IGCSE & O Level Computer Science Revision

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

Which characteristic describes packet switching over circuit switching?

  • Ties up a single communication line for the duration of the transmission.
  • Each data packet can take a different independent route. (correct)
  • Guarantees the packets will arrive in the correct sequential order.
  • Works well with real-time streaming applications.

When converting the denary number 157 to binary, what is the correct set of remainders obtained during the successive division by 2?

  • 10111011
  • 10011101 (correct)
  • 11101101
  • 11000111

In cyclic redundancy check (CRC), what does the trailer added to a data packet contain?

  • The IP address of the receiving station.
  • The size of the packet.
  • The sequence number used to reassemble packets.
  • A hexadecimal value derived from adding 1-bits. (correct)

Which of the following is a use of hexadecimal?

<p>Representing IPv4 addresses. (B)</p> Signup and view all the answers

With an 8-bit register, what is the result of the binary addition of 10000001 and 01111111?

<p>00000000 with indication of overflow error. (A)</p> Signup and view all the answers

How many bits is a pixel represented by a color depth of eight possible values?

<p>3 bits (C)</p> Signup and view all the answers

Which of the following is a lossless compression?

<p>RLE (B)</p> Signup and view all the answers

Which is a primary advantage of Lossy file compression?

<p>Data from the original uncompressed file cannot be precisely reconstructed. (D)</p> Signup and view all the answers

What is a key component comprising the structure of a data packet?

<p>The payload (A)</p> Signup and view all the answers

When is it best to use serial data transmission?

<p>When external interference is a critical factor. (B)</p> Signup and view all the answers

What best describes a USB?

<p>Serial data transmission standard. (C)</p> Signup and view all the answers

Given what you know about error checking, identify the error-detection method that involves the data being sent back to the sending computer for comparison:?

<p>Echo Check (C)</p> Signup and view all the answers

In terms of data communication, which situation is likely to lead to skewing?

<p>Parallel data transmission over long distances. (B)</p> Signup and view all the answers

To keep key data transfer secret on the internet, in which way can asymmetric encryption be used safely?

<p>The sender encrypts data using the recipient's public key, and the recipient decrypts using their own private key. (A)</p> Signup and view all the answers

Within computer architecture as it refers to the CPU, what does ALU most directly and primarily allow?

<p>Performs arithmetic and logic operations. (C)</p> Signup and view all the answers

Regarding main memory with a stored program computer using Von Neumann architecture, what key action is the processor most able to perform?

<p>Access memory directly. (A)</p> Signup and view all the answers

Flashcards

What is the binary number system?

The binary number system is based on the number 2 and only uses 0 and 1.

What is the denary system?

The denary system is a base 10 number system with column headings.

How to convert from denary to binary?

It is necessary to carry out successive divisions by 2 until a zero value results.

What is the hexadecimal system?

The hexadecimal number system is based on the number 16, using digits 0-9 and letters A-F.

Signup and view all the flashcards

Why is the hexadecimal system used?

The hexadecimal number system is often used by computer programmers and designers because it is easier to deal with.

Signup and view all the flashcards

What are Error codes?

It refers to memory locations where the error occurs automatically generated by the computer.

Signup and view all the flashcards

What are HTML colour codes?

It refers to the amount of each color is represented by a hex code. For example #FF0000 is pure red

Signup and view all the flashcards

What is Overflow?

It occurs if the result of a calculation is too large for the allocated word size

Signup and view all the flashcards

What are Logical binary shifts?

Logical shifts involve shifting (moving) bits to the left (multiplying by 2 for each shift) or the right (dividing by 2 for each shift). If shifting to the left or right results in a loss of 1-bits, then this would result in an error.

Signup and view all the flashcards

What is Two's complement?

To allow for the possibility of representing negative integers we make use of two's complement notation.

Signup and view all the flashcards

How is text represented in computers?

All keyboard characters (including control codes) are represented in a computer using 7-bit American Standard Code for Information Interchange (ASCII code) or 8-bit Extended ASCII code character set

Signup and view all the flashcards

What is a drawback of the ASCII code system?

Its main drawback is it can't be used to represent non-Western languages, such as Chinese or Japanese characters.

Signup and view all the flashcards

What is Unicode used for?

It can support up to 4 bytes per character (that is, up to 32 bits per character).

Signup and view all the flashcards

What are data packets used for?

Data is broken up into packets before it is transmitted.

Signup and view all the flashcards

What is a packet header?

It contains the IP address of the sending station, the sequence number of the packet, and ensures the receiving station knows that the whole packet has been received.

Signup and view all the flashcards

What is packet payload?

The actual data.

Signup and view all the flashcards

What is packet trailer?

Containing cyclic redundancy check (CRC) (error check) and a way of identifying the end of the data packet.

Signup and view all the flashcards

What is Packet switching?

Routers (known as nodes) are used to control the path a data packet takes from sending station to receiving station.

Signup and view all the flashcards

What is Simplex data transmission?

Data can be sent in one direction only (for example, sending data to a printer).

Signup and view all the flashcards

What is Half-duplex data transmission?

Data can be sent in both directions, but not at the same time (for example, using a walkie-talkie to send and receive messages).

Signup and view all the flashcards

What is Full-duplex transmission?

Data can be sent in both directions at the same time (for example, when using a broadband internet connection).

Signup and view all the flashcards

What is Serial data transmission?

Data is sent one bit at a time down a single wire/channel (for example, using a USB connection).

Signup and view all the flashcards

What is Parallel data transmission?

Several bits of data are sent down several wires/channels at the same time each wire/channel transmits each bit (for example, transmitting data using the internal circuits of a computer).

Signup and view all the flashcards

How does Checksum work?

The checksum is calculated by the sending computer, from the block of data using an agreed algorithm.

Signup and view all the flashcards

What is echo check?

It requires data to be sent back to the sending computer where it is compared with the data originally sent.

Signup and view all the flashcards

What does Automatic Repeat Request (ARQ) do?

An Automatic Repeat Request (ARQ) is a way to check data following data transmission. It is often used by mobile phone networks to guarantee data integrity.

Signup and view all the flashcards

What is Symmetric encryption?

It uses a single encryption key to encrypt data and to decrypt data.

Signup and view all the flashcards

What is Asymmetric encryption?

It uses two keys: a public key (known to everyone) and a private key (known to one user only).

Signup and view all the flashcards

What does the Central Processing Unit (CPU) do?

The central processing unit (CPU) has the responsibility for execution and processing of all instructions and data in a computer.

Signup and view all the flashcards

What is Von Neumann architecture?

It introduced the idea of the stored program computer, which has been the basis of many computers for a number of years.

Signup and view all the flashcards

What does the arithmetic logic unit (ALU) do?

It allows all arithmetic (such as +, -) and logic (such as AND, OR) operations to be carried out.

Signup and view all the flashcards

What does the register do?

High speed areas of memory within a microprocessor/CPU - used to store small amounts of data, address of next instruction to be executed or current instruction being decoded.

Signup and view all the flashcards

What is a System Clock?

It is used to produce timing signals on the control bus to ensure all functions are synchronized.

Signup and view all the flashcards

What does Buses do?

Buses transfer data and control signals throughout a computer.

Signup and view all the flashcards

What does RAM do?

The random access memory (RAM) holds data, programs and the part of the operating system currently in use.

Signup and view all the flashcards

What does ROM do?

The read-only memory (ROM) which cannot be altered; ROM contains start-up routines for the computer.

Signup and view all the flashcards

What is the fetch execute cycle?

The CPU first fetches data and instructions from memory and stores them in the appropriate registers. Each instruction needs to be decoded and finally executed.

Signup and view all the flashcards

Purpose of the Clock Cycle?

The system clock defines the clock cycle used to synchronise all computer operations.

Signup and view all the flashcards

What is instruction set?

It is a type of programming to make up an operation. Each operation is made up of an opcode and an operand.

Signup and view all the flashcards

What is Embedded systems?

It is a combination of hardware and software designed to carry out a specific task.

Signup and view all the flashcards

Study Notes

Cambridge IGCSE and O Level Computer Science Study and Revision Guide Second Edition

  • This book helps revise for Computer Science examinations and is designed to accompany the Cambridge IGCSE and O Level Computer Science Second Edition Student's Book.
  • Covers all key content and includes sample questions, answers, and exam-style practice questions, aligned with the new Computer Science syllabus first examined in June 2023.
  • Practice papers are available online with an online glossary for key terms.

How To Use This Book

  • The book provides study tips such as understanding questions, improving knowledge, making sure the answer makes sense.
  • Be able to calculate binary arithmetic, read carefully, and ensure understanding, know allocation.
  • Help yourself by getting enough sleep, staying calm, reading whole paper, use clear English and good handwriting, attempt all questions.

Command Words

  • Some keywords need a definition for answering questions:
    • Calculate: Work out from given facts, figures or information.
    • Compare: Identify/comment on similarities and/or differences.
    • Define: Give precise meaning.
    • Demonstrate: Show how or give an example.
    • Describe: State the points of a topic/give characteristics and main features.
    • Evaluate: Judge or calculate the quality, importance, amount or value of something.
    • Explain: Set out purposes or reasons; make the relationships between things evident; provide why and/or how and support with relevant evidence.
    • Give: Produce an answer from a given source or from memory.
    • Identify: Name/select/recognise.
    • Outline: Set out the main points.
    • Show: Provide structured evidence that leads to a given result.
    • State: Express in clear terms.
    • Suggest: Apply knowledge and understanding to situations where there are a range of valid responses in order to make proposals/put forward considerations.

Assessment

  • Information is from the Cambridge IGCSE and O Level Computer Science syllabuses for examination from 2023 (0478/0984/2210).
  • There are two examination papers: Paper 1 Computer systems and Paper 2 Algorithms, programming and logic.
  • Both papers are 1 hour 45 minutes and 75 marks
  • Both account for 50% of overall marks and include Syllabus topics examined.

Data Representation

  • This chapter reviews Number systems, the binary, denary and hexadecimal number:
    • Conversion of numbers between all three number systems
    • Use of the hexadecimal (hex) number system
    • Binary addition and Overflow error
    • Logical shifts, Two's complement format for negative and positive binary numbers
    • text, sound and images, ASCII and Unicode character sets
    • Representation of sound in a computer
    • Sampling rate and sample resolution
    • Image representation, including resolution and colour depth
    • Data storage and file compression
    • Calculation of file sizes, The need for data (file) compression
    • Lossy and lossless compression

Binary Represents Data

  • The basic building block in all computers is the binary number system, using 1s and 0s, corresponding to ON and OFF states in the computer system.

Conversion of Number Systems

  • The Binary System is based on the number 2, the denary system is a base 10 number system, and hexadecimal number system is based on the number 16.
  • To convert from binary to denary, add together all the heading values where a 1-value appears.
  • To convert from positive denary to binary, carry out successive divisions by 2 until a zero value results, reading remainders from bottom to top.
  • To covert to Hexadecimal number: Split the binary number into 4-bit groups starting from the right-hand side
  • To convert a hexadecimal number to denary, it is necessary to multiply each hexadecimal digit by its heading value and then add them together.

Addition of Binary Numbers

  • Binary addition involves a carry and a sum for each of the 2 or 3 bits being added.

Overflow

  • Overflow occurs if the result of a calculation is too large for the allocated word size.

Logical Shifts

  • Logical shifts involve shifting bits to the left (multiplying by 2 for each shift) or the right (dividing by 2 for each shift).
  • When shifting a binary number, any gaps created by the shift operation can be filled by zeros.

Two's Complement

  • Two's complement notation allows the possibility of representing negative integers with 1-bits in the appropriate position.

Text, Sound and Images

  • All keyboard characters are represented using 7-bit ASCII code or 8-bit Extended ASCII code character set.
  • Sound is analogue data. To store sound in a computer, it is necessary to convert the analogue data into a digital format by sampling at regular time intervals.
  • Bitmap images are made up of pixels (picture elements); each pixel can be represented as a binary number

Text, Sound and Images: Data Storage and File Compression

  • Each data type must me measured and saved into memory which has various level of measurement: kibibyte, mebibyte, gibibyte, tebibyte, pebibyte, exbibyte.
  • Image file size uses: Image resolution (number of pixels) x colour depth (in bits)
  • Sound file size uses: Sample rate (in Hz) x sample resolution (bits) x length of sample (secs)

Data Compression

  • Files are often compressed to save storage used, reduce streaming and downloading/uploading times, reduce the bandwidth requirements and reduce costs.
  • Two common types of (file) compression are lossy and lossless.
    • Lossy: File compression algorithms eliminate unnecessary data, but the original file cannot be reconstructed once it has been compressed. Files are smaller than those produced by lossless algorithms, and examples include MPEG and JPEG.
    • Lossless: Data from the original uncompressed file can be reconstructed following compression; no data is lost, and the most common example is RLE (Run Length Encoding).

Data Transmission

  • This chapter reviews methods of data transmission - data packets and structure and error detection, and serial, parallel, simplex, half-duplex and full-duplex and also USB.

Methods of Data Transmission

  • The modes of data transmission are:
    • Simplex: Data can be sent in one direction only.
    • Half-duplex: Data can be sent in both directions, but not at the same time.
    • Full-duplex: Data can be sent in both directions at the same time.
  • Serial data transmission sends data one bit at a time down a single wire/channel.
  • Parallel data transmission sends several bits of data down several wires/channels at the same time.
  • The universal serial bus (USB) is a form of serial data transmission.

Data Packets and Switching

  • Data is broken up into packets before it is transmitted: packet header, payload, packet trailer
  • Routers controp a data packet's path from sending station to receiving location.
  • Packet switching sends manageable chunks along an efficient route with no need to tie up a single communication line.
  • It is possible to overcome failed, busy or faulty lines by simply re-routing packets; it is relatively easy to expand package usage.
  • Packets can be lost and need to be re-sent in real-time streaming which causes delay at the destination whilst the packets are being re-ordered.

Methods of Error Detection

  • Electrical interference can corrupt data.
  • Packet switching can lead to data being lost or out of synchronisation.
  • Skewing of data – bits arrive at their destination no longer synchronised.
  • Parity checks, Checksum, and Echo checks

Error Detection

  • A parity check is a method used to check whether data has been changed or corrupted following data transmission. Parity can be even or odd.
  • A checksum is calculated by the sending computer, from the block of data, using an agreed algorithm.
  • An echo check requires data to be sent back to the sending computer where it is compared with the data originally sent.
  • Check digits are used to identify any errors following data entry by calculating with some methods, and is added to the end of the number.
  • Automatic Repeat Request (ARQ) uses positive and negative acknowledgements and timeout.
  • Positive and negative acknowledgements and timeout

Symmetric and Asymmetric Encryption

  • Uses Encryption and encryption
  • Symmetric encryption uses a single encryption key, which has a Public key (known to everyone) and a private key (known to one user only).
  • Asymmetric encryption needs both types of key are needed to encrypt and decrypt messages.

Harware

  • This chapter reviews:
    • Computer architecture
    • Input and output devices
    • Data storage
    • Network hardware

Computer Architecture

  • The central processing unit (CPU) has the responsibility for execution and processing of all instructions and data in a computer and consists of: control unit (CU), arithmetic and logic unit (ALU), and registers and buses.

Von Neumann Architecture

  • Introduced the idea of the stored program computer, which:
    • Has a concept of a central processing unit (CPU or processor)
    • Able to access the memory directly, and memories could programs as well as data
    • Stored programs were made up of instructions which could be executed in sequential order.

Typical CPU components

  • Arithmetic and Logic Unit (ALU): The ALU allows all arithmetic and logic operations to be carried out.
  • Control Unit: The control unit synchronises data flow and program instructions throughout the computer.
  • Registers: High speed areas of memory within a microprocessor/CPU - used to store small amounts of data and address of next instruction to be executed.
  • System Clock: The system clock is used to produce timing signals on the control bus to ensure all functions are synchronised.
  • System Buses: Buses transfer data and control signals throughout a computer.
  • Memory: The random access memory (RAM) holds data, programs and the part of the operating system currently in use.

Fetch-Decode-Execute Cycle

  • Steps to carry out a set of instructions within the CPU and: fetches data and instructions from memory, stores them in registers, decodes and executes.

Cores, Cache, Internal Clock, Instruction Set

  • The system clock defines the clock cycle used to synchronise all computer operations for an amount of processes per second with correct data bus and address bus widths.
  • caches store frequently used instructions and data, allowing quad-core processors to execute instructions.
  • Instructions are a set of operations that need to be decoded in sequence of one opcode and one oprand with Fetch-Decode-Execute cycle controls.

Embedded Systems

  • A combination of hardware and software designed to carry out a specific task, which can be programmable or non-programmable.
  • Hardware can be electronic, electrical or electro-mechanical. Embedded systems can be based on a microcontroller, microprocessor or system on a chip (SoC).

Uses of Embedded Systems

  • Security systems
  • Set-top box
  • Lighting applications
  • Vending machines
  • Washing machines
  • Motor vehicles

Input and Output Devices

  • Input devices read data from the outside into memory
  • Output devices writes memory to the outside

Main Input Devices

  • barcode reader
  • QR code reader
  • digital camera
  • keyboard
  • mouse
  • 2 and 3D scanner
  • Touch screen

Output Devices and Actuators

  • Actuator: a starter or stopper of a process to do with a system
  • Light projectors: cast data into space for information or data reasons.
  • LCD and LED screens cast an image for consumption and viewing
  • Speakers: use DAC to produce sound
  • Common Sensors: temperature, moisture, humidity, light, infrared (active), infrared (passive), pressure, acoustic/sound, gas, and pH.

Data Storage

  • Data storage in a computer is based with memory, which is split into to Main and Secondary:

Main memory:

  • Random access memory which controls data (RAM) for performance data, and read-only memory (ROM) containing static data.
  • Computers need both RAM and ROM. RAM is the working area of the computer where data currently being used is temporarily stored. ROM contains data that can't be changed and needs to be stored permanently.
  • RAM which can be two types: dynamic RAM (DRAM) or static RAM (SRAM).

Secondary and Offline Storage:

  • Includes non volatile devices and applications/files (music, and files)

Storage types

  • Magnetic, optical and solid-state storage:
    • Magnetic is with HDD and can be removed. With sectors, tracks, heads which has latency and suffers Fragmentation as it reaches capacity. Solid-state by contrast has no moving part, operates in NAND matrix with limited of write cycles and a controller chips with NAND. All from memory sticks, flash memory and SSD. Opticals have lasers (blue, red) read/write. CD, DVD and Blu Ray and double sides to increase more memory. Virtual is a cloud storage that has ram+swap from hdd, with paging but has thrashing of SSD and HDD for memory processes. Has benefit to reduce costs to install hardrives
  • Memory. Cloud is online storage and servers

Network Hardware

  • Network interface cards, Media Access Control addresses, and Internet Protocol addresses all needed to ensure safe data and internet usage

Network Interface Cards

  • A network interface card (NIC) is needed to allow a device to connect to a network.
  • The NIC contains the Media Access Control (MAC) address, generated at the manufacturing stage
  • Wireless NICS (WNICs) can also be used; these plug into the USB port or can be part of an internal integrated circuit

Media Access Control

  • Identify a device connected to a network and Made up of 48 bits written in groups of six hex digits and addresses can be Universally Administered or Locally Administered.

Internet Protocol

  • Protocol (IP) addresses are to assign the device an Internet Protocol (IP), uniquely based in the DHCP server, with a static or dynamic configuration.

Routers

  • Enable data packets to be routed between different networks and convert data to a network (A and B) to connect.

4. Software

  • Software has
  • Types of programs and interrupts
  • Language
  • Translators

Types and Interrupts

  • Software comes as System software and with Applications.

System Software

  • System software has
    • Operating
  • Drivers
  • Utilities Whereas application is for daily usages. All need kernel for boot-up so hardwares runs well.

Operating System

  • Hardware operation
  • Input/Output operation
  • Users to read and write data with memory

Types of Language and Compilation/Interpreter

  • Complication gives executable files
  • Easier distribution
  • Interpration has to check code to run. But easy edit and debug
  • Low-Level Language
  • HLL gives high understanding, readability, and easier usage
  • Assembly, and Machine

Interrupt

  • Signal
  • Process
  • Priority and Buffer

Cyber Security

  • Cyber security threat, that prevent computer and data from bad entities.

Security Risks

  • Brute Force Attack
  • tapping
  • cyberattack

Security Prevention

  • Firewall: data check, data protection, data direction
  • anti virus software for scan and kill.
  • Password
    • Authentication: Something we know, some we have, or some we can identify.
  • Encryptions

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Use Quizgecko on...
Browser
Browser