Sei sulla pagina 1di 63

IGCSE Computer

Studies Notes
End of Term 1 2019-20 Notes

Baraa Khaled IGSCE British Stream Cst Theory + Programming


EOT 1 Exams 2019-20 Cst Notes

Table of Contents

Chapter 1 ...................................................................................................................................................... 2
Binary Systems and Hexadecimal

Chapter 2 ...................................................................................................................................................... 3
Communication and Internet Technologies

Chapter 3 ...................................................................................................................................................... 6
Logic Gates and logic Circuits

Chapter 4 ...................................................................................................................................................... 8
Operating Systems and Computer Architecture

Chapter 5 .................................................................................................................................................... 10
Input and Output Devices

Chapter 6 .................................................................................................................................................... 23
Memory and Data Storage

Chapter 7 .................................................................................................................................................... 26
High- and Low-Level Languages

Chapter 8 .................................................................................................................................................... 27
Security and Ethics

Chapter 9 .................................................................................................................................................... 34
Problem Solving and Design

Chapter 10 .................................................................................................................................................. 42
Pseudocode and Flowcharts

Chapter 11 .................................................................................................................................................. 51
Programming Concepts

Checklist...................................................................................................................................................... 54
IGCSE 2020 Syllabus

1|Page
EOT 1 Exams 2019-20 Cst Notes

CHAPTER 1
 Is a base 2 system, usually made up of 8 bits (1 byte). {10111010}
 Converted into hexadecimal by splitting the number to 4 groups and calculating
the value of each Value 8 4 2 1 8 4 2 1 8 4 2 1
byte:
Binary Digit 1 0 1 1 0 1 1 0 1 1 1 1
 Converted into denary
by finding out the value of each
bit: Value 128 64 32 16 8 4 2 1
Digit 1 0 0 1 0 1 1 1
 Is a base 10 system, which is everyday numbers, such as 154 or 65…
 Converted into binary by placing the correct number of bits in the right position
Denary
to make the total equal the denary value.
 Converted into hexadecimal by significantly dividing the number by “16”.
 Is a base 16 system, which is very similar to the binary number format, but with
letters from “A” to “F”. {E7A}
Hexadecimal  Converted into binary by using the table below. Take the equivalent binary value
of the hex one and that substitute it in place of the hex value.
 Converted into denary by multiplying the value with its position.
 This is a table showing Binary Value Hex Value Denary Value
the relation between 0000 0 0
binary, denary, and 0001 1 1
hexadecimal. 0010 2 2
 It is very important to 0011 3 3
memorize and 0100 4 4
understand this table 0101 5 5
0110 6 6
thoroughly because it
Relation 0111 7 7
will not be provided in
1000 8 8
the exam.
1001 9 9
 As well as, you should 1010 A 10
know when and how 1011 B 11
to use it in different 1100 C 12
types of questions. 1101 D 13
1110 E 14
1111 F 15
 There are five main uses of hexadecimal in real life:
o Memory Dumps
Hexadecimal o HTML (HyperText Mark-up Language)
Uses o MAC (Media Access Control)
o Web Addresses
o Assembly Code & Machine Code

2|Page
EOT 1 Exams 2019-20 Cst Notes

CHAPTER 2
 Simplex data transmission is in one direction only (sender to receiver).
Simplex data  Example of serial data transmission in radios:
transmission

 Half-duplex data transmission is in both directions but not at the same time.
Half-duplex  Example of half-duplex data transmission in radios:
data
transmission

Full-duplex  Full-duplex data transmission involves transmission in both directions


data simultaneously (same time).
transmission  Example of full duplex data transmission in calls:

 Serial data transmission is once a single bit is sent through a single wire once a
time.
 Advantages:
o Works well over long distance because it’s only one wire resulting in low
Serial data cost.
transmission o No issue if data sent out of order.
o More reliable (single bit sent at a time, less chance of errors).
 Disadvantages:
o Much slower rate than parallel transmission because there is only one bit
sent at a time.
 Parallel data transmission is when multiple bits (usually a byte) is sent down
several channels/wires simultaneously.
 Advantages:
o Faster rate of transmission because multiple bits are sent at the same
Parallel data
time.
transmission
o Works well over short distances.
 Disadvantages:
o Wires may be skewed due to having a lot of them.
o Less reliable due to larger amounts of data being sent to the receiver.
 Asynchronous data transmission means data being transmitted in an agreed bit
Asynchronous
pattern along with control bits that group bits.
data
 Receiver has the knowledge of when a new bit is being received and when it ends.
transmission
 This means it’s a great advantage because the data will not be mixed up.
 Synchronous data transmission is basically a continuous stream of data that is
being sent to the receiver.
Synchronous
 Data is accompanied by timing signals to ensure that that the sender and receiver
data
are synchronised.
transmission
 This method is faster than asynchronous data transmission because the data
doesn’t stop flowing.

3|Page
EOT 1 Exams 2019-20 Cst Notes

 USB (Universal Serial Bus) is an asynchronous type of data transmission which


has become universally used.
 Table consisting advantages & disadvantages of using USB:

USB Advantage (+) Disadvantage (-)


(Universal Devices are automatically detected Max cable length is about 5 meters
Serial Bus) Connectors fit in one way only Transmission rate is less than 500 mbits/sec
It became the industry standard Old USB standard may not be supported
Different rates of transmissions are supported -----
New USB is backwards compatible with old ones -----

 This is a way to check for errors and corruptions when data is being transmitted.
 First of all, both the sender and receiver agree to use either even or odd parity
check.
Parity
 Then when the sender sends a byte, it will contain a parity bit that adjusts the
Checking
sum of the 1's in the byte to be odd/even (according to the agreement).
Method
 If the receiver finds out that it is not following the odd/even parity check, he will
ask for a resend.
 A disadvantage is that we won’t know which bit is exactly the error.
 First of all, you will need to identify what is type of parity check used.
 Then you will have to go row by row to find the byte that doesn't use the same
type.
 After finding the incorrect row, you will do the same steps with the columns.
Parity Data
 Finally, after locating the incorrect row & column, we will spot the intersection
Block
point that both of them meet together in, and from that we will spot the incorrect
bit.
 Now simply we can change the 1 to 0 or the 0 to 1.

 Is another way to check whether data has been transmitted correctly.


 An acknowledgment* is sent to the sender by the receiver to clarify that the data
has been transmitted correctly to the receiver.
 If the sender doesn’t receive the message (the acknowledgment) within an
allocated time then a timeout* occurs and the sender automatically sends the
data again.
*Acknowledgment: is a message sent by the receiver indicating that the data has
been received correctly.
ARQ *Timeout: is time allowed to elapse before an acknowledgment is received.
(Automatic
 Simple diagram to explain ARQ:
Repeat
Request)

4|Page
EOT 1 Exams 2019-20 Cst Notes

 Divide the sum of bytes, X, by 256


 Round the answer down to nearest whole number, Y. 2.7  2 | 2.4  2
 Y * 256 = Z
 Subtract X – Y
Checksum  Value is the checksum
 Example (value is 873):
o 873 ÷ 256 = 3.41  3
o 256 × 3 = 768
o 873 – 768 = 105  Checksum
 Basically, when the data is sent to another device (receiver), this data is sent back
to the sender. Then the sender compares the two sets of data to check for any
Echo check errors.
 This way is not reliable since we won’t be able to identify whether an error
occurred during the process of the transmission or when sending the data back…
 ISP (Internet Service Provider) is a company that provides users access to the
ISP internet.
 A monthly or yearly fee is charged to have access for the internet.
 IP Address (Internet Protocol) Address is unique address that is given to each
IP Address device which is connected to the internet.
 It can be used as a shortcut for URLs on a browser.
 MAC Address (Media Access Control) is unique number that identifies a device
MAC Address
connected to the internet.
Difference  IP address gives the location of a device on the internet, whereas MAC addresses
between IP identifies the device connected to the internet.
Address &  An IP address will change if your location changes, whereas your MAC address
MAC Address will not change because your device will stay the same.
 HTML (Hyper Text Mark-up Language) structure consists of the mandatory parts
HTML
of an HTML document plus the semantic and structured mark-up of its contents.
Structure &
 Presentation is the style you give the content. In most cases presentation is about
Presentation
the way a document looks, but it can also affect how a document sounds.
 Http (Hypertext Transfer Protocol) defines how messages are formatted and
transmitted, and what actions Web servers and browsers should take in response
Http(s)
to various commands.
 Https is just the secure type of http but it is slower to use than the normal one.
 Web browser is a software application for accessing information on the World
Wide Web. Each individual web page, image, and video is identified by a distinct
URL, enabling browsers to retrieve and display them on the user's device.
 There are various examples of web browsers, which include:
o Mozilla Firefox
o Google Chrome
Web browsers o Microsoft Edge
Etc….
 URL parts:
https://mris.edupage.org/timetable
 Red: Protocol used
 Blue: Web server’s name
 Green: File Name
5|Page
EOT 1 Exams 2019-20 Cst Notes

CHAPTER 3
 How it’s drawn:

 Functions: Flip the numbers to their opposite (1 0/01)


Logic gate
NOT
 Feature(s):
o One input
o If added with other logic gates, it can form a new gate.
 How it’s drawn:
Logic gate
AND
 Function: Multiply the two inputs (A*B)

 Feature(s):
 Two inputs
 How it’s drawn:

Logic gate  Function: Add the two inputs (A+B)


OR
 Feature(s):
 Two inputs
 How it’s drawn:

 Function: Operates as AND then flip the answer (A*B …)


Logic gate
NAND
 Feature(s):
 Two inputs
 Defined as AND then NOT
 How it’s drawn:

 Function: Operates as OR then flip the answer (A+B …)


Logic gate
NOR
 Feature(s):
 Two inputs
 Defined as OR then NOT
 How it’s drawn:

Logic gate  Function: If inputs are the same, output is 0 and vice versa.
XOR
 Feature(s):
 Two inputs

6|Page
EOT 1 Exams 2019-20 Cst Notes

 Is a table which shows the input(s) and output of a logic circuit.


 Memorize how the numbers are placed in each of 2 and 3 inputs:
Inputs
Inputs A B C
A B 1 1 1
1 0 1 1 0
Truth Table
0 1 1 0 1
1 0 1 0 0
0 1 0 1 1
0 1 0
0 0 1
0 0 0
 A logic statement is another way of representing a logic circuit but with words.
 An example of a logic statement is the following:
Logic (A= 1 AND B= NOT 1) OR (B= 1 AND C= NOT 1)
statements  B= NOT 1 is the same as saying B= 0 but the common way is NOT 1.
 Sometimes you are given a logic statement and aasked to convert it into a logic
circuit and vice versa.

7|Page
EOT 1 Exams 2019-20 Cst Notes

CHAPTER 4
 An operating system (OS) is a software which runs in the background of a
computer system.
 They carry out varrious functions, such as:
o Multitasking
o Error Handling
Operating o Input & output control
System o Security (passwords as an example)
o Memory management
Etc…
 When computer is starting up, programs, which check that the components are
functioning correctly, are loaded onto the ROM. If no errors are detected then the
OS is loaded into the memory.
 Interrupts are signals sent (most likely) by a harware to the computer for
attention due to an error that has occurred.
 An example is when the printer runs out of paper, so in this case the printer sends
an interrupt signal to the computer indicating that there is an issue.
Interrupts and
 Buffers are used when data is transferred at different rates. Buffers are
Buffers
temporary storage areas for data.
 For example, when a computer sends multiple documents to the printer, the data
(documents) which are not being are stored in the buffer for a temporary time
until they are printed.
 There are three types of busses used to transfer different things, they are:
o Address Bus: carries signals related to addresses between the processor
and the memory. This bus is unidirectional.
Von Neumann
o Data Bus: sends data between the processor, the memory unit and the
Busses
input/devices devices. This bus is bidirectional.
o Control Bus: carries siganls relating to control and coordination of all
activities within the computer. This bus is both uni and bi directional.
 MAR (Memory Address Register)
 MDR (Memory Data Register)
Registers  ALU (Arithmetic and Logic Unit)
 PC (Program Counter)
 CIR (Current Instruction Register)
 It’s used to hold the memory address (location) that contains either the next
MAR
piece of data or an instruction that is to be used.
 Acts like a buffer and holds anything that is copied from the memory, tready for
MDR
the processor to use.
 Step 1: Address read to MAR.
Read
 Step 2: Read signal is sent
Operation
 Step 3: Address is now written to the MDR
 Step 1: Data to be stored is first written to MDR
Write  Step 2: Address is now written into the MAR
Operation  Step 3: Write signal is sent

8|Page
EOT 1 Exams 2019-20 Cst Notes

 1. PC contains the address of the next instruction to be fetched


 2. The address is copied from the PC to MAR via address bus
 3. The instruction at the memory address in the MAR is copied into the MDR
Fetch-Execute  4. The instruction in the MDR is copied into CIR
Cycle  5. Value in PC is increased by 1 so that it points to the next instruction to be
fetched
 6. Instruction is decoded and then excuted by sending out signals to computer
components

9|Page
EOT 1 Exams 2019-20 Cst Notes

CHAPTER 5
 Most common form of scanner which, most likely, inputs a hard-copy document
into the computer by converting it into an electronic form.
 Stages of scanning that occur within the scanner:
o Cover raised, document placed on the flatbed, cover is closed
o A scan head moves below the glass panel with an xenon lamp on top of it to
illuminate light on the document.
o The document (paper) reflects some/most of the light depending on the
2D scanners
darkness of the paper.
o The reflected light hits a series of mirrors which eventually passes through a
lens. This lens is used to collect and focus the image reflected by the paper.
o Finally, this focused image falls onto a charge couple device (CCD), where
the most important stage occurs. Here the image is transformed into an
electronic form by having all the stored pixels in the CCD to create an
electric charge one light strikes them.
 When the computer receives the electronic form of the document, it may have an
Optical Character Recognition (OCR) software which converts the document into a
After a 2D text file format.
scan  Text file format allows the scanned image to be edited by importing it into a word
processor.
 If the scanned document was a picture, it will be stored as JPEG.
 Scans actual three-dimensional objects and from it, it produces a 3D image but
electronically.
 Basically, since a 3D object has length, width, and height, the scanner takes several
3D scanners
shots from different angles and joins them to form a three-dimensional electronic
image.
 Those 3D scanners may use lasers, magnetic resonance, white light, etc…
After a 3D  The image formed maybe used in Computer Aided Design (CAD), or to be
scan physically printed by a 3D printer!
 In some airports, a scan of the passport is taken and then it automatically fills a
specific database (by the use of OCR technology…).
Application of
 In other times, they only take a JPEG form of the passport to compare it with
2D Scanners
another 2D picture taken in the airport. This useful so the police can check if he’s
the real owner of that passport.
 Computed Tomographic (CT) Scanners have a special way of building a 3D object.
Basically, it takes several 2D images (slices) and joins them together to make a
Application of complete 3D object.
3D Scanners  The way each slice is captured is by the use of X-Rays, radio frequencies or gamma
imaging. Then those slices are stored individually & digitally in the computer’s
memory

10 | P a g e
EOT 1 Exams 2019-20 Cst Notes

 A barcode is a series of dark and light parallel lines of different thickness.


 Each number of the barcode has a unique formation of its bars.
 On the furthest left, in the middle, and the furthest right, we will find “guard
bars”. Their function is to separate the left & right hand sides of the barcode,
What is a and to surround the barcode. Their shape is distinct from the other bars by
barcode? longer and thinner bars.
 The right hand side of the barcode always starts with a white bar.
 The left hand side of the barcode always starts with a black bar.
 Whether the barcode is upside down or not, the scanner still can read with no
issues.
 A red laser or red LED is shined onto the barcode.
 Light is reflected back off the barcode; dark areas reflect more and vice versa.
(reflection here is similar to the 2D scanner)…
Barcode
 The reflected light is read by sensors (photoelectric cells).
Scanner/
 A pattern is generated which is converted into digital data to allow the
Reader
computer to understand it.
 L = 0 while D = 1. So a digit can form LDDDDLD which is then converted into
0111101.
 The barcode is searched for on the supermarket database, where each item has
its unique identification.
 Stock item record is looked up.
 The price and other information is sent to the cashier (POS).
 The stock item is reduced by one to hold record of the amount of the items
After the
available.
barcode has
 New value sent back to the stock item record.
been read
 Depending on the amount of products left, the stock item is automatically
ordered.
 When the order is generated, a flag is added to the record to stop re-ordering if
the barcode was read again.
 When new stock arrives, the database is updated…
 Fast, easy and reliable when it comes to changing prices.
Advantages of  Better and up-to-date sales information.
barcodes to  No need to price every stock item on the shelves.
management  Allows for automatic stock control.
 Possible to check customer buying habits.
 Faster checkout.
Advantages of  Errors in charging customer extra money is reduced.
barcodes to  Customer receives a detailed bill.
the customer  Cost savings can be passed on to the customers.
 Better track of “sell by dates” so food should be fresher.
 Another type of barcode which uses matrix of filled-in dark squares on a light
(usually white) background.
What is a QR  An example of a QR code which we may find anywhere that
code? contains a link to the website URL:

11 | P a g e
EOT 1 Exams 2019-20 Cst Notes

 Compared to a normal barcode, they can hold much more digits which can
reach up to 7000 digits.
 A great advantage over barcodes is the fact that there is no need for a specific
scanner to read a QR code, instead, you can use you normal smartphone for
Advantages of
that manner.
using QR
 Since the smartphone can read a QR code, then there is good chance of
codes
advertising products/services in public areas.
 No need for the user to write down the URL of the website; instead when
scanning the code, it does that automatically.
 They can store website addresses /URLs.
 Old cameras used film to record a photo
 A film is required to be developed and printed to be seen by the photographer.
 You couldn’t delete unwanted photos which caused it to be expensive to
operate.
 Modern cameras are connect to the computer via Bluetooth or a USB which
Difference then will send the photographs to the computer to be edited/saved.
between old  Modern cameras contain microprocessors which carry out the following tasks:
and new  Adjust the shutter speed. Shutter: a mechanical device on a camera
cameras that opens and closes to control the time of a photographic exposure.
 Focus the image automatically
 Operate the flash automatically
 Adjust the aperture size
 Adjust the size of the image
 Remove “red eye” when flash is used
 A photograph is taken when light passes through the lens onto a light-sensitive
cell.
 This cell is made of pixels.
 The number pixels is what decides the size of the file used to store the
photograph.
Description of
 By reducing the resolution of the image, the storage requirement is reduced
taking a
too.
picture
 Other factors which affect the quality of a photograph are:
 The type of lens used
 The lightning
 Mobile phones have almost the same number of pixels as a digital camera.
Nevertheless, they have poor lens quality and a limited storage space.
 Most common type of input devices.
 They are mainly used on computers, tablets, mobile phones, etc..
Features of  They are connected to a computer using a USB connection or sometimes by
keyboards wireless connection.
 On mobile phones and tablets they are considered as virtual/touchscreen
technology because they are not a hardware in that case.
 Each character (digit/space/number/symbol etc..) is represented by an ASCII
How
value, which the computer understands.
keyboards
 When a character is pressed, it is converted into a digital signal, which the
function
computer interprets…

12 | P a g e
EOT 1 Exams 2019-20 Cst Notes

 It’s a slow method of inputting data into the computer.


Disadvantages
 It’s prone to errors, mostly from the user himself/herself.
of using
 Frequent and consecutive hours of using them may cause injuries such as RSI in
keyboards
the hands and wrists.
 There are various types of keyboards that are used for different purposes, here
are some:
Types of  Normal keyboards which comes in different shapes and sizes. However,
keyboards they are the most common ones to be used
 Ergonomic keyboards which help to reduce RSI due to the arrangement
of their keys.
 To select an icon on the desktop, then you will need to use a pointing device
(mouse or tracker ball).
 Most common pointing devices is the mouse, yet it comes in many forms:
 (1) Mechanical ball arrangement with a USB connection to the
computer.
 (2) Red LED to detect movement (x & y) with a USB connection to the
computer.
Pointing  (3) Either mice 1 or 2 but uses wireless connection instead.
devices

1 2 3

Mouse:
 Needs desk space to be able to move around.
 Needs special kind of surfaces.
Difference
 One or two buttons.
between
 Scroll wheel included.
mouse and
Tracker Ball:
tracker ball
 No need for extra space.
 No need for special surfaces.
 Less likely for the user to experience RSI.
 They usually have a built-in touch pad.
 It works by touching the surface and moving your finger.
Laptops
 Buttons are available on left and right. Although sometimes you can simply click
on the pad itself.
 Main use is to input sound into the computer.
 Allows disabled people to communicate with the computer.
Features of
 They can be built in the computer, connected using a USB port, or wirelessly.
microphones
 When a sound is picked up, a diagram vibrates producing an electric signal.
Then this signal is sent to a sound card and converted into digital values.

13 | P a g e
EOT 1 Exams 2019-20 Cst Notes

 Is a system where the user’s voice is detected.


 When the user speaks, a pattern is produced. This pattern is compared to a
stored wave pattern in the computer to see if they match.
Voice
 If they match, the person is correctly identified.
recognition
 Only certain words can be used so that the computer will have the ability to
compare the two wave patterns.
 This system is mainly used when security is needed.
 Is a much complex system where each word that the speaker says the computer
Speech will have to understand.
recognition  Here the system doesn’t try to recognize the person speaking.
 Instead, the words are recognized and shown on the screen.
 Sound wave converted into digital form – allowing the computer to understand.
Speech  Software takes digital form and breaks it up into phonemes.
recognition  The phoneme is compared with words found in the built-in dictionary.
steps  The word found would be suggested to the software in the application being
used.
 Since there are over a two-hundred thousand words in the English language,
Issue with
there are possibilities that the software understands the wrong word.
speech
 Moreover, there are several dialects and accents around the world which makes
recognition
it even harder for the software to interpret.
 Sometimes both voice and speech recognition are used at the same time in the
Combination same device.
 This may apply in car systems…
 GENERAL INFORMATION
KEY o BENEFIT
DRAWBACK
 Made from layers of
glass acting as a
capacitor, creating
electric fields
between the glass
panels.
 When the top glass
layer is touched, the
Capacitive
electric current
touchscreen
changes and the
coordinates are
found using an on-board microprocessor.
o Medium cost
o Screen visibility is good, even in sunlight.
o Multi-touch capability
o Screen is very durable
Only allows bare fingers as input

14 | P a g e
EOT 1 Exams 2019-20 Cst Notes

 Uses glass as the screen material.  Uses glass as the screen material.
 Needs a warm object to carry out as  Uses an array of sensors (in the form
an input of a grid); the point of contact is
Infra-red based on which grid coordinate is
touchscreen touched.
(heat--left) o BOTH: Multi touch capability
(optical— o OPTICAL: Bare fingers, stylist, or gloved fingers all work
right) o BOTH: Very durable
Expensive technology
HEAT: Only allows bare fingers as input
Fairly good screen visibility in sunlight.
 Sensors are devices which measure/read physical properties.
What are  Examples of physical properties are temperature, pressure, pH, etc
sensors  In everyday life we deal with analogue data (data which constantly changes and
doesn’t have a discrete value)
 Since computers do not understand analogue data, they need a converter to
allow the analogue data to be interpreted. This converter is called Analogue to
Digital Converter (ADC).
 Basically what an ADC does is to change physical values into discrete digital
ADC and DAC
values.
 When a computer is used to control a valve or a motor, for example, they need a
Digital to Analogue Converter (DAC) to allow those devices to understand the
command. That is due to the devices only interpreting analogue values.
 Sometimes, an actuator is used in control applications.
 An actuator may be considered as an output device, but it is used here so we
will mention it as an input device.
Actuator
 An actuator is an electromechanical device such as a relay, solenoid or motor.
 They may need a DAC to understand the data sent by the
computer/microprocessor.

15 | P a g e
EOT 1 Exams 2019-20 Cst Notes

 TEMPERATURE:
o Control a central heating system
o Control/monitor a chemical process*
o Control/monitor the temperature in a greenhouse
 MOISTURE/HUMIDITY:
o Control/monitor the moisture levels in soil in a greenhouse.
o Control/monitor the humidity levels in the air in a greenhouse
o Monitor dampness levels in an industrial application (e.g., monitor
moisture in a paint spray booth in a car factory).
 LIGHT:
o Switch street lighting on at night and off during the day
o Monitor/control light levels in a greenhouse
o Automatically switch on a car’s headlights when it gets dark
 INFRA-RED/MOTION:
o Turn on the windscreen wipers on a car automatically
o Detect intruders in a burglar alarm system
Types of o Count people entering/leaving a building
sensors and  PRESSURE:
some of their o Detect intruders in a burglar alarm system
applications o Weigh things (e.g. check the weight of a vehicle)
o Monitor/control a process where gas pressure is important
 ACOUSTIC/SOUND:
 Pick up noise levels (e.g. footsteps) in a burglar alarm system
 Detect the noise of liquids dripping in a pipe
 GAS (e.g. O2 or CO2):
 Monitor pollution levels in a river or in the air
 Measure O2 and CO2 levels in a greenhouse
 Check for CO2 leaks in a power station
 pH:
 Monitor/control acidity/alkalinity levels in the soil in a greenhouse
 Pollution/environmental monitoring in rivers

 MAGNETIC FIELD:
 Any application where detection of changes in a magnetic field is
required (e.g. in cell phones, CD players, etc.)
 Used in anti-lock braking systems in motor vehicles

Summary

16 | P a g e
EOT 1 Exams 2019-20 Cst Notes

 Only viewing the data or basically “watching” the processor and it can send an
alarm or alert to the screen to warn the user.
 Applications include:
Monitoring  Monitoring a patient in a hospital for vital signs such as heart rate,
and its temperature, etc.
applications  Monitoring of intruders in a burglar alarm system
 Checking the temperature levels in a car engine
 Monitoring pollution levels in a river.

 Print head: the core of an inkjet printer, the print head contains a series of
nozzles that are used to spray drops of ink.
What are
 Ink cartridge(s): a single cartridge for black and one cartridge for 3 colours (blue,
inkjet
yellow, magenta)
printers made
 Stepper motor & a belt: moves the print head assembly across the page.
of?
 Paper feed: feeds the printer with paper as the required number.

 Thermal Bubble:
 Tiny resistors create heat, and this heat vaporizes ink to create a bubble.
 As the bubble
expands, some of
the ink is pushed out
of a nozzle onto the
paper.
 When the bubble
"pops" (collapses), a
vacuum is created.
 This pulls more ink
into the print head from the cartridge.
 A typical bubble jet print head has 300 or 600 tiny nozzles, and all of
wo them can fire a droplet simultaneously.
technologies
in which ink
droplets are
produced  Piezoelectric:
 A crystal is located at the back of
the ink reservoir of each nozzle.
 The crystal receives a tiny electric
charge that causes it to vibrate.
 When the crystal vibrates inward,
it forces a tiny amount of ink out
of the nozzle.
 When it vibrates out, it pulls
some more ink into the reservoir
to replace the ink sprayed out.

17 | P a g e
EOT 1 Exams 2019-20 Cst Notes

 The data from the document is sent to a printer driver


 The printer driver ensures that the data is in a format that the chosen printer
can understand.
 A check is made by the printer driver to ensure that the chosen printer is
available to print (e.g. is it busy, is it off line, is it out of ink, and so on)
 The data is then sent to the printer and it is stored in a temporary memory
known as a printer buffer.
 A sheet of paper is then fed into the main body of the printer; a sensor detects
whether paper is available in the paper feed tray – if it is out of paper (or the
Events that paper is jammed) then an error message is sent back to the computer
occur during  As the sheet of paper is fed through the printer, the print head moves from side
printing to side across the paper printing the text or image; the four ink colours are
sprayed in their exact amounts to produce the desired final colour
 At the end of each full pass of the print head, the paper is advanced very slightly
to allow the next line to be printed; this continues until the whole page has been
printed
 If there is more data in the printer buffer, then the whole process from stage 5 is
repeated until the buffer is finally empty
 Once the printer buffer is empty, the printer sends an interrupt to the processor
in the computer; this is a request for more data to be sent to the printer; the
whole process continues until the whole of the document has been printed

Differences
between
thermal
bubble and
piezoelectric

 They completely differ in the way they print a paper.


 Instead of using liquid ink, they use toner (dry powder ink).
 They print the paper all one go.
Laser Printers  Their advantage is their fast speed and the fact that they don’t run out of ink
halfway through.

18 | P a g e
EOT 1 Exams 2019-20 Cst Notes

 The data from the document is sent to a printer driver


 The printer driver ensures that the data is in a format that the chosen printer
can understand
 A check is made by the printer driver to ensure that the chosen printer is
available to print (e.g. is it busy, is it off line, is it out of ink, and so on)
 The data is then sent to the printer and it is stored in a temporary memory
known as a printer buffer
 The start of the printing process involves a printing drum being given a positive
charge; as this drum rotates, a laser beam is scanned across it removing the
positive charge in certain areas; this leaves negatively charged areas which
Events that exactly match the text/images of the page to be printed
occur during  The drum is then coated with positively charged TONER (powdered ink); since
printing the toner is positively charged, it only sticks to the negatively charged parts of
the drum
 A negatively charged sheet of paper is then rolled over the drum
 The toner on the drum now sticks to the paper to produce an exact copy of the
page sent to the printer
 To prevent the paper sticking to the drum, the electric charge on the paper is
removed after one rotation of the drum
 The paper finally goes through a fuser which is a set of heated rollers; the heat
melts the ink so that it fixes permanently to the paper
 At the very end, a discharge lamp removes all the electric charge from the drum
making it ready to print the next page
Inkjet  They are best for one-off photos or where only a few pages of good quality,
printers colour printing are needed; the small ink cartridges or small paper trays would
specifications not be an issue with such applications.
 They produce high quality printouts and are very fast when making multiple
copies of a document; any application that needs high-volume printing (in colour
Laser printers or monochrome) would choose the laser printer (for example, producing a large
specifications number of high quality flyers or posters for advertising) – they have two
advantages: they have large toner cartridges and large paper trays (often
holding more than a ream of paper).

19 | P a g e
EOT 1 Exams 2019-20 Cst Notes

Differences
between the
printers

(Extra)

 Mainly used in Computer-Aided Design (CAD) applications


General idea
 Able to produce (print) 3D objects which actually function
about 3D
 The object is formed by printing it layer by layer using materials such as
printers
powdered resin, powdered metal, paper, or ceramic powder.
 Sizes differ; ranging from a microwave to a small car size
 Two ways of manufacturing the 3D object:
 Additive:
 Object is built layer by layer
 Subtractive:
Features of
 The removal (carving) of the material to produce the 3D object
3D printing
 Direct 3D printing is similar to the inkjet by having a print head, but the twist is
that the print head moves left & right as well as up & down.
 Binder 3D printing is similar to direct printing but this method uses two passes
for each of the layers; the first is for spraying the powder, and the other sprays a
binder (glue) to form a solid layer.

20 | P a g e
EOT 1 Exams 2019-20 Cst Notes

 A design is made using CAD software


 The finalised drawing is imported into some special software that prepares it in
a format which is understood by the printer
 The 3D printer is set up to allow the solid object to be made
Stages of
 The solid object is built up layer by ;ayer (0.1 mm thick); this can take several
creating a 3D
hours, depending on the thickness of the layers, the material used and the size
object
of the object being printed.
 The object is removed from the printer and is then prepared to be washed to
remove the jelly-like support. In many cases the object has to be left to ‘cure’ for
a few hours.
 Prosthetic limbs that fit the patient perfectly
 Tools in reconstructive surgery
Uses of 3D
 In aerospace (wings, body, etc) for lightweight
printing
 Fashion and art
 Produce parts of obsolete items
 Their systems both work very similarly
 Manly, the difference is that a 3D cutter recognizes the object in x-y-z direction,
while 2D only x-y…
 3D cutters are able to cut the following:
o Glass
2D & 3D
o Crystal
Cutters
o Metal
o Polymer
o Wood
 Since the cutter is controlled by computers, they can cut very precisely through
complex designs.
 They are sometimes considered an input device, but mainly, they aren’t.
Actuators  They are used in many control applications involving sensors and devices (ADC &
DAC)…
 Sound is produced by passing the digital data through a DAC then through
Loudspeakers amplifier and then emerges from loudspeaker
/Headphones  Produced by voltage differences vibrating a cone in the speaker at different
frequencies
 Previously, we used cathode-ray monitors, no we use Liquid Crystal Diode (LCD)
 The front layer of the monitor is made up of pixels, and each pixel is divided into
usually 3 subpixels (Red, Greed, & Blue diodes). However, sometimes the yellow
diode is added to make the colours more vivid.
 Since LCDs don't emit any light, we need a source (called back light). Currently
we are using Light Emitting diodes (LED) as the source of light, but before that
we’ve used Cold Cathode Fluorescent Lamp
Need for LCD (CCFL).
 CCFL uses two fluorescent tubes behind the LCD
screen.
 LEDs are basically a matrix of tiny LEDs behind
the LCD.

21 | P a g e
EOT 1 Exams 2019-20 Cst Notes

 LED gives a sharp, clearer image.


 LED produces bright light (previous slide)…
Advantages  LED monitors are thinner..
of using LEDs  LED probably never dies.
over CCFL  LED consumes less power than the CCFL to operate.
 LED reaches maximum brightness immediately.
 CCFL has a yellowish tint while LED is more visible.
 A more advanced type of LED is Organic Light Emitting Diode (OLED), which
does not involve LED screen.
 They use organic materials (Carbon compounds) to create semi-conductors
which are flexible.
OLED
 When electric field is supplied, the OLED will light so there is no need for any
backlighting material or an LCD. The OLED contains both….
 It is a very thin screen which can be curved for a good view from any angle.
 In the future, this technology may be applied to phones.
 Thinner, lighter, and more flexible due to being made out of plastic not glass.
 OLEDs may give a brighter light than LEDs
Advantages
 No need for LCDs neither LEDs (own light is produced by the OLEDs)
of OLEDs
 OLEDs need less power to function than LEDs, this advantage is more related to
Over LCDs &
phones (battery-operated devices)
LEDs
 Can be made to use for advertising
 Large field view (approximately 170 degrees)
 Uses millions of micro mirrors
 The number of micro mirrors and the way they are arranged on the DLP chip
determines the resolution of the image
 When the micro mirrors tilt towards the light source they are on
DLP  When the micro mirrors tilt away from the light source they are off
Projectors  This creates a light or dark pixel on the projection screen
 A bright white light source passes through a colour filter on its way to the DLP
chip
 White light splits into primary colours (Red, Green, Blue)

 Older technology than DLP


 A powerful beam of white light is generated from a bulb
 This beam of light is then sent to a group of chromatic-coated mirrors; these
reflect the light back at different wavelengths
 When the white light hits the mirrors, the reflected light has wavelengths
LCD
corresponding to red, green and blue
Projectors
 These three different light pass through three LCD screens; these screens show
the image to be projected as millions of pixels in grayscale
 When the coloured light passes through the LCD screens, a red, green and blue
version of the grey image emerges
 Finally, the image passes through the projector lens onto the screen

22 | P a g e
EOT 1 Exams 2019-20 Cst Notes

CHAPTER 6
 The following formats are used in a computer system:
o Musical Instrument Digital Interface (MIDI)
File Formats o MP3
o MP4
o Jpeg
o Text & number format
 Musical Instrument Digital Interface (MIDI) is used for storage of music files,
but not the music (sounds) itself,
instead the ways to connect
devices to produce sounds
(commands)
MIDI  MIDI is asynchronous, due to it
using start and stop bit.
 It contains commands to instruct
devices how to produce the desired sound.
 Each MIDI command has a specific of sequence of bytes, which is as follows:
o First byte (status byte) – informs the MIDI device to perform
 MPEG-3 (MP3) uses technology known as audio compression to convert music
and other sounds into MP3 format.
 It reduces the size by about 90%.
 This format is used in MP3 players, computers, or phones.
MP3  Although, the quality doesn’t match the original, the quality is satisfactory for
general purposes.
 The algorithms (called perceptual music shaping) remove sounds that are not
audible by the human.
 MP3 use lossy format.
MP4  MPEG-4 (MP4) allows music, videos, photos, and animation to be stored.
 Joint Photographic Experts Group (JPEG) reduces the photographic file size, but
in return, the quality drops.
 Also uses lossy file compression.
JPEG  The file size of the image is identified by the number of pixels. Each pixel is
made of three colours (red, green, and blue).
 TIFF and BMP are of high resolution formats, because they are not in a
compressed format.
 Text is usually stored in an ASCII format.
 Numbers may be stored as:
o Real (2.17966)
Text &
o Integer (2)
Number File
o Date (02/12/2014)
Formats
o Time (15:20:59)
o Currency ($60.50)
 If numbers or texts undergo compression, it would be lossless
Lossless File  All the data bits from the original file are reconstructed when the file is again
Compression uncompressed.

23 | P a g e
EOT 1 Exams 2019-20 Cst Notes

Lossy File  The file compression algorithm eliminates unnecessary bits of data.
Compression  This is used in MP3 and MP4….
 It is split into three groups:
• RAM
Primary Memory • ROM

Memory and •Hard-disk Drive (HDD)


Storage Secondary Storage •Solid-state Drive (SSD)

•DVD/CD and DVD-RAM •Removable Hard Drive


Off-Line Storage •Blu-ray disk •USB memory stick/flash memory

 Random Access Memory (RAM) has the following features:


o It is volatile/temporary (contents of memory are lost when power is off)
o It is used to store data, files or part of the OS that is in current use.
o It can be written to or read from and the contents can be changed.
RAM  The larger the size of the RAM, the faster the computer will operate.
 The RAM never runs out of memory, instead it just runs slower and slower.
 RAM is much faster to write to or read from than other types of memory, but
it’s volatile.
 Used in buffers…
 Features of ROM
o Non-volatile/permanent memories (contents remain even when ROM is
ROM turned off)
o Used to store start up instruction (basic input/output systems)
o Data/contents of a ROM chip can only be read, cannot be changed
 Data is stored in a digital format on the magnetic surface of the disks (platter)
 Number of read/write heads can access all of the surfaces of the disk
HDD  Each platter will have two surfaces which can be used to store the data
 Data is stored on the surfaces in sectors and tracks
 HDD have very slow data access compared to RAM
 No moving parts and all data is received at the same time (not like HDD)
 Store data by controlling the movement of electrons within NAND chips, as 1s
and 0s
 Non-volatile rewritable memory
 Benefits of using SDD rather than HDD:
o More reliable (no moving parts)
SSD
o Considerably lighter (suitable for laptops)
o Lower power consumption
o Run much cooler than HDD
o Very thin
o Data access is faster than HDD
 Drawback-questionable longevity (200 GB per day)

24 | P a g e
EOT 1 Exams 2019-20 Cst Notes

Comparison

 Laser (red) light is used to read and write data in the surface of the disk
 Use a thin layer of metal alloy to store data
 Both systems use a single, spiral track which runs from the centre of the disk to
CD/DVD Disks
the edge
 DVD uses Dual-Layering which increases the storage capacity (two individual
recoding layers)
 Uses blue laser to carry out read and write operations
 Wavelength of laser light is less than CD and DVD
(stores up to five times more data than DVD)
Blu-ray Disks  Automatically come with secure encryption (prevent
piracy and copyright infringement)
 Used as back-up systems

 Very small, lightweight suitable from transferring files


USB Flash  Small back-up devices for photo, music
Memory  Solid state so need to be treated with care

25 | P a g e
EOT 1 Exams 2019-20 Cst Notes

CHAPTER 7
 Easier to read and understand as the language is closer
High-Level
 to human language
Languages
 Easier to write in shorter time
(HLL)
 Easier to debug at the development stage
 Easier to maintain once in use
Low-Level  Refer to machine code
Languages  Binary instructions that computer understands
(LLL)
 There are three types of translators:

Interpreters
Compilers

Translators Assemblers

• A program must be translated into binary before a computer can use it


• Types of translators; Compiler, Interpreter and Assembler

 Translates a program written in high-level language into machine code


 Used without compiler
Compilers  Executable file of machine code produced
 One high-level language translated into several machine code instructions
 Used for general use
 Executes a high-language program a statement at a time
 No executable file of machine code produced
 One high-level language program statement may require
Interpreters
 several machine code instructions to be executed
 Cannot be used without interpreter
 Used when program is being developed
 Translates a low-level language program into machine code
 Executable file of machine code produced
Assemblers  One low-level language translated into one machine code instructions
 Can be used without assembler
 Used for general use
 When program is being compiled, if any syntax errors are found no translated
program is produced.
 Instead, a list of all errors in program is produced.
 Programmer corrects program and recompiles.
Syntax Errors  When a program is being interpreted, the interpreter preforms the action until
syntax error is found.
 The programmer is the alerted to the place in the program where error was
found.
 The error is corrected and interpretation continues.

26 | P a g e
EOT 1 Exams 2019-20 Cst Notes

CHAPTER 8
 Nowadays data is threatened to be deleted or corrupted either accidentally or
intentionally using malicious codes or software.
 The following are security risks:
o Hacking
o Viruses
Security Risks
o Pharming
o Phishing
o Wardriving
o Spyware

 Description of security risk


KEY  Possible effect of security risk
Methods to remove security risk
 The act of gaining illegal access to a computer system.
 Identity theft or gaining personal information.
Hacking  Data can be changed, deleted or corrupted.
Firewalls
Use of strong passwords and user IDs
Use of anti-hacking software.
 Cracking is where someone edits the source code.
 It’s usually done for a malicious purpose.
Cracking
 Hacking isn’t always harmful. However, cracking is ALWAYS dangerous and
malicious.
 Program or program code that can replicate itself with the intention of deleting
or corrupting files causing the computer to malfunction.
 Computer malfunction (crash, stop working, or become unresponsive)
Viruses  Can delete files/ data.
 Can corrupt files/data.
Don’t use software from unknown sources.
Be careful when opening emails from unknown senders.
Use of anti-virus software.
 The creator sends out a legitimate-looking email; as soon as it’s clicked the user
Phishing is sent to fake/bogus website.
(Legitimate  Creator could gain personal data such as bank account numbers.
meaning of  Leads to fraud or identity theft.
fishing) Many ISPs filter out phishing emails.
Always be careful when opening emails or attachments.
 Malicious code installed (planted) on a user’s hard drive or on the web server;
Pharming code redirects the user to fake website without their knowledge.
(Legitimate  Creator could gain personal data such as bank account numbers.
meaning of  Leads to fraud or identity theft.
farming) Some anti-spyware can detect and remove the code from the hard drive.
Always be alert to clues that they are being redirected.
---Notice the similarity between pharming & phishing possible effects---

27 | P a g e
EOT 1 Exams 2019-20 Cst Notes

 The act of locating and using wireless internet connections illegally; it requires a
laptop, wireless network card and antenna to pick up signals.
 Possible to steal user’s internet time by downloading large files.
Wardriving  Possible to hack; gain passwords and personal details.
Use of wired equivalent privacy encryption.
Having complex password.
Firewalls
 Software that gathers information by monitoring key presses on the user’s
keyboard; info is sent back to the hacker.
Spyware/Key-  Gives originator access to all data entered on the computer by the keyboard.
logging  Software is able to install other spyware, read cookies, change default browser.
software Use of anti-spyware.
Always be alert for clues that hint to your keyboard being monitored.
Use mouse or on-screen keyboard as form of input.
 A cookie is a packet of information sent by a web server to a web browser.
 They are downloaded onto the user’s computer and every time the website is
visited, the cookies are generated.
 Cookies collect information such as their fashion, music taste and other
Cookies
preferences of the user.
 They help the website with advertisements and what to display the most on
their home screen.
 Those cookies are simply pieces of data and they aren’t programs.

Accidental loss of data Hardware fault (head


(delete a file) crash of hard disk drive)
•Save data on a regular •Use of UPS to prevent
basis power loss.
•Use passwords to •Save data on regular
restrict the access of basis.
files to certain users. •Use of parallel systems
•Use of back-ups. as back-up hardware.
•Use of back-ups
Loss of Data
and Data
Corruption Software fault Incorrect computer
(incompatible software operation (incorrect
installed) shutdown procedure)
• Save data regularly in • Correct training of
case software crashes procedures (such as
or freezes. USB removal) to users
• Use of back-ups so they're aware of
correct process.
• Use of back-ups.

28 | P a g e
EOT 1 Exams 2019-20 Cst Notes

 A firewall can be either a software or a hardware. It lies between the user’s


computer and the internet. They filter out what goes in and what comes out of
the computer.
 Tasks carried out by firewalls:
o Examining the ‘traffic’ between the user’s computer and a public network
(e.g. the internet).
o Checking whether incoming or outgoing data meets a given set of criteria.
o If the data fails the criteria, the firewall will block the ‘traffic’ and give the
user (or network manager) a warning that there may be a security issue.
o logging all incoming and outgoing ‘traffic’ to allow later interrogation by
the user (or network manager)
o criteria can be set to prevent access to certain undesirable sites; the
firewall can keep a list of all undesirable IP addresses
Firewalls o helping to prevent viruses or hackers entering the user’s computer (or
internal network)
o Warning the user if some software on their system is trying to access an
external data source (e.g. automatic software upgrade); the user is given
the option of allowing it to go ahead or requesting that such access is
denied.
 Limitations of firewalls:
o It cannot prevent individuals, on internal networks, using their own
modems to bypass the firewall
o Employee misconduct or carelessness cannot be controlled by firewalls
(for example, control of passwords or use of accounts)
o Users on stand-alone computers can chose to disable the firewall, leaving
their computer open to harmful ‘traffic’ from the internet.

 Proxy servers act as an intermediary between the user and a web server.
 Functions of proxy servers:
o Allowing the internet ‘traffic’ to be filtered; they can block access to a
website if necessary (similar type or reaction as a firewall)
o By using the feature known as a CACHE, they can speed up access to
information from a website; when the website is first visited, the home
page is stored on
the proxy server;
Proxy Servers
when the user next
visits the website, it
now goes through
the proxy server
cache instead, giving
much faster access
o Keeping the user’s IP address secret - this clearly improves security
o Acting as a firewall.
 There are two forms of security protocols:
Security
o Secure Sockets Layer (SSL)
Protocols
o Transport Layer Security (TLS)

29 | P a g e
EOT 1 Exams 2019-20 Cst Notes

 Secure Sockets Layer (SSL) uses authentication and encryption to create a


widely used online security protocol. SSL allows data to be sent and received
securely over the internet.
 You can identify that it’s secured by:
o HTTPS before the website URL.
o There may be a padlock in the browser address bar.
o The browser address bar may turn green.
 The stages are as follows:
1. The website requests
from the SSL Publisher SSL Publisher
a certificate to
confirm the security
Secure
of the website.
Sockets Layer
2. The web browser 4 1
(SSL)
attempts to connect
to a web site which is
secured by SSL. 2, 3, 5
3. The web site sends Web Browser Website
the web browser a (User) (Bank)
copy of its SSL
certificate.
4. The web browser checks whether the SSL certificate is trustworthy with
the SSL Publisher; if it is then a message is sent back to the web site to
confirm this.
5. The encrypted data is then shared securely between the web browser
and the web site.
 TLS is similar to SSL but is basically a more recent technology.
 Like SSL, TLS is a form of protocol that ensures the privacy of information sent
over the internet between two devices.
 Transport Layer Socket is designed to prevent any third party hacking into the
Transport communication between the devices.
Layer Socket  It is formed from two layers:
(TLS) o Record Protocol: can be used with/without encryption. (Data transfer over
the internet)
o Handshake Protocol: the user and the website are permitted to
authenticate each other and to make use of encryption. (Secure
connection is established)
 It’s possible to extend TLS by adding new authentication methods.
 TLS allows for session caching, a method of resuming an existing secure
SSL vs TSL connection rather than establishing a new one.
 TLS separates the handshaking process from the record protocol which holds all
the data.
 Encryption is basically protecting data if it has been hacked.
 Although encryption won’t stop hacking, it will make the data meaningless to
the hacker.
Encryption
 There are two types of encryption:
o Symmetric
o Asymmetric
30 | P a g e
EOT 1 Exams 2019-20 Cst Notes

 Symmetric Encryption is a secret key which is mostly characters. If this key is


applied, the data is
meaningless.
 To make it legible
again, the recipient
must have the set of
characters to decrypt
the message.
Symmetric
 Since the sender has to
Encryption
send the key to the
recipient, it is risky
because it could be
intercepted by a hacker. Therefore, he would be able to decrypt the message
and read its contents.
 The point above is called Key Distribution Problem.
 Although there is a method to distribute the key without sending it over the
internet, it isn’t efficient and very time consuming.
 Asymmetric is a safer and more secure method of encrypting messages.
 In this case two keys are needed:
o Public key: available to everyone.
o Private key: only known by the computer user.
 Alice encrypts her
document with
Bob’s public key
and sends the
Asymmetric doc to him.
Encryption  Once received,
Bob will decrypt
it with his private
key.
 Both Alice and
Bob have a public
and private key.
 The private key
must be kept secure and shouldn’t be shared with anyone.
 Plain text is described as the text we read day-to-day (the input).
 Cypher text is the encrypted form of the plain text (the output).
Plain &  Simple diagram:
Cypher Text
Encryption
Plain Text Cypher Text
Algorithm
 Authentication is used to verify that the data comes from a trusted source.
 It works with encryption to strengthen the security.
Authentic-
 This may include biometrics.
ation
 Biometrics include fingerprint scans, retina scans and others.

31 | P a g e
EOT 1 Exams 2019-20 Cst Notes

 Biometrics relies on the unique charactaristcs of human beings.


 Examples include:
o Fingerprint scans,
o Retina scans
Biometrics
o Face recognition
o Voice recognition

And many others..


 DoS is an attempt at preventing users from accessing pasrt of a network,
notably an internet server.
 An indivual can be targeted. The attacker can prevent the user from:
o Accessing their emails
o Accessing websites
o Accessing online servers
 One method is to overflood the server by sending hundereds if not thousands
of requests. Therefore, the website would be overloaded.
 An indiviual user or
a website can
prevent DoS to
Denial of some degree by:
Service o Using up-to-
Attacks (DoS) date virus
checker
o Setting up
firewall
o Apply email
filters
 Signs to check if
user is a vitim:
o Slow network performance
o Inability to access certain websites
o Large amounts of spam

 Computer ethics are a set of principles set out to regulate the use of computers.
 Here are 3 factors concerning ethics:
Computer o Intellectual property rights: this discusses copying of a software without
Ethics permission.
o Privacy Issues: this covers hacking and gaining illegal access to a computer
o Effect of computer on society: job losses, social impacts, etc…
 When a person steals the idea of another person’s work and claims it as it’s his
own.
Plagiarism
 Although using other people’s work is fine, not acknowledging him is a crime.
 Refrence can be stated in footnotes or at the end of a document.

32 | P a g e
EOT 1 Exams 2019-20 Cst Notes

 Users are free to run, copy or change the software.


 Users are allowed to:
o Run the software for any legal purpose
o Study the source code and amend it as necessary
Free Software o Pass/share the software with friends and family.
 However, the user:
o Shouldn’t add a source code from a non-free software.
o Shouldn’t copy the idea of the software
o Shouldn’t amend it in a way that infringes the copyright laws.
 Freeware is a software a user can download from th internet free of charge.
 Once downloaded, no fees are added.
Freeware  Examples include Adobe© and Skype©.
 They are subjected to copyright laws.
 Modifying the source code is illegal.
 Users are allowed to try the software for a trial period.
 Once the trial period is over, the user is asked to pay fees to continue using the
software.
 In many cases, the trial period software misses some of the features found in
Shareware
the full version.
 It is fully protected by copyright laws; using the source code is a crime.
 Permission needs to be obtained before sharing the software with friends and
family.

33 | P a g e
EOT 1 Exams 2019-20 Cst Notes

CHAPTER 9
 A computer system is made up of a software, hardware, communication, data, and
Computer people.
System  They are divided into smaller and smaller sub-systems.

 It is used to produce structure diagrams that demonstrate the modular construction of


the system.
 Each sub-system can be shown using either a flowchart or pseudocode.
 It is basically the dissection of a computer system into a set of sub-systems until each
one performs a single action.
Top-down  ADVANTAGES:
Design o Several programmers can work on same software package
o Debugging is made easier as tasks are spread out.
o It is easier to test modules than test the whole program.
o Can use modules from a bank of routines (saving time and money)
o Enable large tasks to be broken down into more manageable smaller tasks.
 A structure diagram represents a top-down design.

Question
Sample of
Top-Down
Design

 Answer: A typical answer would be “(Output) destination” in the top right box. While
the bottom left would be “New (destination) and Previous (destination)”.
 Exam code: 0478 Summer 2017 Paper 21

34 | P a g e
EOT 1 Exams 2019-20 Cst Notes

 A structure diagram shows a design of a computer system in a hierarchical way, with


each level giving a more detailed breakdown of the system into sub-systems.
 An example may be an Alarm app for a smartphone.

Structure
Diagrams

 A flowchart shows
diagrammatically the steps
required for a task and the
order they will be performed
in.
 Those steps and their order
combine to be named
algorithm.
 Flowchart example:

Flowcharts

 Although it will be covered


thoroughly, here are the symbols
used in a flowchart:
 The primary requirements for
flowcharts:
1. Common flowchart symbols
2. Writing flowcharts to solve
problems
3. Dry running of flowcharts to
determine its function, outputs
and trace tables.
4. Exercises to test above
concepts

35 | P a g e
EOT 1 Exams 2019-20 Cst Notes

 Is a simple method of showing an algorithm, using English-like words and


mathematical operators.
 Does not use the strict syntax rules of a If student's grade is ≥ to 60
programming language.
Print "passed"
Pseudocode  There is no standard syntax for a pseudocode,
but only some commonly followed Else
conventions.
 Here is a simple example: Print "failed"

 A library routines is a set of programming instructions for a given task that is already
Library
available for use.
Routines
 It is ususally used when a task is frequently used/required in the program.
 An algorithm is a sequence of steps which perform a specific task. Algorithms are
Algorithm
usually represented as a program flowchart or in pseudocode.
 A sub-routine is a sequence of program instructions that performs a specific task,
packaged as a
unit, NOT a whole
system.
 This unit can then
be used in
Sub-Routines
programs
wherever that
particular task
should be
performed.

 Test data are used to determine whether a solution is working properly.


 Ususally, sub-systems are tsted separatly instead of the whole system all at once.
 There are four main types of test data:
o Normal data
o Erroneous/abnormal data
o Extreme data
o Boundary data

 A discount is given when the bill is equal to or between $50 and $500.

Test Data
Test Data Example Result
Normal 60, 90, 100, 250, 300, 450 Accpeted
Abnormal 10, 30, 700, x, ok, 5000, a Rejected
Extreme 50, 500 Accepted
Boundary (49, 50), (500, 501) Whithin a set, one is accepted, the
other is rejected

36 | P a g e
EOT 1 Exams 2019-20 Cst Notes

 Validation is the automated checking by a program that data is reasonable before it is


acccepted into a computer system.
 There are various types of validation checks. You may be asked to match the
appropriate type with the corresponding application.
 The following are types of validation checks:
o Range checks
Validation o Length checks
o Type checks
o Character checks
o Format checks
o Presence checks
o Check digits
 Throughout the explanation, inputting the student’s exam mark example will be used.
 Is a form of validation which checks that only numbers within a specified range are
accepeted.
 For instance, if the exam mark is out of 10,
Range Checks only numbers until 10 should be accepted;
anything else ($, 15, Ten) would not be
allowed.

 Checks that data contains an exact


number of characters.
 Checks that data entered is a
reasonable length.
Length
Checks

 Checks that data entered is of a given type.


Type Checks  For instance, the number of students must be a whole number (integer).

 Checks that when a string of characters are entered, it doesn’t contain invalid
symbols/characters
 An example would be when a name is
Character inputted it must not contain keys such as @
Checks or $.

 Makes sure that data entered correspond with pre-defined pattern.


Format
 For example, the MLG password for students must begin with 13111 followed by 6
Checks
other numbers.

37 | P a g e
EOT 1 Exams 2019-20 Cst Notes

 This basically ensures that some data


has been entered into the field.
Otherwise, the information won’t be
submitted/saved.
 In Google Forms, this is what happens
when you submit leaving some required
Presence
fields:
Checks

 This check is the final digit included in a code.


 To find the final digit, the other numbers must be used.
 To calculate the 13th digit in an ISBN, those steps are followed:
1. Add all the odd numbered digits together, excluding the check digit.
2. Add all the even numbered digits together and multiply the result by 3.
3. Add the results from 1 and 2 together and divide by 10.
Check Digits 4. Take the remainder, if it is zero use this value, otherwise subtract the remainder
from 10 to find the check digit.
 To check that the ISBN is correct, those steps are followed:
1. Add all the odd numbered digits together, including the check digit.
2. Add all the even number of digits together and multiply the result by 3.
3. Add the results from 1 and 2 together and divide by 10.
4. The number is correct if the remainder is zero.
 Verification is checking that data has been accurately copied onto the computer or
transferred from one part of a computer system to another.
 Similar to validation, there are various types of verification checks. You may be asked
to match the appropriate type with the corresponding application.
Verification  Verification types include:
o Double Entry
o Scree/visual Check
o Parity Check
o Checksum
 Basically, this means that the data must be
entered twice to make sure you’ve inputted
the correct information.
 When making a new password anywhere,
Double Entry
most programs use double entry, asking you
to enter your new password twice.

Screen /  This is sa manual check completed by the user who is entering the data.
visual check

38 | P a g e
EOT 1 Exams 2019-20 Cst Notes

 As you can see by


the question, the
steps for
calculating the
check digit is given.
 You must follow
the steps and show
the working
WITHOUT a
calculator.
 Exam code: 0478
Sample
Specimen paper
Question on
2015 Paper 01
Validation

 A trace table may be used to record the results from each step in an algorithm.
 It is used to record the value of an item (variable) that changes each time.
 To create a trace table, write the headings of each input and the output. You will be
given the test numbers/characters,and you’re expected to fill in the table.
Trace Tables
 You may fill in a trace table from either a flowchart or pseducode, depending on the
question.
 Usually, each column is given a mark. So, if one number is incorrect in the column,
you will lose a mark.

39 | P a g e
EOT 1 Exams 2019-20 Cst Notes

Sample
Question on
Trace Tables

 You must follow step by step and take the test data one by one.
 Make sure to write everything in the correct place.
 Exam code: 0478 March 2017 Paper 22
 The following are exactly what’s written in the book; however, keypoints are
underlined:
1. Make sure that the problem is clearly specified.
2. Break the problem down into sub-problems; if it is complex, you may want to
consider writing an algorithm for each sub-problem. Most problems, even the
Stages of
simplest ones can be divided into:
Producing an
 set up
Algorithm
 input
 processing
 output of results.
3. Decide on how any data is to be obtained and stored, what is going to happen to
the data and how any results are going to be displayed.

40 | P a g e
EOT 1 Exams 2019-20 Cst Notes

4. Decide on how you are going to construct your algorithm, using a flowchart or
pseudocode.
5. Construct your algorithm, making sure that it can be easily read and understood
by someone else. This involves setting it out clearly and using meaningful names
for any data stores.
6. Use several sets of test data (normal, abnormal and boundary) and trace tables
to find any errors.
7. If any errors are found, repeat the process until you think that your algorithm
works perfectly.

41 | P a g e
EOT 1 Exams 2019-20 Cst Notes

CHAPTER 10
 As stated previously, it is a simple method of showing an algorithm, using English-like
words and mathematical operators.
 Pseudocode is not restricted by syntax rules therefore, it cannot be interpreted by the
computer.
 It is used to give basic understandable information by anyone of how the structure
works.
Pseudocode  When writing a pseudocode:
o Use proper and meaningful names for variables
o Indentation is key
o Keep it simple
o Keep it concise
 However, don’t:
o Generalize the code too much
o Make the pseudocode abstract
 Assignment sign:  (eg. Mark  10)
 Indicates that a variable (eg. mark) has been given/assigned a value (eg. 10).
 Other Operators include:

Operator Action
+ Addition
Assignment & - Subtraction
Mathematical * Multiplication
Operators / Division
^ To the power of..
( ) Group
 IMPORTANT:
= and  are different. = sign represents comparison, while  sign represents
assigning a value.

42 | P a g e
EOT 1 Exams 2019-20 Cst Notes

• IF..THEN..ELSE..ENDIF
Conditional • CASE..OF..OTHERWISE..ENDCASE
statements

• FOR..TO..NEXT
• REPEAT..UNTIL
Loop structure • WHILE..DO..ENDWHILE

Pseudocode
Structure

• INPUT and OUTPUT


Input & Output
statements

• Totalling
Standard • Counting
actions

 This statement is used when there is only 1 condition which is either


o True (takes the path of THEN)
o False (takes the path of ELSE).
 This statement is ended using ENDIF.
 Format:
IF [CONDITION] THEN
[CONSEQUENCE]
Conditional ELSE
(IF…THEN… [CONSEQUENCE]
ENDIF
ELSE…ENDIF)
 Example:
IF GRADE > 100 THEN
OUTPUT “INVALID”
ELSE
OUTPUT “VALID”
ENDIF

 Note that you may use “nested if” if required to for the code. See example in picture…

43 | P a g e
EOT 1 Exams 2019-20 Cst Notes

 This statement is used when multiple options (paths) are available to be taken with
different consequences for each option.
 Several values are specified. The OTHERWISE path is taken by any other inputted value
ehich is not specified.
 This statement is ended using ENDCASE.
 Format:
CASE OF [VARIABLE]
Conditional OPTION: [CONSEQUENCE]
(CASE…OF… OTHERWISE: [CONSEQUENCE]
OTHERWISE… ENDCASE
ENDCASE)  Example:
CASE Choice OF
1 : Answer  Num1 + Num2
2 : Answer  Num1 - Num2
3 : Answer  Num1 * Num2
4 : Answer  Num1 / Num2
OTHERWISE: OUTPUT “FAIL”
ENDCASE

Sample
question on
conditional
statements

 In this case, the example means just write any code relating to the statement.
 Reason is basically “when is this statement used?”
 Exam code: 0478 Winter 2016 Paper 22

44 | P a g e
EOT 1 Exams 2019-20 Cst Notes

 This type of loop structure is used when there is a specified number of repitions.
 Although almost all the time all loop structures work, there is always a most efficient
structure.
 Such loop has a built-in counter; therefore, there is no need to include a counter in
your code.
 Format:
FOR [VARIABLE]  [VALUE] TO [VALUE]
[CODE]
Loop NEXT
(FOR…TO…  Example:
NEXT) FOR Counter  1 to 10
Print “You must study properly!”
NEXT
 Few points to take in consideration:
o Whenever average is to be calculated, the totalling must be performed.
o Assign total  0 always.
o Initial and final limits in a loop condition. FOR  Count 1 TO 10 will repeat the
code 10 times. FOR  Count 0 TO 10 will repeat it 11 times.
o The loop must be terminated with the keyword NEXT.
 This structure is a from of repetition where the number of repetitions/iterations is
unkown.
 The action is repeated UNTIL a given condition becomes true.
 This loop completes at least once because the condition is at the bottom of the
structure (verification is done after running the code).
 Format:
Loop REPEAT
(REPEAT… [CODE]
UNTIL) UNTIL [CONDITION]
 Example:
REPEAT
Total  Total + Mark
Print “Enter value for mark, -1 to finish”
Input Mark
UNTIL Mark = -1
 This is also a form of repitions where the number of repeats is unknown.
 However, this loop may never be completed because the condition is at the top of the
structure (verification is done before running the code).
 The actions are only repeated WHILE a given condition is true.
 If condition is untrue, actions in the WHILE…DO…ENDWHILE loop are never executed.
 Format:
Loop WHILE [CONDITION] DO
(WHILE…DO… [CODE]
ENDWHILE) ENDWHILE
 Example:
WHILE Mark <> -1 DO
Total  Total + Mark
Print “Enter value for mark, -1 to finish”
Input Mark
ENDWHILE
45 | P a g e
EOT 1 Exams 2019-20 Cst Notes

Sample
question on
loop
structures

 As you can see, you may be asked to convert a code from one type of loop to another.
This is because, as stated above, all loops function and give correct output for the
same code…

 Exam code: 0478 March 2017 Paper 22

46 | P a g e
EOT 1 Exams 2019-20 Cst Notes

 INPUT and OUTPUT are used for the entry and display of data and information.
 READ is sometiomes used instead of INPUT.
 PRINT is frequently used instead of OUTPUT.

 INPUT is used for data entry it is followed by a variable


 Example:
INPUT Name
Input & INPUT StudentMark
Output
statements

 OUTPUT/PRINT is used to display information. It is followed by a single value that is a


string, variable, or a list values separated by a comma.
 Example:
PRINT Name
PRINT “Your name is”, Name
OUTPUT Name1, Name2, Name3
 In those types of actions, there are two main points
o Totalling
o Counting
 Totalling is adding a different value each time (not a single value each time). Examples
Standard may be:
actions o Total  Total + Value (Value could be different no. each time such as 10, 12, 1.. )
o Sum  Sum + Number (Same thing applies for this variable)
 Counting means adding/subtracting a fixed value every time. Examples may be:
o Counter  Counter + 1
o Stock  Stock - 1
 In the exam, you may be asked to find, locate, and correct errors in a given
pseudocode.
 To answer such question, you will need to use your knowledge of all the loops,
conditions, and other structures.
 Possible errors:
Identifying
o Totalling & Counting: They may switch it around.
errors
o Counter: They may add an unnecessary counter (in FOR…TO…NEXT loop).
o Mix structures: They may switch, add, or remove different structures.
o Switching line orders: This is a frequent error found at the end of a structure.
o Variable switch: For eg., instead of H = X they write X = H. Very frequent…
o Incorret condition: For eg., Instead of UNTIL c = 20, they write UNTIL c < 20.

47 | P a g e
EOT 1 Exams 2019-20 Cst Notes

 To answer such
question, always say
the line number then
the error and the way
to correct this error.

 Make sure you read


the line which gives you
Sample the purpose of the
question on code. It makes it much
identifying easier to spot the
errors errors.

 Exam code: 0478


Specimen Paper 2015
Paper 02

 Just like identifying the errors, they may ask you to amend the code in order to fulfill a
Amend the new task/purpose.
Code  Like the errors, there is no exact way to answer those questions other than using your
prior knowledge.

Sample
question on
amending a
code

 Again, make sure you read the purpose of the code given. And this time, also read the
new purpose needed…
 Exam code: 0478 Summer 2016 Paper 21

48 | P a g e
EOT 1 Exams 2019-20 Cst Notes

 This is a quick recap of flowcharts as it has already been explained in chapter 9 notes.
 Here is a reminder of the symbols of a flowchart:

Flowcharts

Sample
question on
drawing
flowcharts

 Let’s draw a flowchart here…


 Make sure you read what is required in the flowchart.
 Keep your work organized and simple to read as it gives a good impression.
 Exam code: 0478 Specimen Paper 2015 Paper 02

49 | P a g e
EOT 1 Exams 2019-20 Cst Notes

Sample
question on
writing
pseudocode

 For the same, question, write a pseudocode.


 Make sure you read what is required for in the code.
 Keep your work organized and simple to read as it gives a good impression.
Exam code: 0478 Specimen Paper 2015 Paper 02

50 | P a g e
EOT 1 Exams 2019-20 Cst Notes

CHAPTER 11
 This chapter is almost the same as chapter 10…
 It mainly focuses on writing a program on the computer and running it using
Generally
different languages.
 However, the differences will be stated in the notes
 Variable:
o Is a named store data that contains a value that may change during the
excution of the program. They MUST be given meaningful names. There
should be no spaces between the name.
 Constant:
o Is a named store data that contains a value that does not change during the
Declaration & excution of the program. They MUST be given meaningful names. There
Usage of should be no spaces between the name.
Variables &  It is a good habbit to declare the variables and constants that will be used in the
Constants program.
 Declaration of
variables and
constants in
VB:

 Different kinds of data are formally given various different types, which enables:
o data to be stored in an appropriate way, for example, as numbers or
characters
o data to be manipulated effectively, for example numbers with mathematical
operators and characters with concatenation
Basic Data o automatic validation in some cases.
Types  The following are the types:
o Integer
o Real
o Char
o String
o Boolean
 An integer is a positive or negative whole number that can be used with
Data Type
mathematical operators.
(Integer)
 Examples may include 2, 100, 85, 46, …..
 A real number is a positive or negative number with a fractional part. Real
Data Type
numbers can be used with mathematical operators.
(Real)
 Examples may be: 7.00, 89.50, 43.20, …..
Data Type  A variable or constant of type CHAR is a single character.
(Char)  Examples of such: Y, M, L, …..
 A variable or constant of type STRING is several characters in length. Strings vary
in length…
Data Type  They may even have no characters: an empty string.
(String)  The characters can be letters and/or digits such as: Ahmed, , Cool, We love CIE,..

51 | P a g e
EOT 1 Exams 2019-20 Cst Notes

Data Type  A BOOLEAN variable can have only two values.


(Boolean)  Examples: Yes or No, 0 or 1, ….
 Fill in the table using: Integer, Real, Char, String, or Boolean.

Data Type
Telephone
3
3.5
True/False
A1
C
Cool
 Past paper question:

Sample
question of
Data Types

 The question also asks for the validation check. Refer to this part if you’ve
forgotten the types.
 Read question carefully…
 Exam code: 0478 March 2017 Paper 22
 There are five main programming/pseudocode constructs:
o Sequesnce
Important o Selection
Concepts o Repetition
o Totalling
Already stated above….
o Counting
 It refers that instructions should be executed one after the other. Eg. Variables
must first be declared, and then used.
 Assignment statements rely on the variables used in the expression on the
Sequence
right-hand side of the statement all having been given values.
 Input statements often provide values for assignment statements.
 Output statements often use the results from assignment statements.
52 | P a g e
EOT 1 Exams 2019-20 Cst Notes

 This construct is used to make a decision in choosing an option from many


available options on the basis of a condition.
 So, if a condition is true then one option would be chosen, while if a condition is
Selection false then another option will be chosen.
 For example, selecting the largest value or the smallest value, selecting items
over a certain price, selecting everyone who is male, ….
 This is done with the use of if and case statements.
 This construct is used to repeat a block of code as per the given condition.
 The three types of loops:
o a fixed number of repetitions
o an unknown number of repetitions with at least one repetition, as the
Repetition condition is tested at the end of the loop
o an unknown number of repetitions which may not be completed at all, as
the condition is tested at the beginning of the loop.
 All those points are just quick recap… the three loops have already been stated
earlier along with their differences…

53 | P a g e
EOT 1 Exams 2019-20 Cst Notes

CHECKLIST
 The next couple of pages are all derived from the syllabus of 2020 examination.
 You may use this as a form of checklist to make sure you’ve covered all what’s required in the
syllabus.
 Place a check beside the parts you feel you covered well and ready to be examined on from past
paper questions.

Section 1 (Theory of Computer Science):


1.1 Data representation………………………………………………………………………………...........
1.1.1 Binary systems
 recognise the use of binary numbers in computer systems
 convert positive denary integers into binary and positive binary integers into denary
(a maximum of 16 bits will be used)
 show understanding of the concept of a byte and how the byte is used to measure memory
size
 use binary in computer registers for a given application (such as in robotics, digital
instruments and counting systems)

1.1.2 Hexadecimal
 represent positive numbers in hexadecimal notation
 show understanding of the reasons for choosing hexadecimal notation to represent
numbers
 convert positive hexadecimal integers to and from denary (a maximum of four
hexadecimal digits will be required)
 convert positive hexadecimal integers to and from binary (a maximum of 16 bit binary
numbers will be required)
 represent numbers stored in registers and main memory as hexadecimal
 identify current uses of hexadecimal numbers in computing, such as defining colours in
Hypertext Markup Language (HTML), Media Access Control (MAC) addresses, assembly
languages and machine code, debugging

54 | P a g e
EOT 1 Exams 2019-20 Cst Notes

1.1.3 Data Storage


 show understanding that sound (music), pictures, video, text and numbers are stored in
different formats
 identify and describe methods of error detection and correction, such as parity checks,
check digits, checksums and Automatic Repeat reQuests (ARQ)
 show understanding of the concept of Musical Instrument Digital Interface (MIDI) files,
JPEG files, MP3 and MP4 files
 show understanding of the principles of data compression (lossless and lossy) applied to
music/video, photos and text files

1.2 Communication and internet technologies……………………………………………...........


1.2.1 Data Transmission
 show understanding of what is meant by transmission of data
 distinguish between serial and parallel data transmission
 distinguish between simplex, duplex and half-duplex data transmission
 show understanding of the reasons for choosing serial or parallel data transmission
 show understanding of the need to check for errors
 explain how parity bits are used for error detection
 show understanding of the use of serial and parallel data transmission, in Universal Serial
Bus (USB) and Integrated Circuit (IC)

1.2.2 Security Aspects


(This section links with section 1.4 of the syllabus.)
 show understanding of the security aspects of using the Internet and understand what
methods are available to help minimise the risks
 show understanding of the Internet risks associated with malware, including viruses,
spyware and hacking
 explain how anti-virus and other protection software helps to protect the user from
security risks

1.2.3 Security Aspects


 show understanding of the role of the browser
 show understanding of the role of an Internet Service Provider (ISP)
 show understanding of what is meant by hypertext transfer protocol (http and https) and
HTML
 distinguish between HTML structure and presentation
[Turn over

55 | P a g e
EOT 1 Exams 2019-20 Cst Notes

 show understanding of the concepts of MAC address, Internet Protocol (IP) address,
Uniform Resource
 Locator (URL) and cookies

1.3 Hardware and Software……………………………………………...........


1.3.1 Logic Gates
 use logic gates to create electronic circuits
 understand and define the functions of NOT, AND, OR, NAND, NOR and XOR (EOR) gates,
including the binary output produced from all the possible binary inputs (all gates, except
the NOT gate, will have 2 inputs only)
 draw truth tables and recognise a logic gate from its truth table
 recognise and use the following standard symbols used to represent logic gates:

 produce truth tables for given logic circuits, for example:

A B C Output
0 0 0

0 0 1
0 1 0

0 1 1
1 0 0

1 0 1
1 1 0
1 1 1

 produce a logic circuit to solve a given problem or to implement a given written logic
statement

56 | P a g e
EOT 1 Exams 2019-20 Cst Notes

1.3.2 Computer Architecture and the Fetch-Execute Cycle


 show understanding of the basic Von Neumann model for a computer system and the
stored program concept (program instructions and data are stored in main memory and
instructions are fetched and executed one after another)
 describe the stages of the fetch-execute cycle, including the use of registers and buses

1.3.3 Input Devices


 describe the principles of operation (how each device works) of these input devices: 2D
and 3D scanners, barcode readers, Quick Response (QR) code readers, digital cameras,
keyboards, mice, touch screens, interactive whiteboards, microphones
 describe how these principles are applied to real-life scenarios, for example: scanning of
passports at airports, barcode readers at supermarket checkouts, and touch screens on
mobile devices
 describe how a range of sensors can be used to input data into a computer system,
including light, temperature, magnetic field, gas, pressure, moisture, humidity, pH and
motion
 describe how these sensors are used in real-life scenarios, for example: street lights,
security devices, pollution control, games, and household and industrial applications

1.3.4 Output Devices


 describe the principles of operation of the following output devices: inkjet, laser and 3D
printers; 2D and 3Dcutters; speakers and headphones; actuators; flat-panel display
screens, such as Liquid Crystal Display (LCD)and Light-Emitting Diodes (LED) display;
LCD projectors and Digital Light Projectors (DLP)
 describe how these principles are applied to real-life scenarios, for example: printing
single items on demand or in large volumes; use of small screens on mobile devices

1.3.5 Memory, Storage Devices and Media


 show understanding of the difference between: primary, secondary and off-line storage
and provide examples of each, such as: primary: Read Only Memory (ROM) and Random
Access Memory (RAM) secondary: hard disk drive (HDD) and Solid State Drive (SSD); off-
line: Digital Versatile Disc (DVD), Compact Disc (CD), Blu-ray disc, USB flash memory and
removable HDD
 describe the principles of operation of a range of types of storage device and media
including magnetic, optical and solid state
 describe how these principles are applied to currently available storage solutions, such as
SSDs, HDDs, USB flash memory, DVDs, CDs and Blu-ray discs
 calculate the storage requirement of a file

57 | P a g e
EOT 1 Exams 2019-20 Cst Notes

1.3.6 Operating Systems


 describe the purpose of an operating system (Candidates will be required to understand
the purpose and function of an operating system and why it is needed. They will not be
required to understand how operating systems work.)
 show understanding of the need for interrupts

1.3.7 High- and Low-Level Languages and their Translators


 show understanding of the need for both high-level and low-level languages
 show understanding of the need for compilers when translating programs written in a
high-level language
 show understanding of the use of interpreters with high-level language programs
 show understanding of the need for assemblers when translating programs written in
assembly language

1.4 Security……………………………………………...........
1.4.1
 show understanding of the need to keep data safe from accidental damage, including
corruption and human errors
 show understanding of the need to keep data safe from malicious actions, including
unauthorised viewing, deleting, copying and corruption

1.4.2
 show understanding of how data are kept safe when stored and transmitted, including:
– use of passwords, both entered at a keyboard and biometric
– use of firewalls, both software and hardware, including proxy servers
– use of security protocols such as Secure Socket Layer (SSL) and Transport Layer Security
(TLS)
– use of symmetric encryption (plain text, cypher text and use of a key) showing
understanding that increasing the length of a key increases the strength of the encryption

1.4.3
 show understanding of the need to keep online systems safe from attacks including denial
of service attacks, phishing, pharming

1.4.4
 describe how the knowledge from 1.4.1, 1.4.2 and 1.4.3 can be applied to real-life
scenarios including, for example, online banking, shopping

58 | P a g e
EOT 1 Exams 2019-20 Cst Notes

1.5 Ethics……………………………………………...........
 show understanding of computer ethics, including copyright issues and plagiarism
 distinguish between free software, freeware and shareware
 show understanding of the ethical issues raised by the spread of electronic communication
and computer systems, including hacking, cracking and production of malware

Section 2 (Practical Problem-Solving and Programming):


2.1 Algorithm design and problem-solving……………………………………………...........
2.1.1 Problem Solving and Design
 show understanding that every computer system is made up of sub-systems, which in turn
are made up of further sub-systems
 use top-down design, structure diagrams, flowcharts, pseudocode, library routines and
sub-routines
 work out the purpose of a given algorithm
 explain standard methods of solution
 suggest and apply suitable test data
 understand the need for validation and verification checks to be made on input data
(validation could include range checks, length checks, type checks and check digits)
 use trace tables to find the value of variables at each step in an algorithm
 identify errors in given algorithms and suggest ways of removing these errors
 produce an algorithm for a given problem (either in the form of pseudocode or flowchart)
 comment on the effectiveness of a given solution

2.1.2 Pseudocode and Flowcharts


 understand and use pseudocode for assignment, using ←
 understand and use pseudocode, using the following conditional statements:
IF … THEN … ELSE … ENDIF
CASE … OF … OTHERWISE … ENDCASE
 understand and use pseudocode, using the following loop structures:
FOR … TO … NEXT
REPEAT … UNTIL
WHILE … DO … ENDWHILE
 understand and use pseudocode, using the following commands and statements:
INPUT and OUTPUT (e.g. READ and PRINT)
totalling (e.g. Sum ← Sum + Number)
counting (e.g. Count ← Count + 1)
 understand and use standard flowchart symbols to represent the above statements,
commands and structures
59 | P a g e
EOT 1 Exams 2019-20 Cst Notes

(Candidates are advised to try out solutions to a variety of different problems on a


computer using a language of their choice; no particular programming language will be
assumed in this syllabus.)

2.2 Programming……………………………………………...........
2.2.1 Programming concepts
 declare and use variables and constants
 understand and use basic data types: Integer, Real, Char, String and Boolean
 understand and use the concepts of sequence, selection, repetition, totalling and counting
 use predefined procedures/functions

2.2.2 Data Structures: Arrays


 declare and use one-dimensional arrays, for example: A[1:n]
 show understanding of the use of one-dimensional arrays, including the use of a variable
as an index in an array
 read or write values in an array using a FOR … TO … NEXT loop

2.3 Databases……………………………………………...........
 define a single-table database from given data storage requirements
 choose and specify suitable data types
 choose a suitable primary key for a database table
 perform a query-by-example from given search criteria

~~With sincere dua and hard work, you will achieve~~

Credits:

- Znotes: https://znotes.org/

- Mr Ashraf’s slides

- CIE Syllabus

- CIE Past Papers

60 | P a g e
EOT 1 Exams 2019-20 Cst Notes

Personal Notes
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________

61 | P a g e
EOT 1 Exams 2019-20 Cst Notes

________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
_______________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________

62 | P a g e

Potrebbero piacerti anche