CAIE IGCSE Computer Science Theory
CAIE IGCSE Computer Science Theory
; The
Binary System is a **Base 2** number system that has two possible values: **0**
(OFF) and **1** (ON).
What does the Most Significant Bit (MSB) refer to in a binary number?; The **Most
Significant Bit (MSB)** refers to the leftmost bit in a binary number, which holds
the highest value in the number's representation.
How do you convert a binary number to denary?; To convert a binary number to
denary, place the binary value in columns of **2 raised to the power** of the
number of values from the right starting from 0, then add the values corresponding
to the bits that are **1**.
What is the process for converting denary to binary?; To convert denary to binary,
successively divide the value by **2**, recording the remainders. Read the
remainders from bottom to top to get the binary value.
How do you convert hexadecimal to binary?; To convert hexadecimal to binary,
separate each hexadecimal digit, convert each to denary, then convert each denary
value to binary, and finally merge all binary values together.
What is the method for converting binary to hexadecimal?; To convert binary to
hexadecimal, divide the binary value into groups of **4** starting from the right,
convert each group to its denary value, and then to its corresponding hexadecimal
value, combining them for the final answer.
What is the process to convert a binary value to denary?; 1. Group the binary value
into sets of four bits.
2. Convert each group to denary.
3. Combine the denary values to get the final result.
What is the hexadecimal equivalent of the denary value 21FD?; The hexadecimal
equivalent of the denary value 21FD is 21FD itself, as it is already in hexadecimal
format.
What are the rules for adding binary values?; - 0 + 0 = 0
- 1 + 0 / 0 + 1 = 1
- 1 + 1 = 0 (1 carry)
- 1 + 1 + 1 = 1 (1 carry)
What is overflow in binary addition?; Overflow occurs when the result of a binary
addition exceeds the number of bits allocated for the values, resulting in a carry
that cannot be represented within the given bit limit.
How do you perform a logical shift on a binary number?; 1. Move all bits in the
binary number to the left or right by the specified number of places.
2. Fill the emptied bit positions with 0.
What is two's complement and how is it used?; Two's complement is a method for
representing negative binary values. It allows for the representation of values
from -128 to 127 in an 8-bit binary format by inverting the bits to the left of the
first 1 from the right and adding 1.
How do you convert a negative denary value to two's complement?; 1. Find the binary
equivalent of the absolute value of the negative number.
2. Convert this binary value to two's complement.
3. Ensure the most significant bit (MSB) is set to 1 to indicate negativity.
What is the range of values in a two's complement byte?; The range of values in a
two's complement byte is from -128 to 127.
How do you convert a two's complement binary value to denary?; 1. Identify the MSB;
if it is 1, the value is negative.
2. Convert the binary value to denary as usual, replacing 128 with -128 for the
MSB.
3. Sum the values accordingly to get the final denary result.
What are some examples of the use of the hexadecimal system?; - Defining colours in
HTML
- Media Access Control (MAC) addresses
- Assembly languages and machine code
- Memory Dumps
- Debugging
- Display error codes
- IP addresses
Why is hexadecimal preferred over binary in writing assembly code and machine
code?; Using hexadecimal makes writing code easier, faster, and less error-prone
than binary. Machine code (binary) takes a long time to key in values and is prone
to errors.
What is the standard ASCII code character set?; The standard ASCII code character
set consists of a 7-bit code that represents letters, numbers, and characters found
on a standard keyboard, along with 32 control codes.
How does the ASCII value change from lowercase to uppercase characters?; The sixth
bit changes from 1 to 0 when going from lowercase to uppercase of a character,
while the rest remains the same.
What is the purpose of Unicode?; Unicode is used to represent characters from
multiple languages, as ASCII does not contain all international languages. The
first 128 values in Unicode are the same as ASCII.
How is sound converted from analogue to digital form?; Sound is sampled at regular
time intervals where the amplitude is measured, and approximate values are stored
in digital form.
What is sampling resolution in sound recording?; Sampling resolution, also known as
bit depth, is the number of bits per sample. Increasing it increases the accuracy
of the sampled sound and the memory usage of the file.
What is the sampling rate and how does it affect sound accuracy?; The **sampling
rate** is the number of sound samples taken per second, measured in **Hertz (Hz)**.
A higher sampling rate allows for more accurate sound as it results in fewer
estimations between samples.
What are bitmap images and how are they stored in a computer?; **Bitmap images**
are made up of **pixels** and are stored in a computer as a series of **binary
numbers**.
What is colour depth and how does it affect the number of colours in a bitmap
image?; **Colour depth** refers to the number of bits representing each colour. An
**8-bit colour depth** allows each pixel to be one of **256 colours**. A **1-bit
colour depth** allows each pixel to store one colour (0 for white, 1 for black).
Increasing colour depth increases the file size when storing an image.
How does image resolution impact the detail of a photograph?; **Image resolution**
refers to the number of pixels that make up an image. Higher resolution images
contain more pixels, resulting in greater detail, while lower resolution images
have less detail and can appear **pixelated** when zoomed in.
What is a BIT and how does it relate to measuring memory size?; A **binary digit**
is referred to as a **BIT**. **8 bits** make up a **byte**, and **4 bits** make up
a **nibble**. The byte is commonly used to measure memory size.
What is the difference between the IEC and Conventional systems of measuring memory
size?; | System | Name of Memory Size | No. of Bytes | Equivalent Denary
Value |
|---------------|---------------------|--------------|-----------------------------
|
| IEC | 1 kibibyte (1KiB) | 2^10 | 1,024 bytes
|
| IEC | 1 mebibyte (1MiB) | 2^20 | 1,048,576 bytes
|
| IEC | 1 gibibyte (1GiB) | 2^30 | 1,073,741,824 bytes
|
| IEC | 1 tebibyte (1TiB) | 2^40 | 1,099,511,627,776 bytes
|
| IEC | 1 pebibyte (1PiB) | 2^50 | 1,125,899,906,842,624 bytes
|
| Conventional | 1 kilobyte (1KB) | 10^3 | 1,000 bytes
|
| Conventional | 1 megabyte (1MB) | 10^6 | 1,000,000 bytes
|
| Conventional | 1 gigabyte (1GB) | 10^9 | 1,000,000,000 bytes
|
| Conventional | 1 terabyte (1TB) | 10^12 | 1,000,000,000,000 bytes
|
| Conventional | 1 petabyte (1PB) | 10^15 | 1,000,000,000,000,000 bytes
|
How is the file size of an image calculated?; The **file size** of an image is
calculated as:
**Image Size** = **Image Resolution (in pixels)** x **Colour Depth (in bits)**.
What is MIDI and how does it function in music storage?; **MIDI** (Musical
Instrument Digital Interface) is a protocol for storing music files and allows
electronic musical instruments to interact. It is stored as a series of demands
without actual music notes and uses **8-bit serial transmission**. Each MIDI
command consists of a **status byte** that informs the device what function to
perform, operating on **16 different channels**. Examples include commands for note
on/off and key pressure.
What is the purpose of Audio Compression in converting sounds to MP3 format?; Audio
Compression reduces the normal file size by 90% using file compression algorithms
that employ Perceptual Music Shaping, which removes sounds that the human ear
cannot hear properly without significantly affecting quality.
What types of files can be stored in the MP4 format?; The MP4 format allows the
storage of multimedia files, including music, videos, photos, and animations, and
enables streaming of videos without losing discernible quality.
How does JPEG file compression reduce photographic file sizes?; JPEG reduces
photographic file sizes by lowering picture resolution, which changes the number of
pixels per centimeter, and can reduce the raw bitmap image size by a factor between
5 and 15.
What is the main characteristic of Lossless File Compression?; In Lossless File
Compression, all data bits from the original file are reconstructed when the file
is uncompressed, ensuring no data is lost, which is crucial for files where data
loss would be disastrous.
What is Run-Length Encoding (RLE) and how does it work?; Run-Length Encoding (RLE)
reduces the size of a string of adjacent, identical data by encoding a repeating
string into two values: the count of identical items and the code of the data item,
making it effective for long runs of repeated units.
What is a key disadvantage of Lossy File Compression?; A key disadvantage of Lossy
File Compression is that it eliminates unnecessary data bits, making it impossible
to recover the original file once it is compressed, and it can reduce file quality.
What are the main components of a packet structure in data transmission?; The main
components of a packet structure are:
1. **Header**: Contains the IP address of the sender and receiver, the sequence
number of the packet, and the size of the packet.
2. **Payload**: Contains the actual data being transmitted.
3. **Trailer**: Includes a method of identifying the end of the packet and error-
checking methods.
What is packet switching and how does it work?; Packet switching is a method of
data transmission where data is broken into multiple packets. These packets are
sent independently from the sender to the receiver and are reassembled at the
receiver's computer.
What are the advantages and disadvantages of packet switching?; | Advantages
| Disadvantages
|
| :-----------------------------------------------
| :--------------------------------------------------------------------------------
---- |
| There is no need to create a single line of communication | Packets may be lost
|
| Possible to overcome failed or busy nodes | More prone to errors in real-
time streaming |
| High data transmission speed | Delay at the receiver while
the packets are being re-ordered |
| Easy to expand package usage |
|
What are the three types of data transmission?; 1. **Simplex**: Data transmission
in one direction only (e.g., computer to printer).
2. **Half-duplex**: Data transmission in both directions but not at the same time
(e.g., walkie-talkie).
3. **Full-duplex**: Data transmission in both directions simultaneously (e.g.,
broadband connection on the phone line).
What is the difference between serial and parallel data transmission?; |
| Serial | Parallel
|
| :----------- | :-----------------------------------------------
| :-------------------------------------------------- |
| **Distance** | Better for longer distances (Telephone Lines) | Better for
short distances (Internal circuits) |
| **Cost** | Cheaper Option | Expensive (More
hardware required) |
| **Data Size**| Used when the size of data transmitted is small | Used when speed
is necessary |
| **Speed** | Slower Option | Faster than
Serial |
| **Synchronization** | Easier to synchronise as there's only one data stream |
Difficult to synchronise due to skew between bits. |
What are the advantages and disadvantages of USB as a data transmission method?; |
Advantages | Disadvantages
|
| :--------------------------
| :--------------------------------------------------------------------------------
------------ |
| Automatically detected | Transmission rate is less than 120 MB/sec
|
| Only fit one way, prevents incorrect connections | Maximum cable length is about
5 metres |
| Different data transmission rates |
|
| Backwards compatible |
|
| Industry-standard |
|
What are the two types of parity checks used in error detection?; The two types of
parity checks are:
- When the micromirrors tilt towards the light source, they are 'on', creating a
light pixel.
- When they tilt away from the light source, they are 'off', creating a dark pixel.
What is a key disadvantage of Digital Light Projectors (DLP)?; A key disadvantage
of Digital Light Projectors (DLP) is that the image tends to suffer from 'shadows'
when displaying grey components in the image.
What is a significant advantage of LCD projectors over DLP projectors?; A
significant advantage of LCD projectors is that they have better color saturation
than DLP projectors, making the colors appear more vibrant.
What is the difference between primary and secondary storage in terms of CPU
access?; The CPU directly accesses primary storage, which includes RAM, ROM, and
cache memory. In contrast, the CPU does not directly access secondary storage,
which includes HDD, SSD, DVD, memory sticks, and Blu-ray discs.
What is the primary function of RAM in a computer system?; RAM is used to store and
access data that is actively being used or processed by the user immediately.
What are the two types of RAM?; The two types of RAM are **DRAM (Dynamic RAM)** and
**SRAM (Static RAM)**.
What is a key difference between DRAM and SRAM regarding data refresh?; DRAM needs
to be constantly refreshed, while SRAM doesn't need to be constantly refreshed.
What happens when RAM runs out of memory?; When RAM runs out of memory, the
processor has to access the hard drive to overwrite old data on RAM with new data,
which can slow down the system.
What is virtual memory and why is it used?; Virtual memory is a memory management
capability that allows the system to use hard drive or SSD space as additional
memory when RAM runs out, preventing system crashes.
What are the advantages of using virtual memory?; The advantages of virtual memory
include:
1. It can be larger than the physical memory provided in RAM.
2. It avoids the need to install/upgrade RAM, which can be expensive.
3. The system wastes no storage on unwanted/unused data.
What is the main purpose of Read Only Memory (ROM)?; ROM is used to store start-up
instructions (basic input/output systems) and retains its contents even when turned
off.
How is data stored in Hard Disk Drives (HDD)?; Data is stored in a digital format
on the magnetic surface of the disks (platter), organized in sectors and tracks.
What is a significant difference in data access speed between HDD and RAM?; HDD has
very slow data access compared to RAM.
What are the benefits of using SSDs over HDDs?; - More reliable (no moving parts)
- Considerably lighter (suitable for laptops)
- Lower power consumption
- Run much cooler than HDDs
- Very thin
- Data access is faster than HDD
What is the primary method used to read and write data on CD/DVD disks?; Laser
(red) light is used to read and write data on the surface of the disk, utilizing a
thin layer of metal alloy to store data.
How does Blu-ray technology differ from CD and DVD in terms of data storage?; Blu-
ray uses a blue laser with a shorter wavelength, allowing it to store up to five
times more data than DVD and includes secure encryption to prevent piracy.
What is cloud storage and what is its key feature?; Cloud storage is a method of
data storage where data is stored on remote servers, with the key feature being
**data redundancy**, allowing access to data at any time from multiple servers.
What are the three types of cloud storage?; 1. **Public cloud** - storage
environment where the customer and provider are different companies.
2. **Private cloud** - dedicated storage behind a company firewall, integrated with
the customer.
3. **Hybrid cloud** - a combination of public and private cloud environments, with
some data in the private cloud and less sensitive data in the public cloud.
What are the components that may be found in embedded systems?; - Microcontrollers
(CPU, RAM, ROM, and other peripherals on one chip)
- Microprocessors (integrated circuit with CPU only)
- System on Chips (SoC) (microprocessor with I/O ports, storage, and memory)
What are the two methods for updating programmable embedded devices?; 1. Connecting
the device to a computer and downloading the update.
2. Updating automatically via a satellite, cellular, or Wi-Fi link.
What are the advantages of using embedded systems?; The advantages of using
embedded systems include:
- **Static IP Address**:
- Assigned **manually** to a device.
- **Does not change** over time.
- **Dynamic IP Address**:
- Assigned **automatically** by a DHCP server.
- **Changes periodically** or when the device connects to a different network.
What are the key differences between IPv4 and IPv6?; | Feature |
IPv4 | IPv6 |
|------------------------|-------------------------------|-------------------------
---------------|
| Address Format | 32-bit address | 128-bit address
|
| Address Space | Approximately 4.3 billion | Approximately 340
undecillion |
| Address Allocation | Manually allocated via DHCP | Primarily assigned using
stateless autoconfiguration |
What is the primary function of a router in a network?; A router directs data
packets between different networks and determines the most efficient path for data
transmission.
How does a router determine the next hop for data packets?; A router examines the
destination IP address of incoming data packets and uses routing tables to
determine the next hop or the next router on the path to the destination.
What role does a router play in IP address assignment?; A router can act as a DHCP
server, dynamically allocating IP addresses from a predefined range to connected
devices on a local network, simplifying network management.
How does a router connect a local network to the Internet?; A router serves as the
gateway between a local network and the internet, forwarding data packets from
devices on the local network to the internet and vice versa.
What is system software and its purpose?; System software is a set of programs that
control and manage hardware operations, provide a platform for other software to
run, and ensure hardware and software function without issues.
What are the main types of software?; The main types of software are System
Software (e.g., Operating System, Utility programs, device drivers) and Application
Software (e.g., spreadsheet, word processor).
What is the function of a device driver in system software?; A device driver
enables hardware devices to communicate with a computer's operating system,
allowing devices like printers to function properly.
What is the difference between system software and application software?; System
software manages hardware operations and provides a platform for applications,
while application software allows users to perform specific tasks using the
computer's resources.
What is the primary function of a word processor?; A word processor is software
used for manipulating text documents, including creating, editing, and formatting
text with tools for copying, deleting, spell-checking, and importing images.
How does a spreadsheet organize data?; A spreadsheet organizes and manipulates
numerical data using a grid of lettered columns and numbered rows, with each cell
identified by a unique combination of columns and rows. It can calculate using
formulas, produce graphs, and perform modeling and 'what if' calculations.
What is the purpose of a database in software applications?; A database is software
used to organize, analyze, and manipulate data consisting of one or more tables
that hold records and fields. It allows querying and reporting on data, as well as
adding, deleting, and modifying records in a table.
What is the role of control and measuring software?; Control and measuring software
is designed to interface with sensors, allowing a computer or microprocessor to
measure physical quantities and control applications by comparing sensor data with
stored data and altering process parameters accordingly.
What types of applications are typically referred to as 'apps'?; Apps are software
designed to run on mobile phones or tablets, downloaded from an 'App Store', and
can range from games to sophisticated software such as phone banking. Common
examples include video and music streaming, GPS, and camera facilities.
What functionalities does photo and video editing software provide?; Photo and
video editing software allows users to manipulate digital photographs or videos,
including changing colour, brightness, and contrast, applying filters and
enhancements, and creating transitions between clips.
What distinguishes graphics manipulation software from other types of software?;
Graphics manipulation software allows the manipulation of bitmap and vector images,
with bitmap graphics editors changing pixels to produce a different image, while
vector graphics editors manipulate lines, curves, and text to alter the stored
image as required.
What is an interrupt in the context of microprocessors?; An interrupt is a signal
sent to the microprocessor, prompting it to pause its ongoing tasks and handle the
interrupt temporarily. It can be triggered by timing signals, input/output
processes, hardware faults, user interaction, or software errors.
What are some common types of utility software?; Common utility programs include
virus checkers, defragmentation software, disk analysis and repair tools, file
compression and management software, backup software, security tools, and
screensavers.
How can utility programs operate in relation to user input?; Utility programs can
be initiated by the user or run in the background without user input, providing
essential maintenance and support for the system software.
What is the primary function of anti-virus software?; The primary function of anti-
virus software is to protect computers from malware by checking files before they
are run or loaded and comparing them against a database of known viruses.
What is heuristic checking in anti-virus software?; Heuristic checking is a method
used by anti-virus software to identify possible viruses that are not yet in the
database by analyzing the behavior and characteristics of files.
Why is it important to regularly update anti-virus software?; It is important to
regularly update anti-virus software because new viruses are constantly discovered,
and updates ensure that the software can detect and protect against these new
threats.
What does disk defragmentation software do?; Disk defragmentation software
rearranges the data blocks on a hard disk drive (HDD) to store files in contiguous
sectors, reducing head movements and improving data access time.
How does defragmentation improve data retrieval on an HDD?; Defragmentation
improves data retrieval on an HDD by organizing scattered data blocks into
contiguous sectors, allowing the read-write head to access data more quickly and
efficiently.
What are the benefits of using backup software?; Backup software helps create and
manage backup copies of data files and programs, allows scheduling of backups, and
can back up only files that have changed, ensuring data security and recovery
options.
What role does security software play in a computer system?; Security software
manages access control, user accounts, and links to other utilities like virus
checkers, while also protecting network interfaces with firewalls and overseeing
software updates to prevent malicious installations.
What was the original purpose of screensavers?; Screensavers were originally
developed to protect CRT monitors from 'phosphor burn' by displaying moving and
still images after a period of inactivity.
How do screensavers contribute to computer security?; Screensavers contribute to
computer security by automatically logging out the user after a certain period of
inactivity, thus preventing unauthorized access to the system.
What is the role of device drivers in a computer system?; Device drivers translate
data into a format that can be understood by the associated hardware device.
Without the appropriate device driver, a hardware device cannot work with a
computer and may not be recognized by the operating system.
What information do USB device drivers contain to help the operating system
identify a device?; USB device drivers contain descriptors, which include a vendor
ID (VID), product ID (PID), and a unique serial number that allow the operating
system to identify the device.
What are the main functions of a typical operating system?; The main functions of a
typical operating system include:
1. Managing files
2. Handling interrupts
3. Providing an interface
4. Managing peripherals and drivers
5. Managing memory
6. Managing multitasking
7. Providing a platform for running applications
8. Providing system security
9. Managing user accounts
What are the advantages and disadvantages of Command Line Interface (CLI) compared
to Graphical User Interface (GUI)?; | Interface | Advantages | Disadvantages |
|-----------|------------|---------------|
| CLI | Direct communication with the computer; Not restricted to pre-
determined options; Uses less memory | User needs to learn commands; All commands
need to be typed correctly; Spelling and format matters |
| GUI | User-friendly; Icons represent applications; Easy to use with a
pointing device | Uses more computer memory; Limited to the icons on the screen |
What is the process of booting up a computer?; The booting process involves:
1. **Code Editor**
2. **Translator**
3. **Debugger**
4. **Error Reports**
5. **Auto-Completion and Auto-Correction**
6. **Auto-Documenter**
7. **Pretty Printing**
What is the difference between the Internet and the World Wide Web (WWW)?; |
Internet
| World Wide Web (WWW)
|
| :--------------------------------------------------------------------------------
-------------
| :--------------------------------------------------------------------------------
-------- |
| Uses transmission protocols such as TCP and IP (Internet Protocols)
| Collection of webpages and other information on websites
|
| Allows the user to communicate with other users via chat, email, calling and more
| Uses HTTP(S) protocols that are written using Hypertext Mark-up Language (HTML)
|
| Worldwide Collection of Interconnected Networks and Devices
| URLs (Uniform Resource Locator) are used for the location of the web pages
|
|
| Web browsers can access web pages.
|
What is the typical format of a URL?; The typical format of URLs is: