AS Level CS P1
AS Level CS P1
ORG
CAIE AS LEVEL
COMPUTER
SCIENCE
SUMMARIZED NOTES ON THE THEORY SYLLABUS
Prepared for Danial Kashif for personal use only.
CAIE AS LEVEL COMPUTER SCIENCE
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by Danial Kashif at undefined on 12/09/24.
CAIE AS LEVEL COMPUTER SCIENCE
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by Danial Kashif at undefined on 12/09/24.
CAIE AS LEVEL COMPUTER SCIENCE
Mechanism: Reduces file size by encoding Email server: For sending, receiving, and storing
sequences of adjacent, identical elements emails.
(characters in text files and pixels in bitmap Database server: Manages DBMS.
images) into two values: run count and run value. Domain controller server:
Example: RLE of a bitmap image. Manages user accounts (IDs & passwords).
The client sends a login request to the server,
which processes and grants the request if the
Lossy Compression
user ID & password are recognized.
Definition: A type of compression that irreversibly
eliminates unnecessary data.
Effect: File accuracy/quality is lower than with lossless Thin Clients vs. Thick Clients
compression, but file size is significantly reduced
(often to about 10% of the lossless size). Thin Clients Thick Clients
Examples: Sound files (.mp3), .jpeg images. A client that solely runs on the
An independent client that
Mechanism in Sound Files: resources provided by the
does not require the server to
Perceptual Coding: Removes parts of the sound server and has no local
run.
that are less audible or discernible to human storage.
hearing, as used in .mp3 compression. Only provides input and
Thick client processes most of
receives output; processing is
the application locally.
2. Communication done by the server.
Smaller purchase cost:
Can function even if no server
expensive, demanding
is connected (works offline).
2.1. Networks, including the Internet hardware is not required.
Improved security: Cannot run
Networking devices: Interconnected devices that enable No lag related to network
unauthorized, harmful
fast data transmission within a network. problems.
software.
Networking benefits:
File sharing: Easily share data between different
Peer-to-Peer network model (P2P)
interconnected devices.
Definition: A decentralized network where each
Resource sharing: Use network-connected output
connected computer stores data and operates
devices like printers or share software within the
independently as a ‘peer’, acting as both a client and a
network.
server.
Higher storage: Files can be stored in network-
Applications: Internet and Ad hoc networks.
connected storage mediums.
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by Danial Kashif at undefined on 12/09/24.
CAIE AS LEVEL COMPUTER SCIENCE
A single line (bus) connects all devices with Example: A connection between two or more LANs
terminators at each end. of different topologies.
Other computers can read data being sent
between any two computers.
Wired Networks
Unsuitable for heavy traffic due to frequent
Use copper (twisted-pair cable or coaxial cable) or
collisions.
fiber-optic cables.
Star
Cables are connected to an Ethernet port on the
network router.
Benefits Drawbacks
Less expensive and Doesn’t perform well
easier to with small charges.
Copper Cable
install. Flexible. Easier Affected by
to make terminations. electromagnetism.
Greater bandwidth,
improved security,
lightweight, easy to Needs expensive
Fiber-Optic
install, and less signal optical transmitters
Cables
boosting are required; and receivers.
used in long-distance
communications.
Ethernet
The most common wired medium for data
transmission in LANs or WANs.
Typically used in bus topology; data collisions are
managed by the CSMA/CD (Carrier Sense Multiple
Access with Collision Detection) method.
CSMA/CD Process:
Device checks if the channel is busy before
A combination of two or more topologies. transmitting.
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by Danial Kashif at undefined on 12/09/24.
CAIE AS LEVEL COMPUTER SCIENCE
If busy, the device waits a random time before Public cloud Private Cloud
retrying. Access provided by third- Owned and maintained by a
During transmission, the device listens for other party service providers, single organization, providing
transmissions. shared among multiple users. exclusive access.
If a collision occurs, transmission is aborted, and
Managed by cloud service Can be managed internally by
both devices wait random times before retrying.
providers using large server the organization itself, or
Bit Streaming
farms. outsourced.
Sequence of digital signals (bits) transferred over a
communication path at high speeds, requiring a fast
broadband connection and buffers. Benefits Drawback
Bit Streaming Types: Cannot access the
Real-time: Live events captured and transmitted Less technical knowledge resources/data stored on the
directly. required, easy to implement. cloud if there are bandwidth
On-demand: Pre-existing files are converted and issues.
streamed as requested. Poor data privacy, since there
Importance of High Broadband Speed/Bit-Rate Flexibility to scale with
may be data leakage in the
The user has to download and display bits at the organization’s growth
multi-tenant architecture
same time. mindset.
(public clouds).
Higher quality media requires faster speeds due to
larger data frames as well.
Real-time streaming needs higher speeds due to World Wide Web (WWW):
simultaneous data requests coming from multiple Description: Collection of web pages stored on
different users. websites.
Function: Protocols are used to transmit data across
Real-time On-demand the WWW.
Existing digital files are Internet (Interconnected Network):
converted to encoded bit- Description: Massive, open network of networks.
The event is captured live via
streaming format for Protocol: Uses TCP/IP protocol, which uses IP
a video camera that is
broadcasting on the internet addresses to identify devices connected to the
connected to a computer.
by uploading to a dedicated internet.
server. Access: Provided by Internet Service Provider.
A link for encoded video is Communication Methods: Wired, radio, and satellite.
Video signal converted to an placed on the website, and Router in a Network:
encoded streaming video the user clicks on the link to Function: Connects two networks together which
signal. view encoded streaming operate under the same protocols (for example, IP).
video. Connections: Allows internal connections between
Encoded video signal The data is streamed to a LANs or external connection from the main LAN to a
uploaded from computer to a buffer in the user’s computer, WAN.
dedicated streaming server and the buffer stops the video Additional Roles: Acts as a gateway and firewall.
Setup: Usually attached to a server or switch in a LAN.
via cables or high-speed from being paused as the bits
IP Address Translation: Translates private IP
wireless internet connection. are streamed.
addresses to public IP addresses and vice versa.
The server then sends live As the buffer is emptied, it’s
images to all users requesting filled again, thus providing
them as a real-time video. continuous viewing. LAN-Supporting Hardware:
It cannot be paused, fast- Can be paused, fast- Switch:
forwarded, etc. forwarded, etc. Connected to all devices in a LAN.
Can simultaneously broadcast information to all
devices.
Cloud Computing Server:
On-demand provision of computing services over the Device/software that provides specific functions
internet, including infrastructure, and platforms. for computers in the network.
Infrastructure: Storage capacity and higher Network Interface Card (NIC):
processing power. Provides each device (end-system) in the wired
Platform: Software, testing & debugging LAN with a unique MAC address to uniquely
resources. identify it on the network.
Allows each device to connect to the network.
Public cloud vs. Private cloud Wireless Network Interface Card (WNIC):
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by Danial Kashif at undefined on 12/09/24.
CAIE AS LEVEL COMPUTER SCIENCE
Provides each end-system of a wireless (WiFi) LAN Transmission: Radio waves are usually used for
a unique network address to identify it. transmission. Can be broadcast in all directions
Wireless Access Points (WAP): over a wide area.
Allows devices to connect to the LAN via WiFi Portable Transceivers: Devices like mobile phones
instead of using a cable. can communicate and access the internet via base
Usually built into the router. stations.
Cables:
A wired transmission medium that allows
IPv4 vs. IPv6
communication in wired networks.
Bridge:
IPv4 IPv6
Connects two LANs which work using the same
32-bit address, split into 4 The 128-bit address is divided
protocol, which can be two segments of the same
blocks by “.” into eight 16-bit blocks by “:”
network.
Stores network addresses for all devices (end- Each block could have a value Each block can have 4 hex
systems) between the two networks. between 0 and 255 (00 to FF values ranging from 0000 to
Looks for the receiving device before it sends the in hex). FFFF.
message. IPv6 can be shortened by
Repeater: removing at least (≥) 2 blocks
Connects two cables. containing only zeroes. For
Regenerates the sent data signal over the same example:
network before the signal weakens (attenuation) to For example, 255.0.1.255. “2001:0db8:85a3:0000:0000:8
prevent it from being corrupted. a2e:0070:7334” can be
shortened to
“2001:0db8:85a3::8a2e:0070:7
Internet-Supporting Hardware:
334"
Modems:
Allows a device to connect to the Internet via a
IPv4 Functionality:
telephone line.
IP Address Structure:
Function: A transmitter uses a modem to convert
Network Identifier (netID): Identifies the network to
digital signals (from the transmitting device) to
which the host (device) is connected.
analogue signals sent down the telephone line. A
Host Identifier (hostID): Identifies the host within
receiver uses a modem on the other end to
the network.
convert the analogue signals to digital signals so
Classful Addressing: Used for IPv4, where different
the receiving device can understand the data.
bit lengths for identification impose restrictions on
PSTN (Public Switched Telephone Network):
available addresses.
Refers to all telephone networks.
Subnetting:
Channel: Used between two endpoints for the call
Definition: The practice of dividing a network into
duration via circuit switching.
two or more networks.
Resilience: Lines are active even during a power
Structure: IP addresses are broken down into three
outage.
parts by not changing the netID but partitioning the
Communication: Bi-directional.
host ID into a subnet ID and host ID.
Dedicated Lines:
Subnet ID: These bits are used to identify each
Telecommunication path between endpoints.
subnet within the network.
Not shared with multiple users; it’s bought/leased.
Subnet Masks: Numbers that hide (mask) the
Function: Able to host websites as well as carry
netID of a system's IP address and leave only
phone calls. Allows continuous, uninterrupted
the host part as the machine identifier,
access to the Web.
allowing data to be routed within the subnet to
Cell Phone Network:
the appropriate host.
Wireless networks spread over land areas divided
into (hexagonal) cells.
Base Stations: Each cell is served by at least one Public and Private IP Addresses:
base station (transceiver), which uses a different Public IP:
frequency range compared to adjacent cells to Provided by the ISP.
transmit data. Unique and can be accessed across the internet.
Capacity: Larger capacity is possible since the Private IP:
same frequencies can be used in non-adjacent Issued by the LAN’s router.
cells. Unique within the LAN and can only be accessed
within the LAN.
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by Danial Kashif at undefined on 12/09/24.
CAIE AS LEVEL COMPUTER SCIENCE
NAT (Network Address Translation): Required for The following essential features are needed in a
private IP addresses to access the internet directly. computer -
Security: Private IPs are more secure than public Input: Takes in data from the outside world.
IPs since they are not directly accessible on the Output: Displays data for human understanding.
Internet and are hidden by NAT. Primary Storage: Main memory storing critical
Address Range: The range of IP addresses used program instructions and data.
for private IP addressing can never be assigned to Secondary Storage: Non-volatile storage for
public IP addresses. noncritical data.
Removable secondary storage:
File backup and archives
Static vs. Dynamic IP addresses
Portable transfer of files to a second device
Static Dynamic Embedded systems:
Miniature computer systems such as microprocessors
The IP address will change at
IP address never changes. that are often a part of a more extensive system.
regular periods.
Each embedded system performs a few specific
Static IP addresses are valid Dynamic IP address is functions, unlike general-purpose computers.
when websites need to relatively more secure, hence
remember a device for a long used where data privacy is Benefits Drawbacks
time, e.g VPNs whitelisting. quite important. Reliable since there are no Difficult to program functions
Maintaining the cost of the moving parts since there is no interface
Faster upload/download
dynamic IP address is a Expensive expert help is
speeds. Require less power
lesser. needed for the repair
Cheap to mass-produce
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by Danial Kashif at undefined on 12/09/24.
CAIE AS LEVEL COMPUTER SCIENCE
The electric current in the voice coil generates an Virtual (Reality) Headset:
electromagnetic field Virtual headsets consist of 2 lenses, (an LCD) display,
Change in digital audio signal causes current a circuit board with sensors, a cover and foam
direction to change, which changes field polarity padding
Electromagnet is either attracted or repelled to a The display provides a simulation of a 3D environment
permanent magnet, causing a diaphragm that is generated by a 3D graphics package
attached to the coil to vibrate The user can ‘move’ in the virtual environment by
Vibration transmitted to air in front of the speaker moving their head or using controllers
The degree of vibration determines the amplitude Buffers:
and frequency of the sound wave produced A queue that temporarily stores data to balance
Magnetic Hard Disk: input/output speed of data, while the cache is the
Hard disks have platters whose surfaces are covered short-term memory storage that stores frequently
with a magnetisable material. used data.
Platters are mounted on a central spindle and rotated Random Access Memory vs. Read-Only Memory
at high speed
The surface of platters is divided into concentric tracks RAM ROM
& sectors, where data is encoded as magnetic Volatile memory: loses Non-volatile memory: does
patterns content when power is turned not lose content when power
Each surface is accessed by read/write heads off is turned off
When writing, current variation in the head causes It can be read and altered It can only be read
magnetic field variation on the disk
Used to store currently Used for storing OS kernel
When reading, magnetic field variation from the disk
executing program and boot-up instructions
produces current variation in the read head
Solid State (Flash) Memory:
Types of RAM - Static RAM vs. Dynamic RAM
Most use NAND-based flash memory
Consist of a grid of columns & rows that has 2 SRAM DRAM
transistors at each intersection
Doesn’t need to refresh; Has to be refreshed; it has
Two transistors:
hence, it uses less power and slower access times and
Floating Gate: stores electrons, and the presence or
faster access time needs higher power
absence of charge (electrons) represents either 1 or 0
Control Gate: controls charge (electrons) flow for Only a single transistor &
More complex circuitry, hence
read/write capacitor, hence less
more expensive
Optical Disc Reader/Writer: expensive to purchase
The disc surface has a reflective metal layer and is Each bit is stored in a flip-flop Each bit is stored as a charge
spun Has lower data density Has higher data density
The tracking mechanism moves the laser assembly Used in cache memory Used in main memory
The lens focuses laser onto the disc
A laser beam shone onto a disc to read/write
Types of ROM – PROM vs. EPROM vs. EEPROM
Tracks have sequences of amorphous and crystalline
states on the metallic layer PROM EPROM EEPROM
When reading, the reflected light from the different
Electrically
states on the track is encoded as bit patterns Erasable
Programmable Erasable
When writing, the laser changes surface to crystalline Programmable
ROM Programmable
and amorphous states along the track, corresponding ROM
ROM
to 1s or 0s.
Touchscreen: It can be It can be erased by It can be erased by
Considered as both an input & output device programmed only UV light exposure an electrical signal
There are two main-types: once after it is and can then be and can then be
created reprogrammed reprogrammed
Resistive Capacitive Chip has to be Can update data
Data cannot be
Consists of two charged Made from materials that removed for without removing
erased or deleted
plates store electric charge reprogramming the chip.
Pressure causes plates to When touched, the charge is
touch, completing the circuit transferred to the finger Monitoring and Control Systems
Monitoring System:
Point of contact registered
Monitors some state external to the computer
with coordinates used to
system
calculate the position
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by Danial Kashif at undefined on 12/09/24.
CAIE AS LEVEL COMPUTER SCIENCE
A B Output
A B Output 0 0 1
0 0 0 0 1 0
0 1 1 1 0 0
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by Danial Kashif at undefined on 12/09/24.
CAIE AS LEVEL COMPUTER SCIENCE
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by Danial Kashif at undefined on 12/09/24.
CAIE AS LEVEL COMPUTER SCIENCE
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by Danial Kashif at undefined on 12/09/24.
CAIE AS LEVEL COMPUTER SCIENCE
Two pass assembler: software makes 2 passes thru code B denotes a binary number, e.g. B01001010 & denotes a
On the first pass: hexadecimal number, e.g. &4A
Symbol table created to enter symbolic addresses
and labels into specific addresses Modes of Addressing
All errors are suppressed Direct Addressing: loads contents at address into ACC
On the second pass: Indirect Addressing: The address to be used is at given
Jump instructions access memory addresses via address. Load contents of this second address to ACC
table Indexed addressing: form the address to be used as
Whole source code translates into machine code + the contents of the IR (Index Register)
Error reported if they exist Relative addressing: next instruction to be carried out
Grouping the Processor’s Instruction Set is an offset number of locations away, relative to
address of current instruction held in PC; allows for
Op Code Operand Explanation relocatable code
Addressing Conditional jump: has a condition that will be checked
(like using an IF statements)
LDM #n Immediate: Load n into ACC
Unconditional jump: no condition to be followed,
Direct: load contents at simply jump to the next instruction as specified
LDD
address into the ACC
Indirect: load contents of
4.3. Bit Manipulation
LDI address at given address into
ACC Binary numbers can be multiplied or divided by shifting
Indexed: load contents of Left shift (LSL #n)
LDX
given address + IR into ACC Bits are shifted to the left to multiply
Data Movement E.g. to multiply by four, all digits shift two places to left
Store contents of ACC into Right shift (LSR #n)
STO Bits are shifted to the right to divide
address
E.g. to divide by four, all digits shift two places to right
Arithmetic
Logical shift: zeros replace the vacated bit position
Operations
Add contents of register to
ADD
ACC
Arithmetic shift: Used to carry out multiplication and
Add 1 to contents of the
INC division of signed integers represented by bits in the
register
accumulator by ensuring that the sign-bit (usually the
Comparing MSB) is the same after the shift.
Compare contents of ACC
CMP
with that of given address
Cyclic shift: the bit that is removed from one end by the
Compare contents of ACC
CMP #n shift is added to the other end.
with n
Conditional Jumps
Bit Masking
Jump to address if compare
JPE Each bit can represent an individual flag.
TRUE
∴ by altering the bits, flags could be operated upon.
Jump to address if compare Bit manipulation operations:
JPN
FALSE Masking: an operation that defines which bits you
Unconditional Jumps want to keep and which bits you want to clear.
JMP Jump to given address Masking to 1: The OR operation is used with a 1.
I/O Data Masking to 0: The AND operation is used with a 0.
Matching: an operation that allows the
Input any character and store
IN accumulator to compare the value it contains to
ASCII value in ACC
the given value in order to change the state of the
Output character whose status register.
OUT
ASCII value is stored in ACC Practical applications of Bit Masking:
Ending Setting an individual bit position:
Return Control to operating Mask the content of the register with a mask
END
system pattern which has 0 in the ‘mask out’ positions and
1 in the ‘retain’ positions.
#denotes immediate addressing Set the result with the match pattern by using the
AND command with a direct address.
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by Danial Kashif at undefined on 12/09/24.
CAIE AS LEVEL COMPUTER SCIENCE
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by Danial Kashif at undefined on 12/09/24.
CAIE AS LEVEL COMPUTER SCIENCE
Library file is a complex algorithm which the user Highlights undeclared/unassigned variable
does not need to understand to use it identifiers
Dynamic Link Library (DLL) files Initial Error Detection
Shared library file that contains code and data Dynamic syntax checks: Automatic checking and
Code saved separately from the main .EXE file, highlighting of syntax errors, as soon as line typed
reducing the .EXE file’s size Type checking & parameter checking
Code only loaded to main memory when required Presentation
DDL file can be made available to several applications Prettyprint: Automatic indentation and color-
simultaneously, thus reducing strain on memory coding of keywords
DLL files act as modules in more complex programs, Expand and Collapse code blocks: Saves excessive
making it easier to install and run updates scrolling if collapsed, and easy to see global
variable declarations and main program body
5.2. Language Translators when collapsed
Debugging
Assembler Single stepping: Executes program line-by-line to
Software that translates assembly language see the effect of each statement on variables
statements into machine code (binary) for execution Breakpoints: Pauses program at a specific line to
The mnemonics used translates into machine opcodes ensure program operates correctly up to that line
Process simple because assembly language has a Variables/expressions Report Window: Monitors
one-to-one relationship with machine code. variables for comparing values.
Compiler and Interpreter
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by Danial Kashif at undefined on 12/09/24.
CAIE AS LEVEL COMPUTER SCIENCE
Risk restriction: Ensure anti-virus and anti-spyware prevent them from accessing all data ∴ increases
software is installed, regularly updated and run. security
Hacking Data Backup
illegal access to a computer system An exact copy of an original piece of data in case
Hackers can obtain user’s confidential data which the original is lost or corrupted
can cause identity theft Within the same computer system or at different
Can lead to the deletion or corruption of data site
Risk restriction: Use strong passwords and ensure Disk-mirroring strategy
firewall Real-time strategy that writes data to two or more
Phishing disks at the same time.
Attempt through emails to obtain user’s If one fails, the other is still there to be read off of
confidential data which can cause identity theft
Risk restriction: Ignore suspicious mails and 6.2. Data Integrity
ensure firewall criteria include SPAM filters,
blacklist, etc. Data validation and data verification help protect the
Pharming integrity of data by checking whether the data entered is
Redirects user to a fake website that appears sensible and accurate, respectively.
legitimate to gain confidential data Data Validation: checks if data entered is valid, but not its
Risk restriction: use a reliable ISP; check that links accuracy
are genuine and ensure https is present in the URL Data Validation Methods
Computer System Security Measures Range check: data must be between a set of values
User Accounts and Passwords Format check: data must follow correct pattern/order
Usernames & passwords to deny access to Length check: data must have exact no. of characters
unauthorized users Presence check: checks if some data has been
User-assigned privilege, which accesses to only entered
the user’s workplace, preventing the user to have Existence check: data entered must exist
admin rights. Limit check: checks whether a value entered is within
Can assign privileges to files so users with low acceptable minimum and maximum values.
privileges do not have access. Check digit: A digit is used as the answer to an
Firewalls arithmetic operation of other digits in data. If not
Hardware or software that filters information matched, then data entered incorrectly
travelling between the computer system and the Data Verification: checks data entered is accurate during
internet data entry and data transfer
(software) firewall can make decisions about what Data Entry Verification Methods
to allow and block by detecting illegal attempts by Visual Check: Person manually compares original data
specific software to connect to the internet with that entered to check if correct
Authentication Double Entry: Enter data into computer twice and
Process of determining whether someone is who compares.
they claim to be. If differences found, go back to raw data to fix error
Helps prevent unauthorized access Data Transfer Verification Methods
Log-on using digital signatures, passwords and Errors may occur when data moved in system.
biometric scans. Parity Check
Anti-virus software All data transmitted as bits
Runs in the background to detect & remove Number of 1s in a byte must always be either an
viruses. odd number or an even number
Checks files for known malicious patterns Parity can be set either as even or odd
Anti-spyware software: detects & removes spyware. E.g. two communicating devices decide there will
Encryption: always be an odd number of 1s. A byte is received
Conversion of data to code by encoding it that has even number of 1s so error occurred and
It doesn’t stop illegal access but appears receiving device would ask for it to be sent again
meaningless Used also when data sent between parts of the
Necessary to use decryption software to decode CPU
data Not foolproof: if 2 bits are transposed, data
Data Security Measures accepted
Encryption Checksum Check
Access Rights to data (authorization): different Data sent from one place to another as block of
users assigned different authorization levels which bytes rather than individual bytes
Computer adds together all bytes being sent
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by Danial Kashif at undefined on 12/09/24.
CAIE AS LEVEL COMPUTER SCIENCE
Any bits lost at most-significant end as carry they learn to predict what might happen & raise
ignored so answer is an 8-bit number alert
Checksum calculated before and after data sent AI can learn to work more efficiently
If two bytes different, error occurred therefore when an action slows the system down, it can
block of bytes must be sent again prevent this from happening again
when an action increases the speed of the system,
it can repeat this when necessary to improve
7. Ethics and Ownership efficiency
AI Applications
Ethics: a system of moral principles that guide behaviour Developing autonomous mechanical products
based on philosophical views Machine learning through data sets
Computer Ethics AI Impacts
Regulate how computing professionals should make Social
decisions regarding professional & social conduct. Replacement of manual labour with automation
A computing professional can be ethically guided by could lead to massive unemployment.
joining a professional, ethical body such as the BCS However, it could lead to increased leisure time.
and IEEE, which have codes of conduct. Economic: Due to increased innovation and efficiency
Ownership with automation provided by AI, there’d be lower
Data ownership: having legal rights and complete manufacturing costs in general
control over a single piece or set of data elements. Environmental: Detrimental impact on the
Copyright gives the creators of some types of media environment due to robot manufacture with limited
rights to control how they're used and distributed. resources and its waste disposal
Competitors can steal programming ideas and
methods; software can easily be copied and
bootlegged (sold illegally); hence, legislation is needed 8. Database and Data
to protect the ownership, usage, and copyright of data.
Software Licencing Modelling
Free Software Foundation:
A license gives users freedom to run, copy,
8.1. File Based System
distribute, study, change, and improve the
software.
Data stored in discrete files, stored on computer, and can
Condition: any redistributed version of software
be accessed, altered or removed by the user
must be distributed with original terms of free use,
modification, and distribution (aka copyleft) Disadvantages of File Based System:
The Open Source Initiative:
The source code of open-source software is No enforcing control on organization/structure of files
readily available to users under copyright; it does Data repeated in different files; manually change each
enable users to re-distribute the software. Sorting must be done manually or must write a program
The concept of an open-source program relies on Data may be in different format; difficult to find and use
the fact that users can review source code to Impossible for it to be multi-user; chaotic
eliminate bugs in it Security not sophisticated; users can access everything
Shareware:
Demonstration software that is distributed for free 8.2. Database Management Systems
but for a specific evaluation period only
Distributed on a trial basis and with an
(DBMS)
understanding that sometime later, a user may be
Database: collection of non-redundant interrelated data
interested in paying for it
DBMS: Software programs that allow databases to be
Used for marketing purposes
defined, constructed and manipulated
Commercial: Requires payment before it can be used,
but includes all program's features, with no Features of a DBMS:
restrictions
Artificial Intelligence (AI): the ability of a computer to Data management: data stored in relational databases -
perform tasks in such a way that is conventionally tables stored in secondary storage
associated with human intelligence: Data dictionary contains:
AI can learn from past mistakes List of all files in database
they adapt to stop the same problem from No. of records in each file
occurring again Names & types of each field
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by Danial Kashif at undefined on 12/09/24.
CAIE AS LEVEL COMPUTER SCIENCE
Tools in a DBMS:
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by Danial Kashif at undefined on 12/09/24.
CAIE AS LEVEL COMPUTER SCIENCE
3rd Normal Form (3NF): it is in 1NF and 2NF and all non-key Query and maintenance of data done using this language
elements are fully dependent on the primary key. No inter- – written in SQL
dependencies between attributes.
Queries:
MANY-TO-MANY functions cannot be directly normalized
Creating a query:
to 3NF, must use a 2 step process e.g.
SELECT <field-name>
FROM <table-name>
WHERE <search-condition>
becomes:
SQL Operators:
= Equals to
8.6. Data Definition Language (DDL) > Greater than
< Less than
Creation/modification of the database structure using this
>= Greater than or equal to
language
<= Less than or equal to
written in SQL
Creating a database: <> Not equal to
IS NULL Check for null values
CREATE DATABASE <database-name>
Sort into ascending order:
Creating a table:
ORDER BY <field-name>
CREATE TABLE <table-name> (…)
Arrange identical data into groups:
Changing a table:
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by Danial Kashif at undefined on 12/09/24.
CAIE AS LEVEL
Computer Science
© ZNotes Education Ltd. & ZNotes Foundation 2024. All rights reserved.
This version was created by Danial Kashif on 12/09/24 for strictly personal use only.
These notes have been created by Saketh Devareddy for the 2024-2025 syllabus
The document contains images and excerpts of text from educational resources available on the internet and
printed books. If you are the owner of such media, test or visual, utilized in this document and do not accept its
usage then we urge you to contact us and we would immediately replace said media.
No part of this document may be copied or re-uploaded to another website. Under no conditions may this
document be distributed under the name of false author(s) or sold for financial gain.
“ZNotes” and the ZNotes logo are trademarks of ZNotes Education Limited (registration UK00003478331).