Download as pdf or txt
Download as pdf or txt
You are on page 1of 20

ZNOTES.

ORG

UPDATED TO 2021-23 SYLLABUS

CAIE AS LEVEL
COMPUTER
SCIENCE (9618)
SUMMARIZED NOTES ON THE THEORY SYLLABUS
CAIE AS LEVEL COMPUTER SCIENCE (9618)

Convert binary number to two’s complement (add 1)


|1010101 + 1 = 11010110
1. Information Representation Converting binary two’s complement into denary (ex.
11010110)
Flip all the bits | 00101001
1.1. Data Representation
Add 1 | 00101010
The basis of any number system consists of: Convert binary to denary and put a –ve sign) | -42
A base: the number of digits that a number system Maximum positive number in 8 bits: 256
can use to represent numbers Maximum negative number in 8 bits: -128
Place value for each digit: digits in certain positions Hexadecimal Systems - Base 16
have a specific value Possible digits: 0 to 9 and A to F, where A to F
Denary - Base 10 integer digits represent denary digits 10 to 15
Binary Systems - Base 2 Practical applications:
Possible bits (binary digits): 0 and 1 Defining colours in HTML
All data and characters are represented in binary Defining Media Access Control (MAC) addresses
Assembly languages and machine code
128 64 32 16 8 4 2 1 Debugging via memory dumps
0 0 0 0 0 0 0 0 E.g. A5 in Denary = (16×10) + (1×5) = 165
E.g. 65 in Hexadecimal = 65÷16=4 Remainder 1∴ = 41
Character Sets
E.g. 65 in binary is 0100001
A character set generally includes upper & lower case
Denary vs. Binary prefixes:
letters, number digits, punctuation marks and other
DenaryPrefix factor value BinaryPrefix factor value characters.
Character sets use different binary representations
kilo- (k) ×10^3 kibi- (Ki) ×2^10
for each character via character encoding
mega- (M) ×10^6 mebi- (Mi) ×2^20 Character Encoding Standards:
giga- (G) ×10^9 gebi- (Gi) ×2^30
tera- (T) ×10^12 tebi- (Ti) ×2^40 ASCII Extended ASCII Unicode
ASCII’s extension - Superset for ASCII
Binary Coded Decimal (BCD) Only English Also includes most & extended ASCII -
Binary representation where each positive denary alphabets can be European recognized by
digit is represented by a sequence of 4 bits (nibble) represented languages’ various global
Only certain digits are converted to BCD, because alphabets languages
particular digits represent a digit greater than 9. Each character ASCII extended to 8 Greater range of
Ex. 429 in BCD: encoding takes up bits, hence 256 characters, as it
Convert each digit to their binary equivalents 7 bits, hence 128 possible uses 2 or 4 bytes
4 = 0100 | 2 = 0010 |9 = 1001 possible characters characters. per character.

Concatenate the 3 nibbles (4-bit group) to produce BCD: 0100 2 or 4 times more
Smaller storage
0010 1001 storage space per
space.
character.
Practical applications
A string of digits on any electronic device displaying
numbers (eg. Calculators)
1.2. Multimedia
Accurately measuring decimal fractions
Bitmap Images
Electronically coding denary numbers
Data for a bitmapped image is encoded by assigning a
Two’s Complement
solid colour to each pixel, i.e., through bit patterns.
We can represent a negative number in binary by
Bit patterns are generated by considering each row of
making the most significant bit (MSB) a sign bit, which
the grid as a series of binary colour codes which
indicates whether the number is positive or negative.
correspond to each pixel’s colour.
Converting negative denary into binary (ex. -42)
These bit patterns are ‘mapped’ onto main memory
Find the binary equivalent of the denary number
Pixels: smallest picture element whose colour can be
(ignoring the -ve sign) | 42 = 101010
accurately represented by binary
Add extra 0 bits before the MSB, to format binary number
Bitmap image also contains the File Header which
to 8 bits | 00101010
has the metadata contents of the bitmap file,
Convert binary number to one’s complement (flip the
including image size, number of colours, etc.
bits) | 11010101
Image Resolution

WWW.ZNOTES.ORG
CAIE AS LEVEL COMPUTER SCIENCE (9618)

Pixel density which is measured by no. of pixels/cm Sampling Resolution


If image resolution increases, then image is Number of bits used to encode each sample
sharper/more detailed Increasing sampling resolution increases accuracy of
Screen Resolution digitized sound wave but increases the file size
Number of pixels which can be viewed horizontally & Bit Rate: no. of bits for storing 1 second of sound
vertically on the device’s screen
Number of pixels = width × height Bit Rate = Sampling Rate × Sampling Resolution
E.g. 1680 × 1080 pixels File Size=Bit Rate * Length of Sound
Colour depth: number of bits used to represent the
colour of a single pixel 1.3. Compression
An image with n bits has 2n colours per pixel
E.g. 16-colour bitmap has 4 bits per pixel ∵ 24 = 16 Compression is the process of reducing file size without a
Colour depth↑: colour quality↑ but file size↑ significant loss in quality which results in
File Size = Number of Pixels × colour depth Reducing the time needed to search for data. 
Convert bits to bytes by dividing by 8 if necessary. Faster transfer of compressed files, which uses less
Applications: scanned images and general computer bandwidth than uncompressed files.
usage ∵ small file size and can be easily manipulated. Lossless Compression
Vector Graphics Type of compression that allows original data to
Made up of drawing objects perfectly reconstructed from compressed file when
Drawing objects:  a mathematically defined construct the file is opened by utilizing some form of
(of shapes like rectangle, line, circle, etc.) replacement.
Drawing list: set of commands defining the vector E.g. bitmap (.bmp), vector graphic (.svg) and .png
Properties of each object are the basic geometric data images, text file compression, database records
which determine the shape and appearance. Run-length Encoding (RLE)
Data is encoded using mathematical formulas to Form of lossless compression which is used for
generate properties in order to draw lines & curves to compressing text files and bitmap images.
create the image Reduces file size of a sequence of elements which
If object is resized, properties are recalculated. has adjacent, identical elements (characters in text
file and pixels in bitmap images).
∴ Scalable without losing quality unlike bitmaps Repeating sequence of elements encoded in two
values: run count and run value.
Applications: company logos
 E.g. RLE of bitmap image:
Sound
We can represent the first row as a sequence of
Analogue data is continuous electrical signals whereas
pixels: “W B B W W B B W” | W: white and B: black
digital data is discrete electrical signals.
Sound signals are vibrations through a medium.
Hence are analogue in nature as there can be an
infinite amount of detail for sound.
Analogue signals converted (encoded) to digital
signals by sampling:
Sound wave’s amplitude (height) sampled at set
time intervals
These samples (amplitudes) are encoded as a
binary number sequence
This sequence provides a digital representation of
the sound wave

After applying RLE: “W 2B 2W 2B W”. 


In ‘2B’ 2 is the run count and B is the run value,
Sampling Rate which represents a run of two adjacent black
Number of samples taken per unit time pixels
Increasing the sampling rate increases accuracy of Process is repeated for other rows.
digitized sound wave representation but increases the Lossy Compression
file size

WWW.ZNOTES.ORG
CAIE AS LEVEL COMPUTER SCIENCE (9618)

Type of compression which irreversibly eliminates Thin Clients Thick Clients


unnecessary data A client that solely runs on
File accuracy/quality lower than that of lossless but An independent client that
the resources provided by
file size is lower (~10% of lossless). does not require the server
the server and has no local
E.g. Sound files (.mp3), .jpeg images to run
storage
Sound files compression (.mp3) utilizes Perceptual
Only provides input and
Coding to remove certain parts of sound that are less Thick client processes most
receives output; processing
audible/discernible to human hearing. of the application
done by server
Smaller purchase cost: Can function even if no
2. Communication expensive, demanding server is connected (works
hardware is not required offline)

2.1. Networks including the Internet Improved security: cannot


No lag related to network
run unauthorized, harmful
problems
Networking devices are interconnected devices that allow software
a fast means of data transmission within the network. 
Networking benefits: Peer-to-peer network model (P2P)
File sharing - you can easily share data between Decentralised network where each connected
different interconnected devices computer stores data and operates independently as
Resource sharing - using network-connected output a ‘peer’, and can act as both a client & server.
devices like printers, or can share the same software Applications: Internet and Ad hoc networks
within the network Client-server vs. Peer-to-peer models
Higher storage - can store files in network-connected
storage mediums.
Client-server Peer-to-peer
LAN(Local Area Network) vs. WAN(Wide Area Network) Centralized backup Lesser initial setup cost
Lesser network traffic: each
LAN WAN Files & resources centralized
peer can simultaneously
in server: prevents illegal
Network that connects Network that connects receive data from different
resource usage 
devices within a small devices within a larger sources
geographical area geographical area Improved security: files are Can work even if a device
Only private ownership Private or public ownership stored on central server goes down, but Client-server
Transmission medium: which would be regularly model can’t work if server
Transmission medium:  PSTN scanned for malware goes down
twisted pair cable, coaxial
or satellite link
cable or Wi-Fi
Higher data transfer rate  Lower data transfer rate  Network Topologies
Bus 
Lesser congestion  Higher congestion 

Client-server Model
Server based network: dedicated server provides an
application (administration of users, security and
resources) for the client computer to utilize
Client-server Applications 
Printer: manages print jobs from client computers
File Sharing: the client accesses software and user’s
data files stored on the server
Proxy server
Email server: for sending, receiving & storing emails
Database server: manages DBMS
Domain controller server 
Management of user accounts (IDs & passwords)
Client sends login request to server which
processes and grants request if user ID &
password recognized
Thin Clients vs. Thick Clients Single line (bus) connecting all devices with
terminators at each end.
Thin Clients Thick Clients Other computers can read the data being sent
from one to another computer.

WWW.ZNOTES.ORG
CAIE AS LEVEL COMPUTER SCIENCE (9618)

Unsuitable for heavy traffic since collisions occur. Benefits Drawbacks


Star
Less expensive and Doesn’t perform well
easier to with small
Copper Cable
install FlexibleEasier to charges.Affected by
make terminations  electromagnetism
Greater
bandwidthImproved
security Lightweight: Needs expensive
Fiber-Optic
easy to installLess optical transmitters
Cables
signal boosting and receivers. 
required; used in long
distance comm.

Wireless Networks: use radio waves (including WiFi),


microwaves, satellites to connect devices to networks
without cables.

Benefits Drawbacks
Can travel over large
Consists of a central server (‘Switch’) and all other distances since they Low frequency so
computers connected with a dedicated connection have largest range of transmits less data at
to each, hence server can send packets to Radio
wavelengthRelatively one time.Affected by
different devices simultaneously and bi- waves
inexpensive.Used for TV radio stations with
directionally. signals & mobile phone similar frequency
No collisions possible. comms.
Mesh 
Emitting towers
Network setup where every device (node) is Larger bandwidth, can
Micro- expensive to
directly interconnected to the each of the other transfer more data at a
waves build Physical obstacles
devices (nodes) time
can interfere
Cheap with long
Easy to
distanceUsed for
Satellites interfereExpensive set
Satellite phones,
up
satellite radio broadcast

Ethernet
Most common wired medium of transmission, that
can be used to transfer data between LANs or WANs
Usually used in bus topology; since all data travelled
on a single wire there is a possibility of data
corruption by the “collision” of signals
This collision is prevented by the CSMA/CD (Carrier
Sense Multiple Access Collision Detection) method:
Before transmitting, device checks if channel is
busy
It is commonly used for wireless networks (such as If busy, device calculates a random wait time and
the Internet), via the mesh connection of routers waits that time, after which it begins transmission
Hybrid  Then during transmission, the device listens for
Combination of two or more topologies. other devices also beginning transmission
 E.g. when there is a connection between 2 or If collision, transmission is aborted and both
more LANs of different topologies devices wait different random times, then tried
Wired Networks: use (copper (twisted-pair cable or again
coaxial cable) or fibre-optic) cables connected to an Bit Streaming
Ethernet port on the network router Sequence of digital signals (bits) transferred over a
communication path at high speeds
Benefits Drawbacks Requires a fast broadband connection and some form
of buffers (short-term memory)
Bits arrive in the same order they are sent

WWW.ZNOTES.ORG
CAIE AS LEVEL COMPUTER SCIENCE (9618)

Bit rate: number of bits transmitted per second benefits drawback


Two methods of bit streaming:  Cannot access the
Relatively less technical
resources/data stored on the
Real-time  On-demand knowledge required and easy
cloud, if there are bandwidth
Existing digital files converted to implement
issues
Event captured live via video to encoded bit-streaming
Poor data privacy, since there
camera that is connected to a format for broadcasting on Flexibility: Cloud Can Be
may be data leakage in the
computer the internet by uploading to a Scaled To Match The
multi-tenant architecture
dedicated server Organization’s Growth
(public clouds)
A link for encoded video is
Video signal converted to an
placed on website and the
encoded streaming video World Wide Web (WWW)
user clicks on link to view
signal Collection of web pages stored on websites 
encoded streaming video
Protocols are used to transmit data across the WWW
Encoded video signal The data is streamed to a Internet (Interconnected network)
uploaded from computer to a buffer in user’s computer and Massive, open network of networks
dedicated streaming server the buffer stops the video Uses TCP/IP protocol, which uses IP addresses to
via cables or high-speed from being paused as the bits identify devices connected to the internet
wireless internet connection are streamed Access provided by Internet Service Provider
Server then sends live images As the buffer is emptied, it’s Communication used: wired, radio and satellite
to all users requesting it as a filled again thus providing Router in a network
real-time video continuous viewing Connects two networks together which may operate
Cannot be paused, fast- Can be paused, fast- on different protocols
forwarded, etc. forwarded, etc. Allows internal connections between LANs OR allows
external connection from the main LAN to a WAN 
Importance of high broadband speed / bit-rate Router acts as gateway & firewall
User has to download and display bits at same time Usually will be attached to server or switch in a LAN
If media is of higher quality, then higher broadband Router translates private IP addresses to public IP
speed needed since each “frame” is of a larger size addresses AND vice versa.
Real-time needs faster broadband speeds as LAN-supporting hardware
compared to on-demand, since there are a greater Switch: Connected to all devices in a LAN and can
number of users simultaneously requesting same simultaneously broadcast information to all devices
data Server: device/software provides specific function for
Cloud Computing computers in the network
Refers to the on-demand provision of computing Network Interface Card (NIC)
services through the internet Provides each device (an end-system) in the wired
Services provided include LAN with a unique (MAC) address to uniquely
identify it on the network
Infrastructure: Storage capacity and higher
processing power Allows each individual device to connect to
Platform: Software, testing & debugging resources network
Public cloud vs. Private cloud Wireless Network Interface Card (WNIC): Provides
each end-system of a wireless (WiFi) LAN a unique
Public cloud private cloud network address to identify it.
3rd-party cloud service A private cloud is owned by Wireless Access Points (WAP):
provider grants access to one organization and is not Allows devices to connect to the LAN via WiFi
multiple parties, accessible shared with any other (wireless radio communication) instead of using a
cable
via a browser organization
Usually built into router
The private cloud can either
Cloud service provider owns, Cables: A wired transmission medium that allows
be created and maintained
develops and manages the communication in wired networks
by the organization itself or it
public cloud through large Bridge
can outsource these tasks to
server farms Connects two LANs which work use the same
a third-party protocol, which can be two segments of the same
network
Benefits and drawbacks of cloud computing Stores network addresses for all devices (end-
systems) between the 2 networks
benefits drawback
 A bridge looks for the receiving device before it
sends the message.

WWW.ZNOTES.ORG
CAIE AS LEVEL COMPUTER SCIENCE (9618)

Repeater Network Identifier (netID)


Connects two cables Identifies the network to which the host (device) is
regenerates the sent data signal over the same connected to
network before the signal weakens (attenuation) Host Identifier (hostID): Identifies the host within
to prevent it from being corrupted the network
Internet-supporting hardware ‘Classfull’ addressing used for IPv4 where different bit
Modems lengths for identification and impose restrictions on
Allows a device to connect to the Internet via a available address
telephone line.  Subnetting 
A transmitter uses a modem to convert digital Practice of dividing a network into two or more
signals (from the transmitting device) to analogue networks
signals that are then sent down the telephone IP addresses are broken down to 3 parts by not
line.  changing the netID but partitioning the host ID into a
A receiver uses a modem on the other end to subnet ID and host ID
convert the analogue signals to digital signals so These subnet ID bits are used to identify each subnet
the receiving device can understand the data. within the network. 
PSTN (Public Switched Telephone Network) Subnet masks are numbers that hides (masks) the
Refers to all telephone networks netID of a system's IP address and leaves only the
Channel used between 2 endpoints for the call host part as the machine identifier, allowing data to
duration via circuit switching be routed within the subnet to the appropriate host.
Lines active even during power outage Public and Private IP address
Bi-directional communication Public IP is provided by the ISP while Private IP issued
Dedicated lines by the LAN’s router 
Telecommunication path between endpoints Public IP is unique and can be across the internet
Not shared with multiple users; it’s bought/leased whereas Private IP is only unique within LAN and
Able to host websites as well as carry phone calls hence can only be accessed within LAN
Allows continuous, uninterrupted access on Web NAT (Network address translation) required for
Cell phone network private IP addresses to access internet directly.
Wireless network spread over land areas divided Private IP more secure than public IP, since they are
into (hexagonal) ‘cells’ not directly accessible on the Internet and are hidden
Each cell is served by at least one base station by NAT
(transceiver), which uses a different frequency Range of IP addresses used for private IP addressing
range, as compared to adjacent cells, to transmit can never be assigned to public IP addresses
data Static vs. Dynamic IP addresses
Larger capacity possible since same frequencies
can be used, in non-adjacent cells Static Dynamic
Radio waves are usually used for transmission IP address will change at
IP address never changes.
Can be broadcast in all directions over a wide area regular time periods.
Portable transceivers (e.g. mobile phones) are able Static IP addresses are useful Dynamic IP address is
to communicate and access internet via base when websites need to relatively more secure, hence
stations remember a device for a long used where data privacy is
IPv4 vs. IPv6 time. Eg) VPNs whitelisting important

IPv4 IPv6 Faster upload/download Maintaining cost of dynamic


speeds IP address is lesser
32 bit address, split into 4 128 bit address divided into
blocks by “.”  eight 16-bit blocks by “:”.
URL (Uniform Resource Locator)
Each block could have a value Each block can have 4 hex Unique reference address for the exact location of an
between 0 and 255 (00 to FF values ranging from 0000 to internet resource on the WWW
in hex). FFFF
IPv6 can be shortened by
removing >=2 blocks
E.g.255.0.1.255 containing solely Protocol: enables browser to know what protocol is used
zeroesE.g.2001:0db8:85a3::8a to access info in domain
2e:0070:7334 Hostname: Domain name
Location of server: path
IPv4 functionality Domain Name Service (DNS)
each IP address has 2 parts:

WWW.ZNOTES.ORG
CAIE AS LEVEL COMPUTER SCIENCE (9618)

naming system used for computers or resources Object is then cured (e.g. resin-made objects are
having internet connection   hardened by UV light)
Consists of a hierarchy of DNS servers which have a Microphone
URLs database of and their corresponding IP Incoming sound waves enter wind screen and
addresses cause vibrations about a diaphragm
Vibrations cause coil to move past a magnetic core
Electrical current generated which is then digitized
3. Hardware Speaker
Takes electrical signals and translates into physical
3.1. Computers and their components vibrations to create sound waves
Electric current in voice coil generates an
General-purpose computer system consists of a electromagnetic field
processor, memory, I/O functionality. Change in digital audio signal causes current
Understanding the need for direction to change which changes field polarity
Input: take in data from the outside world Electromagnet is either attracted or repelled to a
Output: display data for humans’ understanding permanent magnet, causing a diaphragm that is
Primary storage: computer’s main memory which attached to the coil to vibrate
stores a set of critical program’s instructions & data Vibration transmitted to air in front of speaker
Secondary storage: non-volatile storage for noncritical Degree of vibration determines amplitude and
data that will not be frequently accessed frequency of sound wave produced
Removable secondary storage: Magnetic Hard Disk
File backup and archive Hard disk has platters whose surfaces are covered
Portable transfer of files to second device with a magnetisable material.
Embedded systems Platters are mounted on central spindle and rotated
Small computer systems such as microprocessors at high-speed
that are often a part of a larger system Surface of platters divided into concentric tracks &
Each embedded system performs a few specific sectors, where data is encoded as magnetic patterns
functions unlike general-purpose computers Each surface is accessed by read/write heads
When writing, current variation in head causes
benefits drawbacks magnetic field variation on disk
Difficult to program functions When reading, magnetic field variation from disk
Reliable since there are no produces current variation in read head
since there is either no
moving parts Solid State (Flash) Memory
interface
Most use NAND-based flash memory
Expensive expert help
Require less power Consist of a grid of columns & rows that has 2
needed for repair
transistors at each intersection
Cheap to mass-produce Two transistors:
Floating Gate: stores electros and the presence or
Principle Operations of Hardware Devices absence of charge (electrons) represents either 1 or 0
Laser printer Control Gate: controls charge (electrons) flow for
A laser beam and rotating mirrors are used to read/write
draw image of the page on a photosensitive drum Optical Disc Reader/Writer
Image converted into electric charge which Disc surface has reflective metal layer and is spun
attracts charged toner such that it sticks to image Tracking mechanism moves laser assembly
Electrostatic charged paper rolled against drum Lens focuses laser onto disc
Charge pulls toner away from drum and onto Laser beam shone onto disc to read/write
paper Tracks have sequences of amorphous and crystalline
Heat applied in the fuser to fuse toner to the states on the metallic layer
paper When reading, the reflected light from the different
Electrical charge removed from drum and excess states on the track are encoded as bit patterns
toner collected When writing, laser changes surface to crystalline and
3D printer amorphous states along the track, which correspond
Process starts from saved digital file that holds the to 1s or 0s.
blueprint of object to be printed Touchscreen
Object is then built by sequentially adding layers Considered as both an input & output device
of a material (e.g. polymer resin) until object 2 types:
created
Resistive capacitive

WWW.ZNOTES.ORG
CAIE AS LEVEL COMPUTER SCIENCE (9618)

Resistive capacitive Monitoring and Control Systems


Consists of two charged Made from materials that Monitoring System
plates store electric charge Monitors some state external to computer system
No changes made to environment by the system
Pressure causes plates to When touched, charge
and hence no feedback
touch, completing circuit transferred from finger
Control System
Point of contact registered Regulates the behaviour of other devices or
with coordinates used to systems.
calculate position Event-driven system: the controller alters the state
of the system in response to some event.
Virtual (Reality) headset Time-driven system: the controller takes action at
Virtual headsets consist of 2 lenses, (LCD) display, a specific point in time
circuit board with sensors, cover and foam padding Hardware typically used in a system
The display provides a simulation of a 3D Sensor: measures an (analogue) property and
environment, generated by a 3D graphics package transmits it to a processing unit, generally as an
The user can ‘move’ in the virtual environment by electrical or optical signal.
moving their head or using controllers Actuators: switch on/off heavy appliances (e.g.
Buffers: short-term memory storage that stores data right heater to heat/fan to cool)
before it’s used, typically in RAM. ADC: converts analogue signals to digital signals
Random Access Memory vs. Read Only Memory Transmission cable: to transfer signals
Feedback Systems
RAM rom Output from system affects the input of sensors.
Volatile memory: loses Non-volatile memory: does Ensures system operates within the given criteria
content when power turned not lose content when power By enabling the system output to affect
off turned off subsequent system inputs, it may cause a change
Can be read and altered Can only be read in the actions taken by the system
Used to store currently Used for storing OS kernel Thus enables the system to automatically adjust
executing program and boot up instructions conditions in a continuous process

Types of RAM - Static RAM vs. Dynamic RAM 3.2. Logic Gates and Logic Circuits
sram dram Logic Gates: use one or more inputs and produces a
Doesn’t need to refresh Has to be refreshed, hence single logical output
hence uses less power and has slower access times and AND gate: If both inputs high, output is high (A•B)
faster access time needs higher power
A B Output
Only single transistor &
More complex circuitry, 0 0 0
capacitor, hence less
hence more expensive
expensive to purchase 0 1 0
Each bit stored in flip-flop Each bit stored as a charge 1 0 0
Has lower data density Has higher data density 1 1 1
Used in cache memory Used in main memory

Types of ROM – PROM vs. EPROM vs. EEPROM


\n
pROM EPROM EEPROM A B Output
Erasable Electrically Erasable 0 0 0
Programmable
Programmable Programmable 0 1 1
ROM
ROM ROM
1 0 1
Can be Can be erased by Can be erased by
1 1 1
programmed only UV light exposure an electrical signal
once after it is and can then be and can then be
OR gate: If either inputs high, output is high (A+B)
created reprogrammed reprogrammed
Chip has to be Can update data
Data cannot be
removed for without removing
erased or deleted
reprogramming chip.

WWW.ZNOTES.ORG
CAIE AS LEVEL COMPUTER SCIENCE (9618)

NOT gate: an inverter (A) Registers: smallest unit of storage of microprocessor;


allows fast data transfer between other registers
A Output General Purpose registers
1 0 Used to temporarily store data values which have
0 1 been read from memory or some processed result
Can be used by assembly language instructions
Special Purpose Registers
Some are accessible by assembly language
instructions
Only holds either data or memory location, not both
A B Output
Special purpose registers include:
0 0 1
Program Counter (PC): holds address of next
0 1 1 instruction to be fetched
1 0 1 Memory Data Register (MDR): holds data value
1 1 0 fetched from memory
Memory Address Register (MAR): Holds address of
memory cell of program which is to be accessed
Accumulator (ACC): holds all values that are
processed by arithmetic & logical operations.
NAND gate: (A•B) \n
Index Register (IX): Stores a number used to
A B Output change an address value
Current Instruction Register (CIR): Once program
0 0 1
instruction fetched, it is stored in CIR and allows
0 1 0 the processor to decode & execute it
1 0 0 Status Register: holds results of comparisons to
1 1 0 decide later for action, intermediate and
erroneous results of arithmetic performed
The Processor (CPU)
Arithmetic and Logic Unit (ALU): part of processor that
processes instructions which require some form of
NOR gate: (A+B) \n
arithmetic or logical operation
A B Output Control Unit (CU): part of CPU that fetches
instructions from memory, decodes them &
0 0 0
synchronizes operations before sending signals to
0 1 1 computer’s memory, ALU and I/O devices to direct
1 0 1 how to respond to instructions sent to processor
1 1 0 Immediate Access Store (IAS): memory unit that can
be directly accessed by the processor
System Clock: timing device connected to processor
that is needed to synchronize all components.
XOR gate: (A⨁B) \n Buses
set of parallel wires that allow the transfer data
between components in a computer system
4. Processor Fundamentals
4.1. Central Processing Unit
Architecture
Von Neumann model
Von Neumann realized data & programs are
indistinguishable and can therefore use same
memory.
Von Neumann architecture uses a single processor. Data bus: bidirectional bus that carries data
It follows a linear sequence of fetch–decode–execute instructions between processor, memory, and I/O
operations for the set of instructions i.e. the program.
devices.
In order to do this, the processor uses registers.

WWW.ZNOTES.ORG
CAIE AS LEVEL COMPUTER SCIENCE (9618)

Address bus: unidirectional bus that carries Can only connect output devices (e.g. second
address of main memory location or input/output monitor/display) to the processor through a VGA
device about to be used, from processor to port
memory address register (MAR) VGA ports allows only the transmission of video
Control bus streams, but not audio components
Bidirectional and unidirectional Fetch-Execute (F-E) cycle
used to transmit control signals from control unit Fetch stage
to ensure access/use of data & address buses by PC holds address of next instruction to be fetched
components of system does not lead to conflict Address in PC is copied to MAR
Performance of Computer System Factors PC is incremented
Clock Speed Instruction loaded to MDR from address held in
number of pulses the clock sends out in a given MAR
time interval, which determines the number of Instruction from MDR loaded to CIR
cycles (processes) CPU executes in a given time Decode stage: The opcode and operand parts of
interval instruction are identified
usually measured in Gigahertz (GHz) Execute stage: Instructions executed by the control
If the clock speed is increased, then execution unit sending control signals
time for instructions decreases. Hence, more Register Transfer Notation (RTN)
cycles per unit time, which increases performance. MAR ← [PC]
However, there is a limit on clock speed since the PC ← [PC] + 1
heat generated by higher clock speeds cannot be MDR ← [[MAR]]
removed fast enough, which leads to overheating CIR ← [MDR]
Bus Width Decode
Determines number of bits that can be Execute
simultaneously transferred Return to start
Refers to number of lines in a bus Square brackets: value currently in that register
Increasing bus width increases number of bits Double square brackets: CPU is getting value
transferred at one time, hence increasing stored at the address in the register
processing speed and performance since there Interrupts
Cache Memory A signal from a program seeking processor’s attention
Commonly used instructions are stored in the Interrupt Service Routine (ISR):
cache memory area of the CPU. Handles the interrupt by controlling the processor
If cache memory size is increased, more Different ISRs used for different sources of
commonly executed instructions can be stored interrupt
and the need for the CPU to wait for instructions Typical sequence of actions when interrupt occurs:
to be loaded reduces, hence CPU executes more The processor checks interrupt register for interrupt
cycles per unit time, thus improving performance at the end of the F-E cycle for the current instruction
Number of Cores If the interrupt flag is set in the interrupt register, the
Most CPU chips are multi-core — have more than interrupt source is detected
one core (essentially a processor) If interrupt is low priority: then interrupt is disabled
Each core simultaneously processes different If interrupt is high priority:
instructions through multithreading, improving All contents of registers of the running process are
computer performance saved on the stack
Ports PC is loaded with the ISR, and is executed
Hardware which provides a physical interface Once ISR is completed, the processor restores
between a device with CPU and a peripheral device registers’ contents from the stack, and the
Peripheral (I/O) devices cannot be directly connected interrupted program continues its execution
to CPU, hence connected through ports Interrupts re-enabled and
Universal Serial Bus (USB): Can connect both input Return to start of cycle
and output devices to processor through a USB port
High Definition Multimedia Interface (HDMI) 4.2. Assembly Language
Can only connect output devices (e.g. LCD display)
to the processor through a HDMI port Assembly language: low-level programming language with
HDMI cables transmit high-bandwidth and high- instructions made up of an op code and an operand
resolution video & audio streams through HDMI Machine code: code written in binary that uses the
ports processor’s basic machine operations
Video Graphics Array (VGA) Relationship between machine and assembly language:
every assembly language instruction (source code)

WWW.ZNOTES.ORG
CAIE AS LEVEL COMPUTER SCIENCE (9618)

translates into exactly one machine code instruction Op Code Operand Explanation
(object code) Jump to address if compare
Symbolic addressing JPN
FALSE
Symbols used to represent operation codes 
Unconditional Jumps
Labels can be used for addresses  
Absolute addressing: a fixed address in memory JMP Jump to given address
Assembler I/O Data
Software that changes assembly language into Input any character and
machine code for the processor to understand IN
store ASCII value in ACC
The assembler replaces all mnemonics and labels with Output character whose
their respective binary values (that are predefined OUT
ASCII value is stored in ACC
before by the assembler software)
Ending
One pass assembler
Assembler converts mnemonic source code into Return Control to operating
END
machine code in one sweep of program system
Cannot handle code that involves forward referencing
Two pass assembler: software makes 2 passes thru code #denotes immediate addressing
On the first pass: B denotes a binary number, e.g. B01001010
& denotes a
Symbol table created to enter symbolic addresses hexadecimal number, e.g. &4A
and labels into specific addresses
Modes of Addressing
All errors are suppressed
Direct Addressing: loads contents at address into ACC
On the second pass:
Indirect Addressing: The address to be used is at
Jump instructions access memory addresses via
given address. Load contents of this second address
table
to ACC
Whole source code translates into machine code
Indexed addressing: form the address to be used as
Error reported if they exist
+ the contents of the IR (Index Register)
Grouping the Processor’s Instruction Set
Relative addressing: next instruction to be carried out
Op Code Operand Explanation is an offset number of locations away, relative to
address of current instruction held in PC; allows for
Adressing
relocatable code
LDM #n Immediate: Load n into ACC Conditional jump: has a condition that will be checked
Direct: load contents at (like using an IF statements)
LDD
address into the ACC Unconditional jump: no condition to be followed,
Indirect: load contents of simply jump to the next instruction as specified
LDI address at given address
into ACC 4.3. Bit Manipulation
Indexed: load contents of
LDX
given address + IR into ACC Binary numbers can be multiplied or divided by shifting
Data Movement Left shift (LSL #n)
Bits are shifted to the left to multiply
Store contents of ACC into
STO E.g. to multiply by four, all digits shift two places to left
address
Right shift (LSR #n)
Arithmetic Bits are shifted to the right to divide
Operations
E.g. to divide by four, all digits shift two places to right
Add contents of register to Logical shift: zeros replace the vacated bit position
ADD
ACC
Add 1 to contents of the
INC
register
Comparing
Compare contents of ACC
CMP
with that of given address
Compare contents of ACC
CMP #n
with n
Conditional Jumps
Jump to address if compare
JPE
TRUE

WWW.ZNOTES.ORG
CAIE AS LEVEL COMPUTER SCIENCE (9618)

Matching: an operation that allows the


accumulator to compare the value it contains to
the given value in order to change the state of the
status register.
Practical applications of Bit Masking:
Setting an individual bit position:
Mask the content of the register with a mask
pattern which has 0 in the ‘mask out’ positions and
1 in the ‘retain’ positions.
Set the result with the match pattern by using the
AND command with a direct address.
Testing one or more bits:
Mask the content of the register with a mask
pattern which has 0 in the ‘mask out’ positions and
1 in the ‘retain’ positions.
Compare the result with the match pattern by
using the CMP command or by “Checking the
pattern”.
Checking the pattern
Arithmetic shift: Used to carry out multiplication and
Use AND operation to mask bits and obtain
division of signed integers represented by bits in the
resultant.
accumulator by ensuring that the sign-bit (usually the
Now subtract matching bit pattern from resultant.
MSB) is the same after the shift.
The final ‘non-zero’ result confirms the patterns
are not the same else vice versa.

5. System Software
5.1. Operating System
Need for OS
A set of programs designed to run in the background
on a computer system which
Controls operation of computer system
Provides a user interface
Cyclic shift: the bit that is removed from one end by the
Controls how computer responds to user’s
shift is added to the other end.
requests
Controls how hardware communicate
Provides an environment in which application
software can be executed
OS hardware is unusable without an OS, as the OS
acts as an interface since it controls communication
between user and hardware
Key Management Tasks
(Main) Memory Management
Memory protection to ensure 2 programs do not
try to use same memory space
Paging
Use of virtual memory
Bit Masking
File Management
Each bit can represent an individual flag.
Provides file naming conventions
∴ by altering the bits, flags could be operated upon.
Maintains a directory structure
Bit manipulation operations:
Allocates space to particular files
Masking: an operation that defines which bits you
Security Management
want to keep and which bits you want to clear.
Proves usernames & passwords
Masking to 1: The OR operation is used with a 1.
Ensures data privacy
Masking to 0: The AND operation is used with a 0.
Prevents unauthorized access

WWW.ZNOTES.ORG
CAIE AS LEVEL COMPUTER SCIENCE (9618)

Carries out automatic backup Can provide synchronization between devices


Hardware (input/output/peripherals) Management Program Libraries
Installation of appropriate driver software Pre-written code that can be linked to a software
Controls access to data sent to and from under development without any amendments
peripherals Can perform common or complex tasks
Receives & handles interrupts from hardware Takes the form of classes
devices Benefits:
Processor Management Saves time: less code needs to be written
Enables multiprogramming and multitasking Smaller testing time: pre-tested and used by
Resolution of conflicts when 2 or more processes others
requires the same resource Library file be a complex algorithm which the user
E.g. via Round-robin method need not understand for using it
Utility Software Dynamic Link Library (DLL) files
Disk Formatter Shared library file that contains code and data
Prepares a hard disk to allow data to be stored on Code saved separately from the main .EXE file,
it reducing the .EXE file’s size
Deletes any existing data on disk Code only loaded to main memory when required
Performs formatting, process where computer DDL file can be made available to several applications
‘draws lines’ on disk surface to split it into small simultaneous, thus reducing strain on memory
areas DLL files act as modules in more complex programs,
Virus checker making it easier to install and run updates
Checks for and then removes any viruses found
Constantly checks all incoming and outgoing files 5.2. Language Translators
Defragmentation Software
Files can be big so have to be stored in multiple Assembler
sectors, which can result in fragmentation Software that translates assembly language
(contents of file scattered across >2 non- statements into machine code (binary) for execution
contiguous sectors) The mnemonics used translates into machine
Fragmentation slows down disk access and thus opcodes
the performance of the entire computer. Process simple because assembly language has a one-
Defragmenting software works by physically to-one relationship with machine code. 
reorganizing disk contents (files) such that they Compiler and Interpreter
are stored in contiguous sectors.
This defragmentation reduces number of compiler Interpreter
movements of the read/write heads require to Translates a high-level Translates and executes a
access the disk contents, hence increasing language program to high-level language program,
computer performance machine code. line-by-line.
The defragmentation also creates larger
Creates a .exe file which can
contiguous free space regions No .exe file created.
be easily distributed.
Disk contents analysis/disk repair software
Software utility for visualization of disk space Once compiled, .exe file does
Execution very slow –
usage not need to be compiled
translated each time program
Gets size for each folder and files, and generates a again, resulting in faster
run.
graphical chart showing disk usage distribution execution.
according to folders or other user defined criteria. Debugging easier/faster,
Reports all errors at the end
Allows disk to report errors (e.g. “bad sector”) since it stops translating
of compilation: difficult to
Software will attempt to offer a solution when it reaches an error. This
locate errors∴ development
File Compression allows real time error
process long.
Reduces file size by removing redundant data in correction.
files Only be produced when all Can run program any time,
Causes improvements in the computer’s errors are fixed. even before code finished.
performance by reducing the data that needs to
Used when development is
be stored Used during development.
completed.
Back-up Software
Makes copy of files on another storage medium in
Two-step translation
the event of a hard drive failure, user error,
Java and some other high level language programs
disaster or accident.
may require two-step translation, i.e., they will be
Should be a regular process

WWW.ZNOTES.ORG
CAIE AS LEVEL COMPUTER SCIENCE (9618)

partially compiled and partially interpreted Data management: data stored in relational databases -
Java code first translated to bytecode by Java compiler tables
stored in secondary storage
Bytecode finally interpreted by the Java Virtual Data dictionary contains:
Machine to produce machine code List of all files in database
Integrated Development Environment (IDE) features No. of records in each file
Coding Names & types of each field
Context-sensitive prompts: Displays choice of Data modeling: analysis of data objects used in database,
keywords and available identifiers appropriate at identifying relationships among them
current insertion point and provides choices in Logical schema: overall view of entire database, includes:
alphabetical order entities, attributes and relationships
Highlights undeclared/unassigned variable Data integrity: entire block copied to user’s area when
identifiers being
changed, saved back when done
Initial Error Detection Data security: handles password allocation and
Dynamic syntax checks: Automatic checking and verification,
backups database automatically, controls
highlighting of syntax errors, as soon as line typed what certain user’s view by
access rights of individuals or
Type checking & parameter checking groups of users
Presentation 
Prettyprint: Automatic indentation and color- Data change clash solutions:
coding of keywords
Open entire database in exclusive mode – impractical
Expand and Collapse code blocks: Saves excessive
with
several users
scrolling if collapsed, and easy to see global
Lock all records in the table being modified – one user
variable declarations and main program body
changing
a table, others can only read table
when collapsed
Lock record currently being edited – as someone changes
Debugging 
something, others can only read record
Single stepping: Executes program line-by-line to
User specifies no locks – software warns user of
see the effect of each statement on variables
simultaneous
change, resolve manually
Breakpoints: Pauses program at a specific line to
Deadlock: 2 locks at the same
time, DBMS must
ensure program operates correctly up to that line
recognize, 1 user must abort task
Variables/expressions Report Window: Monitors
variables for comparing values. Tools in a DBMS:

Developer interface: allows creating and manipulating


6. Database and Data database
in SQL rather than graphically
Query processor: handles high-level queries. It parses,
Modelling validates, optimizes, and compiles or interprets a query
which
results in the query plan.
6.1. File Based System
6.3. Relational Database Modelling
Data stored in discrete files, stored on computer, and can
be
accessed, altered or removed by the user Entity: object/event which can be distinctly identified
Table: contains a group of related entities in rows and
Disadvantages of File Based System: columns
called an entity set
Tuple: a row or a record in a relation
No enforcing control on organization/structure of files
Attribute: a field or column in a relation
Data repeated in different files; manually change each
Primary key: attribute or combination of them that
Sorting must be done manually or must write a program
uniquely
define each tuple in relation
Data may be in different format; difficult to find and use
Candidate key: attribute that can potentially be a primary
Impossible for it to be multi-user; chaotic
key
Security not sophisticated; users can access everything
Foreign key: attribute or combination of them that relates
2
different tables
6.2. Database Management Systems Referential integrity: prevents users or applications from
entering inconsistent data
(DBMS)
Secondary key: candidate keys not chosen as the primary
Database: collection of non-redundant interrelated data key
Indexing: creating a secondary key on an attribute to
DBMS: Software programs that allow databases to be
defined,
constructed and manipulated provide
fast access when searching on that attribute;
indexing data must be
updated when table data changes
Features of a DBMS:

WWW.ZNOTES.ORG
CAIE AS LEVEL COMPUTER SCIENCE (9618)

6.4. Relational Design of a System

6.5. Normalization

1st Normal Form (1NF): contains no repeating attribute or


groups of attributes. Intersection of each tuple and attribute
contains
only 1 value. Example:

2nd Normal Form (2NF): it is in 1NF and every non-primary 3rd Normal Form (3NF): it is in 1NF and 2NF and all
non-key
key attribute is fully dependent on the primary; all the elements are fully dependent on the primary key. No
inter-
dependencies between attributes.
incomplete
dependencies have been removed. Example:
MANY-TO-MANY functions cannot be directly normalized
to 3NF, must
use a 2 step process e.g.

becomes:

6.6. Data Definition Language (DDL)


Creation/modification of the database structure using
this language
written in SQL
Creating a database:

CREATE DATABASE <database-name>

Creating a table:

CREATE TABLE <table-name> (…)

Changing a table:

ALTER TABLE <table-name>

Adding a primary key:

WWW.ZNOTES.ORG
CAIE AS LEVEL COMPUTER SCIENCE (9618)

PRIMARY KEY (field)


DELETE FROM <table-name>

ADD <field-name>:<data-type>
WHERE <condition>

Adding a foreign key: Updating a field in a table:

FOREIGN KEY (field) REFERENCES <table>(field)


UPDATE <table-name>

SET <field-name> = <value>

Example: WHERE <condition>

CREATE DATABASE ‘Personnel.gdb’

CREATE TABLE Training

(EmpID INT NOT NULL,

7. Ethics and Ownership


CourseTitle VARCHAR(30) NOT NULL,

Ethics: a system of moral principles that guide behaviour


CourseDate Date NOT NULL,

based on philosophical views


PRIMARY KEY (EmpID, CourseDate),

Computer Ethics
FOREIGN KEY (EmpID) REFERENCES Employee(EmpID))

Regulate how computing professionals should make


decisions regarding professional & social conduct.
6.7. Data Manipulation Language (DML) A computing professional can be ethically guided by
joining a professional ethical body such as the BCS
Query and maintenance of data done using this language and IEEE, which have codes of conduct.
– written in
SQL Ownership
Data ownership: having legal rights and complete
Queries:
control over a single piece or set of data elements.
Creating a query: Copyright gives the creators of some types of media
rights to control how they're used and distributed.
SELECT <field-name>
Programming ideas and methods can be stolen by
FROM <table-name>
competitors, software can easily be copied and
WHERE <search-condition>
bootlegged (sold illegally) hence legislation is needed
to protect the ownership, usage and copyright of
SQL Operators: data.
Software Licencing
= Equals to
Free Software Foundation:
> Greater than License gives user freedom to run, copy,
< Less than distribute, study, change and improve software.
>= Greater than or equal to Condition: any redistributed version of software
<= Less than or equal to must be distributed with original terms of free
use, modification, and distribution (aka copyleft)
<> Not equal to
The Open Source Initiative:
IS NULL Check for null values Source code of an open-source software is readily
available to users under a copyright; does not
Sort into ascending order: enable user to re-distribute the software
ORDER BY <field-name>
Concept of open-source program relies on fact
that user can review source-code for eliminating
Arrange identical data into groups: bugs in it
Shareware:
GROUP BY <field-name>
Demonstration software that is distributed for
free but for a specific evaluation period only
Joining together fields of different tables:
Distributed on trial basis and with an
INNER JOIN understanding that sometime later a user may be
interested in paying for it
Data Maintenance: Used for marketing purposes
Commercial: Requires payment before it can be used,
Adding data to table: but includes all program's features, with no
restrictions
INSERT INTO <table-name>(field1, field2, field3)

VALUES (value1, value2, value3)


Artificial Intelligence (AI): ability of a computer to perform
tasks in such a way that are conventionally associated
Deleting a record: with human intelligence:
AI can learn from past mistakes

WWW.ZNOTES.ORG
CAIE AS LEVEL COMPUTER SCIENCE (9618)

they adapt to stop the same problem occurring Spyware: software that gathers information about
again user’s online and offline activity including accessed
they learn to predict what might happen & raise sites, applications, and downloaded files.
alert Risk restriction: Ensure anti-virus and anti-spyware
AI can learn to work more efficiently software is installed, regularly updated and run.
when an action slows the system down, it can Hacking
prevent this from happening again illegal access to a computer system
when an action increases the speed of the system, Hackers can obtain user’s confidential data which
it can repeat this when necessary to improve can cause identity theft
efficiency Can lead to deletion or corruption of data
AI Applications Risk restriction: Use strong passwords and ensure
Developing autonomous mechanical products firewall
Machine learning through data sets Phishing
AI Impacts Attempt through emails to obtain user’s
Social confidential data which can cause identity theft
Replacement of manual labour with automation Risk restriction: Ignore suspicious mails and
could lead to massive unemployment ensure firewall criteria include SPAM filters,
However, could lead to increased leisure time blacklist, etc.
Economic: Due to increased innovation and efficiency Pharming
with automation provided by AI, there’d be lower Redirects user to a fake website that appears
manufacturing costs in general legitimate to gain confidential data
Environmental: Detrimental impact on environment Risk restriction: use a reliable ISP; check that links
due to robot manufacture with limited resources and are genuine and ensure https is present in the
its waste disposal URL
Computer System Security Measures
User Accounts and Passwords
8. Data Integrity Usernames & passwords to deny access to
unauthorized users
User assigned privilege which access to only the
8.1. Data Security
user’s workplace, preventing the user to have
Data Security: making sure that data is protected against admin rights.
loss and unauthorized access. Can assign privilege to files so users with low
Data Integrity: making sure that data is valid and does not privileges do not have access.
corrupt after transmission Firewalls
Data Privacy: ability to determine what data is shared Hardware or software that filters information
with a third party traveling between the computer system and the
Data Security and Computer System Security internet
(software) firewall can make decisions about what
Data Security System Security to allow and block by detecting illegal attempts by
specific softwares to connect to the internet
Protection of data on a Protection of the computer
computer system system Authentication ⦁ Process of determining whether
someone is who they claim to be
To prevent access of viruses
To prevent corruption of data
to the system and prevent ⦁Helps prevent unaut
and prevent hackers from
hackers to enter your
using data
computer system ⦁Log-on using digita
E.g. encryption E.g. ID & Password
Anti-virus software
Runs in background to detect & remove viruses.
Threats to Computer & Data Security
Checks files for known malicious patterns
Malware
Anti-spyware software: detects & removes spyware.
software intentionally designed to damage a
Encryption:
computer or computer network
Conversion of data to code by encoding it
Includes Virus & Spyware
Doesn’t stop illegal access but appears
Virus: Software that replicates itself by inserting a
meaningless
copy of itself into another piece of software, which
Necessary to use decryption software to decode
may cause computer to crash and can lead to
data
deletion or corruption of data
Data Security Measures
Encryption

WWW.ZNOTES.ORG
CAIE AS LEVEL COMPUTER SCIENCE (9618)

Access Rights to data (authorization): different Data Verification: checks data entered is accurate during
users assigned different authorization levels which data entry and data transfer
prevent them from accessing all data ∴ increases Data Entry Verification Methods
security Visual Check: Person manually compares original data
Data Backup with that entered to check if correct
An exact copy of an original piece of data in case Double Entry: Enter data into computer twice and
the original is lost or corrupted compares.
Within the same computer system or at different If differences found, go back to raw data to fix error
site Data Transfer Verification Methods
Disk-mirroring strategy Errors may occur when data moved in system.
Real-time strategy that writes data to two or more Parity Check
disks at the same time. All data transmitted as bits
If one fails, the other is still there to be read off of Number of 1s in a byte must always be either an
odd number or an even number
8.2. Data Integrity Parity can be set either as even or odd
E.g. two communicating devices decide there will
Data validation and data verification help protect the always be an odd number of 1s. A byte is received
integrity of data by checking whether the data entered is that has even number of 1s so error occurred and
sensible and accurate, respectively. receiving device would ask for it to be sent again
Data Validation: checks if data entered is valid, but not its Used also when data sent between parts of the
accuracy CPU
Data Validation Methods Not foolproof: if 2 bits are transposed, data
Range check: data must be between a set of values accepted
Format check: data must follow correct pattern/order Checksum Check
Length check: data must have exact no. of characters Data sent from one place to another as block of
Presence check: checks if some data has been bytes rather than individual bytes
entered Computer adds together all bytes being sent
Existence check: data entered must exist Any bits lost at most-significant end as carry
Limit check: checks whether a value entered is within ignored so answer is an 8-bit number
acceptable minimum and maximum values. Checksum calculated before and after data sent
Check digit: A digit is used as the answer to an If two bytes different, error occurred therefore
arithmetic operation of other digits in data. If not block of bytes must be sent again
matched, then data entered incorrectly

WWW.ZNOTES.ORG
CAIE AS LEVEL
Computer Science (9618)

Copyright 2022 by ZNotes


These notes have been created by Saketh Devareddy for the 2021-23 syllabus
This website and its content is copyright of ZNotes Foundation - © ZNotes Foundation 2022. All rights reserved.
The document contains images and excerpts of text from educational resources available on the internet and
printed books. If you are the owner of such media, test or visual, utilized in this document and do not accept its
usage then we urge you to contact us and we would immediately replace said media.
No part of this document may be copied or re-uploaded to another website without the express, written
permission of the copyright owner. Under no conditions may this document be distributed under the name of
false author(s) or sold for financial gain; the document is solely meant for educational purposes and it is to remain
a property available to all at no cost. It is current freely available from the website www.znotes.org
This work is licensed under a Creative Commons Attribution-NonCommerical-ShareAlike 4.0 International License.

You might also like