Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Studies Notes
End of Term 1 2019-20 Notes
Table of Contents
Chapter 1 ...................................................................................................................................................... 2
Binary Systems and Hexadecimal
Chapter 2 ...................................................................................................................................................... 3
Communication and Internet Technologies
Chapter 3 ...................................................................................................................................................... 6
Logic Gates and logic Circuits
Chapter 4 ...................................................................................................................................................... 8
Operating Systems and Computer Architecture
Chapter 5 .................................................................................................................................................... 10
Input and Output Devices
Chapter 6 .................................................................................................................................................... 23
Memory and Data Storage
Chapter 7 .................................................................................................................................................... 26
High- and Low-Level Languages
Chapter 8 .................................................................................................................................................... 27
Security and Ethics
Chapter 9 .................................................................................................................................................... 34
Problem Solving and Design
Chapter 10 .................................................................................................................................................. 42
Pseudocode and Flowcharts
Chapter 11 .................................................................................................................................................. 51
Programming Concepts
Checklist...................................................................................................................................................... 54
IGCSE 2020 Syllabus
1|Page
EOT 1 Exams 2019-20 Cst Notes
CHAPTER 1
Is a base 2 system, usually made up of 8 bits (1 byte). {10111010}
Converted into hexadecimal by splitting the number to 4 groups and calculating
the value of each Value 8 4 2 1 8 4 2 1 8 4 2 1
byte:
Binary Digit 1 0 1 1 0 1 1 0 1 1 1 1
Converted into denary
by finding out the value of each
bit: Value 128 64 32 16 8 4 2 1
Digit 1 0 0 1 0 1 1 1
Is a base 10 system, which is everyday numbers, such as 154 or 65…
Converted into binary by placing the correct number of bits in the right position
Denary
to make the total equal the denary value.
Converted into hexadecimal by significantly dividing the number by “16”.
Is a base 16 system, which is very similar to the binary number format, but with
letters from “A” to “F”. {E7A}
Hexadecimal Converted into binary by using the table below. Take the equivalent binary value
of the hex one and that substitute it in place of the hex value.
Converted into denary by multiplying the value with its position.
This is a table showing Binary Value Hex Value Denary Value
the relation between 0000 0 0
binary, denary, and 0001 1 1
hexadecimal. 0010 2 2
It is very important to 0011 3 3
memorize and 0100 4 4
understand this table 0101 5 5
0110 6 6
thoroughly because it
Relation 0111 7 7
will not be provided in
1000 8 8
the exam.
1001 9 9
As well as, you should 1010 A 10
know when and how 1011 B 11
to use it in different 1100 C 12
types of questions. 1101 D 13
1110 E 14
1111 F 15
There are five main uses of hexadecimal in real life:
o Memory Dumps
Hexadecimal o HTML (HyperText Mark-up Language)
Uses o MAC (Media Access Control)
o Web Addresses
o Assembly Code & Machine Code
2|Page
EOT 1 Exams 2019-20 Cst Notes
CHAPTER 2
Simplex data transmission is in one direction only (sender to receiver).
Simplex data Example of serial data transmission in radios:
transmission
Half-duplex data transmission is in both directions but not at the same time.
Half-duplex Example of half-duplex data transmission in radios:
data
transmission
Serial data transmission is once a single bit is sent through a single wire once a
time.
Advantages:
o Works well over long distance because it’s only one wire resulting in low
Serial data cost.
transmission o No issue if data sent out of order.
o More reliable (single bit sent at a time, less chance of errors).
Disadvantages:
o Much slower rate than parallel transmission because there is only one bit
sent at a time.
Parallel data transmission is when multiple bits (usually a byte) is sent down
several channels/wires simultaneously.
Advantages:
o Faster rate of transmission because multiple bits are sent at the same
Parallel data
time.
transmission
o Works well over short distances.
Disadvantages:
o Wires may be skewed due to having a lot of them.
o Less reliable due to larger amounts of data being sent to the receiver.
Asynchronous data transmission means data being transmitted in an agreed bit
Asynchronous
pattern along with control bits that group bits.
data
Receiver has the knowledge of when a new bit is being received and when it ends.
transmission
This means it’s a great advantage because the data will not be mixed up.
Synchronous data transmission is basically a continuous stream of data that is
being sent to the receiver.
Synchronous
Data is accompanied by timing signals to ensure that that the sender and receiver
data
are synchronised.
transmission
This method is faster than asynchronous data transmission because the data
doesn’t stop flowing.
3|Page
EOT 1 Exams 2019-20 Cst Notes
This is a way to check for errors and corruptions when data is being transmitted.
First of all, both the sender and receiver agree to use either even or odd parity
check.
Parity
Then when the sender sends a byte, it will contain a parity bit that adjusts the
Checking
sum of the 1's in the byte to be odd/even (according to the agreement).
Method
If the receiver finds out that it is not following the odd/even parity check, he will
ask for a resend.
A disadvantage is that we won’t know which bit is exactly the error.
First of all, you will need to identify what is type of parity check used.
Then you will have to go row by row to find the byte that doesn't use the same
type.
After finding the incorrect row, you will do the same steps with the columns.
Parity Data
Finally, after locating the incorrect row & column, we will spot the intersection
Block
point that both of them meet together in, and from that we will spot the incorrect
bit.
Now simply we can change the 1 to 0 or the 0 to 1.
4|Page
EOT 1 Exams 2019-20 Cst Notes
CHAPTER 3
How it’s drawn:
Feature(s):
Two inputs
How it’s drawn:
Logic gate Function: If inputs are the same, output is 0 and vice versa.
XOR
Feature(s):
Two inputs
6|Page
EOT 1 Exams 2019-20 Cst Notes
7|Page
EOT 1 Exams 2019-20 Cst Notes
CHAPTER 4
An operating system (OS) is a software which runs in the background of a
computer system.
They carry out varrious functions, such as:
o Multitasking
o Error Handling
Operating o Input & output control
System o Security (passwords as an example)
o Memory management
Etc…
When computer is starting up, programs, which check that the components are
functioning correctly, are loaded onto the ROM. If no errors are detected then the
OS is loaded into the memory.
Interrupts are signals sent (most likely) by a harware to the computer for
attention due to an error that has occurred.
An example is when the printer runs out of paper, so in this case the printer sends
an interrupt signal to the computer indicating that there is an issue.
Interrupts and
Buffers are used when data is transferred at different rates. Buffers are
Buffers
temporary storage areas for data.
For example, when a computer sends multiple documents to the printer, the data
(documents) which are not being are stored in the buffer for a temporary time
until they are printed.
There are three types of busses used to transfer different things, they are:
o Address Bus: carries signals related to addresses between the processor
and the memory. This bus is unidirectional.
Von Neumann
o Data Bus: sends data between the processor, the memory unit and the
Busses
input/devices devices. This bus is bidirectional.
o Control Bus: carries siganls relating to control and coordination of all
activities within the computer. This bus is both uni and bi directional.
MAR (Memory Address Register)
MDR (Memory Data Register)
Registers ALU (Arithmetic and Logic Unit)
PC (Program Counter)
CIR (Current Instruction Register)
It’s used to hold the memory address (location) that contains either the next
MAR
piece of data or an instruction that is to be used.
Acts like a buffer and holds anything that is copied from the memory, tready for
MDR
the processor to use.
Step 1: Address read to MAR.
Read
Step 2: Read signal is sent
Operation
Step 3: Address is now written to the MDR
Step 1: Data to be stored is first written to MDR
Write Step 2: Address is now written into the MAR
Operation Step 3: Write signal is sent
8|Page
EOT 1 Exams 2019-20 Cst Notes
9|Page
EOT 1 Exams 2019-20 Cst Notes
CHAPTER 5
Most common form of scanner which, most likely, inputs a hard-copy document
into the computer by converting it into an electronic form.
Stages of scanning that occur within the scanner:
o Cover raised, document placed on the flatbed, cover is closed
o A scan head moves below the glass panel with an xenon lamp on top of it to
illuminate light on the document.
o The document (paper) reflects some/most of the light depending on the
2D scanners
darkness of the paper.
o The reflected light hits a series of mirrors which eventually passes through a
lens. This lens is used to collect and focus the image reflected by the paper.
o Finally, this focused image falls onto a charge couple device (CCD), where
the most important stage occurs. Here the image is transformed into an
electronic form by having all the stored pixels in the CCD to create an
electric charge one light strikes them.
When the computer receives the electronic form of the document, it may have an
Optical Character Recognition (OCR) software which converts the document into a
After a 2D text file format.
scan Text file format allows the scanned image to be edited by importing it into a word
processor.
If the scanned document was a picture, it will be stored as JPEG.
Scans actual three-dimensional objects and from it, it produces a 3D image but
electronically.
Basically, since a 3D object has length, width, and height, the scanner takes several
3D scanners
shots from different angles and joins them to form a three-dimensional electronic
image.
Those 3D scanners may use lasers, magnetic resonance, white light, etc…
After a 3D The image formed maybe used in Computer Aided Design (CAD), or to be
scan physically printed by a 3D printer!
In some airports, a scan of the passport is taken and then it automatically fills a
specific database (by the use of OCR technology…).
Application of
In other times, they only take a JPEG form of the passport to compare it with
2D Scanners
another 2D picture taken in the airport. This useful so the police can check if he’s
the real owner of that passport.
Computed Tomographic (CT) Scanners have a special way of building a 3D object.
Basically, it takes several 2D images (slices) and joins them together to make a
Application of complete 3D object.
3D Scanners The way each slice is captured is by the use of X-Rays, radio frequencies or gamma
imaging. Then those slices are stored individually & digitally in the computer’s
memory
10 | P a g e
EOT 1 Exams 2019-20 Cst Notes
11 | P a g e
EOT 1 Exams 2019-20 Cst Notes
Compared to a normal barcode, they can hold much more digits which can
reach up to 7000 digits.
A great advantage over barcodes is the fact that there is no need for a specific
scanner to read a QR code, instead, you can use you normal smartphone for
Advantages of
that manner.
using QR
Since the smartphone can read a QR code, then there is good chance of
codes
advertising products/services in public areas.
No need for the user to write down the URL of the website; instead when
scanning the code, it does that automatically.
They can store website addresses /URLs.
Old cameras used film to record a photo
A film is required to be developed and printed to be seen by the photographer.
You couldn’t delete unwanted photos which caused it to be expensive to
operate.
Modern cameras are connect to the computer via Bluetooth or a USB which
Difference then will send the photographs to the computer to be edited/saved.
between old Modern cameras contain microprocessors which carry out the following tasks:
and new Adjust the shutter speed. Shutter: a mechanical device on a camera
cameras that opens and closes to control the time of a photographic exposure.
Focus the image automatically
Operate the flash automatically
Adjust the aperture size
Adjust the size of the image
Remove “red eye” when flash is used
A photograph is taken when light passes through the lens onto a light-sensitive
cell.
This cell is made of pixels.
The number pixels is what decides the size of the file used to store the
photograph.
Description of
By reducing the resolution of the image, the storage requirement is reduced
taking a
too.
picture
Other factors which affect the quality of a photograph are:
The type of lens used
The lightning
Mobile phones have almost the same number of pixels as a digital camera.
Nevertheless, they have poor lens quality and a limited storage space.
Most common type of input devices.
They are mainly used on computers, tablets, mobile phones, etc..
Features of They are connected to a computer using a USB connection or sometimes by
keyboards wireless connection.
On mobile phones and tablets they are considered as virtual/touchscreen
technology because they are not a hardware in that case.
Each character (digit/space/number/symbol etc..) is represented by an ASCII
How
value, which the computer understands.
keyboards
When a character is pressed, it is converted into a digital signal, which the
function
computer interprets…
12 | P a g e
EOT 1 Exams 2019-20 Cst Notes
1 2 3
Mouse:
Needs desk space to be able to move around.
Needs special kind of surfaces.
Difference
One or two buttons.
between
Scroll wheel included.
mouse and
Tracker Ball:
tracker ball
No need for extra space.
No need for special surfaces.
Less likely for the user to experience RSI.
They usually have a built-in touch pad.
It works by touching the surface and moving your finger.
Laptops
Buttons are available on left and right. Although sometimes you can simply click
on the pad itself.
Main use is to input sound into the computer.
Allows disabled people to communicate with the computer.
Features of
They can be built in the computer, connected using a USB port, or wirelessly.
microphones
When a sound is picked up, a diagram vibrates producing an electric signal.
Then this signal is sent to a sound card and converted into digital values.
13 | P a g e
EOT 1 Exams 2019-20 Cst Notes
14 | P a g e
EOT 1 Exams 2019-20 Cst Notes
Uses glass as the screen material. Uses glass as the screen material.
Needs a warm object to carry out as Uses an array of sensors (in the form
an input of a grid); the point of contact is
Infra-red based on which grid coordinate is
touchscreen touched.
(heat--left) o BOTH: Multi touch capability
(optical— o OPTICAL: Bare fingers, stylist, or gloved fingers all work
right) o BOTH: Very durable
Expensive technology
HEAT: Only allows bare fingers as input
Fairly good screen visibility in sunlight.
Sensors are devices which measure/read physical properties.
What are Examples of physical properties are temperature, pressure, pH, etc
sensors In everyday life we deal with analogue data (data which constantly changes and
doesn’t have a discrete value)
Since computers do not understand analogue data, they need a converter to
allow the analogue data to be interpreted. This converter is called Analogue to
Digital Converter (ADC).
Basically what an ADC does is to change physical values into discrete digital
ADC and DAC
values.
When a computer is used to control a valve or a motor, for example, they need a
Digital to Analogue Converter (DAC) to allow those devices to understand the
command. That is due to the devices only interpreting analogue values.
Sometimes, an actuator is used in control applications.
An actuator may be considered as an output device, but it is used here so we
will mention it as an input device.
Actuator
An actuator is an electromechanical device such as a relay, solenoid or motor.
They may need a DAC to understand the data sent by the
computer/microprocessor.
15 | P a g e
EOT 1 Exams 2019-20 Cst Notes
TEMPERATURE:
o Control a central heating system
o Control/monitor a chemical process*
o Control/monitor the temperature in a greenhouse
MOISTURE/HUMIDITY:
o Control/monitor the moisture levels in soil in a greenhouse.
o Control/monitor the humidity levels in the air in a greenhouse
o Monitor dampness levels in an industrial application (e.g., monitor
moisture in a paint spray booth in a car factory).
LIGHT:
o Switch street lighting on at night and off during the day
o Monitor/control light levels in a greenhouse
o Automatically switch on a car’s headlights when it gets dark
INFRA-RED/MOTION:
o Turn on the windscreen wipers on a car automatically
o Detect intruders in a burglar alarm system
Types of o Count people entering/leaving a building
sensors and PRESSURE:
some of their o Detect intruders in a burglar alarm system
applications o Weigh things (e.g. check the weight of a vehicle)
o Monitor/control a process where gas pressure is important
ACOUSTIC/SOUND:
Pick up noise levels (e.g. footsteps) in a burglar alarm system
Detect the noise of liquids dripping in a pipe
GAS (e.g. O2 or CO2):
Monitor pollution levels in a river or in the air
Measure O2 and CO2 levels in a greenhouse
Check for CO2 leaks in a power station
pH:
Monitor/control acidity/alkalinity levels in the soil in a greenhouse
Pollution/environmental monitoring in rivers
MAGNETIC FIELD:
Any application where detection of changes in a magnetic field is
required (e.g. in cell phones, CD players, etc.)
Used in anti-lock braking systems in motor vehicles
Summary
16 | P a g e
EOT 1 Exams 2019-20 Cst Notes
Only viewing the data or basically “watching” the processor and it can send an
alarm or alert to the screen to warn the user.
Applications include:
Monitoring Monitoring a patient in a hospital for vital signs such as heart rate,
and its temperature, etc.
applications Monitoring of intruders in a burglar alarm system
Checking the temperature levels in a car engine
Monitoring pollution levels in a river.
Print head: the core of an inkjet printer, the print head contains a series of
nozzles that are used to spray drops of ink.
What are
Ink cartridge(s): a single cartridge for black and one cartridge for 3 colours (blue,
inkjet
yellow, magenta)
printers made
Stepper motor & a belt: moves the print head assembly across the page.
of?
Paper feed: feeds the printer with paper as the required number.
Thermal Bubble:
Tiny resistors create heat, and this heat vaporizes ink to create a bubble.
As the bubble
expands, some of
the ink is pushed out
of a nozzle onto the
paper.
When the bubble
"pops" (collapses), a
vacuum is created.
This pulls more ink
into the print head from the cartridge.
A typical bubble jet print head has 300 or 600 tiny nozzles, and all of
wo them can fire a droplet simultaneously.
technologies
in which ink
droplets are
produced Piezoelectric:
A crystal is located at the back of
the ink reservoir of each nozzle.
The crystal receives a tiny electric
charge that causes it to vibrate.
When the crystal vibrates inward,
it forces a tiny amount of ink out
of the nozzle.
When it vibrates out, it pulls
some more ink into the reservoir
to replace the ink sprayed out.
17 | P a g e
EOT 1 Exams 2019-20 Cst Notes
Differences
between
thermal
bubble and
piezoelectric
18 | P a g e
EOT 1 Exams 2019-20 Cst Notes
19 | P a g e
EOT 1 Exams 2019-20 Cst Notes
Differences
between the
printers
(Extra)
20 | P a g e
EOT 1 Exams 2019-20 Cst Notes
21 | P a g e
EOT 1 Exams 2019-20 Cst Notes
22 | P a g e
EOT 1 Exams 2019-20 Cst Notes
CHAPTER 6
The following formats are used in a computer system:
o Musical Instrument Digital Interface (MIDI)
File Formats o MP3
o MP4
o Jpeg
o Text & number format
Musical Instrument Digital Interface (MIDI) is used for storage of music files,
but not the music (sounds) itself,
instead the ways to connect
devices to produce sounds
(commands)
MIDI MIDI is asynchronous, due to it
using start and stop bit.
It contains commands to instruct
devices how to produce the desired sound.
Each MIDI command has a specific of sequence of bytes, which is as follows:
o First byte (status byte) – informs the MIDI device to perform
MPEG-3 (MP3) uses technology known as audio compression to convert music
and other sounds into MP3 format.
It reduces the size by about 90%.
This format is used in MP3 players, computers, or phones.
MP3 Although, the quality doesn’t match the original, the quality is satisfactory for
general purposes.
The algorithms (called perceptual music shaping) remove sounds that are not
audible by the human.
MP3 use lossy format.
MP4 MPEG-4 (MP4) allows music, videos, photos, and animation to be stored.
Joint Photographic Experts Group (JPEG) reduces the photographic file size, but
in return, the quality drops.
Also uses lossy file compression.
JPEG The file size of the image is identified by the number of pixels. Each pixel is
made of three colours (red, green, and blue).
TIFF and BMP are of high resolution formats, because they are not in a
compressed format.
Text is usually stored in an ASCII format.
Numbers may be stored as:
o Real (2.17966)
Text &
o Integer (2)
Number File
o Date (02/12/2014)
Formats
o Time (15:20:59)
o Currency ($60.50)
If numbers or texts undergo compression, it would be lossless
Lossless File All the data bits from the original file are reconstructed when the file is again
Compression uncompressed.
23 | P a g e
EOT 1 Exams 2019-20 Cst Notes
Lossy File The file compression algorithm eliminates unnecessary bits of data.
Compression This is used in MP3 and MP4….
It is split into three groups:
• RAM
Primary Memory • ROM
24 | P a g e
EOT 1 Exams 2019-20 Cst Notes
Comparison
Laser (red) light is used to read and write data in the surface of the disk
Use a thin layer of metal alloy to store data
Both systems use a single, spiral track which runs from the centre of the disk to
CD/DVD Disks
the edge
DVD uses Dual-Layering which increases the storage capacity (two individual
recoding layers)
Uses blue laser to carry out read and write operations
Wavelength of laser light is less than CD and DVD
(stores up to five times more data than DVD)
Blu-ray Disks Automatically come with secure encryption (prevent
piracy and copyright infringement)
Used as back-up systems
25 | P a g e
EOT 1 Exams 2019-20 Cst Notes
CHAPTER 7
Easier to read and understand as the language is closer
High-Level
to human language
Languages
Easier to write in shorter time
(HLL)
Easier to debug at the development stage
Easier to maintain once in use
Low-Level Refer to machine code
Languages Binary instructions that computer understands
(LLL)
There are three types of translators:
Interpreters
Compilers
Translators Assemblers
26 | P a g e
EOT 1 Exams 2019-20 Cst Notes
CHAPTER 8
Nowadays data is threatened to be deleted or corrupted either accidentally or
intentionally using malicious codes or software.
The following are security risks:
o Hacking
o Viruses
Security Risks
o Pharming
o Phishing
o Wardriving
o Spyware
27 | P a g e
EOT 1 Exams 2019-20 Cst Notes
The act of locating and using wireless internet connections illegally; it requires a
laptop, wireless network card and antenna to pick up signals.
Possible to steal user’s internet time by downloading large files.
Wardriving Possible to hack; gain passwords and personal details.
Use of wired equivalent privacy encryption.
Having complex password.
Firewalls
Software that gathers information by monitoring key presses on the user’s
keyboard; info is sent back to the hacker.
Spyware/Key- Gives originator access to all data entered on the computer by the keyboard.
logging Software is able to install other spyware, read cookies, change default browser.
software Use of anti-spyware.
Always be alert for clues that hint to your keyboard being monitored.
Use mouse or on-screen keyboard as form of input.
A cookie is a packet of information sent by a web server to a web browser.
They are downloaded onto the user’s computer and every time the website is
visited, the cookies are generated.
Cookies collect information such as their fashion, music taste and other
Cookies
preferences of the user.
They help the website with advertisements and what to display the most on
their home screen.
Those cookies are simply pieces of data and they aren’t programs.
28 | P a g e
EOT 1 Exams 2019-20 Cst Notes
Proxy servers act as an intermediary between the user and a web server.
Functions of proxy servers:
o Allowing the internet ‘traffic’ to be filtered; they can block access to a
website if necessary (similar type or reaction as a firewall)
o By using the feature known as a CACHE, they can speed up access to
information from a website; when the website is first visited, the home
page is stored on
the proxy server;
Proxy Servers
when the user next
visits the website, it
now goes through
the proxy server
cache instead, giving
much faster access
o Keeping the user’s IP address secret - this clearly improves security
o Acting as a firewall.
There are two forms of security protocols:
Security
o Secure Sockets Layer (SSL)
Protocols
o Transport Layer Security (TLS)
29 | P a g e
EOT 1 Exams 2019-20 Cst Notes
31 | P a g e
EOT 1 Exams 2019-20 Cst Notes
Computer ethics are a set of principles set out to regulate the use of computers.
Here are 3 factors concerning ethics:
Computer o Intellectual property rights: this discusses copying of a software without
Ethics permission.
o Privacy Issues: this covers hacking and gaining illegal access to a computer
o Effect of computer on society: job losses, social impacts, etc…
When a person steals the idea of another person’s work and claims it as it’s his
own.
Plagiarism
Although using other people’s work is fine, not acknowledging him is a crime.
Refrence can be stated in footnotes or at the end of a document.
32 | P a g e
EOT 1 Exams 2019-20 Cst Notes
33 | P a g e
EOT 1 Exams 2019-20 Cst Notes
CHAPTER 9
A computer system is made up of a software, hardware, communication, data, and
Computer people.
System They are divided into smaller and smaller sub-systems.
Question
Sample of
Top-Down
Design
Answer: A typical answer would be “(Output) destination” in the top right box. While
the bottom left would be “New (destination) and Previous (destination)”.
Exam code: 0478 Summer 2017 Paper 21
34 | P a g e
EOT 1 Exams 2019-20 Cst Notes
Structure
Diagrams
A flowchart shows
diagrammatically the steps
required for a task and the
order they will be performed
in.
Those steps and their order
combine to be named
algorithm.
Flowchart example:
Flowcharts
35 | P a g e
EOT 1 Exams 2019-20 Cst Notes
A library routines is a set of programming instructions for a given task that is already
Library
available for use.
Routines
It is ususally used when a task is frequently used/required in the program.
An algorithm is a sequence of steps which perform a specific task. Algorithms are
Algorithm
usually represented as a program flowchart or in pseudocode.
A sub-routine is a sequence of program instructions that performs a specific task,
packaged as a
unit, NOT a whole
system.
This unit can then
be used in
Sub-Routines
programs
wherever that
particular task
should be
performed.
A discount is given when the bill is equal to or between $50 and $500.
Test Data
Test Data Example Result
Normal 60, 90, 100, 250, 300, 450 Accpeted
Abnormal 10, 30, 700, x, ok, 5000, a Rejected
Extreme 50, 500 Accepted
Boundary (49, 50), (500, 501) Whithin a set, one is accepted, the
other is rejected
36 | P a g e
EOT 1 Exams 2019-20 Cst Notes
Checks that when a string of characters are entered, it doesn’t contain invalid
symbols/characters
An example would be when a name is
Character inputted it must not contain keys such as @
Checks or $.
37 | P a g e
EOT 1 Exams 2019-20 Cst Notes
Screen / This is sa manual check completed by the user who is entering the data.
visual check
38 | P a g e
EOT 1 Exams 2019-20 Cst Notes
A trace table may be used to record the results from each step in an algorithm.
It is used to record the value of an item (variable) that changes each time.
To create a trace table, write the headings of each input and the output. You will be
given the test numbers/characters,and you’re expected to fill in the table.
Trace Tables
You may fill in a trace table from either a flowchart or pseducode, depending on the
question.
Usually, each column is given a mark. So, if one number is incorrect in the column,
you will lose a mark.
39 | P a g e
EOT 1 Exams 2019-20 Cst Notes
Sample
Question on
Trace Tables
You must follow step by step and take the test data one by one.
Make sure to write everything in the correct place.
Exam code: 0478 March 2017 Paper 22
The following are exactly what’s written in the book; however, keypoints are
underlined:
1. Make sure that the problem is clearly specified.
2. Break the problem down into sub-problems; if it is complex, you may want to
consider writing an algorithm for each sub-problem. Most problems, even the
Stages of
simplest ones can be divided into:
Producing an
set up
Algorithm
input
processing
output of results.
3. Decide on how any data is to be obtained and stored, what is going to happen to
the data and how any results are going to be displayed.
40 | P a g e
EOT 1 Exams 2019-20 Cst Notes
4. Decide on how you are going to construct your algorithm, using a flowchart or
pseudocode.
5. Construct your algorithm, making sure that it can be easily read and understood
by someone else. This involves setting it out clearly and using meaningful names
for any data stores.
6. Use several sets of test data (normal, abnormal and boundary) and trace tables
to find any errors.
7. If any errors are found, repeat the process until you think that your algorithm
works perfectly.
41 | P a g e
EOT 1 Exams 2019-20 Cst Notes
CHAPTER 10
As stated previously, it is a simple method of showing an algorithm, using English-like
words and mathematical operators.
Pseudocode is not restricted by syntax rules therefore, it cannot be interpreted by the
computer.
It is used to give basic understandable information by anyone of how the structure
works.
Pseudocode When writing a pseudocode:
o Use proper and meaningful names for variables
o Indentation is key
o Keep it simple
o Keep it concise
However, don’t:
o Generalize the code too much
o Make the pseudocode abstract
Assignment sign: (eg. Mark 10)
Indicates that a variable (eg. mark) has been given/assigned a value (eg. 10).
Other Operators include:
Operator Action
+ Addition
Assignment & - Subtraction
Mathematical * Multiplication
Operators / Division
^ To the power of..
( ) Group
IMPORTANT:
= and are different. = sign represents comparison, while sign represents
assigning a value.
42 | P a g e
EOT 1 Exams 2019-20 Cst Notes
• IF..THEN..ELSE..ENDIF
Conditional • CASE..OF..OTHERWISE..ENDCASE
statements
• FOR..TO..NEXT
• REPEAT..UNTIL
Loop structure • WHILE..DO..ENDWHILE
Pseudocode
Structure
• Totalling
Standard • Counting
actions
Note that you may use “nested if” if required to for the code. See example in picture…
43 | P a g e
EOT 1 Exams 2019-20 Cst Notes
This statement is used when multiple options (paths) are available to be taken with
different consequences for each option.
Several values are specified. The OTHERWISE path is taken by any other inputted value
ehich is not specified.
This statement is ended using ENDCASE.
Format:
CASE OF [VARIABLE]
Conditional OPTION: [CONSEQUENCE]
(CASE…OF… OTHERWISE: [CONSEQUENCE]
OTHERWISE… ENDCASE
ENDCASE) Example:
CASE Choice OF
1 : Answer Num1 + Num2
2 : Answer Num1 - Num2
3 : Answer Num1 * Num2
4 : Answer Num1 / Num2
OTHERWISE: OUTPUT “FAIL”
ENDCASE
Sample
question on
conditional
statements
In this case, the example means just write any code relating to the statement.
Reason is basically “when is this statement used?”
Exam code: 0478 Winter 2016 Paper 22
44 | P a g e
EOT 1 Exams 2019-20 Cst Notes
This type of loop structure is used when there is a specified number of repitions.
Although almost all the time all loop structures work, there is always a most efficient
structure.
Such loop has a built-in counter; therefore, there is no need to include a counter in
your code.
Format:
FOR [VARIABLE] [VALUE] TO [VALUE]
[CODE]
Loop NEXT
(FOR…TO… Example:
NEXT) FOR Counter 1 to 10
Print “You must study properly!”
NEXT
Few points to take in consideration:
o Whenever average is to be calculated, the totalling must be performed.
o Assign total 0 always.
o Initial and final limits in a loop condition. FOR Count 1 TO 10 will repeat the
code 10 times. FOR Count 0 TO 10 will repeat it 11 times.
o The loop must be terminated with the keyword NEXT.
This structure is a from of repetition where the number of repetitions/iterations is
unkown.
The action is repeated UNTIL a given condition becomes true.
This loop completes at least once because the condition is at the bottom of the
structure (verification is done after running the code).
Format:
Loop REPEAT
(REPEAT… [CODE]
UNTIL) UNTIL [CONDITION]
Example:
REPEAT
Total Total + Mark
Print “Enter value for mark, -1 to finish”
Input Mark
UNTIL Mark = -1
This is also a form of repitions where the number of repeats is unknown.
However, this loop may never be completed because the condition is at the top of the
structure (verification is done before running the code).
The actions are only repeated WHILE a given condition is true.
If condition is untrue, actions in the WHILE…DO…ENDWHILE loop are never executed.
Format:
Loop WHILE [CONDITION] DO
(WHILE…DO… [CODE]
ENDWHILE) ENDWHILE
Example:
WHILE Mark <> -1 DO
Total Total + Mark
Print “Enter value for mark, -1 to finish”
Input Mark
ENDWHILE
45 | P a g e
EOT 1 Exams 2019-20 Cst Notes
Sample
question on
loop
structures
As you can see, you may be asked to convert a code from one type of loop to another.
This is because, as stated above, all loops function and give correct output for the
same code…
46 | P a g e
EOT 1 Exams 2019-20 Cst Notes
INPUT and OUTPUT are used for the entry and display of data and information.
READ is sometiomes used instead of INPUT.
PRINT is frequently used instead of OUTPUT.
47 | P a g e
EOT 1 Exams 2019-20 Cst Notes
To answer such
question, always say
the line number then
the error and the way
to correct this error.
Just like identifying the errors, they may ask you to amend the code in order to fulfill a
Amend the new task/purpose.
Code Like the errors, there is no exact way to answer those questions other than using your
prior knowledge.
Sample
question on
amending a
code
Again, make sure you read the purpose of the code given. And this time, also read the
new purpose needed…
Exam code: 0478 Summer 2016 Paper 21
48 | P a g e
EOT 1 Exams 2019-20 Cst Notes
This is a quick recap of flowcharts as it has already been explained in chapter 9 notes.
Here is a reminder of the symbols of a flowchart:
Flowcharts
Sample
question on
drawing
flowcharts
49 | P a g e
EOT 1 Exams 2019-20 Cst Notes
Sample
question on
writing
pseudocode
50 | P a g e
EOT 1 Exams 2019-20 Cst Notes
CHAPTER 11
This chapter is almost the same as chapter 10…
It mainly focuses on writing a program on the computer and running it using
Generally
different languages.
However, the differences will be stated in the notes
Variable:
o Is a named store data that contains a value that may change during the
excution of the program. They MUST be given meaningful names. There
should be no spaces between the name.
Constant:
o Is a named store data that contains a value that does not change during the
Declaration & excution of the program. They MUST be given meaningful names. There
Usage of should be no spaces between the name.
Variables & It is a good habbit to declare the variables and constants that will be used in the
Constants program.
Declaration of
variables and
constants in
VB:
Different kinds of data are formally given various different types, which enables:
o data to be stored in an appropriate way, for example, as numbers or
characters
o data to be manipulated effectively, for example numbers with mathematical
operators and characters with concatenation
Basic Data o automatic validation in some cases.
Types The following are the types:
o Integer
o Real
o Char
o String
o Boolean
An integer is a positive or negative whole number that can be used with
Data Type
mathematical operators.
(Integer)
Examples may include 2, 100, 85, 46, …..
A real number is a positive or negative number with a fractional part. Real
Data Type
numbers can be used with mathematical operators.
(Real)
Examples may be: 7.00, 89.50, 43.20, …..
Data Type A variable or constant of type CHAR is a single character.
(Char) Examples of such: Y, M, L, …..
A variable or constant of type STRING is several characters in length. Strings vary
in length…
Data Type They may even have no characters: an empty string.
(String) The characters can be letters and/or digits such as: Ahmed, , Cool, We love CIE,..
51 | P a g e
EOT 1 Exams 2019-20 Cst Notes
Data Type
Telephone
3
3.5
True/False
A1
C
Cool
Past paper question:
Sample
question of
Data Types
The question also asks for the validation check. Refer to this part if you’ve
forgotten the types.
Read question carefully…
Exam code: 0478 March 2017 Paper 22
There are five main programming/pseudocode constructs:
o Sequesnce
Important o Selection
Concepts o Repetition
o Totalling
Already stated above….
o Counting
It refers that instructions should be executed one after the other. Eg. Variables
must first be declared, and then used.
Assignment statements rely on the variables used in the expression on the
Sequence
right-hand side of the statement all having been given values.
Input statements often provide values for assignment statements.
Output statements often use the results from assignment statements.
52 | P a g e
EOT 1 Exams 2019-20 Cst Notes
53 | P a g e
EOT 1 Exams 2019-20 Cst Notes
CHECKLIST
The next couple of pages are all derived from the syllabus of 2020 examination.
You may use this as a form of checklist to make sure you’ve covered all what’s required in the
syllabus.
Place a check beside the parts you feel you covered well and ready to be examined on from past
paper questions.
1.1.2 Hexadecimal
represent positive numbers in hexadecimal notation
show understanding of the reasons for choosing hexadecimal notation to represent
numbers
convert positive hexadecimal integers to and from denary (a maximum of four
hexadecimal digits will be required)
convert positive hexadecimal integers to and from binary (a maximum of 16 bit binary
numbers will be required)
represent numbers stored in registers and main memory as hexadecimal
identify current uses of hexadecimal numbers in computing, such as defining colours in
Hypertext Markup Language (HTML), Media Access Control (MAC) addresses, assembly
languages and machine code, debugging
54 | P a g e
EOT 1 Exams 2019-20 Cst Notes
55 | P a g e
EOT 1 Exams 2019-20 Cst Notes
show understanding of the concepts of MAC address, Internet Protocol (IP) address,
Uniform Resource
Locator (URL) and cookies
A B C Output
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
produce a logic circuit to solve a given problem or to implement a given written logic
statement
56 | P a g e
EOT 1 Exams 2019-20 Cst Notes
57 | P a g e
EOT 1 Exams 2019-20 Cst Notes
1.4 Security……………………………………………...........
1.4.1
show understanding of the need to keep data safe from accidental damage, including
corruption and human errors
show understanding of the need to keep data safe from malicious actions, including
unauthorised viewing, deleting, copying and corruption
1.4.2
show understanding of how data are kept safe when stored and transmitted, including:
– use of passwords, both entered at a keyboard and biometric
– use of firewalls, both software and hardware, including proxy servers
– use of security protocols such as Secure Socket Layer (SSL) and Transport Layer Security
(TLS)
– use of symmetric encryption (plain text, cypher text and use of a key) showing
understanding that increasing the length of a key increases the strength of the encryption
1.4.3
show understanding of the need to keep online systems safe from attacks including denial
of service attacks, phishing, pharming
1.4.4
describe how the knowledge from 1.4.1, 1.4.2 and 1.4.3 can be applied to real-life
scenarios including, for example, online banking, shopping
58 | P a g e
EOT 1 Exams 2019-20 Cst Notes
1.5 Ethics……………………………………………...........
show understanding of computer ethics, including copyright issues and plagiarism
distinguish between free software, freeware and shareware
show understanding of the ethical issues raised by the spread of electronic communication
and computer systems, including hacking, cracking and production of malware
2.2 Programming……………………………………………...........
2.2.1 Programming concepts
declare and use variables and constants
understand and use basic data types: Integer, Real, Char, String and Boolean
understand and use the concepts of sequence, selection, repetition, totalling and counting
use predefined procedures/functions
2.3 Databases……………………………………………...........
define a single-table database from given data storage requirements
choose and specify suitable data types
choose a suitable primary key for a database table
perform a query-by-example from given search criteria
Credits:
- Znotes: https://znotes.org/
- Mr Ashraf’s slides
- CIE Syllabus
60 | P a g e
EOT 1 Exams 2019-20 Cst Notes
Personal Notes
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
61 | P a g e
EOT 1 Exams 2019-20 Cst Notes
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
_______________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
62 | P a g e