Automated and Emerging Technologies – IGCSE Computer Science (0478)
Learning Objective
Students will be able to describe the advantages and disadvantages of an automated system used in a given scenario and to apply the core concepts of the Cambridge Computer‑Systems and Algorithms syllabus to that scenario.
1 – 6 Computer Systems (AO1)
1. Number Systems
Binary (base‑2) – each digit is a bit (0 or 1). Example: 1011₂ = 11₁₀.
HTTP vs. HTTPS – HTTPS adds TLS encryption for confidentiality and integrity.
Request/Response cycle – client sends request, server returns status code and payload.
Cookies – small pieces of data stored on the client for session management.
DNS – translates domain names to IP addresses.
Scenario – Automated Ticket‑Machine (T·M) at a Railway Station
A self‑service ticket‑machine allows passengers to purchase tickets without staff assistance. It accepts cash, debit/credit cards and mobile payments, prints a paper ticket and updates the central reservation system instantly.
How the Automated System Works
User selects destination and ticket type on a touch‑screen.
System calculates the fare using the stored fare table: Fare = BaseRate + Distance × RatePerKm
Payment is processed via card reader, NFC or cash acceptor.
Ticket is printed; a confirmation message is sent to the central database.
SELECT Destination,
COUNT(*) AS TicketsSold,
SUM(Fare) AS Revenue
FROM Tickets
WHERE SaleDate = '2025-12-01'
GROUP BY Destination;
Boolean Logic – Card‑Read Error Detector
Let A = “Card inserted”, B = “Signal received”, C = “Checksum OK”.
Error flag E is true when a card is inserted but either no signal or a bad checksum occurs:
E = A AND ( NOT B OR NOT C )
A
B
C
E
1
0
1
1
1
1
0
1
1
1
1
0
0
–
–
0
Testing & Validation
Trace table – record variable values after each step for a sample transaction.
Boundary testing – distance = 0 km, maximum distance, maximum fare.
Debugging – use print statements or break‑points to locate logic errors.
Cyber‑Security – Threats, Social Engineering & Counter‑measures
Threats specific to the ticket‑machine
Physical tampering / vandalism.
Card‑skimming devices.
Malware injection via USB or network.
Social engineering – e.g., an attacker posing as a technician to gain access.
Whitelisted firmware, disabled USB host ports, regular security patches.
Social engineering
Strict access control, staff training, two‑factor authentication for maintenance mode.
Emerging Technologies – Example Extensions
Biometric authentication – fingerprint or facial recognition to speed up payment; must store biometric templates securely (hashing, encryption).
Cloud‑based reservation API – RESTful service returning seat availability; requires HTTPS, API keys and rate‑limiting.
Blockchain ticket ledger
Each ticket sale creates a transaction: {TicketID, Destination, Fare, Timestamp}.
Transaction hash = SHA‑256 of the transaction data + previous block hash.
Immutable chain provides auditability but adds processing time and storage.
Suggested Activities & Quick‑Check Questions
Computer‑Systems Mini‑Tasks
Convert 101101₂ to decimal and hexadecimal.
Encode the word “TRAIN” in ASCII binary.
Calculate the file size of a 5‑second, 44.1 kHz, 16‑bit stereo audio clip.
Draw a packet diagram showing header, payload, CRC trailer.
Label the stages of the fetch‑decode‑execute cycle on a CPU diagram.
Identify three network‑hardware components (NIC, router, switch) and state their primary function.
List three social‑engineering attacks and suggest a specific counter‑measure for each.
Algorithms & Programming Mini‑Tasks
Complete a trace table for the pseudocode fare‑calculation using a 15 km journey, base rate $2.00 and $0.10 /km.
Write a flowchart for the “Payment Validation” step, including a retry loop (max 3 attempts).
Create an SQL INSERT statement to record a new ticket sale.
Construct a truth table for the Boolean error detector and verify the expression E = A AND (¬B OR ¬C).
Debug a short code fragment that incorrectly adds a surcharge twice (provide corrected version).
Extension – Critical Evaluation
Discuss how adding biometric authentication or a blockchain ledger would change the list of advantages and disadvantages. Evaluate the trade‑off between increased security/traceability and potential privacy or performance impacts.
Key Take‑aways
Understanding number systems, data representation and storage is essential for interpreting how an automated system processes information.
Network hardware and internet protocols enable the ticket‑machine to communicate with central systems securely (HTTPS, ARQ, checksums).
Algorithmic thinking (decomposition, flowcharts, pseudocode) allows students to model the complete transaction cycle.
Evaluating advantages and disadvantages requires linking technical features to real‑world impacts such as cost, accessibility, security and privacy.
Emerging technologies (biometrics, cloud APIs, blockchain) illustrate how automation evolves and introduce new considerations for the IGCSE syllabus.
Your generous donation helps us continue providing free Cambridge IGCSE & A-Level resources,
past papers, syllabus notes, revision questions, and high-quality online tutoring to students across Kenya.