Chapter 3

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 12

ZNOTES.

ORG

UPDATED TO 2023-2025 SYLLABUS

CAIE IGCSE
COMPUTER
SCIENCE
SUMMARIZED NOTES ON THE THEORY SYLLABUS
Prepared for Sandamali Samarawickrama for personal use only.
CAIE IGCSE COMPUTER SCIENCE

1. Hardware
1.1. Computer Architecture & Von
Neumann Architecture
The central processing unit (CPU) (also known as a
microprocessor or processor) is central to all modern
computer systems
Source: Cambridge IGCSE and O Level Computer
The CPU consists of the following architecture: Science - Second Edition (Hodder Education)

Processor: The processor contains the Arithmetic and The Fetch-Execute Cycle
Logic Unit (ALU)
Control Unit: The control unit controls the operation of the 1. PC contains the address of the next instruction to be
memory, processor and input/output devices fetched
Arithmetic Logic Unit: Carries out the logic system like 2. This address is copied to the MAR via the address bus
calculations 3. The instruction of the address is copied into the MDR
System Clock: The system clock is used to produce timing temporarily
signals on the control bus 4. The instruction in the MDR is then placed in the CIR
5. The value in the PC is incremented by 1, pointing to
Busses: Carry data through components. The following are its
the next instruction to be fetched
types.
6. The instruction is finally decoded and then executed
Address bus – unidirectional
Data Bus – bi-directional Stored Program Concept
Control Bus – bi-directional
Instructions are stored in the main memory
Immediate Access Store: Stores the instructions that are to Instructions are fetched, decoded and executed by
be processed, which are fetched by the CPU the processor
Programs can be moved to and from the main memory
The following registers also exist in the architecture:
Memory Concept
REGISTER ABBREVIATION DEFINITION
Stores the instruction the A computer’s memory is divided into partitions: Each
Current instruction
CIR CPU is currently decoding partition consists of an address and its contents, e.g.
register
or executing
Stores the Address of the MEMORY LOCATION CONTENT
Memory address
MAR instruction, copy it, and 10101010 01010110
register
sends it to MDR
Stores the Data from the Instruction Set:
address received from the An instruction set is a list of all the commands that a CPU can
MDR Memory data register process, and the commands are machine code
MAR and sends data to
CIR
Stores the address of the 1.2. Cores, Cache and Internal Clock
PC Program counter next instruction to be
fetched from memory System’s Clock
During calculations, data
ACC Accumulator The clock defines the clock cycle that synchronises all
is temporarily held in it
computer operations. By increasing the clock speed, the
computer's processing speed also increases. This doesn’t
mean that the computer's performance is increased,
however.

Overclocking

WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved.
This document is authorised for personal use only by Sandamali Samarawickrama at undefined on 09/05/24.
CAIE IGCSE COMPUTER SCIENCE

Using a clock speed higher than the computer was designed 3D scanners can scan solid objects and produce a three-
for. dimensional image
It leads to multiple issues. Scanners take images at several points, x, y and z (lasers,
magnetic, white light)
Operations become unsynchronised - (the computer The scanned images can be used in Computer Aided
would frequently crash and become unstable) Design (CAD) or to a 3D printer to produce a working
can lead to serious overheating of the CPU model

Length of Data Buses Application of 2D Scanners at an Airport:

The wider the data buses, the better the performance of the Make use of (OCR) to produce digital images which
computer represent the passport pages
Text can be stored in ASCII format
Cache The 2D photograph in the passport is also scanned and
stored as jpeg image
Cache memory is located within the CPU itself The passenger’s face is also photographed using a digital
-- allows faster access to the CPU camera and compared using face recognition software
-- stores frequently used instructions and data that need to be Key parts of the face are compared (distance between
accessed faster, which improves CPU performance eyes, width of nose)
The larger the cache memory size, the better the CPU
performance Barcode readers/scanners

A barcode is a series of dark and light parallel lines of


Cores
varying thicknesses
The more cores in the CPU, the better and faster the The numbers 0 -9 are each represented by a unique
performance series of lines
The left and right hand sides of the barcode are separate
But if any number of cores are used, it could possibly slow using guard bars
down the system performance as the communication Allows barcode to be scanned in any direction
between each core increases, and so do the data cables Barcode is read by a red laser or red LED
between each. Which in turn reduces the potential system Light is reflected back off the barcode; dark areas
performance. reflect little light which allows the bars to be read
You might have heard about quad and dual cores, not Reflected light is read by sensors (photoelectric cells)
septa or octa cores. The pattern is generated, which is converted to digital

Quick Response (QR) Codes


1.3. Input Devices
Another type of barcode is the QR codes
Two-dimensional Scanners: Made up of a matrix of filled-in dark squares on a light
background
Used to input hard-copy documents Can hold more storage (7000 digits)
The image is converted into an electronic form which can Advantages of QR codes:
be stored in the computer
No need for the user to write down the website
Document is placed on a glass panel address
A bright light illuminates the document QR codes can store website addresses
A scan head moves across the document until the
whole page is scanned. And image of the document is Digital Cameras
produced and sent to a lens using a series of mirrors
The lens focuses the document image It is controlled by a microprocessor that adjusts the
The focused image now falls onto a charge couple shutter speed, focuses the image, etc.
device (CCD) which consists of a numbers of Photo is captured when light passes through the lens onto
integrated circuits a light sensitive cell
Software produces a digital image from the electronic The cell is made up of pixels
form The number of pixels determines the size of the file
Optical Character Recognition (OCR) is a software which
Keyboards
converts scanned documents into a text file format
If the original document was a photo/image, then the Connected to a computer with a USB connection or by
scanned image forms an image file such as JPEG wireless connection
Each character has an ASCII value and is converted into a
Three-dimensional Scanners
digital signal

WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved.
This document is authorised for personal use only by Sandamali Samarawickrama at undefined on 09/05/24.
CAIE IGCSE COMPUTER SCIENCE

Slow method Infra-red (active) - This IR sensor uses an invisible


Prone to errors infrared beam. When the beam is broken/disturbed, it
changes the amount of infrared light reaching the
Pointing devices detector.
Infra-red (passive) - These sensors detect the heat
Mouse/trackball
emitted by any type of object.
Traditional; mechanical ball, connected by USB port
Level - This sensor detects the solids, liquids, or gas
Modern type; red LEDs to detect movement
level.
Microphones Light - These devices use light-sensitive cells that
generate electric current based on light brightness.
Used to input sound to a computer Magnetic field - This sensor detects the change in
When a microphone picks up sound, a diaphragm magnetic field.
vibrates, producing an electric signal Moisture - This type of sensor detects the water
The signal goes to a sound card and is converted into content wherever this sensor has been installed.
digital values and stored in a computer pH - This measures the acidity or alkalinity.
Voice recognition, voice is detected and converted into Pressure - This sensor measures the pressure applied
digital Proximity - This sensor detects the nearby objects
around the sensor
Touchscreens
Temperature - These sensors measure the
Capacitive (medium cost tech) temperature of the environment.
Made up of many layers of glass (Note: You do not need to know the working principle of
Creating electric fields between glass plates in layers the sensor. But have an idea of their purposes.)
When the top layer of glass is touched, electric current
Control of Street Lighting­­
changes
Co-ordinates where the screen was touched are The light sensor sends data to the ADC
determined by an on-board microprocessor Digitised data and sends it to the microprocessor
Infra-red heat (expensive) Microprocessor samples data every minute
Use glass as the screen material If data from sensor < value stored in memory:
Needs a warm object to carry an input operation Signal sent from microprocessor to street lamp
Infra-red optical (expensive) Lamp switched on
Uses glass as screen material
Uses an array of sensors (grid form)
Point of contact is based on which grid co-ordinate is
1.4. Output Devices
touched
Inkjet Printers
Resistive (inexpensive)
The upper layer of polyester, the bottom layer of glass Used to print one-off pictures and documents
When the top polyester is touched, the top layer and
bottom layer complete a circuit 1. Data from the document sent to the printer driver
Signals are then sent out, which are interpreted by a 2. The printer driver ensures data is in the correct
microprocessor, determine where the screen was format
touched 3. Check made by printer driver that the chosen printer
is available
Sensors 4. Data is sent to printer, and stored in a temporary
memory (printer buffer)
Devices that read or measure physical properties
5. A sheet of paper is fed; the sensor detects if the paper
Data needs to be converted to digital
is available in the paper tray
Analogue-to-digital converter (ADC) converts physical
6. The print head moves across paper printing
values into digital
text/image, four ink colours sprayed in the exact
Sensors and their purposes:
amount
Acoustic - These sensors act like a microphone that
7. Paper is advanced, so next line is printed
converts sound to electric pulses.
8. Repeated until the buffer is empty
Accelerometer - These sensors measure an object's
9. Once it is done, the printer sends an interrupt to the
acceleration or deceleration and motion.
processor (request for more data to be sent)
Flow - This sensor measures the flow of liquid or gas.
Gas - These sensors measure the amount/level of any Laser Printers
gas in the environment.
Humidity - This sensor measures the water vapour in Used to print flyers, high quality
the air or any sample.

WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved.
This document is authorised for personal use only by Sandamali Samarawickrama at undefined on 09/05/24.
CAIE IGCSE COMPUTER SCIENCE

Use dry powder ink (toner) and static electricity to CCFL uses two fluorescent tubes behind the LCD screen,
produce text and images which supplies the light source
Prints the whole page in one go
Light Projectors:
1. (steps 1-4 same as inkjet)
2. Printing drum is given a positive charge; as the drum Two common types of light projectors:
rotates, a the laser beam is scanned across it, Digital Light Projector (DLP)
removing the positive charge leaves negatively LCD Projector
charged areas which match the text/image Projectors are used to project computer output onto
3. The drum is then coated with positively charged toner; larger screens/interactive whiteboards
it only sticks to negatively charged parts of the drum
Digital Light Projectors (DLP)
4. A negatively charged sheet is rolled over the drum
5. The toner on the drum now sticks to the paper to Uses millions of micromirrors
produce a copy of the page the number of micromirrors and the way they are
6. Paper finally goes through a fuser (set of heated arranged on the DLP chip determines the resolution of the
rollers); heat melts the ink so it is permanent image
7. The discharge lamp removes all electric charge from When the micromirrors tilt towards the light source they
the drum, ready to print next page are on
When the micromirrors tilt away from the light source,
3D Printers
they are off
Used for models of cars This creates a light or dark pixel on the projection screen
Produce solid objects that work A bright white light source passes through a colour filter
Built up layer by layer, using powdered resin, ceramic on its way to the DLP chip
powder White light splits into primary colours
A design is made using Computer-aided Design (CAD)
LCD Projectors
2D and 3D Cutters
Older technology than DLP
3D cutters can recognise objects in x, y, z direction A powerful beam of white light is generated from a bulb
3D laser cutters can cut; glass, crystal, metal, wood This beam of light is then sent to a group of chromatic-
coated mirrors; these reflect the light back at different
Actuators wavelengths
When the white light hits the mirrors, the reflected light
The actuators convert electrical signals to mechanical has wavelengths corresponding to red, green, and blue
processes. These three different lights pass through three LCD
Used in many control applications involving sensors and screens; these screens show the image to be projected as
devices (ADC and DAC) millions of pixels in grayscale
When the coloured light passes through the LCD screens,
Loudspeakers/Headphones
a red, green and blue version of the grey image emerges
Sound is produced by passing the digital data through a Finally, the image passes through the projector lens onto
DAC then through an amplifier and then emerges from the screen
the loudspeaker
Produced by voltage differences vibrating a cone in the
speaker at different frequencies

LCD and LED Monitors

The front layer of the monitor is made up of Liquid Crystal


Display (LCD), these tiny diodes are grouped together in
threes as pixels (LCD doesn’t emit any light)
LCD monitors are backlit using Light Emitting Diode (LED)
because: Source: Cambridge IGCSE and O Level Computer
LEDs reach their maximum brightness immediately Science - Second Edition (Hodder Education)
LEDs sharpens image (higher resolution), and CCFL
has a yellow tint
LEDs improve the colour image
1.5. Memory, Storage Devices & Media
Monitors using LED are much thinner than CCFL
Primary vs. Secondary Storage
LEDs consume very little power
Before LEDs, LCD monitors were backlit using CCFL The CPU directly accesses primary storage

WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved.
This document is authorised for personal use only by Sandamali Samarawickrama at undefined on 09/05/24.
CAIE IGCSE COMPUTER SCIENCE

The CPU does not directly access secondary storage Avoids the need to install/upgrade RAM, as it could be
RAM, ROM, and cache memory are some examples expensive
HDD, SSD, DVD, memory stick, and Blu-ray disc are some The system wastes no storage on unwanted/unused
examples data.

Primary Memory: Read Only Memory (ROM)


Random Access Memory (RAM)
Features of ROM
RAM is used by a system when it needs to store and Non-volatile/permanent memories (contents remain
access data that is actively being used or processed by even when ROM is turned off)
the user immediately. Used to store start-up instructions (basic input/output
Features of RAM systems)
Volatile/temporary memory (contents lost if RAM is Data/contents of a ROM chip can only be read and
turned off) cannot be changed
Used to store; data, files
It can be written to or read from, and the contents of Secondary Storage:
the memory can be changed Hard Disk Drives (HDD)
The larger the size of the RAM, the faster the computer
Data is stored in a digital format on the magnetic surface
will operate
of the disks (platter)
RAM never runs out of memory and continues to run slow
A number of read/write heads can access all of the
As RAM becomes full, the processor has to access the
surfaces of the disk
continually hard drive to overwrite old data on RAM with
Each platter will have two surfaces which can be used to
new data
store the data
RAM is of two types:
Data is stored on the surfaces in sectors and tracks
DRAM (Dynamic RAM) and SRAM (Static RAM) HDD has very slow data access compared to RAM

Solid-State Drive (SSD)

There are no moving parts, and all data is received at the


same time (not like HDD)
Store data by controlling the movement of electrons
within NAND chips, as 1s and 0s
Source: Cambridge IGCSE and O Level Computer Non-volatile rewritable memory
Science - Second Edition (Hodder Education) Benefits of using SSD rather than HDD:
Virtual memory More reliable (no moving parts)
Considerably lighter (suitable for laptops)
When RAM runs out of memory, there is a problem with Lower power consumption
memory management; thus, the system has a high Run much cooler than HDDs
chance of crashing. This is why virtual memory comes into Very thin
the picture. Data access is faster than HDD
The virtual memory can be either HDD or SSD (these Drawback – questionable longevity (20GB per day)
storages are discussed below)
Off-Line Storage:
CD/DVD Disks

Laser (red) light is used to read and write data on the


surface of the disk.
A thin layer of metal alloy is used to store data.
Both systems use a single spiral track that runs from the
centre of the disk to the edge
DVD uses Dual-Layering, which increases the storage
capacity (two individual recording layers)

Blu-ray Disks

You may be expected to draw a diagram like the above. Uses a blue laser to carry out read-and-write operations
The main advantages of virtual memory are The wavelength of laser light is less than CD and DVD
They can be larger than the physical memory provided (stores up to five times more data than DVD)
in the RAM. Automatically come with secure encryption (prevent
piracy and copyright infringement)

WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved.
This document is authorised for personal use only by Sandamali Samarawickrama at undefined on 09/05/24.
CAIE IGCSE COMPUTER SCIENCE

Used as backup systems Updating automatically via a satellite, cellular or Wi-Fi


link
USB Flash Memories
Advantages and Disadvantages of using embedded systems
Very small, lightweight, and suitable for transferring files Advantages Disadvantages
Small back-up devices for photo, music
Small in size, therefore can
Solid state, so needs to be treated with care Can be difficult to upgrade
easily fit into devices
Cloud Storage: The interface can be
Low cost to make
confusing sometimes
Cloud storage is a method of data storage where data is
Troubleshooting is a
stored on remote servers Requires very little power
specialist’s job
The same data is stored on more than one server in case
of maintenance or repair, allowing clients to access data Often thrown away as difficult
Very fast reaction to changing
at any time. This is known as data redundancy. to upgrade and faults are
input
harder to find
The following are its types: Increased garbage as they
Dedicated to one task only
are thrown away
Public cloud – this is a storage environment where the
customer/client and cloud storage provider are different Any computerised system is
Can be controlled remotely
companies prone to attacks
Private cloud – this is storage provided by a dedicated
environment behind a company firewall; customer/client Applications of Embedded devices
and cloud storage provider are integrated and operate as GPS systems
a single entity Security Systems
Hybrid cloud – this is a combination of the two above Vending Machines
environments; some data resides in the private cloud, and Washing Machines
less sensitive/less commercial data can be accessed from Oven
a public cloud storage provider Microwave

1.7. Network Hardware


Network Interface Card (NIC)

A network interface card (NIC) is needed to allow a device to


connect to a network (such as the Internet).

Media Access Control (MAC)


1.6. Embedded System
A MAC address comprises 48 bits which are shown as six
A combination of hardware and software is designed to groups of hexadecimal digits. The first six display the
carry out a specific set of tasks. manufacturer’s code, and the second half shows the device
Embedded systems may contain - serial number.
Microcontrollers - CPU, RAM, ROM and other
peripherals on one single chip These do not change and are primarily constant for every
Microprocessor - Integrated circuit with CPU only device
System on Chips (SoC) - microprocessor with I/O ports, there are two types of MAC addresses: the Universally
storage and memory Administered MAC Address (UAA) and the Locally
Process of Embedded Devices - Administered MAC Address (LAA)
Input from the user is sent to the microprocessor
(ADC needed if the data is analogue) The only difference between the two types is that UAA is
Data from the user interface is also sent to the made Universally and cannot be changed, but it is the
microprocessor opposite for LAA.
The microprocessor then sends signals to actuators
which are the output
IP Addresses
Non-programmable devices need to be replaced if they
IP address allocation:
need a software update.
The network allocates IP addresses.
Programmable devices have two methods of updating
Two types of IP addresses: static and dynamic.
Connecting the device to a computer and downloading
Static IP addresses:
the update

WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved.
This document is authorised for personal use only by Sandamali Samarawickrama at undefined on 09/05/24.
CAIE IGCSE COMPUTER SCIENCE

Assigned manually to a device. It also receives incoming data packets from the
Does not change over time. internet and routes them to the appropriate devices
Dynamic IP addresses: on the local network.
Assigned automatically by a DHCP (Dynamic Host
Configuration Protocol) server.
Changes periodically or when the device connects to a 2. The Internet and Its Uses
different network.
IPv4 (Internet Protocol version 4): 2.1. The Internet and the World Wide
Widely used protocol.
Consists of four groups of decimal numbers separated Web
by dots (e.g., 192.168.0.1).
Provides approximately 4.3 billion unique addresses. Internet World Wide Web (WWW)
IPv6 (Internet Protocol version 6): Uses transmission protocols
Collection of webpages and
Developed to address the limitations of IPv4. such as TCP and IP (Internet
other information on websites
Uses eight groups of hexadecimal numbers separated Protocols)
by colons (e.g., Allows the user to
2001:0db8:85a3:0000:0000:8a2e:0370:7334). Uses HTTP(S) protocols that
communicate with other
Provides an extremely large number of unique are written using Hypertext
users via chat, email, calling
addresses (approximately 340 undecillion). Mark-up Language (HTML)
and more
Differences between IPv4 and IPv6:
Worldwide Collection of URLs (Uniform Resource
Address format: IPv4 uses a 32-bit address, while IPv6
Interconnected Networks and Locator) are used for the
uses a 128-bit address.
Devices location of the web pages
Address space: IPv4 provides approximately 4.3 billion
addresses, whereas IPv6 offers around 340 Web browsers can access
undecillion addresses. web pages.
Address allocation: IPv4 addresses are allocated
manually using DHCP, while IPv6 addresses are Uniform Resource Locator (URLs)
primarily assigned using stateless autoconfiguration.
URLs are used to locate and access web pages. The
Routers typical format of URLs is -

Router functionality: protocol://website address/path/file name


A router is a networking device that directs data
The protocol would usually be HTTP or HTTPS
packets between different networks.
The website address would contain -
It determines the most efficient path for data
domain host (www)
transmission.
domain name (website name)
Sending data to a specific destination on a network:
domain type (.com, .org, .net, .gov) or sometimes
A router examines the destination IP address of
country codes (.uk, .in, .cy)
incoming data packets.
The path would usually become the file directory roots. for
It uses routing tables to determine the next hop or the
example, https://www.znotes.com/computer-science
next router on the path to the destination.
The /computer-science is the file name
The router forwards the data packet to the
appropriate next hop.
HTTP and HTTPS
Router's role in IP address assignment:
A router can act as a DHCP server (Dynamic Host HTTP stands for Hypertext Transfer Protocol, and HTTPS
Configuration Protocol) and assign IP addresses to stands for Hypertext Transfer Protocol secure
devices on a local network. They are safety protocols maintained while transmitting
It dynamically allocates IP addresses from a data.
predefined range to connected devices.
DHCP allows for automatic IP address configuration Web Browsers
and simplifies network management.
Connecting a local network to the Internet: It is software used to connect to the internet
A router serves as the gateway between a local It translates the HTML code
network and the internet. ensures SSL & TLS security can be established
It connects the local network to an internet service Offers additional features like search history & ad
provider (ISP) network. blockers
The router receives data packets from devices on the
local network and forwards them to the internet. Retrieval and Location of web pages

WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved.
This document is authorised for personal use only by Sandamali Samarawickrama at undefined on 09/05/24.
CAIE IGCSE COMPUTER SCIENCE

The browser sends the URL to the domain name server


(DNS)
DNS stores the index and matches it with the IP
IP is sent to the browser if it exists
The browser sends a request to the IP of the webserver
Browser interprets the HTML

Cookies

Cookies are small files stored on the user’s computer


They are used to track data about the users and autofill The first block is called the genesis block as it doesn’t point to
forms or give suggestions accordingly any previous block (Previous Hash Value - 0000)
Types of Cookies -

Session Cookie Persistent Cookie 2.3. Cyber Security


Remembers the user’s login
Temporary cookies are stored Brute Force Attack:
details so the user doesn’t
in the RAM till the browser is
have to log in every time they Hackers try to guess your password by trying all the
closed.
visit a website different combinations of letters, numbers and symbols.
Stored on the hard disk on the Effect:
Doesn’t collect any
computer until their expiry Hacker gets access to user’s personal data (credit
information on the user
date or the user deletes them cards, passwords and more)
A good example is the virtual To remove risk:
shopping basket on e- Use stronger passwords with more characters and
commerce websites. symbols

Data Interception:
2.2. Digital Currency
This involves stealing data by tapping into a wired or a
Form of payment to pay for goods and services wireless transmission line
A few examples are Debit/Credit Cards, Apps (Paypal, Wardriving - The act of locating and using wireless
Apple Pay, Bank Transfers and many more) internet connections illegally
Cryptography was later introduced due to the problem in Packet Sniffing - Uses Packet sniffers to examine
centralised banking systems. packets sent over a line; all the data collected is sent
Cryptocurrency uses cryptography to maintain track of back to the attacker
transactions. Effect:
Cryptocurrency is also more secure because it uses It can cause a computer to crash
Blockchain Network Can delete or corrupt files/data
To remove risk:
Blockchain Network Install anti-virus software
Don’t use software from unknown sources
Blockchain Network involves several interconnected Be careful when opening emails from unknown
computers where the transaction data is stored
Hacking isn’t possible here as transaction details would be Distributed Denial of Service Attacks (DDoS)
sent to all the computers, and the data can’t be changed An attempt at preventing users from accessing part of a
without the consent of all the network members network
Usually temporary but may be damaging
How do blockchains work
Every time a transaction takes place, A block is created. The An attacker may be able to prevent the user from:
block would contain - Accessing their emails
Accessing websites
Data - Name of the sender and the receiver, amount of Accessing online services
money and more
Hacking
Hash Value - Unique value generated by an algorithm
Previous Hash Value - Hash Value of the previous block in The act of gaining illegal access to a computer system
the chain Effect:
This leads to identity theft, gaining personal
information

WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved.
This document is authorised for personal use only by Sandamali Samarawickrama at undefined on 09/05/24.
CAIE IGCSE COMPUTER SCIENCE

Data can be deleted, changed or corrupted access to patient’s data)


To remove risk: Antivirus - Protects user’s computer from malware attacks
Firewalls Authentication - User proving who they are. The most
Strong passwords/ user IDs common methods are passwords, PINs, Mobiles (OTPs),
Use of anti-hacking software biometrics and more)
Difference between hacking and cracking
Hacking breaks into computer systems to steal data Benefits and Drawbacks of Biometric Method
Cracking is when someone edits a program code, Biometric
Benefits Drawbacks
malicious Methods
Most development
Malware Intrusive as used to
methods are very easy
identify criminals,
Stands for Malicious Software. A few examples are - Fingerprint to use and require
Can’t be used if the
Virus - A program that can replicate itself with the Scans very low storage
finger gets dirty or
space to store the
intention of deleting or corrupting files, causing a damaged (e.g. cuts)
computer malfunction biometric data.
Ransomware - Attackers encrypt the user’s data until a With very high It is very intrusive,
certain amount of money is paid accuracy, it Impossible Takes longer to verify,
Retina Scan
Adware - Displays unwanted ads on the user’s screen to replicate a person’s Expensive to install
Trojan Horse - Programs that are disguised as retina and set up
legitimate software Can’t identify if there
Spyware - Sends data about all the activities of the Face Non-intrusive method, are any changes in the
user to the attacker Recognition Relatively cheaper lighting, change in age
Worms - Programs that can replicate themselves with or person’s age.
the intention of corrupting the entire network instead Voices can be
of the computer alone recorded and used for
Phishing verification, but low
Non-Intrusive method,
accuracy and illnesses
Voice verification is done
Attackers send legitimate-looking emails to bait the user such as colds or
Recognition quickly and relatively
into giving out their information. coughs can affect a
cheaper
To remove risk: person’s voice, making
Don’t open links from unknown receivers identification
Use anti-phishing tools impossible.
Block pop-up ads
Have an up-to-date browser Two-Step Verification - Requires two methods of
authentication to prove who the user is
Pharming Automatic Software Updates - Latest updates contain
patches which improve device security
The attacker installs a malicious code on the computer,
Spelling and Tone - Fake emails tend to have wrong
which redirects the user to fake websites
spelling and grammar (amazonn instead of amazon), and
Effect:
the tone would also seem urgent
The user gives out login details and other personal
Firewalls - Hardware or Software which monitors the
details
traffic between a network and the user’s computer
To remove risk:
Proxy Servers - Acts as an intermediate between the
Using anti-virus software
user’s computer and the web server. They are used for -
Checking the spelling and the weblink carefully
Filtering Internet traffic
Make sure that the green padlock is present in the
Keeping the user’s IP Address Confidential
URL bar
Blocking access to certain websites
Social Engineering Attacks like DDoS and Hacking attack the proxy
server, keeping the web server safe.
Attackers create a social situation which leads to victims Acts as a firewall as well.
giving out their details (For example - Spam calls Privacy Settings - Used to limit who can access and see a
informing them that their account has been hacked) user’s profile
SSL (Secure Socket Layer) - Set of rules used while
Keeping data safe from threats communicating with other users on the internet.

Access Levels - Having Different levels of access for


different people (for example - Only doctors can have

WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved.
This document is authorised for personal use only by Sandamali Samarawickrama at undefined on 09/05/24.
CAIE IGCSE COMPUTER SCIENCE

WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved.
This document is authorised for personal use only by Sandamali Samarawickrama at undefined on 09/05/24.
CAIE IGCSE
Computer Science

© ZNotes Education Ltd. & ZNotes Foundation 2024. All rights reserved.
This version was created by Sandamali Samarawickrama on 09/05/24 for strictly personal use only.
These notes have been created by Abdullah Aamir, Abhiram Mydi and Shriram Srinivas for the 2023-2025 syllabus
The document contains images and excerpts of text from educational resources available on the internet and
printed books. If you are the owner of such media, test or visual, utilized in this document and do not accept its
usage then we urge you to contact us and we would immediately replace said media.
No part of this document may be copied or re-uploaded to another website. Under no conditions may this
document be distributed under the name of false author(s) or sold for financial gain.
“ZNotes” and the ZNotes logo are trademarks of ZNotes Education Limited (registration UK00003478331).

You might also like