Understand how and why computers use binary to represent all forms of data

Cambridge IGCSE/A‑Level Computer Science – Full Syllabus Overview

This set of notes is designed to cover every core topic of the Cambridge Computer Science syllabus (0478). Each section highlights the key concepts, essential terminology, common exam verbs and a quick‑check example so you can revise efficiently for both IGCSE and A‑Level papers.


1. Data Representation – Binary Foundations

1.1 Why computers use binary

  • Electronic circuits have two stable voltage levels: High (ON) ≈ 1 V and Low (OFF) ≈ 0 V.
  • Binary (base‑2) maps directly onto these two states → simple, cheap, reliable hardware.
  • All other data types (numbers, text, images, sound, video, etc.) are encoded as patterns of bits.

1.2 Basic binary terminology

TermSizeTypical use
Bit1 bitSmallest unit (0 or 1)
Nibble4 bitsConvenient for hex conversion
Byte8 bitsStandard addressable unit
WordCPU‑dependent (e.g., 32‑ or 64‑bit)Number of bits processed at once

1.3 Number systems used in computing

SystemBaseDigits
Binary20, 1
Octal80 – 7
Decimal100 – 9
Hexadecimal160 – 9, A – F

1.3.1 Binary ⇄ Decimal conversion

Binary → Decimal – add the value of each ‘1’ bit (2ⁿ).

Formula: N₁₀ = Σ bᵢ·2ⁱ

Example: 1011₂ = 1·2³ + 0·2² + 1·2¹ + 1·2⁰ = 11₁₀

Decimal → Binary – repeated division by 2, recording remainders.

StepQuotientRemainder
45 ÷ 2221
22 ÷ 2110
11 ÷ 251
5 ÷ 221
2 ÷ 210
1 ÷ 201

Read remainders bottom‑up → 101101₂.

1.3.2 Binary ⇄ Hexadecimal conversion

  • Group binary digits in fours (nibbles) from the right.
  • Replace each nibble with its hex equivalent.

Example: 11010110₂ → 1101 | 0110 → D | 6 → D6₁₆

1.3.3 Binary ⇄ Octal conversion

  • Group binary digits in threes from the right.
  • Replace each group with the corresponding octal digit.

Example: 101110010₂ → 101 | 110 | 010 → 5 | 6 | 2 → 562₈

1.4 Binary arithmetic

1.4.1 Addition, carry and overflow

When the result needs more bits than the operand size, the extra bit is a carry. In unsigned arithmetic this indicates overflow.

Operation (8‑bit)BinaryResultOverflow?
200 + 10011001000 + 0110010000101100Yes
50 + 2500110010 + 0001100101001011No

1.4.2 Two’s‑complement (signed integers)

  1. Write the absolute value in binary (using the required bits).
  2. Invert all bits (one’s complement).
  3. Add 1 → two’s‑complement.

Example (8‑bit): –13
13₁₀ = 00001101₂ → invert → 11110010₂ → +1 → 11110011₂.

1.4.3 Logical shift operations (unsigned)

ShiftEffect on bitsMathematical effect
Logical left (<<n)Bits move left, 0s fill right‑most positionsMultiply by 2ⁿ
Logical right (>>n)Bits move right, 0s fill left‑most positionsInteger division by 2ⁿ (discard remainder)

1.5 Character encoding

1.5.1 ASCII

  • 7‑bit code (stored in an 8‑bit byte).
  • 128 characters: control codes, digits, upper‑/lower‑case letters, punctuation.
CharDecimalBinary (8‑bit)Hex
A650100000141
a970110000161
0480011000030
Space320010000020

1.5.2 Unicode (UTF‑8)

  • Extends ASCII to > 140 000 characters.
  • Variable‑length encoding:
    • 0 – 127 → 1 byte (identical to ASCII).
    • 128 – 2047 → 2 bytes (pattern 110xxxxx 10xxxxxx).
    • 2048 – 65535 → 3 bytes.
    • 65536 – 1 114 111 → 4 bytes.

1.6 Images – pixel representation

1.6.1 Pixel grid

An image = rectangular matrix of pixels. Each pixel stores colour data as binary.

1.6.2 Colour models & depth

  • RGB – three channels (Red, Green, Blue). Common depths:
    • 24‑bit colour = 8 bits per channel → 16 777 216 colours.
    • 32‑bit colour = 24‑bit RGB + 8‑bit alpha (transparency).
  • Indexed colour – palette of up to 256 colours; each pixel stores an 8‑bit index.
  • Grayscale – single channel; 8‑bit → 256 shades.

1.6.3 Example – 24‑bit red pixel

R = 255 (11111111₂), G = 0 (00000000₂), B = 0 (00000000₂) → 11111111 00000000 00000000 → hex #FF0000.

1.6.4 Uncompressed image size

$$\text{Size (bits)} = \text{width} \times \text{height} \times \text{bits per pixel}$$

Example: 800 × 600 @ 24‑bit → 800 × 600 × 24 = 11 520 000 bits = 1 440 000 bytes ≈ 1.37 MiB.

1.6.5 Compression (exam‑style)

  • Lossless – PNG, GIF – original data can be perfectly restored (RLE, Huffman).
  • Lossy – JPEG, WebP – some data discarded; exploits limits of human vision.

1.7 Sound – digital audio

1.7.1 Sampling (temporal resolution)

  • Sample rate = number of measurements per second (e.g., 44 kHz for CD).
  • Nyquist theorem: sample rate must be ≥ 2 × highest audible frequency.

1.7.2 Bit depth (amplitude resolution)

  • Number of bits per sample → number of possible amplitude levels (2ⁿ).
  • Common depths: 8‑bit (256 levels), 16‑bit (65 536, CD quality), 24‑bit (16 777 216, professional).

1.7.3 Example – CD‑quality stereo audio

Sample rate = 44 100 Hz, Bit depth = 16 bits, Channels = 2

  • Bits / s = 44 100 × 16 × 2 = 1 411 200 bits
  • Bytes / s = 176 400 ≈ 172 KiB
  • 1 min uncompressed ≈ 10.3 MiB.

1.7.4 General size formula

$$\text{Size (bytes)} = \frac{\text{sample rate} \times \text{bit depth} \times \text{channels} \times \text{duration (s)}}{8}$$

1.7.5 Audio compression

  • Lossless – FLAC, ALAC.
  • Lossy – MP3, AAC, OGG.

1.8 Binary storage prefixes

PrefixSymbolValue (bytes)
KibiKiB2¹⁰ = 1 024
MebiMiB2²⁰ = 1 048 576
GibiGiB2³⁰ = 1 073 741 824
TebiTiB2⁴⁰ = 1 099 511 627 776

1.9 Quick‑check checklist (exam verbs)

  • Explain why binary is used in hardware.
  • Convert between binary, decimal, octal and hexadecimal (both directions).
  • Perform binary addition, identify overflow and give the two’s‑complement result.
  • State the size of a bit, nibble, byte and word.
  • Give the ASCII (binary/hex) code for a character and vice‑versa.
  • Describe how an image is stored and calculate its uncompressed size.
  • Explain sampling and bit depth for sound and calculate an uncompressed audio size.
  • Distinguish lossless vs. lossy compression for images and audio.
  • Use binary prefixes correctly in calculations.

2. Data Transmission – Moving Data Around

2.1 Basic concepts

  • Digital signal – sequence of bits transmitted over a medium.
  • Transmission can be serial (bits one after another) or parallel (multiple bits simultaneously).
  • Directionality:
    • Simplex – one‑way only (e.g., TV broadcast).
    • Half‑duplex – two‑way but not simultaneously (e.g., walkie‑talkie).
    • Full‑duplex – two‑way simultaneously (e.g., telephone).

2.2 Common transmission media

MediumTypical useKey characteristics
Twisted‑pair copper (UTP/STP)Ethernet LANRelatively cheap, limited distance, susceptible to EMI.
Coaxial cableBroadband TV, older EthernetBetter shielding, higher bandwidth than UTP.
Fiber‑opticBackbone, ISP, data‑centre linksVery high bandwidth, immune to EMI, long distance.
Wireless (radio, infrared, Bluetooth, Wi‑Fi)Mobile, LAN, IoTConvenient, limited by interference & range.

2.3 Error detection & correction

  • Parity bit – adds a single bit to make the number of 1s even (even parity) or odd (odd parity). Detects single‑bit errors.
  • Checksum – sum of data bytes; receiver recomputes and compares.
  • CRC (Cyclic Redundancy Check) – polynomial division; widely used in Ethernet, storage.
  • ARQ (Automatic Repeat Request) – if error detected, request retransmission (e.g., TCP).

2.4 Basic networking protocols (exam‑style)

  • TCP/IP model – four layers: Application, Transport, Internet, Link.
    • TCP – reliable, connection‑oriented.
    • UDP – fast, connection‑less, no guarantee of delivery.
  • HTTP / HTTPS – request/response protocol for web pages; HTTPS adds TLS encryption.
  • DNS – translates domain names to IP addresses.

2.5 Simple encryption for transmission

  • Symmetric encryption – same key for encrypt & decrypt (e.g., AES). Fast, but key distribution is an issue.
  • Asymmetric encryption – public‑key/private‑key pair (e.g., RSA). Used for key exchange and digital signatures.

2.6 Quick‑check checklist (data transmission)

  • Define serial vs. parallel transmission and give an example of each.
  • State the three direction modes (simplex, half‑duplex, full‑duplex) and illustrate with a device.
  • Identify a suitable medium for high‑speed long‑distance links and justify.
  • Explain how a parity bit works and what type of error it can detect.
  • Describe the role of TCP in reliable data transfer.
  • Differentiate symmetric and asymmetric encryption in one sentence each.

3. Hardware – The Physical Computer

3.1 CPU architecture

  • Von Neumann architecture – single memory for data and instructions; fetch‑decode‑execute cycle.
  • FDE (Fetch‑Decode‑Execute) cycle – basic instruction processing steps.
  • Key components:
    • ALU (Arithmetic‑Logic Unit) – performs arithmetic and logical operations.
    • Control Unit – generates control signals, orchestrates the FDE cycle.
    • Registers – small, fast storage inside the CPU (e.g., accumulator, program counter).
  • Performance factors: clock speed (Hz), number of cores, cache size, instruction set (CISC vs. RISC).

3.2 Memory hierarchy

LevelTypical sizeSpeed (relative)Purpose
RegistersKBFastestCPU‑internal temporary data
Cache (L1/L2/L3)KB‑MBVery fastReduce main‑memory access latency
Primary memory (RAM)GBFastActive program & data storage
Secondary storageGB‑TBSlowerPermanent data (HDD, SSD, optical)
Cloud / network storageVirtually unlimitedVariableRemote backup & sharing

3.3 Primary vs. secondary storage

  • RAM (Random‑Access Memory) – volatile, fast, read/write.
  • ROM (Read‑Only Memory) – non‑volatile, stores firmware (e.g., BIOS).
  • Magnetic storage – HDD, floppy; large capacity, slower, mechanical parts.
  • Solid‑State Drives (SSD) – flash memory, no moving parts, faster access.
  • Optical media – CD, DVD, Blu‑ray; read‑only (or write‑once) using lasers.

3.4 Embedded systems

  • Specialised computers built into devices (e.g., microwaves, automotive ECUs).
  • Typically use microcontrollers (CPU + RAM + ROM on one chip) and run a single dedicated program.

3.5 Input & output devices

  • Input: keyboard, mouse, touch screen, scanner, microphone, sensors (temperature, light, motion).
  • Output: monitor, printer, speaker, actuator (motor, LED).
  • Often mediated by I/O controllers and drivers.

3.6 Quick‑check checklist (hardware)

  • Describe the three stages of the FDE cycle.
  • Name two functions of the control unit.
  • Explain why cache memory improves performance.
  • Distinguish volatile from non‑volatile memory with an example.
  • Give one advantage of SSDs over HDDs.
  • Define an embedded system and provide a real‑world example.

4. Software – Programs & Operating Systems

4.1 System software vs. application software

  • System software – manages hardware resources, provides a platform for applications (e.g., Operating System, device drivers, utility programs).
  • Application software – performs specific user‑oriented tasks (e.g., word processor, web browser, games).

4.2 Operating system (OS) functions

  • Process management – creates, schedules, terminates processes.
  • Memory management – allocation, paging, virtual memory.
  • File system – hierarchical storage, access control.
  • Device management – drivers, I/O handling.
  • Security – user authentication, permissions.
  • User interface – CLI or GUI.

4.3 Firmware

Low‑level software stored in non‑volatile memory (e.g., BIOS, microcontroller bootloader). Provides basic control before the OS loads.

4.4 Programming languages – levels of abstraction

LevelExamplesTypical use
Machine codeBinary instructionsCPU execution
Assemblye.g., x86, ARMLow‑level system programming
High‑levelPython, Java, C#, ScratchApplication development, teaching

4.5 Translators

  • Assembler – converts assembly to machine code.
  • Compiler – translates high‑level source to machine code (or intermediate bytecode) in one step.
  • Interpreter – executes high‑level code line‑by‑line without producing a separate executable.

4.6 Integrated Development Environments (IDEs)

  • Combine editor, compiler/interpreter, debugger, and often a visual GUI builder.
  • Examples: Eclipse, Visual Studio, PyCharm, BlueJ (useful for IGCSE).

4.7 Quick‑check checklist (software)

  • State two main functions of an operating system.
  • Differentiate firmware from an operating system.
  • Explain the difference between a compiler and an interpreter.
  • Give an example of a high‑level language used in the IGCSE syllabus.
  • Describe what an IDE provides to a programmer.

5. The Internet & Its Uses

5.1 Internet vs. World Wide Web

  • Internet – global network of interconnected computers using TCP/IP.
  • WWW – collection of web pages accessed via HTTP/HTTPS; one of many services on the Internet.

5.2 URL structure

protocol://domain[:port]/path?query#fragment

  • Protocol – e.g., http, https, ftp.
  • Domain – human‑readable address (e.g., example.com).
  • Port – optional numeric identifier (default 80 for HTTP, 443 for HTTPS).
  • Path – location of the resource on the server.
  • Query – parameters after ? (e.g., ?id=5).
  • Fragment – anchor within a page after #.

5.3 HTTP/HTTPS request‑response cycle

  1. Browser sends an HTTP request (method, URL, headers).
  2. Server processes request, retrieves resource.
  3. Server returns an HTTP response (status code, headers, body).
  4. Browser renders the body (HTML, CSS, JavaScript).

HTTPS adds TLS encryption, ensuring confidentiality and integrity.

5.4 DNS – translating domain names

  • Client queries a DNS resolver.
  • Resolver contacts authoritative name servers.
  • IP address is returned and cached for future use.

5.5 Cookies

  • Session cookie – stored temporarily, deleted when browser closes.
  • Persistent cookie – stored on disk with an expiry date; used for login persistence, preferences.
  • Privacy considerations – third‑party tracking, GDPR.

5.6 Digital currency (blockchain basics)

  • Decentralised ledger where each block contains a list of transactions and a cryptographic hash of the previous block.
  • Mining – participants solve a proof‑of‑work puzzle; the first to find a valid hash adds the block and receives a reward.
  • Security relies on the immutability of the hash chain and the difficulty of altering past blocks.

5.7 Cyber‑security – protecting data & systems

  • Threats:
    • Malware (virus, worm, ransomware, spyware).
    • Phishing & social engineering.
    • Denial‑of‑service (DoS/DDoS) attacks.
    • Brute‑force password attacks.
  • Defences:
    • Strong authentication (password policies, 2‑FA).
    • Firewalls – filter inbound/outbound traffic.
    • Encryption – TLS for data in transit, AES for data at rest.
    • Anti‑malware software, regular updates, backups.
  • Safe online habits – don’t click unknown links, verify HTTPS, use reputable sources.

5.8 Quick‑check checklist (Internet & security)

  • Distinguish the Internet from the World Wide Web.
  • Identify the four parts of a URL and give an example.
  • Explain the purpose of DNS in one sentence.
  • State the difference between a session and a persistent cookie.
  • Summarise how a blockchain ensures transaction integrity.
  • List two common cyber‑threats and one mitigation technique for each.

6. Automated & Emerging Technologies

6.1 Sensors, microprocessors & actuators

  • Sensor – converts a physical quantity (temperature, light, motion) into an electrical signal.
  • Microprocessor / microcontroller – processes sensor data and runs control algorithms.
  • Actuator – converts an electrical command into physical action (motor, LED, speaker).

6.2 Example systems

  1. Smart home lighting – ambient light sensor → microcontroller decides dimming level → LED driver (actuator).
  2. Weather station – temperature & humidity sensors → microcontroller logs data → wireless module transmits to a server.

6.3 Robotics

  • Combines sensors (feedback), a control program, and actuators to perform tasks.
  • Advantages: repeatability, precision, ability to work in hazardous environments.
  • Disadvantages: high cost, limited flexibility, reliance on power & programming.

6.4 Artificial Intelligence (AI) basics

  • Expert system – rule‑based AI that mimics human decision‑making in a narrow domain.
  • Machine learning – algorithms that improve performance from data (e.g., classification, regression).
  • Typical workflow: data collection → training → testing → deployment.

6.5 Quick‑check checklist (automation)

  • Define a sensor and give a real‑world example.
  • Explain how

Create an account or Login to take a Quiz

49 views
0 improvement suggestions

Log in to suggest improvements to this note.