0% found this document useful (0 votes)
13 views11 pages

CAIE-AS Level-IT - Theory

The document provides a comprehensive overview of the CAIE AS Level IT syllabus, covering key topics such as data processing, encryption, validation, and verification. It also discusses hardware and software types, user interfaces, monitoring and control systems, and eSecurity measures for protecting personal data. Each section includes definitions, examples, advantages, and disadvantages relevant to the concepts presented.

Uploaded by

Arya Binu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views11 pages

CAIE-AS Level-IT - Theory

The document provides a comprehensive overview of the CAIE AS Level IT syllabus, covering key topics such as data processing, encryption, validation, and verification. It also discusses hardware and software types, user interfaces, monitoring and control systems, and eSecurity measures for protecting personal data. Each section includes definitions, examples, advantages, and disadvantages relevant to the concepts presented.

Uploaded by

Arya Binu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

ZNOTES.

ORG

UPDATED TO 2023-2025 SYLLABUS

CAIE AS LEVEL
IT
SUMMARIZED NOTES ON THE THEORY SYLLABUS
Prepared for Arya for personal use only.
CAIE AS LEVEL IT

Electoral Register
1. Data Processing and Governments keep a register of voters, including
names and addresses.
Information Originally for elections, it’s also used by credit
reference agencies to verify addresses or by
marketing agencies for direct mail.
1.1. Data and Information People can choose to keep their electoral register
details hidden from public view.
Data: Includes raw number, letters, symbols, sounds or Businesses and Personal Data
images with no meaning. Businesses often buy lists of contact information
Examples : 28345.77 (emails, phone numbers) collected by third parties.
Information: When data items get context and meaning This data is often collected by third parties through
they become information. interactions like online forms, subscriptions, or
Examples : 28345.77 is the price of a car in dollars loyalty programmes.
This indirect data is then used for targeted marketing
1.2. Sources of Data campaigns.

Direct Data Source: Data collected from the primary source Advantages and disadvantages of direct and
is used for its intended purpose. indirect data
Questionnaires Direct data Indirect data
Ideal for gathering specific opinions, especially when Only needed data is collected, making the data Large samples are easy to acquire.
relevant.
dealing with many respondents. The data can be trusted because the original Data is immediately available.
source is known.
Questions should be structured to gather the right Additional sorting of irrelevant data will be
The data is up to date
data, ensure easy analysis, and not overwhelm The data is collected and presented in the
required.
The source is not reliable as the original source
respondents. format required. is unknown.
The collection of original data can take longer The data may be out of date.
Online questionnaires are efficient because they than using data that is available.
directly input data into databases, saving time on A large sample of data can be difficult to
collect.
The data may not be available in the required
format.
manual entry.
Interviews
Involve asking respondents questions directly,
1.3. Quality of information
allowing for follow-up queries to gain more detailed
Accuracy: Data must be accurate.
responses.
Relevance: Information must be relevant to its purpose.
Indirect Data Source: Data collected from the secondary Age: Information must be up to date.
source and used for a different purpose. Level of detail: Good quality information requires the
right amount of information.
Completeness: All information required should be
present.

1.4. Encryption

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE AS LEVEL IT

Encryption: The scrambling of data so it cannot be Validation: The process of checking data to ensure it
understood without a decryption key if intercepted. matches acceptable rules.
Types of Encryption: Presence check: used to ensure that data is
Caesar Cipher: A special type of algorithm that entered(present).
defines a set of rules to follow to encrypt. Range check: Ensures that data is within a defined
Symmetric Encryption: This encryption requires range. Contains two boundaries, the lower boundary
both the sender and recipient to possess a key and the upper boundary.
known as a private key used for both encryption and Type check: Ensures that data must be of a defined
decryption. data type.
Asymmetric Encryption: This encryption has a Length check: Ensures data is of a defined length or
public key for the sender to encrypt and a private key within a range of lengths.
for the recipient to decrypt the data. Format check: Ensures data matches a defined
format.
Applications of Encryption Lookup check: Rests to see if data exists in a list.
Similar to referential integrity.
Hard Disk: Every bit of stored data is encrypted and Consistency check: Compares data in one field with
requires a key to decrypt it. data in another field that already exists within a
HTTPS: It uses SSL ( Secure Socket Layer ) or TLS ( record to check their consistency.
Transport Layer Security ) to encrypt web pages for Check Digit: It is a digit added to the end of an
security. identification number and is generated by an
Email Encryption: Email is encrypted using the algorithm.
asymmetric encryption method. Verification: The process of checking whether data
entered into the system matches the original source.
1.5. Validation and Verification Visual checking: Visually checking the data to see if it
matches the original source, by reading and
comparing, usually by the user.
Double data entry: Data is input into the system
twice and checked for consistency by comparison.
Hash Total: Before input, the values from the input
field are manually calculated, and after input, the
computer compares the manual total.
Control Total: Similar to Hash totals but used on
fields with meaning.
Parity Check: It is used to find errors during data
transmission. Every byte is checked individually.
By using both validation and verification, the chances of
entering incorrect data are reduced.

1.6. Data Processing

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE AS LEVEL IT

Data processing: Any activity that manipulates or carries


out operations on data. 3. Hardware and Software
Batch processing: Sets of data are processed all at once
without user interaction.
Master file: A table in a database containing 3.1. Mainframe Computers and
information about one set of things. Supercomputers
Transaction file: Data that is used to update a
master file. Mainframe Computers:
Advantages and Disadvantages of Batch Processing: Powerful computer serving several terminals
A dumb terminal (which has very little processing
Advantages Disadvantages
A single, automated process that requires very There is a delay in the process as the time has power) is connected to the mainframe with
little human interaction. been scheduled.
It can be scheduled to occur at a fixed time. Only data of the same type can be processed.
organisation.
There will be no errors that human operators
may produce.
Errors cannot be corrected until the end of
processing.
Used for large-scale transaction processing, batch
There are fewer repetitive tasks for human processing, and statistical analysis.
operators.
Supercomputers:
Online processing: Data is input by the user, and the Large computer with parallel processing to complete
feedback is given in the form of outputs. Examples: highly complex tasks quickly.
Electronic Electric Funds It runs very few computer programs but focuses on
executing instructions as quickly as possible for one
Online Stores
purpose.
Automatic stock control
Electronic data exchange They run at maximum capacity so that their full
Real-time processing: Data is processed as soon as it power is used to process data and solve a problem.
has been input so the outputs can be generated They are used in quantum mechanics, where billions
of calculations must be made.
immediately. Examples:
They are used in weather forecasting and climate
Air Traffic Control
Computer games research.
Air conditioning system Measurement of performance:
Central heating system MIPS (Millions of instructions per second):
It is not considered as a very accurate measure.
FLOPS (floating point operations per second) or
2. | MFLOPS (Mega FLOPS):
Used to compare the speed of supercomputers.
|| Some processors can carry out a single floating
test point operation, but others may require several
| floating points for the same result.
test Advantages Disadvantages
| They are designed to be reliable, available and
serviceable (RAS).
They are very expensive and can only be
afforded by organisations.
test They are scalable A lot of space is required to install the system
|| || They are designed to last for at least ten years. Temperature must be regulated, so they are
usually built in cold places.
test They can store and process extremely large
amounts of data. Specialist staff are required for maintenance.
| Hardware failures are notified immediately so
They need massive external storage devices.
that replacements can be made very quickly.
test More than one operating system can be used It isn't easy to understand as the interface is
| to improve the overall performance. command-driven.

test
|| |# 3.2. System Software

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE AS LEVEL IT

System Software: Any program designed to maintain or Utility software: Software that performs some
operate the computer system is known as system maintenance on the computer system.
software. Two main functions of an Anti-virus:
Operating Systems: The operating system manages the Anti-virus monitor continually monitors the system
hardware within a computer system. It carries the tasks for viruses and malware.
below: Check for viruses or malware that may already be on
Allocating memory to software the system, this is known as scanning.
Sending data and instructions to output devices Backup utilities: It create a second copy of data and
Responding to input devices, such as when a key is programs that are in storage.
pressed Data compression: reduces the original size of files so
Opening and closing files on storage devices they use less storage space.
Giving each running task a fair share of processor Disc defragmentation: defragments and reorganizes
time fragmented gaps of files left after usage on a drive so
Sending error messages or status messages to that each file is contiguous.
applications or users Formatting: the process of organizing the tracks on the
Dealing with user log-on and security. disc into sectors. When a used disc is formatted, all data
Device Drivers: The device driver is used to enable is erased.
communication between the computer system and File-copying utilities give users more control over which
specific hardware models. files are copied and how they are copied.
Translators: It translate a high-level language program Deleting utilities can overcome restrictions set by an
into machine code that the computer can understand. operating system and enable the permanent deletion of
There are two types of translators: files.
Compilers
Interpreters 3.4. Custom-Written and Off-the-Shelf
Compilers
Before executing, it simultaneously translates
Interpreters
Translates source code into object code one
Software
the source code into object code. line at a time.
The compiled object code will only work for the The object code can be used for multiple
operating system it was compiled for. operating systems.
Object code is ready to be executed quickly. It takes extra time for execution as the object
code needs to be generated.
It takes a long time to compile. Only the required code needs to be
interpreted.
Errors are reported only after compilation is Errors are reported during the interpretation.
done.

Linkers: A linker is used to combine the object files


together to form one executable file.

3.3. Utility Software

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE AS LEVEL IT

Custom-written: Software that is written to meet the User Interface: A boundary between the user and the
requirements of a client. computer system.
It is expensive because the client covers the entire Command Line Interface (CLI): This interface allows the
development cost. user to enter text commands to which the computer
Takes a longer time to develop. system responds.
The requirements of the client can be met precisely. Graphical User Interface (GUI): The most common and
Developers will ensure compatibility with the client’s easiest interface type. It has elements that are known as
hardware, software and data. WIMP.
Bugs are likely since it is not used widely. Windows: Area of the screen for a specific task.
The client will have access to support from the Icons: Image used to represent a specific software or
developer company. task.
Off-the-shelf: General-purpose software available to a Menus: Words on the screen representing a list of
large market. options.
Development cost is spread between all the Pointers: Representing movement on the screen.
customers who purchase it at a specific price, Dialogue Interface: It uses spoken words to
reducing overall cost. communicate with the computer.
Immediately available. Gesture-Based Interface: It uses the recognition of
User requirements may not be precise/unnecessary human motion.
features.
It may have compatibility issues.
Many users mean fewer bugs due to patches 4. Monitoring and Control
released after identifying bugs.
Wide range of support both from the developing 4.1. Sensors
company and externally.
Sensor: An input device that records data about the
3.5. User Interfaces surrounding physical environment. The advantages of
the sensors are as follows:
Data can be repeatedly collected.
Data can be collected from harmful and dangerous
environments.
Data is likely to be more accurate.
Different types of sensors:
Light sensor
Temperature sensor
Pressure sensor
Humidity sensor
Infrared sensor

4.2. Calibration

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE AS LEVEL IT

Calibration: Testing and modifying a device to make


sure it takes correct readings. 5. eSecurity
Characteristic curve of sensors:
Offset curve: The readings are higher or lower than
the ideal reference. 5.1. Personal Data
Sensitivity curve: The readings change over a range at
a different rate to the ideal reference. Personal Data: Any data that relates to you or your
Linearity curve: The readings are directly proportional identity.
to the ideal reference. Name
Types of Calibrations: Address
One-point calibration: Used to correct offset Telephone number
calibration curve. Ways to keep your personal data safe:
Two-point calibration: Used to correct both offset Have strong passwords
and sensitivity curves. Encrypt any personal data
Multipoint calibration: Performed with multiple Have a firewall present
readings to increase the accuracy. Have an antivirus package
Use a nickname when using the internet
These are the ways personal data is collected:
4.3. Monitoring System and Control Phishing: When a user receives a legitimate-looking
System email with a link so the personal data can be
inputted.
Monitoring System: A system that observes and often Smishing: Smishing is the same as phishing, but an
records activities in process. SMS is sent instead of email.
Example: Weather Stations Vishing: Vishing is the same a phishing but using the
Control System: A system that manages or regulates a voice of a human or automated system.
process by physically changing aspects depending on the Pharming: Pharming is when an unauthorised user
collected data. installs malicious code into a server that redirects the
Microprocessor: Integrated circuit that is used in both user to a legitimate-looking website.
monitoring and control systems.
Advantages and Disadvantages: 5.2. Malware
Advantages Disadvantages
Programmed to execute several different A limit on the size of the data they can handle.
tasks.
It is small so that it can be embedded into They are small and can overheat if too much
other technologies. demand is placed on them.
Fast at moving data between other memory
locations.

Actuator: Type of motor used to move or operate


another mechanism or device.
Advantages and Disadvantages:
Advantages Disadvantages
Hydraulic and electric actuators are fairly quiet. Pneumatic actuators can be pretty noisy.
The cost of pneumatic actuators is relatively Hydraulic and electric actuators are expensive.
low.
Most actuators have moderate to high-speed Fluid leaks can be a problem in hydraulic
abilities to perform an action. actuators.

Real-World Examples:
Growing crops in a greenhouse.
Protection against intruders.

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE AS LEVEL IT

6. The Digital Divide 7. Expert Systems


7.1. Introduction
Expert System: It is a computerised system that
attempts to reproduce decision-making process of an
expert in the field.
Components of the expert system:
User interface
Knowledge base
Knowledge base editor
Inference engine
Explanation system
Output method

7.2. Components of an Expert System


User interface: It is the way in which a user interacts
with the system
Knowledge base: A database of related information
about a particular subject.
Rules base: Part of the knowledge base that contains
rules to be analysed by the expert system.
Knowledge base editor: A component used to amend
or update the knowledge base.
Inference engine: A part of the expert system that
makes judgments and reasoning.
Backward Chaining: A goal is broken down into sub-
goals, allowing the system to work backwards from
the goal.
Forward Chaining: A system that moves forward from
rule to rule until it reaches possible outcomes.
Explanation system: A component that explains an
outcome.
Method of output: The method through which the user
can view the outcomes.

7.3. Advantages and Disadvantages of


an Expert System

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE AS LEVEL IT
Advantages Disadvantages
Provides answers to questions that require Responses are always logical but can’t be
knowledge you don’t have
Aids professional people by prompting them
and guiding them to look at areas of
useful every time
If there are any errors in the rules and
databases, they can generate the wrong
9. Database and File
Concepts
knowledge they may not have considered or solution.
remembered
The responses that are produced are always It is very expensive and requires a lot of
consistent consultants from expert humans
It can be used at any time
Arrives at a solution faster than an expert
human.

7.4. Usage of the Expert Systems


Examples of environments where expert systems are
used:
Medical Diagnosis
Car engine fault diagnosis
Digital opponents in games
Financial planning
Insurance planning
Plant and animal identification
Scheduling and planning delivery routes
Mineral prospecting

8. Spreadsheets

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE AS LEVEL IT

10. Sound and Video editing


10.1. Sound Editing
Track: A specific recording which can be edited or
combined.
Splice: Joining together two or more sound or video
clips.
Stereo clip: A clip that has multiple tracks
Mono clip: A clip that has a single track
Sample rate: Number of times sound is sampled in a
second
Sample resolution: Number of bits that are used to
represent each sound sample

10.2. Video Editing


Clip: Short piece of a video or audio file
Aspect ratio: Proportion of a screen or video of its width
to its height
Frame: Single image in a video file
Transition: The method in which one video merges into
a second clip
Compression: Reducing the size of a file

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE AS Level
IT

© ZNotes Education Ltd. & ZNotes Foundation 2024. All rights reserved.
This version was created by Arya on Fri Feb 14 2025 for strictly personal use only.
These notes have been created by Jaabir for the 2022-24 syllabus.
The document contains images and excerpts of text from educational resources available on the internet and printed books.
If you are the owner of such media, test or visual, utilized in this document and do not accept its usage then we urge you to contact us
and we would immediately replace said media. No part of this document may be copied or re-uploaded to another website.
Under no conditions may this document be distributed under the name of false author(s) or sold for financial gain.
"ZNotes" and the ZNotes logo are trademarks of ZNotes Education Limited (registration UK00003478331).

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy