CAIE-AS Level-IT - Theory
CAIE-AS Level-IT - Theory
ORG
CAIE AS LEVEL
IT
SUMMARIZED NOTES ON THE THEORY SYLLABUS
Prepared for Arya for personal use only.
CAIE AS LEVEL IT
Electoral Register
1. Data Processing and Governments keep a register of voters, including
names and addresses.
Information Originally for elections, it’s also used by credit
reference agencies to verify addresses or by
marketing agencies for direct mail.
1.1. Data and Information People can choose to keep their electoral register
details hidden from public view.
Data: Includes raw number, letters, symbols, sounds or Businesses and Personal Data
images with no meaning. Businesses often buy lists of contact information
Examples : 28345.77 (emails, phone numbers) collected by third parties.
Information: When data items get context and meaning This data is often collected by third parties through
they become information. interactions like online forms, subscriptions, or
Examples : 28345.77 is the price of a car in dollars loyalty programmes.
This indirect data is then used for targeted marketing
1.2. Sources of Data campaigns.
Direct Data Source: Data collected from the primary source Advantages and disadvantages of direct and
is used for its intended purpose. indirect data
Questionnaires Direct data Indirect data
Ideal for gathering specific opinions, especially when Only needed data is collected, making the data Large samples are easy to acquire.
relevant.
dealing with many respondents. The data can be trusted because the original Data is immediately available.
source is known.
Questions should be structured to gather the right Additional sorting of irrelevant data will be
The data is up to date
data, ensure easy analysis, and not overwhelm The data is collected and presented in the
required.
The source is not reliable as the original source
respondents. format required. is unknown.
The collection of original data can take longer The data may be out of date.
Online questionnaires are efficient because they than using data that is available.
directly input data into databases, saving time on A large sample of data can be difficult to
collect.
The data may not be available in the required
format.
manual entry.
Interviews
Involve asking respondents questions directly,
1.3. Quality of information
allowing for follow-up queries to gain more detailed
Accuracy: Data must be accurate.
responses.
Relevance: Information must be relevant to its purpose.
Indirect Data Source: Data collected from the secondary Age: Information must be up to date.
source and used for a different purpose. Level of detail: Good quality information requires the
right amount of information.
Completeness: All information required should be
present.
1.4. Encryption
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE AS LEVEL IT
Encryption: The scrambling of data so it cannot be Validation: The process of checking data to ensure it
understood without a decryption key if intercepted. matches acceptable rules.
Types of Encryption: Presence check: used to ensure that data is
Caesar Cipher: A special type of algorithm that entered(present).
defines a set of rules to follow to encrypt. Range check: Ensures that data is within a defined
Symmetric Encryption: This encryption requires range. Contains two boundaries, the lower boundary
both the sender and recipient to possess a key and the upper boundary.
known as a private key used for both encryption and Type check: Ensures that data must be of a defined
decryption. data type.
Asymmetric Encryption: This encryption has a Length check: Ensures data is of a defined length or
public key for the sender to encrypt and a private key within a range of lengths.
for the recipient to decrypt the data. Format check: Ensures data matches a defined
format.
Applications of Encryption Lookup check: Rests to see if data exists in a list.
Similar to referential integrity.
Hard Disk: Every bit of stored data is encrypted and Consistency check: Compares data in one field with
requires a key to decrypt it. data in another field that already exists within a
HTTPS: It uses SSL ( Secure Socket Layer ) or TLS ( record to check their consistency.
Transport Layer Security ) to encrypt web pages for Check Digit: It is a digit added to the end of an
security. identification number and is generated by an
Email Encryption: Email is encrypted using the algorithm.
asymmetric encryption method. Verification: The process of checking whether data
entered into the system matches the original source.
1.5. Validation and Verification Visual checking: Visually checking the data to see if it
matches the original source, by reading and
comparing, usually by the user.
Double data entry: Data is input into the system
twice and checked for consistency by comparison.
Hash Total: Before input, the values from the input
field are manually calculated, and after input, the
computer compares the manual total.
Control Total: Similar to Hash totals but used on
fields with meaning.
Parity Check: It is used to find errors during data
transmission. Every byte is checked individually.
By using both validation and verification, the chances of
entering incorrect data are reduced.
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE AS LEVEL IT
test
|| |# 3.2. System Software
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE AS LEVEL IT
System Software: Any program designed to maintain or Utility software: Software that performs some
operate the computer system is known as system maintenance on the computer system.
software. Two main functions of an Anti-virus:
Operating Systems: The operating system manages the Anti-virus monitor continually monitors the system
hardware within a computer system. It carries the tasks for viruses and malware.
below: Check for viruses or malware that may already be on
Allocating memory to software the system, this is known as scanning.
Sending data and instructions to output devices Backup utilities: It create a second copy of data and
Responding to input devices, such as when a key is programs that are in storage.
pressed Data compression: reduces the original size of files so
Opening and closing files on storage devices they use less storage space.
Giving each running task a fair share of processor Disc defragmentation: defragments and reorganizes
time fragmented gaps of files left after usage on a drive so
Sending error messages or status messages to that each file is contiguous.
applications or users Formatting: the process of organizing the tracks on the
Dealing with user log-on and security. disc into sectors. When a used disc is formatted, all data
Device Drivers: The device driver is used to enable is erased.
communication between the computer system and File-copying utilities give users more control over which
specific hardware models. files are copied and how they are copied.
Translators: It translate a high-level language program Deleting utilities can overcome restrictions set by an
into machine code that the computer can understand. operating system and enable the permanent deletion of
There are two types of translators: files.
Compilers
Interpreters 3.4. Custom-Written and Off-the-Shelf
Compilers
Before executing, it simultaneously translates
Interpreters
Translates source code into object code one
Software
the source code into object code. line at a time.
The compiled object code will only work for the The object code can be used for multiple
operating system it was compiled for. operating systems.
Object code is ready to be executed quickly. It takes extra time for execution as the object
code needs to be generated.
It takes a long time to compile. Only the required code needs to be
interpreted.
Errors are reported only after compilation is Errors are reported during the interpretation.
done.
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE AS LEVEL IT
Custom-written: Software that is written to meet the User Interface: A boundary between the user and the
requirements of a client. computer system.
It is expensive because the client covers the entire Command Line Interface (CLI): This interface allows the
development cost. user to enter text commands to which the computer
Takes a longer time to develop. system responds.
The requirements of the client can be met precisely. Graphical User Interface (GUI): The most common and
Developers will ensure compatibility with the client’s easiest interface type. It has elements that are known as
hardware, software and data. WIMP.
Bugs are likely since it is not used widely. Windows: Area of the screen for a specific task.
The client will have access to support from the Icons: Image used to represent a specific software or
developer company. task.
Off-the-shelf: General-purpose software available to a Menus: Words on the screen representing a list of
large market. options.
Development cost is spread between all the Pointers: Representing movement on the screen.
customers who purchase it at a specific price, Dialogue Interface: It uses spoken words to
reducing overall cost. communicate with the computer.
Immediately available. Gesture-Based Interface: It uses the recognition of
User requirements may not be precise/unnecessary human motion.
features.
It may have compatibility issues.
Many users mean fewer bugs due to patches 4. Monitoring and Control
released after identifying bugs.
Wide range of support both from the developing 4.1. Sensors
company and externally.
Sensor: An input device that records data about the
3.5. User Interfaces surrounding physical environment. The advantages of
the sensors are as follows:
Data can be repeatedly collected.
Data can be collected from harmful and dangerous
environments.
Data is likely to be more accurate.
Different types of sensors:
Light sensor
Temperature sensor
Pressure sensor
Humidity sensor
Infrared sensor
4.2. Calibration
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE AS LEVEL IT
Real-World Examples:
Growing crops in a greenhouse.
Protection against intruders.
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE AS LEVEL IT
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE AS LEVEL IT
Advantages Disadvantages
Provides answers to questions that require Responses are always logical but can’t be
knowledge you don’t have
Aids professional people by prompting them
and guiding them to look at areas of
useful every time
If there are any errors in the rules and
databases, they can generate the wrong
9. Database and File
Concepts
knowledge they may not have considered or solution.
remembered
The responses that are produced are always It is very expensive and requires a lot of
consistent consultants from expert humans
It can be used at any time
Arrives at a solution faster than an expert
human.
8. Spreadsheets
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE AS LEVEL IT
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE AS Level
IT
© ZNotes Education Ltd. & ZNotes Foundation 2024. All rights reserved.
This version was created by Arya on Fri Feb 14 2025 for strictly personal use only.
These notes have been created by Jaabir for the 2022-24 syllabus.
The document contains images and excerpts of text from educational resources available on the internet and printed books.
If you are the owner of such media, test or visual, utilized in this document and do not accept its usage then we urge you to contact us
and we would immediately replace said media. No part of this document may be copied or re-uploaded to another website.
Under no conditions may this document be distributed under the name of false author(s) or sold for financial gain.
"ZNotes" and the ZNotes logo are trademarks of ZNotes Education Limited (registration UK00003478331).