Revision
Revision
2210 / 0478
As can be seen it starts from 1 and then goes to 128 from
left to right
1. Data Representation Now values with 1 are to be added together, giving the
final answer, as for the example, it is 128 + 64 + 32 + 8 + 4
1.1. Number Systems + 2 = 238
1100 C 12
Final Answer: 0010000111111101
1101 D 13
1110 E 14 Converting Binary to Hexadecimal
1111 F 15
Divide the binary value into groups of 4 starting from the
right. If at the end, the last division is less than 4, add 0s
1.2. Number Conversions until it reaches 4
For each group, find the denary value as shown above,
Converting Binary to Denary and then convert each denary value to its corresponding
hexadecimal value (if less than 10, then itself, else, 10 is
Place the binary value in columns of 2 raised to the power A, 11 is B, 12 is C, 13 is D, 14 is E and 15 is F).
of the number of values from the right starting from 0.
After conversion, just put all the hexadecimal values in
e.g. For binary value 11101110, place it in a table like this: order to get the final answer
Convert the value to binary, and then convert it to Shifting 10101010 - 1 place left:
hexadecimal as explained above 1. The furthest bit in the direction to be logically
shifted is removed ( in this case, one at the LHS is
removed) - ==(if it were two places, 2 bits would
1.3. Binary Calculations have been removed)==
2. Every bit is moved in given places to the given
Binary values are not added the way denary values are
direction ( every bit is moved one place to the left
added, as when adding 1 and 1, we cannot write two
in this case, and the leftover bit in the right is
because it doesn’t exist in binary.
marked 0, so 10101010 would become 01010100)
Steps to add Two Values (With Example) Converting negative values to two complement
The values we will add are 1 1 0 1 1 1 0 and 1 1 0 1 1 1 1 0
Find the binary equivalent of the value ignoring the - sign
1. Convert both the bytes into 8 bits (add zero to the
Convert the binary value to two’s complement
left-hand side to match them).
Make the MSB 1, if not already
e.g., 1 1 0 1 1 1 0 would become 0 1 1 0 1 1 1 0
2. Add the values as follows with the points given
Converting Two’s Complement Value to Denary:
above
We do it the same way as a normal value is converted
Carry 1 1 1 1 1 1 1
from binary to denary; we only replace 128 with -12,8 e.g.,
Byte 1 0 1 1 0 1 1 1 0 for 1011101,0 we do the:
Byte 2 1 1 0 1 1 1 1 0
OVERFLOW -128 64 32 16 8 4 2 1
Solution 1 0 1 0 0 1 1 0 0 1 0 1 1 1 0 1 0
Note: We move from RHS to LHS, and when adding values, we -128 + 32 + 16 + 8 + 2 = -70
use the rules given above. If the bit crosses the limit
1.4. Use of the Hexadecimal System
Examples: The first 128 values are the same as ASCII.
Unicode supports up to four bytes per character, storing
Defining colours in Hypertext Markup Language (HTML) multiple languages and more data.
Media Access Control (MAC) addresses (a number that To represent text in binary, a computer uses a character
uniquely identifies a device on a network) set, a collection of characters and the corresponding
Assembly languages and machine code binary codes that represent them.
Memory Dumps
Debugging (method to find errors in a program) Sound
Display error codes (numbers refer to the memory
location of the error) Sound is analogue, and for it to be converted to digital
IP (Internet Protocol) addresses form, it is sampled
The sound waves are sampled at regular time intervals
Memory Dumps
where the amplitude is measured. However, it cannot be
Hexadecimal is used when developing new software or measured precisely, so approximate values are stored
when trying to trace errors.
Memory dump is when the memory contents are output How is Sound Recorded
to a printer or monitor.
The amplitude of the sound wave is first determined at set
Assembly code and machine code (low-level languages) time intervals
The value is converted to digital form
Computer memory is machine code/ assembly code Each sample of the sound wave is then encoded as a
Using hexadecimal makes writing code easier, faster, and series of binary digits
less error-prone than binary. A series of readings gives an approximate representation
Using machine code (binary) takes a long time to key in of the sound wave
values and is prone to errors.
Sampling Resolution:
1.5. Text, Sound and Images
The number of bits per sample is known as the sampling
resolution (aka bit depth)
ASCII
Increasing the sampling resolution increases the accuracy
The standard ASCII code character set consists of 7-bit of the sampled sound as more detail is stored about the
code that represents the letters, numbers and characters amplitude of the sound.
found on a standard keyboard, together with 32 control Increasing the sampling resolution also increases the
codes memory usage of the file as more bits are being used to
store the data.
Uppercase and lowercase characters have different ASCII
values
Every subsequent value in ASCII is the previous value + 1.
Sampling Rate
e.g. “a” is 97 in ASCII, “b” will be 98 (which is 97 + 1)
The sampling rate is the number of sound samples taken
Important ASCII values (in denary) to remember are as
per second, which is measured in Hertz (Hz)
follows:
A higher sampling rate would allow more accurate sound
as fewer estimations will be done between samples.
0 is at 48
A is at 65 Images
a is at 97
Bitmap Images
ASCII uses one byte to store the value
When the ASCII value of a character is converted to Bitmap images are made up of pixels
binary, it can be seen that the sixth-bit changes from 1 to A bitmap image is stored in a computer as a series of
0 when going from lowercase to uppercase of a binary numbers
character, and the rest remains the same. e.g.
Colour Depth
IECB System (Most Common) Uses technology known as Audio Compression to convert
music and other sounds into an MP3 file format
Name of memory No. of This compression reduces the normal file size by 90%
Equivalent Denary Value Done using file compression algorithms which use
size Bytes
Perceptual Music Shaping
1 kibibyte (1KB) 210 1 024 bytes
Removes sounds that the human ear cannot hear
1 mibibyte (1MB) 220 1 048 576 bytes properly
Certain sounds are removed without affecting the
1 gibibyte (1GB) 230 1 073 741 824 bytes
quality too much
1 tibibyte (1TB) 240 1 099 511 627 776 bytes CD files are converted using File Compression Software
1 125 899 906 842 624 Use lossy format as the original file is lost following the
1 pibibyte (1PB) 250 compression algorithm
bytes
MP4
Conventional System
This format allows the storage of multimedia files rather
Name of memory No. of than just sound
Equivalent Denary Value
size Bytes Music, videos, photos and animations can be stored
1 kilobyte (1KB) 103 1 000 bytes Videos could be streamed without losing any real
discernible quality
1 megabyte (1MB) 106 1 000 000 bytes
Joint Photographic Experts Group (JPEG)
1 gigabyte (1GB) 109 1 000 000 000 bytes
1 terabyte (1TB) 1012 1 000 000 000 000 bytes JPEG is a file format used to reduce photographic file sizes
1 000 000 000 000 000 Reducing picture resolution is changing the number of
1 petabyte (1PB) 1015 bytes pixels per centimetre
When a photographic file undergoes compression, file
size is reduced
Calculation of File Size
JPEG will reduce the raw bitmap image by a factor
between 5 and 15
The file size of an image is calculated as: image resolution
(in pixels) × colour depth (in bits)
Size of the packet
1.8. Lossless and Lossy File
Payload
Compression Contains the actual data
Trailer
Lossless File Compression Includes a method of identifying the end of the
packet
All the data bits from the original file are reconstructed Error-Checking methods
when the file again is uncompressed. Packet Switching - Method of data transmission where the
Important for files where the loss of data would be data is broken into multiple packets. Packets are then sent
disastrous (spreadsheet) independently from start to end and reassembled at the
An algorithm is used to compress data receiver’s computer.
No data is lost
Repeated patterns/text are grouped together in indexes Advantages Disadvantages
There is no need to create a
Run-Length Encoding Packets may be lost
single line of communication
Possible to overcome failed or More prone to errors in real-
It reduces the size of a string of adjacent, identical data
busy nodes time streaming
(e.g. repeated colours in an image)
A repeating string is encoded into two values: the first Delay at the receiver while
value represents the number of identical data items (e.g. High data transmission speed the packets are being re-
characters), and the second value represents the code of ordered
the data item (such as ASCII code if it is a keyboard Easy to expand package
character), e.g. ‘aaaaabbbbccddddd’ becomes “05 97 04 usage
98 02 99 05 100.”
RLE is only effective where there is a long run of repeated Data Transmission
units/bits
One difficulty is that RLE compression isn't perfect for Simplex data transmission is in one direction only (e.g.
strings like "cdcdcdcdcd". We use a flag to solve this; e.g. computer to printer)
255 can be made the flag. Now 255 will be put before Half-duplex data transmission is in both directions but not
every repeating value, e.g. our previous example at the same time (e.g., in a phone conversation where
becomes 255 05 97 255 04 98 255 02 99 255 05 100 only one person speaks)
where 255 now indicates that the next character/set of Full-duplex data transmission is in both directions
characters is approaching simultaneously (e.g. broadband connection on the phone
line)
Lossy File Compression Serial data transmission is when data is sent one bit at a
time over a single wire
The file compression algorithm eliminates unnecessary Parallel data transmission is when data of several bits (1
data bits like MP3 and JPEG formats. byte) are sent down several wires at the same time.
It is impossible to get the original file back once it is
compressed Comparison of Serial and Parallel Data Transmission
Reduces file quality
In this, the image's resolution and colour depth are Serial Parallel
reduced.
Better for longer distances Better for short distances
(Telephone Lines) (Internal circuits)
2. Data Transmission Cheaper Option
Expensive (More hardware
required)
Used when the size of data Used when speed is
2.1. Types and Methods of Data transmitted is small necessary
Transmission Slower Option Faster than Serial
Data Packets
2.2. Universal Serial Bus (USB)
Packet Structure -
USB is an asynchronous serial data transmission method
Header
USB consists of:
Contains the IP address of the sender and the
Four-wire shielded cable
receiver
Two wires are used for power and earth
The sequence number of the packet
Two wires are used in data transmission
Advantages Disadvantages request is made to re-send the data.
Transmission rate is less than
Automatically detected Echo Check
120 MB/sec
Only fit one way, prevents Maximum cable length is Once the data has been sent, The receiver will send the
incorrect connections about 5 metres data back to the sender for verification.
Different data transmission The sender would compare the received and original data
rates for errors.
Backwards compatible The only downside is that we wouldn’t know if the error
Industry-standard occurred when sending the data or sending the data back
for verification.
Parity Checks Check digits are calculated from all the other digits in the
data (ex-codes). The check digit would be the last digit of
It uses the number of 1-bits in a byte the code.
Type Types - These are used to identify mistyping errors such as -
Even - Even number of 1-bits 6372 typed as 6379
Odd - Odd numbers of 1-bits 8432 typed as 842
Example (Even Parity) -
Automatic Repeat Requests (ARQs)
0 1 0 1 1 0 1 0
Uses acknowledgements and timeouts to make sure the
The LMB (Left-Most Bit) is the parity bit. As the number of user received the data
1s is even, the parity bit would be set to even. The receiver would check the data for any errors; if none
Limitations with Parity Checks are found, a positive acknowledgement is sent to the
Two bits may change during transmission; therefore error sender. However, if errors are found, a negative
is not found acknowledgement will be sent, and the data will be sent
Even though the parity checks would reveal the errors, the again.
bit(s) changed wouldn’t be identified The sender uses timeouts to wait for a pre-determined
amount for the acknowledgement.
Parity Blocks If no acknowledgements are received after the timeout,
the data will be sent again to the receiver.
To overcome the limitations of parity bits, Parity blocks
would be used.
2.4. Encryption
Encryption is a process of turning the data into an
unreadable form so it doesn’t make sense to hackers and
other attackers.
Any changes in bits would be identified through the rows Symmetric and Asymmetric Encryption
and columns
Symmetric Encryption:
Checksum It uses an encryption key for the encryption process;
the same key is used for encrypting and decrypting
Whenever a block of data needs to be sent, the sender
the data.
would calculate the checksum value using a specific
Asymmetric Encryption:
algorithm.
Uses a public key and a private key. The public key is
Once the data has been sent, The receiver would available to everyone, whereas the private key is only
calculate the checksum again with the same set of data
available to the user.
and the same algorithm used before.
The receiver would have the private key, and they
The receiver would then compare the value received and
would send the public key to the sender. The sender
the newly calculated value. If they aren’t matched, A
can encrypt the message with the public key, and the
data can be decrypted using the private key.
3. Hardware
3.1. Computer Architecture & Von
Neumann Architecture
The central processing unit (CPU) (also known as a
Source: Cambridge IGCSE and O Level Computer
microprocessor or processor) is central to all modern
Science - Second Edition (Hodder Education)
computer systems
Overclocking
WWW.ZNOTES.ORG
Using a clock speed higher than the computer was designed 3D scanners can scan solid objects and produce a three-
for. dimensional image
It leads to multiple issues. Scanners take images at several points, x, y and z (lasers,
magnetic, white light)
Operations become unsynchronised - (the computer The scanned images can be used in Computer Aided
would frequently crash and become unstable) Design (CAD) or to a 3D printer to produce a working
can lead to serious overheating of the CPU model
The wider the data buses, the better the performance of the Make use of (OCR) to produce digital images which
computer represent the passport pages
Text can be stored in ASCII format
Cache The 2D photograph in the passport is also scanned and
stored as jpeg image
Cache memory is located within the CPU itself The passenger’s face is also photographed using a digital
-- allows faster access to the CPU camera and compared using face recognition software
-- stores frequently used instructions and data that need to be Key parts of the face are compared (distance between
accessed faster, which improves CPU performance eyes, width of nose)
The larger the cache memory size, the better the CPU
performance Barcode readers/scanners
Blu-ray Disks
You may be expected to draw a diagram like the above. Uses a blue laser to carry out read-and-write operations
The main advantages of virtual memory are The wavelength of laser light is less than CD and DVD
They can be larger than the physical memory provided (stores up to five times more data than DVD)
in the RAM. Automatically come with secure encryption (prevent
piracy and copyright infringement)
Used as backup systems Updating automatically via a satellite, cellular or Wi-Fi
link
USB Flash Memories
Advantages and Disadvantages of using embedded systems
Very small, lightweight, and suitable for transferring files
Advantages Disadvantages
Small back-up devices for photo, music
Small in size, therefore can
Solid state, so needs to be treated with care Can be difficult to upgrade
easily fit into devices
Cloud Storage: The interface can be
Low cost to make
confusing sometimes
Cloud storage is a method of data storage where data is
Troubleshooting is a
stored on remote servers Requires very little power
specialist’s job
The same data is stored on more than one server in case
of maintenance or repair, allowing clients to access data Often thrown away as difficult
Very fast reaction to changing
at any time. This is known as data redundancy. to upgrade and faults are
input
harder to find
The following are its types: Increased garbage as they
Dedicated to one task only
are thrown away
Public cloud – this is a storage environment where the
customer/client and cloud storage provider are different Any computerised system is
Can be controlled remotely
companies prone to attacks
Private cloud – this is storage provided by a dedicated
environment behind a company firewall; customer/client Applications of Embedded devices
and cloud storage provider are integrated and operate as GPS systems
a single entity Security Systems
Hybrid cloud – this is a combination of the two above Vending Machines
environments; some data resides in the private cloud, and Washing Machines
less sensitive/less commercial data can be accessed from Oven
a public cloud storage provider Microwave
Routers
Router functionality:
A router is a networking device that directs data
packets between different networks.
It determines the most efficient path for data
transmission.
Sending data to a specific destination on a network: Source: Cambridge IGCSE and O Level Computer Science -
A router examines the destination IP address of Second Edition (Hodder Education)
incoming data packets.
It uses routing tables to determine the next hop or the Memory Management - Manages the RAM and the
next router on the path to the destination. HDD/SSD during the execution of programs
The router forwards the data packet to the Security Management - Providing security features such
appropriate next hop. as Anti-Virus, System updates and so on
Router's role in IP address assignment: Hardware Peripheral Management - Managing the device
A router can act as a DHCP server (Dynamic Host drives, Inputs, Outputs, Queues and buffers
Configuration Protocol) and assign IP addresses to File Management - Opening, Creating, Deleting,
devices on a local network. Renaming, and many more functions
It dynamically allocates IP addresses from a Multitasking - OS would share the hardware resources
predefined range to connected devices. with each of the processes
DHCP allows for automatic IP address configuration Management of User Accounts - OS would allow multiple
and simplifies network management. users to customise their accounts individually.
Connecting a local network to the Internet:
A router serves as the gateway between a local
4.1. Running of Applications
network and the internet.
The computer starts its OS (booting up the computer)
It connects the local network to an internet service
through the bootstrap loader.
provider (ISP) network.
The BIOS (Basic Input/Output System) tells the computer
The router receives data packets from devices on the
the location of the OS in the storage.
local network and forwards them to the internet.
BIOS is often referred to as the firmware Assembly language must be translated into machine
code using an assembler to run.
Translators
Compiler
Timing signals: Scheduled signals prompt the Defragmentation software rearranges the data blocks on
microprocessor to pause and handle tasks at specific a hard disk drive (HDD) to store files in contiguous
intervals. sectors, reducing head movements and improving data
Input/Output processes: Events such as a disk drive or access time.
printer requiring additional data cause an interruption in As an HDD becomes full, blocks used for files become
the microprocessor's activities. scattered all over the disk surface, making it slower to
Hardware faults: Issues like a paper jam in a printer, retrieve data as the HDD read-write head needs several
signalling the microprocessor to halt its operations and movements to find the data.
address the hardware problem. When a file is deleted or extended, new data does not fill
User interaction: Instances like a user pressing specific the vacant sectors immediately, causing the files to
keys on a keyboard (e.g., ), leading to an interrupt in the become more scattered throughout the disk surfaces.
system's operation. A disk defragmenter rearranges the data blocks to store
Software errors: Problems such as missing .exe files files in contiguous sectors wherever possible, allowing for
needed to initiate a program, conflicts like two processes faster data access and retrieval.
accessing the exact memory location, or attempts to The defragmentation process can free up previously
divide by zero. These errors trigger interrupts, prompting occupied sectors and empty some tracks.
the microprocessor to handle the issues.
Backup Software
5. The Internet and Its Uses The browser sends a request to the IP of the webserver
Browser interprets the HTML
Malware
The first block is called the genesis block as it doesn’t point to
any previous block (Previous Hash Value - 0000) Stands for Malicious Software. A few examples are -
Virus - A program that can replicate itself with the
5.3. Cyber Security intention of deleting or corrupting files, causing a
computer malfunction
Brute Force Attack: Ransomware - Attackers encrypt the user’s data until a
certain amount of money is paid
Hackers try to guess your password by trying all the Adware - Displays unwanted ads on the user’s screen
different combinations of letters, numbers and symbols. Trojan Horse - Programs that are disguised as
Effect: legitimate software
Hacker gets access to user’s personal data (credit
Spyware - Sends data about all the activities of the
cards, passwords and more) user to the attacker
To remove risk: Worms - Programs that can replicate themselves with
Use stronger passwords with more characters and the intention of corrupting the entire network instead
symbols of the computer alone
Data Interception:
Phishing
This involves stealing data by tapping into a wired or a Attackers send legitimate-looking emails to bait the user
wireless transmission line into giving out their information.
Wardriving - The act of locating and using wireless To remove risk:
internet connections illegally
Don’t open links from unknown receivers
Packet Sniffing - Uses Packet sniffers to examine Use anti-phishing tools
packets sent over a line; all the data collected is sent Block pop-up ads
back to the attacker Have an up-to-date browser
Effect:
It can cause a computer to crash Pharming
Can delete or corrupt files/data
To remove risk: The attacker installs a malicious code on the computer,
Install anti-virus software which redirects the user to fake websites
Don’t use software from unknown sources Effect:
Be careful when opening emails from unknown The user gives out login details and other personal
details
Distributed Denial of Service Attacks (DDoS) To remove risk:
Using anti-virus software
An attempt at preventing users from accessing part of a Checking the spelling and the weblink carefully
network Make sure that the green padlock is present in the
Usually temporary but may be damaging URL bar
An attacker may be able to prevent the user from:
Social Engineering Attacks like DDoS and Hacking attack the proxy
server, keeping the web server safe.
Attackers create a social situation which leads to victims Acts as a firewall as well.
giving out their details (For example - Spam calls Privacy Settings - Used to limit who can access and see a
informing them that their account has been hacked) user’s profile
SSL (Secure Socket Layer) - Set of rules used while
Keeping data safe from threats communicating with other users on the internet.