AS Level Computer Science Notes
AS Level Computer Science Notes
ORG
CAIE AS LEVEL
COMPUTER SCIENCE
SUMMARIZED NOTES ON THE THEORY SYLLABUS
Prepared for Sajid for personal use only.
CAIE AS LEVEL COMPUTER SCIENCE
Image Resolution
Definition: the number of pixels that make up an
image. Example:- 4096x3192 pixels.
Effect: Higher resolution results in sharper, more
detailed images.
Screen Resolution
Definition: The number of pixels that can be viewed
horizontally and vertically on a device’s screen.
Calculation: $Number\ of\ pixels = width × height$
(e.g., 1680 × 1080 pixels).
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
[Link] authorised for personal use only by Sajid at St Patricks High School on 08/05/25.
CAIE AS LEVEL COMPUTER SCIENCE
1.3. Compression
Definition: Compression is the process of reducing file
size without significant loss in quality, resulting in:
Reduced time needed to search for data.
Faster transfer of compressed files, using less
bandwidth than uncompressed files.
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
[Link] authorised for personal use only by Sajid at St Patricks High School on 08/05/25.
CAIE AS LEVEL COMPUTER SCIENCE
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
[Link] authorised for personal use only by Sajid at St Patricks High School on 08/05/25.
CAIE AS LEVEL COMPUTER SCIENCE
||Benefits|Drawbacks| |:---|:---|:---| |Copper Cable|Less
Peer-to-Peer network model (P2P) expensive and easier to install. Flexible. Easier to make
Definition: A decentralized network where each terminations.|Doesn’t perform well with small charges.
connected computer stores data and operates Affected by electromagnetism.| |Fiber-Optic Cables|Greater
independently as a ‘peer’, acting as both a client and bandwidth, improved security, lightweight, easy to install,
a server. and less signal boosting are required; used in long-distance
Applications: Internet and Ad hoc networks. communications.|Needs expensive optical transmitters and
Client-Server vs. Peer-to-Peer models receivers.|
|Client-Server|Peer-to-Peer| |:---|:---| |Centralized Wired Networks
backup.|Lesser initial setup cost.| |Files & resources Use copper (twisted-pair cable or coaxial cable) or
centralized in server: Prevents illegal resource usage.|Lesser fiber-optic cables.
network traffic: Each peer can simultaneously receive data Cables are connected to an Ethernet port on the
from different sources.| |Improved security: Files are stored network router.
on a central server, which would be regularly scanned for
malware.|It can work even if a device goes down, but the ||Benefits|Drawbacks| |:---|:---|:---| |Radio waves|Can
client-server model can’t work if the server goes down.| travel over large distances with a wide range of wavelengths.
Relatively inexpensive. Used for TV signals and mobile phone
Network Topologies communications.|Low frequency means less data can be
Bus transmitted at one time. Affected by interference from radio
A single line (bus) connects all devices with stations with similar frequencies.| |Microwaves|Larger
terminators at each end. bandwidth allows more data transfer.|Expensive to build
Other computers can read data being sent emitting towers. Physical obstacles can interfere with
between any two computers. signals.| |Satellites|Cost-effective for long-distance
Unsuitable for heavy traffic due to frequent communication, used in satellite phones and radio
collisions. broadcasts.|Susceptible to interference. Expensive setup.|
Star
Consists of a central server (switch) with all other Wireless Networks
computers connected via dedicated connections. Use radio waves (including WiFi), microwaves, and
The server can send packets to different devices satellites to connect devices to networks without
simultaneously and bidirectionally. cables.
No collisions are possible.
Mesh
Every device (node) is directly interconnected with
each of the other devices (nodes).
Commonly used for wireless networks, such as
the Internet, through the mesh connection of
routers.
Hybrid
A combination of two or more topologies.
Example: A connection between two or more
LANs of different topologies.
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
[Link] authorised for personal use only by Sajid at St Patricks High School on 08/05/25.
CAIE AS LEVEL COMPUTER SCIENCE
|Real-time|On-demand| |:---|:---| |The event is captured
live via a video camera that is connected to a Ethernet
computer.|Existing digital files are converted to encoded bit- The most common wired medium for data
streaming format for broadcasting on the internet by transmission in LANs or WANs.
uploading to a dedicated server.| |Video signal converted to Typically used in bus topology; data collisions are
an encoded streaming video signal.|A link for encoded video managed by the CSMA/CD (Carrier Sense Multiple
is placed on the website, and the user clicks on the link to Access with Collision Detection) method.
view encoded streaming video.| |Encoded video signal CSMA/CD Process:
uploaded from computer to a dedicated streaming server Device checks if the channel is busy before
via cables or high-speed wireless internet connection.|The transmitting.
data is streamed to a buffer in the user’s computer, and the If busy, the device waits a random time before
buffer stops the video from being paused as the bits are retrying.
streamed.| |The server then sends live images to all users During transmission, the device listens for other
requesting them as a real-time video.|As the buffer is transmissions.
emptied, it’s filled again, thus providing continuous viewing.| If a collision occurs, transmission is aborted, and
|It cannot be paused, fast-forwarded, etc.|Can be paused, both devices wait random times before retrying.
fast-forwarded, etc.| Bit Streaming
Sequence of digital signals (bits) transferred over a
communication path at high speeds, requiring a fast
broadband connection and buffers.
Bit Streaming Types:
Real-time: Live events captured and transmitted
directly.
On-demand: Pre-existing files are converted and
streamed as requested.
Importance of High Broadband Speed/Bit-Rate
The user has to download and display bits at the
same time.
Higher quality media requires faster speeds due
to larger data frames as well.
Real-time streaming needs higher speeds due to
simultaneous data requests coming from multiple
different users.
<b>Cloud Computing</b>
On-demand provision of computing services over the
internet, including infrastructure, and platforms.
Infrastructure: Storage capacity and higher
processing power.
Platform: Software, testing & debugging
resources.
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
[Link] authorised for personal use only by Sajid at St Patricks High School on 08/05/25.
CAIE AS LEVEL COMPUTER SCIENCE
|Public cloud|Private Cloud| |:---|:---| |Access provided by
third-party service providers, shared among multiple <b>LAN-Supporting Hardware:</b>
users.|Owned and maintained by a single organization, <b>Switch:</b>
providing exclusive access.| |Managed by cloud service Connected to all devices in a LAN.
providers using large server farms.|Can be managed Can simultaneously broadcast information to all
internally by the organization itself, or outsourced.| devices.
|Benefits|Drawback| |:---|:---| |Less technical knowledge <b>Server:</b>
required, easy to implement.|Cannot access the Device/software that provides specific functions
resources/data stored on the cloud if there are bandwidth for computers in the network.
issues.| |Flexibility to scale with organization’s growth <b>Network Interface Card (NIC):</b>
mindset.|Poor data privacy, since there may be data leakage Provides each device (end-system) in the wired
in the multi-tenant architecture (public clouds).| LAN with a unique MAC address to uniquely
identify it on the network.
Allows each device to connect to the network.
<b>World Wide Web (WWW):</b>
<b>Wireless Network Interface Card (WNIC):</b>
<b>Description:</b> Collection of web pages stored
Provides each end-system of a wireless (WiFi) LAN
on websites.
a unique network address to identify it.
<b>Function:</b> Protocols are used to transmit data
<b>Wireless Access Points (WAP):</b>
across the WWW.
Allows devices to connect to the LAN via WiFi
<b>Internet (Interconnected Network):</b>
instead of using a cable.
<b>Description:</b> Massive, open network of
Usually built into the router.
networks.
<b>Cables:</b>
<b>Protocol:</b> Uses TCP/IP protocol, which uses IP
A wired transmission medium that allows
addresses to identify devices connected to the
communication in wired networks.
internet.
<b>Bridge:</b>
<b>Access:</b> Provided by Internet Service
Connects two LANs which work using the same
Provider.
protocol, which can be two segments of the same
<b>Communication Methods:</b> Wired, radio, and
network.
satellite.
Stores network addresses for all devices (end-
<b>Router in a Network:</b>
systems) between the two networks.
<b>Function:</b> Connects two networks together
Looks for the receiving device before it sends the
which operate under the same protocols (for
message.
example, IP).
<b>Repeater:</b>
<b>Connections:</b> Allows internal connections
Connects two cables.
between LANs or external connection from the main
Regenerates the sent data signal over the same
LAN to a WAN.
network before the signal weakens (attenuation)
<b>Additional Roles:</b> Acts as a gateway and
to prevent it from being corrupted.
firewall.
<b>Setup:</b> Usually attached to a server or switch
in a LAN.
<b>IP Address Translation:</b> Translates private IP
addresses to public IP addresses and vice versa.
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
[Link] authorised for personal use only by Sajid at St Patricks High School on 08/05/25.
CAIE AS LEVEL COMPUTER SCIENCE
|IPv4|IPv6| |:---|:---| |32-bit address, split into 4 blocks by
Internet-Supporting Hardware: “.”|The 128-bit address is divided into eight 16-bit blocks by
<b>Modems:</b> “:”| |Each block could have a value between 0 and 255 (00 to
Allows a device to connect to the Internet via a FF in hex).|Each block can have 4 hex values ranging from
telephone line. 0000 to FFFF.| |For example, [Link].|IPv6 can be
<b>Function:</b> A transmitter uses a modem to shortened by removing at least (≥) 2 blocks containing only
convert digital signals (from the transmitting zeroes. For example:
device) to analogue signals sent down the “[Link]” can be
telephone line. A receiver uses a modem on the shortened to “[Link]"|
other end to convert the analogue signals to
digital signals so the receiving device can <b>IPv4 Functionality:</b>
understand the data. <b>IP Address Structure:</b>
<b>PSTN (Public Switched Telephone Network):</b> <b>Network Identifier (netID):</b> Identifies the
Refers to all telephone networks. network to which the host (device) is connected.
<b>Channel:</b> Used between two endpoints <b>Host Identifier (hostID):</b> Identifies the
for the call duration via circuit switching. host within the network.
<b>Resilience:</b> Lines are active even during a <b>Classful Addressing:</b> Used for IPv4, where
power outage. different bit lengths for identification impose
<b>Communication:</b> Bi-directional. restrictions on available addresses.
<b>Dedicated Lines:</b> <b>Subnetting:</b>
Telecommunication path between endpoints. <b>Definition:</b> The practice of dividing a
Not shared with multiple users; it’s network into two or more networks.
bought/leased. <b>Structure:</b> IP addresses are broken down
<b>Function:</b> Able to host websites as well as into three parts by not changing the netID but
carry phone calls. Allows continuous, partitioning the host ID into a subnet ID and host
uninterrupted access to the Web. ID.
<b>Cell Phone Network:</b> <b>Subnet ID:</b> These bits are used to
Wireless networks spread over land areas divided identify each subnet within the network.
into (hexagonal) cells. <b>Subnet Masks:</b> Numbers that hide
<b>Base Stations:</b> Each cell is served by at (mask) the netID of a system's IP address and
least one base station (transceiver), which uses a leave only the host part as the machine
different frequency range compared to adjacent identifier, allowing data to be routed within
cells to transmit data. the subnet to the appropriate host.
<b>Capacity:</b> Larger capacity is possible since
the same frequencies can be used in non-
adjacent cells.
<b>Transmission:</b> Radio waves are usually
used for transmission. Can be broadcast in all
directions over a wide area.
<b>Portable Transceivers:</b> Devices like mobile
phones can communicate and access the internet
via base stations.
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
[Link] authorised for personal use only by Sajid at St Patricks High School on 08/05/25.
CAIE AS LEVEL COMPUTER SCIENCE
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
[Link] authorised for personal use only by Sajid at St Patricks High School on 08/05/25.
CAIE AS LEVEL COMPUTER SCIENCE
Microphone:
The disc surface has a reflective metal layer and is spun
Incoming sound waves enter the screen and cause The tracking mechanism moves the laser assembly
vibrations in the diaphragm The lens focuses laser onto the disc
Vibrations cause the coil to move past a magnetic core A laser beam shone onto a disc to read/write
Electrical current is generated, which is then digitized Tracks have sequences of amorphous and crystalline
states on the metallic layer
Speaker: When reading, the reflected light from the different
Takes electrical signals and translates them into physical states on the track is encoded as bit patterns
vibrations to create sound waves When writing, the laser changes surface to crystalline
The electric current in the voice coil generates an and amorphous states along the track, corresponding to
electromagnetic field 1s or 0s.
Change in digital audio signal causes current direction to Touchscreen:
change, which changes field polarity
Electromagnet is either attracted or repelled to a Considered as both an input & output device
permanent magnet, causing a diaphragm that is There are two main-types:
attached to the coil to vibrate
Vibration transmitted to air in front of the speaker |Resistive|Capacitive| |:---|:---| |Consists of two charged
The degree of vibration determines the amplitude and plates|Made from materials that store electric charge|
frequency of the sound wave produced |Pressure causes plates to touch, completing the
circuit|When touched, the charge is transferred to the
Magnetic Hard Disk: finger| |Point of contact registered with coordinates used to
calculate the position||
Hard disks have platters whose surfaces are covered
with a magnetisable material. Virtual (Reality) Headset:
Platters are mounted on a central spindle and rotated at Virtual headsets consist of 2 lenses, (an LCD) display,
high speed a circuit board with sensors, a cover and foam
The surface of platters is divided into concentric tracks & padding
sectors, where data is encoded as magnetic patterns The display provides a simulation of a 3D
Each surface is accessed by read/write heads environment generated by a 3D graphics package
When writing, current variation in the head causes The user can ‘move’ in the virtual environment by
magnetic field variation on the disk moving their head or using controllers
When reading, magnetic field variation from the disk Buffers:
produces current variation in the read head A queue that temporarily stores data to balance
input/output speed of data, while the cache is the
Solid State (Flash) Memory: short-term memory storage that stores frequently
Most use NAND-based flash memory used data.
Consist of a grid of columns & rows that has 2 transistors Random Access Memory vs. Read-Only Memory
at each intersection |RAM|ROM| |:---|:---| |Volatile memory: loses content
Two transistors: when power is turned off|Non-volatile memory: does not
Floating Gate: stores electrons, and the presence or lose content when power is turned off| |It can be read and
absence of charge (electrons) represents either 1 or 0 altered|It can only be read| |Used to store currently
Control Gate: controls charge (electrons) flow for executing program|Used for storing OS kernel and boot-up
read/write instructions|
Optical Disc Reader/Writer: Types of RAM - Static RAM vs. Dynamic RAM
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
[Link] authorised for personal use only by Sajid at St Patricks High School on 08/05/25.
CAIE AS LEVEL COMPUTER SCIENCE
|SRAM|DRAM| |:---|:---| |Doesn’t need to refresh; hence, it
uses less power and faster access time|Has to be refreshed; Monitoring and Control Systems
it has slower access times and needs higher power| |More Monitoring System:
complex circuitry, hence more expensive|Only a single Monitors some state external to the computer
transistor & capacitor, hence less expensive to purchase| system
|Each bit is stored in a flip-flop|Each bit is stored as a No changes were made to the environment by
charge| |Has lower data density|Has higher data density| the system, and hence, no feedback
|Used in cache memory|Used in main memory| Control System:
Regulates the behaviour of other devices or
Types of ROM – PROM vs. EPROM vs. EEPROM systems
Event-driven system: the controller alters the
|PROM|EPROM|EEPROM| |:---|:---|:---| |Programmable system's state in response to some event
ROM|Erasable Programmable ROM|Electrically Erasable Time-driven system, where the controller takes
Programmable ROM| |It can be programmed only once action at a specific point in time
after it is created|It can be erased by UV light exposure and Hardware typically used in a system:
can then be reprogrammed|It can be erased by an electrical Sensor that measures an (analogue) property and
signal and can then be reprogrammed| |Data cannot be transmits it to a processing unit, generally as an
erased or deleted|Chip has to be removed for electrical or optical signal
reprogramming|Can update data without removing the Actuators that switch on/off heavy appliances
chip.| (e.g. heater to heat/fan to cool)
ADC that converts analogue signals to digital
signals
Transmission cable to transfer signals
Feedback Systems:
Output from the system affects the input of
sensors
Ensures the system operates within the given
criteria
Enabling the system output to affect subsequent
system inputs may cause a change in the actions
taken by the system
This enables the system to adjust conditions in a
continuous process automatically
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
[Link] authorised for personal use only by Sajid at St Patricks High School on 08/05/25.
CAIE AS LEVEL COMPUTER SCIENCE
OR gate: If either input is high, the output is high (A+B) NOR gate: (A+B)
|A|B|Output| |:---|:---|:---| |0|0|0| |0|1|1| |1|0|1| |A|B|Output| |:---|:---|:---| |0|0|1| |0|1|0| |1|0|0|
|1|1|1| |1|1|0|
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
[Link] authorised for personal use only by Sajid at St Patricks High School on 08/05/25.
CAIE AS LEVEL COMPUTER SCIENCE
Von Neumann realized data & programs are Arithmetic and Logic Unit (ALU): part of the processor
indistinguishable and can, therefore, use the same that processes instructions which require some form of
memory. arithmetic or logical operation
Von Neumann's architecture uses a single processor. Control Unit (CU): part of the CPU that fetches
It follows a linear sequence of fetch–decode–execute instructions from memory, decodes them &
operations for the set of instructions, i.e. the program. synchronizes operations before sending signals to the
To do this, the processor uses registers. computer’s memory, ALU and I/O devices to direct how
to respond to instructions sent to the processor
Registers Immediate Access Store (IAS): memory unit that the
Registers: smallest unit of storage of microprocessor; processor can directly access
allows fast data transfer between other registers System Clock: a timing device connected to a processor
that synchronises all components.
General Purpose registers
Used to temporarily store data values which have Buses
been read from memory or some processed result
Assembly language instructions can use it Set of parallel wires that allow the transfer of data
Special Purpose Registers between components in a computer system
Some are accessible by assembly language Data bus: bidirectional bus that carries data
instructions instructions between processor, memory, and I/O
Only holds either data or memory location, not both devices.
Particular purpose registers include: Address bus: unidirectional bus that carries the
Program Counter (PC): holds the address of the address of the main memory location or input/output
next instruction to be fetched device about to be used, from processor to memory
Memory Data Register (MDR): holds data value address register (MAR)
fetched from memory Control bus
Memory Address Register (MAR): Holds the Bidirectional
address of the memory cell of the program which used to transmit control signals from the control unit
is to be accessed to ensure access/use of data & address buses by
Accumulator (ACC): holds all values that are components of the system does not lead to conflict
processed by arithmetic & logical operations.
Index Register (IX): Stores a number used to Performance of Computer System Factors
change an address value
Current Instruction Register (CIR): Once program
instruction is fetched, it is stored in CIR and allows
the processor to decode & execute it
Status Register: holds results of comparisons to
decide later for action, intermediate and
erroneous results of arithmetic performed
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
[Link] authorised for personal use only by Sajid at St Patricks High School on 08/05/25.
CAIE AS LEVEL COMPUTER SCIENCE
Interrupts
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
[Link] authorised for personal use only by Sajid at St Patricks High School on 08/05/25.
CAIE AS LEVEL COMPUTER SCIENCE
A signal from a program seeking the processor’s Assembly language: low-level programming language
attention with instructions made up of an op code and an operand
Handles the interrupt by controlling the processor Machine code: code written in binary that uses the
Different ISRs used for different sources of interrupt processor’s basic machine operations
Relationship between machine and assembly language:
A typical sequence of actions when an interrupt occurs: every assembly language instruction (source code)
The processor checks the interrupt register for translates into exactly one machine code instruction
interrupt at the end of the F-E cycle for the current (object code)
instruction Symbolic addressing
If the interrupt flag is set in the interrupt register, the Symbols used to represent operation codes
interrupt source is detected Labels can be used for addresses
If the interrupt is low priority, then an interrupt is Absolute addressing: a fixed address in memory
disabled Assembler
If interrupting is a high priority: Software that changes assembly language into
All contents of registers of the running process machine code for the processor to understand
are saved on the stack The assembler replaces all mnemonics and labels
PC is loaded with the ISR and is executed with their respective binary values (that are
Once ISR is completed, the processor pops the predefined before by the assembler software)
registers’ contents from the stack, and the One pass assembler
interrupted program continues its execution. Assembler converts mnemonic source code into
Interrupts re-enabled and machine code in one sweep of program
Return to the start of the cycle Cannot handle code that involves forward
referencing
4.2. Assembly Language Two pass assembler: software makes 2 passes through
the code
On the first pass:
Symbol table created to enter symbolic addresses
and labels into specific addresses
All errors are suppressed
On the second pass:
Jump instructions access memory addresses via
table
Whole source code translates into machine code
Error reported if they exist
Grouping the Processor’s Instruction Set
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
[Link] authorised for personal use only by Sajid at St Patricks High School on 08/05/25.
CAIE AS LEVEL COMPUTER SCIENCE
|Op Code|Operand|Explanation| |:---|:---|:---|
|Addressing||| |LDM|#n|Immediate: Load n into ACC| Binary numbers can be multiplied or divided by shifting
|LDD|<address>|Direct: load contents at address into the Left shift (LSL #n)
ACC| |LDI|<address>|Indirect: load contents of address at Bits are shifted to the left to multiply
given address into ACC| |LDX|<address>|Indexed: load E.g. to multiply by four, all digits shift two places to
contents of given address + IR into ACC| |Data left
Movement||| |STO|<address>|Store contents of ACC into Right shift (LSR #n)
address| |Arithmetic Operations||| |ADD|<address>|Add Bits are shifted to the right to divide
contents of register to ACC| |INC|<register>|Add 1 to E.g. to divide by four, all digits shift two places to right
contents of the register| |Comparing||| |CMP| Logical shift: zeros replace the vacated bit position
<address>|Compare contents of ACC with that of given Arithmetic shift: Used to carry out multiplication and
address| |CMP|#n|Compare contents of ACC with n| division of signed integers represented by bits in the
|Conditional Jumps||| |JPE|<address>|Jump to address if accumulator by ensuring that the sign-bit (usually the
compare TRUE| |JPN|<address>|Jump to address if MSB) is the same after the shift.
compare FALSE| |Unconditional Jumps||| |JMP| Cyclic shift: the bit that is removed from one end by the
<address>|Jump to given address| |I/O Data||| |IN||Input shift is added to the other end.
any character and store ASCII value in ACC| |OUT||Output
Bit Masking
character whose ASCII value is stored in ACC| |Ending|||
|END||Return Control to operating system|
#denotes immediate addressing
B denotes a binary number, e.g. B01001010 & denotes a
hexadecimal number, e.g. &4A
Modes of Addressing
Direct Addressing: loads contents at address into ACC
Indirect Addressing: The address to be used is at
given address. Load contents of this second address
to ACC
Indexed addressing: form the address to be used as
<address> + the contents of the IR (Index Register)
Relative addressing: next instruction to be carried out
is an offset number of locations away, relative to
address of current instruction held in PC; allows for
relocatable code
Conditional jump: has a condition that will be
checked (like using an IF statements)
Unconditional jump: no condition to be followed,
simply jump to the next instruction as specified
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
[Link] authorised for personal use only by Sajid at St Patricks High School on 08/05/25.
CAIE AS LEVEL COMPUTER SCIENCE
Utility Software
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
[Link] authorised for personal use only by Sajid at St Patricks High School on 08/05/25.
CAIE AS LEVEL COMPUTER SCIENCE
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
[Link] authorised for personal use only by Sajid at St Patricks High School on 08/05/25.
CAIE AS LEVEL COMPUTER SCIENCE
Malware
6. Security, Privacy and Data software intentionally designed to damage a
computer or computer network
Integrity Includes Virus & Spyware
Virus: Software that replicates itself by inserting a
copy of itself into another piece of software, which
6.1. Data Security may cause the computer to crash and can lead to
deletion or corruption of data
Data Security: ensuring data is protected against loss and Spyware: software that gathers information about
unauthorized access. users' online and offline activity, including accessed
Data Integrity: making sure that data is valid and does sites, applications, and downloaded files.
not corrupt after transmission Risk restriction: Ensure anti-virus and anti-spyware
Data Privacy: ability to determine what data is shared software is installed, regularly updated and run.
with a third party Hacking
Data Security and Computer System Security illegal access to a computer system
| Data Security | System Security | |----|----| | Protection of Hackers can obtain user’s confidential data which can
data on a computer system | Protection of the computer cause identity theft
system | | To prevent corruption of data and prevent Can lead to the deletion or corruption of data
hackers from using data | To prevent access of viruses to Risk restriction: Use strong passwords and ensure
the system and prevent hackers from entering your firewall
computer system | | E.g. encryption | E.g. ID & Password | Phishing
Threats to Computer & Data Security* Attempt through emails to obtain user’s confidential
data which can cause identity theft
Risk restriction: Ignore suspicious mails and ensure
firewall criteria include SPAM filters, blacklist, etc.
Pharming
Redirects user to a fake website that appears
legitimate to gain confidential data
Risk restriction: use a reliable ISP; check that links are
genuine and ensure https is present in the URL
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
[Link] authorised for personal use only by Sajid at St Patricks High School on 08/05/25.
CAIE AS LEVEL COMPUTER SCIENCE
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
[Link] authorised for personal use only by Sajid at St Patricks High School on 08/05/25.
CAIE AS LEVEL COMPUTER SCIENCE
Software Licencing
Errors may occur when data moved in system.
Parity Check Free Software Foundation:
All data transmitted as bits A license gives users freedom to run, copy, distribute,
Number of 1s in a byte must always be either an odd study, change, and improve the software.
number or an even number Condition: any redistributed version of software must
Parity can be set either as even or odd be distributed with original terms of free use,
E.g. two communicating devices decide there will modification, and distribution (aka copyleft)
always be an odd number of 1s. A byte is received The Open Source Initiative:
that has even number of 1s so error occurred and The source code of open-source software is readily
receiving device would ask for it to be sent again available to users under copyright; it does enable
Used also when data sent between parts of the CPU users to re-distribute the software.
Not foolproof: if 2 bits are transposed, data accepted The concept of an open-source program relies on the
Checksum Check fact that users can review source code to eliminate
Data sent from one place to another as block of bytes bugs in it
rather than individual bytes Shareware:
Computer adds together all bytes being sent Demonstration software that is distributed for free
Any bits lost at most-significant end as carry ignored but for a specific evaluation period only
so answer is an 8-bit number Distributed on a trial basis and with an
Checksum calculated before and after data sent understanding that sometime later, a user may be
If two bytes different, error occurred therefore block interested in paying for it
of bytes must be sent again Used for marketing purposes
Commercial: Requires payment before it can be used,
7. Ethics and Ownership but includes all program's features, with no restrictions
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
[Link] authorised for personal use only by Sajid at St Patricks High School on 08/05/25.
CAIE AS LEVEL COMPUTER SCIENCE
No enforcing control on organization/structure of files Developer interface: allows creating and manipulating
Data repeated in different files; manually change each database in SQL rather than graphically
Sorting must be done manually or must write a program Query processor: handles high-level queries. It parses,
Data may be in different format; difficult to find and use validates, optimizes, and compiles or interprets a query
Impossible for it to be multi-user; chaotic which results in the query plan.
Security not sophisticated; users can access everything
8.3. Relational Database Modelling
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
[Link] authorised for personal use only by Sajid at St Patricks High School on 08/05/25.
CAIE AS LEVEL COMPUTER SCIENCE
2<sup>nd</sup> Normal Form (2NF): it is in 1NF and every
Entity: object/event which can be distinctly identified non-primary key attribute is fully dependent on the primary;
Table: contains a group of related entities in rows and all the incomplete dependencies have been removed.
columns called an entity set Example:
Tuple: a row or a record in a relational database
Attribute: a field or column in a relational database
Primary key: attribute or combination of them that
uniquely define each tuple in relation
Candidate key: attribute that can potentially be a
primary key
Foreign key: attribute or combination of them that
relates 2 different tables
Referential integrity: prevents users or applications
from entering inconsistent data
Secondary key: candidate keys not chosen as the
primary key
Indexing: creating a secondary key on an attribute to
provide fast access when searching on that attribute; 3<sup>rd</sup> Normal Form (3NF): it is in 1NF and 2NF
indexing data must be updated when table data changes and all non-key elements are fully dependent on the primary
key. No inter-dependencies between attributes.
8.4. Relational Design of a System
MANY-TO-MANY functions cannot be directly normalized
to 3NF, must use a 2 step process e.g.
becomes:
8.5. Normalization
8.6. Data Definition Language (DDL)
1<sup>st</sup> Normal Form (1NF): contains no repeating
attribute or groups of attributes. Intersection of each tuple Creation/modification of the database structure using
and attribute contains only 1 value. Example: this language
written in SQL
Creating a database:
CREATE DATABASE <database-name>
Creating a table:
Changing a table:
Example:
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
[Link] authorised for personal use only by Sajid at St Patricks High School on 08/05/25.
CAIE AS LEVEL COMPUTER SCIENCE
<span class="underline">Queries:</span>
Creating a query:
SELECT <field-name>
FROM <table-name>
WHERE <search-condition>
SQL Operators:
ORDER BY <field-name>
GROUP BY <field-name>
INNER JOIN
Deleting a record:
UPDATE <table-name>
SET <field-name> = <value>
WHERE <condition>
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
[Link] authorised for personal use only by Sajid at St Patricks High School on 08/05/25.
CAIE AS Level
Computer Science
© ZNotes Education Ltd. & ZNotes Foundation 2025. All rights reserved.
This version was created by Sajid on Thu May 08 2025 for strictly personal use only.
These notes have been created by Nethul Gunasekara & Shaikh Ayman Abdul-Majid and reviewed by Zeeshan Shaukat for the 2024-2025
syllabus.
The document contains images and excerpts of text from educational resources available on the internet and printed books.
If you are the owner of such media, test or visual, utilized in this document and do not accept its usage then we urge you to contact us
and we would immediately replace said media. No part of this document may be copied or re-uploaded to another website.
Under no conditions may this document be distributed under the name of false author(s) or sold for financial gain.
"ZNotes" and the ZNotes logo are trademarks of ZNotes Education Limited (registration UK00003478331).
The Fetch-Execute cycle is crucial in CPU operation as it outlines the process through which a CPU retrieves an instruction from memory, decodes it, and then executes it. System registers such as the Program Counter (PC), Memory Address Register (MAR), and Current Instruction Register (CIR) play critical roles. The PC holds the address of the next instruction, the MAR gets the address from the PC, and the instruction data travels through the Memory Data Register (MDR) into the CIR for decoding and execution. This cyclic process ensures a streamlined flow of operations and is central to the functioning of computational tasks .
Fiber-optic cables offer several advantages over other types of cables in network topologies. They provide greater bandwidth, improved security due to the difficulty of tapping into the cables, are lightweight, easy to install, and require less signal boosting for long-distance communication. However, these advantages come with the drawbacks of needing expensive optical transmitters and receivers, which can increase the overall cost of network setup and maintenance .
Mesh topology is well-suited for wireless networks like the Internet because every device, or node, is directly interconnected with each other. This redundancy and multiple pathways for data transmission increase the network's reliability and robustness. If one connection or path fails, data can still be routed through alternative paths. This is especially valuable in dynamic environments where network topology can change, such as in the Internet .
Real-time bit streaming captures and transmits live events directly to users, meaning users cannot interact with the stream by pausing, rewinding, or fast-forwarding. This requires high-speed broadband connections to accommodate simultaneous data requests from multiple users. In contrast, on-demand streaming involves pre-existing files that can be paused, rewound, or fast-forwarded by users. The content is typically stored on dedicated servers and delivered to users upon request, offering more flexibility in user interaction .
Dedicated lines are valued for continuous internet access and hosting capabilities because they provide a dedicated communication path between endpoints, ensuring that bandwidth is not shared with multiple users. This dedicated access allows for reliable and uninterrupted connectivity, which is critical for hosting services that require stable connections and high availability. In contrast, shared telecommunication pathways can suffer from bandwidth constraints and variable performance due to competing demands .
CSMA/CD (Carrier Sense Multiple Access with Collision Detection) helps manage data collisions in Ethernet networks by allowing a device to listen to the network traffic and only transmit data when the channel is clear. If a collision is detected during transmission, the device will stop sending data and wait for a random period before attempting to retransmit. This method effectively minimizes data loss and maintains the network efficiency by handling collisions dynamically and preventing network congestion .
Cloud computing enhances organizational scalability and flexibility by allowing organizations to quickly scale their computing resources up or down according to demand without investing in physical infrastructure. Public cloud services, in particular, provide this scalability by sharing resources among multiple users, whereas private clouds can be tailored to an organization’s specific needs. This flexibility ensures organizations can efficiently manage their resource usage and costs while adapting to growth or varying workloads .
The Peer-to-Peer (P2P) network model generally has a lesser initial setup cost compared to the Client-Server model because it does not require specialized central servers where data and files are stored and managed. Additionally, the P2P network is more resilient in that it can continue to function even if a device within the network goes down. Conversely, the Client-Server model relies on a central server; if this server fails, the entire network can be affected .
In a LAN setting, a router connects multiple networks, such as connecting a LAN to a WAN (e.g., the Internet), and typically manages network traffic between them using IP address translation and as a firewall. In contrast, a switch operates within a single LAN, connecting directly to devices and facilitating internal data transfers by directing data packets to their destination within the network without interaction with external networks .
Several factors determine the performance of a computer system in relation to its CPU architecture. Key factors include clock speed, which dictates how many instruction cycles the CPU can execute per second; bus width, influencing the volume of data transfer per cycle; cache memory size, which affects how quickly frequently used instructions can be accessed; and the number of cores, as multiple cores can handle separate tasks simultaneously, enhancing the system's ability to perform multitasking efficiently .