0% found this document useful (0 votes)
14 views6 pages

CAIE-IGCSE-Computer Science

This document provides summarized notes on the CAIE IGCSE Computer Science syllabus, covering topics such as the Internet, cookies, digital currency, cybersecurity, automated systems, and artificial intelligence. It includes definitions, types, and security measures related to various concepts, along with advantages and disadvantages of technologies like automated systems and robotics. The notes are prepared for personal use and include information relevant to the 2023-2025 syllabus.

Uploaded by

azkafarhad10
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views6 pages

CAIE-IGCSE-Computer Science

This document provides summarized notes on the CAIE IGCSE Computer Science syllabus, covering topics such as the Internet, cookies, digital currency, cybersecurity, automated systems, and artificial intelligence. It includes definitions, types, and security measures related to various concepts, along with advantages and disadvantages of technologies like automated systems and robotics. The notes are prepared for personal use and include information relevant to the 2023-2025 syllabus.

Uploaded by

azkafarhad10
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

ZNOTES.

ORG

UPDATED TO 2023-2025 SYLLABUS

CAIE IGCSE

COMPUTER SCIENCE
SUMMARIZED NOTES ON THE THEORY SYLLABUS
Prepared for Azka for personal use only.
CAIE IGCSE COMPUTER SCIENCE

Cookies
1. The Internet and Its Uses
Cookies are small files stored on the user’s computer
They are used to track data about the users and autofill
1.1. The Internet and the World Wide
forms or give suggestions accordingly
Web Types of Cookies -

Internet World Wide Web (WWW) Session Cookie Persistent Cookie


Uses transmission protocols Remembers the user’s login
Collection of webpages and Temporary cookies are stored
such as TCP and IP (Internet details so the user doesn’t have
other information on websites in the RAM till the browser is
Protocols) to log in every time they visit a
closed.
website
Allows the user to
Uses HTTP(S) protocols that are Stored on the hard disk on the
communicate with other users Doesn’t collect any information
written using Hypertext Mark- computer until their expiry
via chat, email, calling and on the user
up Language (HTML) date or the user deletes them
more
Worldwide Collection of URLs (Uniform Resource A good example is the virtual
Interconnected Networks and Locator) are used for the shopping basket on e-
Devices location of the web pages commerce websites.
Web browsers can access web
pages. 1.2. Digital Currency
Uniform Resource Locator (URLs) Form of payment to pay for goods and services
A few examples are Debit/Credit Cards, Apps (Paypal,
URLs are used to locate and access web pages. The Apple Pay, Bank Transfers and many more)
typical format of URLs is - Cryptography was later introduced due to the problem in
centralised banking systems.
protocol://website address/path/file name
Cryptocurrency uses cryptography to maintain track of
The protocol would usually be HTTP or HTTPS transactions.
The website address would contain - Cryptocurrency is also more secure because it uses
domain host (www) Blockchain Network
domain name (website name)
domain type (.com, .org, .net, .gov) or sometimes
Blockchain Network
country codes (.uk, .in, .cy)
Blockchain Network involves several interconnected
The path would usually become the file directory roots.
computers where the transaction data is stored
for example, https://www.znotes.com/computer-science
Hacking isn’t possible here as transaction details would
The /computer-science is the file name
be sent to all the computers, and the data can’t be
HTTP and HTTPS changed without the consent of all the network
members
HTTP stands for Hypertext Transfer Protocol, and HTTPS
How do blockchains work
stands for Hypertext Transfer Protocol secure
Every time a transaction takes place, A block is created. The
They are safety protocols maintained while transmitting
block would contain -
data.
Data - Name of the sender and the receiver, amount of
Web Browsers money and more
Hash Value - Unique value generated by an algorithm
It is software used to connect to the internet
Previous Hash Value - Hash Value of the previous block
It translates the HTML code
in the chain
ensures SSL & TLS security can be established
Offers additional features like search history & ad
blockers

Retrieval and Location of web pages

The browser sends the URL to the domain name server


(DNS)
DNS stores the index and matches it with the IP
IP is sent to the browser if it exists
The browser sends a request to the IP of the webserver
Browser interprets the HTML

WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Azka at APSIS on 27/10/24.
CAIE IGCSE COMPUTER SCIENCE

Hacking

The act of gaining illegal access to a computer system


Effect:
This leads to identity theft, gaining personal
information
Data can be deleted, changed or corrupted
To remove risk:
Firewalls
Strong passwords/ user IDs
Use of anti-hacking software
Difference between hacking and cracking
The first block is called the genesis block as it doesn’t point
Hacking breaks into computer systems to steal data
to any previous block (Previous Hash Value - 0000)
Cracking is when someone edits a program code,
malicious
1.3. Cyber Security
Malware
Brute Force Attack:
Stands for Malicious Software. A few examples are -
Hackers try to guess your password by trying all the Virus - A program that can replicate itself with the
different combinations of letters, numbers and symbols. intention of deleting or corrupting files, causing a
Effect: computer malfunction
Hacker gets access to user’s personal data (credit Ransomware - Attackers encrypt the user’s data until
cards, passwords and more) a certain amount of money is paid
To remove risk: Adware - Displays unwanted ads on the user’s screen
Use stronger passwords with more characters and Trojan Horse - Programs that are disguised as
symbols legitimate software
Spyware - Sends data about all the activities of the
Data Interception: user to the attacker
Worms - Programs that can replicate themselves with
This involves stealing data by tapping into a wired or a
the intention of corrupting the entire network instead
wireless transmission line
of the computer alone
Wardriving - The act of locating and using wireless
internet connections illegally Phishing
Packet Sniffing - Uses Packet sniffers to examine
packets sent over a line; all the data collected is sent Attackers send legitimate-looking emails to bait the user
back to the attacker into giving out their information.
Effect: To remove risk:
It can cause a computer to crash Don’t open links from unknown receivers
Can delete or corrupt files/data Use anti-phishing tools
To remove risk: Block pop-up ads
Install anti-virus software Have an up-to-date browser
Don’t use software from unknown sources
Pharming
Be careful when opening emails from unknown

Distributed Denial of Service Attacks (DDoS)

An attempt at preventing users from accessing part of a


network
Usually temporary but may be damaging
An attacker may be able to prevent the user from:
Accessing their emails
Accessing websites
Accessing online services

WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Azka at APSIS on 27/10/24.
CAIE IGCSE COMPUTER SCIENCE

The attacker installs a malicious code on the computer, Two-Step Verification - Requires two methods of
which redirects the user to fake websites authentication to prove who the user is
Effect: Automatic Software Updates - Latest updates contain
The user gives out login details and other personal patches which improve device security
details Spelling and Tone - Fake emails tend to have wrong
To remove risk: spelling and grammar (amazonn instead of amazon), and
Using anti-virus software the tone would also seem urgent
Checking the spelling and the weblink carefully Firewalls - Hardware or Software which monitors the
Make sure that the green padlock is present in the traffic between a network and the user’s computer
URL bar Proxy Servers - Acts as an intermediate between the
user’s computer and the web server. They are used for -
Social Engineering Filtering Internet traffic
Keeping the user’s IP Address Confidential
Attackers create a social situation which leads to victims
Blocking access to certain websites
giving out their details (For example - Spam calls
Attacks like DDoS and Hacking attack the proxy
informing them that their account has been hacked)
server, keeping the web server safe.
Acts as a firewall as well.
Keeping data safe from threats
Privacy Settings - Used to limit who can access and see a
Access Levels - Having Different levels of access for user’s profile
different people (for example - Only doctors can have SSL (Secure Socket Layer) - Set of rules used while
access to patient’s data) communicating with other users on the internet.
Antivirus - Protects user’s computer from malware
attacks
Authentication - User proving who they are. The most
2. Automated and Emerging
common methods are passwords, PINs, Mobiles (OTPs),
biometrics and more)
Technologies
Benefits and Drawbacks of Biometric Method 2.1. Automated Systems
Biometric
Benefits Drawbacks
Methods
Automated Systems are a combination of software and
Most development
Intrusive as used to hardware designed to function without human
methods are very easy
identify criminals, intervention.
Fingerprint to use and require
Can’t be used if the Process of Automated Systems
Scans very low storage space
finger gets dirty or Sensors take inputs, and they are sent to the
to store the biometric
damaged (e.g. cuts)
data. microprocessor. The data is usually analogue, so it
With very high It is very intrusive, has to go through Analogue-to-Digital Converter
accuracy, it Impossible Takes longer to verify, (ADC)
Retina Scan
to replicate a person’s Expensive to install The microprocessor processes the data and makes
retina and set up the necessary decisions based on its program
Can’t identify if there The actions are then executed by the actuators
Face Non-intrusive method, are any changes in the
(Motors, wheels and so on)
Recognition Relatively cheaper lighting, change in age
or person’s age. Advantages and Disadvantages of Automated Systems
Voices can be Advantages Disadvantages
recorded and used for
Expensive to set up and
verification, but low Faster and Safer
Non-Intrusive method, maintain
accuracy and illnesses
Voice verification is done Any changes can be identified Any computerised systems are
such as colds or
Recognition quickly and relatively quickly prone to attacks
coughs can affect a
cheaper
person’s voice, making Over-reliance on automated
identification Less Expensive in the long run systems may cause humans to
impossible. lose skills
Higher Productivity and
Efficiency

WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Azka at APSIS on 27/10/24.
CAIE IGCSE COMPUTER SCIENCE

You should be able to describe the advantages and


disadvantages of an automated system used for a given 2.3. Artificial Intelligence
scenario.
Including scenarios from: AI is the branch of computer science that simulates
intelligent human behaviour.
industry
Types of AI -
transport
Narrow AI - A machine has superior performance to a
agriculture
human when doing one specific task
weather
General AI - A machine is similar to a human when
gaming
doing one specific task
lighting
Strong AI - Machine has superior performance to a
science
human in many tasks
Characteristics of AI -
2.2. Robotics Collection of Data and Rules
Ability to Reason
Robotics is the branch of computer science that Ability to learn and adapt
combines robot design, construction and operation.
Isaac Asimov’s Laws of Robotics - Types of AI
A robot may not injure a human through action or
inaction Expert System - AI that is developed to mimic human
A robot must obey orders given by humans unless it knowledge and experiences. They are usually used for
comes into conflict with Law 1 answering questions using knowledge and inference.
a robot must protect itself unless this conflicts with They have many applications, including chatbots,
law 1. diagnosis in the medical industry, financial calculations
Characteristics of a robot - and so on
Ability to sense their surroundings
Have a degree of movement Advantages and Disadvantages of Expert Systems
Programmable Advantages Disadvantages
Setup and Maintenance costs
High level of Expertise
NOTE - ROBOTS DO NOT POSSESS AI; THEY TEND TO DO are very high
REPETITIVE TASKS RATHER THAN REQUIRING HUMAN Can only rely on the information
High Accuracy and Consistent
CHARACTERISTICS in the system
Tend to give cold responses
Types of Robots - High response times
sometimes
Independent - Have no human intervention; they can
completely replace humans Machine Learning is a subset of AI in which machines
Dependent - Needs human intervention through an are trained to learn from past experiences.
interface, can supplement but can’t completely
replace humans Difference Between AI and Machine Learning
AI Machine Learning
Advantages and Disadvantages of Robots Machines are trained to make
Advantages Disadvantages Representation of human
decisions without being
intelligence in machines
Robots can find it difficult to do programmed to
Robots can work 24/7
non-standard tasks The aim is to build machines The aim is to make machines
Robots can work in hazardous Robots can lead to higher that think like humans learn through data acquisitions
conditions unemployment
They are less expensive in the Risk of deskilling as robots
long run replace humans in some task
They have high productivity Expensive to install and
and are more consistent maintain in the short run
Robots have the risk of getting
hacked.

WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Azka at APSIS on 27/10/24.
CAIE IGCSE
Computer Science

© ZNotes Education Ltd. & ZNotes Foundation 2024. All rights reserved.
This version was created by Azka on 07/10/24 for strictly personal use only.
These notes have been created by Shrey Agarwal and Reyansh Roy for the 2023-2025 syllabus.
The document contains images and excerpts of text from educational resources available on the internet and printed books.
If you are the owner of such media, test or visual, utilized in this document and do not accept its usage then we urge you to contact us
and we would immediately replace said media. No part of this document may be copied or re-uploaded to another website.
Under no conditions may this document be distributed under the name of false author(s) or sold for financial gain.
"ZNotes" and the ZNotes logo are trademarks of ZNotes Education Limited (registration UK00003478331).

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy