most the brackets first before moving outwards.
Example: X = ((A AND B) AND C) OR (B XOR C)
1 2 3
1. Draw the logic circuit for A AND B.
2. Merge 1 with C using AND gate.
3. Draw the logic circuit for B XOR C.
4. Merge the output of 2 and 3 using OR gate.