CAIE-IGCSE-Computer Science
CAIE-IGCSE-Computer Science
ORG
CAIE IGCSE
COMPUTER SCIENCE
SUMMARIZED NOTES ON THE THEORY SYLLABUS
Prepared for Azka for personal use only.
CAIE IGCSE COMPUTER SCIENCE
Cookies
1. The Internet and Its Uses
Cookies are small files stored on the user’s computer
They are used to track data about the users and autofill
1.1. The Internet and the World Wide
forms or give suggestions accordingly
Web Types of Cookies -
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Azka at APSIS on 27/10/24.
CAIE IGCSE COMPUTER SCIENCE
Hacking
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Azka at APSIS on 27/10/24.
CAIE IGCSE COMPUTER SCIENCE
The attacker installs a malicious code on the computer, Two-Step Verification - Requires two methods of
which redirects the user to fake websites authentication to prove who the user is
Effect: Automatic Software Updates - Latest updates contain
The user gives out login details and other personal patches which improve device security
details Spelling and Tone - Fake emails tend to have wrong
To remove risk: spelling and grammar (amazonn instead of amazon), and
Using anti-virus software the tone would also seem urgent
Checking the spelling and the weblink carefully Firewalls - Hardware or Software which monitors the
Make sure that the green padlock is present in the traffic between a network and the user’s computer
URL bar Proxy Servers - Acts as an intermediate between the
user’s computer and the web server. They are used for -
Social Engineering Filtering Internet traffic
Keeping the user’s IP Address Confidential
Attackers create a social situation which leads to victims
Blocking access to certain websites
giving out their details (For example - Spam calls
Attacks like DDoS and Hacking attack the proxy
informing them that their account has been hacked)
server, keeping the web server safe.
Acts as a firewall as well.
Keeping data safe from threats
Privacy Settings - Used to limit who can access and see a
Access Levels - Having Different levels of access for user’s profile
different people (for example - Only doctors can have SSL (Secure Socket Layer) - Set of rules used while
access to patient’s data) communicating with other users on the internet.
Antivirus - Protects user’s computer from malware
attacks
Authentication - User proving who they are. The most
2. Automated and Emerging
common methods are passwords, PINs, Mobiles (OTPs),
biometrics and more)
Technologies
Benefits and Drawbacks of Biometric Method 2.1. Automated Systems
Biometric
Benefits Drawbacks
Methods
Automated Systems are a combination of software and
Most development
Intrusive as used to hardware designed to function without human
methods are very easy
identify criminals, intervention.
Fingerprint to use and require
Can’t be used if the Process of Automated Systems
Scans very low storage space
finger gets dirty or Sensors take inputs, and they are sent to the
to store the biometric
damaged (e.g. cuts)
data. microprocessor. The data is usually analogue, so it
With very high It is very intrusive, has to go through Analogue-to-Digital Converter
accuracy, it Impossible Takes longer to verify, (ADC)
Retina Scan
to replicate a person’s Expensive to install The microprocessor processes the data and makes
retina and set up the necessary decisions based on its program
Can’t identify if there The actions are then executed by the actuators
Face Non-intrusive method, are any changes in the
(Motors, wheels and so on)
Recognition Relatively cheaper lighting, change in age
or person’s age. Advantages and Disadvantages of Automated Systems
Voices can be Advantages Disadvantages
recorded and used for
Expensive to set up and
verification, but low Faster and Safer
Non-Intrusive method, maintain
accuracy and illnesses
Voice verification is done Any changes can be identified Any computerised systems are
such as colds or
Recognition quickly and relatively quickly prone to attacks
coughs can affect a
cheaper
person’s voice, making Over-reliance on automated
identification Less Expensive in the long run systems may cause humans to
impossible. lose skills
Higher Productivity and
Efficiency
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Azka at APSIS on 27/10/24.
CAIE IGCSE COMPUTER SCIENCE
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Azka at APSIS on 27/10/24.
CAIE IGCSE
Computer Science
© ZNotes Education Ltd. & ZNotes Foundation 2024. All rights reserved.
This version was created by Azka on 07/10/24 for strictly personal use only.
These notes have been created by Shrey Agarwal and Reyansh Roy for the 2023-2025 syllabus.
The document contains images and excerpts of text from educational resources available on the internet and printed books.
If you are the owner of such media, test or visual, utilized in this document and do not accept its usage then we urge you to contact us
and we would immediately replace said media. No part of this document may be copied or re-uploaded to another website.
Under no conditions may this document be distributed under the name of false author(s) or sold for financial gain.
"ZNotes" and the ZNotes logo are trademarks of ZNotes Education Limited (registration UK00003478331).