| Assessment Objective | What the section covers |
|---|---|
| AO1 | Recall of facts, terminology and concepts (e.g., binary arithmetic, hardware components). |
| AO2 | Application of knowledge to solve problems (e.g., converting numbers, calculating file sizes, analysing packet structures). |
| AO3 | Analysis, design and evaluation (e.g., comparing storage types, choosing error‑detection methods, evaluating security measures). |
| Data type | Typical representation | Key points |
|---|---|---|
| Text | ASCII (7 bits) or Unicode (UTF‑8/16) | 1 byte per ASCII character; Unicode can be 1–4 bytes. |
| Images | Bitmap – pixel matrix; colour depth (e.g., 24 bits = 8 bits per RGB channel) | Size ≈ (width × height × bits per pixel)/8 bytes. |
| Sound | Pulse‑Code Modulation (PCM); sample rate × bit depth | File size = duration × sample‑rate × bit‑depth × channels ÷ 8. |
| Video | Frames per second × image size × colour depth (often compressed, e.g., H.264) | Lossless vs lossy compression; key‑frame vs. inter‑frame. |
Size = 5 min × 60 s × 44 100 samples × 16 bits × 2 channels ÷ 8 ≈ 105 MB
+----------+----------+----------+
| Header | Payload | Trailer |
+----------+----------+----------+
Header fields: source IP, dest IP, length, protocol, checksum
Payload: user data (e.g., part of a file)
Trailer: CRC or other error‑check code
| Component | Function | Key details |
|---|---|---|
| NIC (Network Interface Card) | Connects a computer to a network. | Contains a MAC address (48‑bit unique identifier). |
| Router | Forwards packets between different networks; performs IP routing. | Can perform NAT (Network Address Translation) to map private IPv4 addresses to a public address. |
| Switch | Connects multiple devices within the same LAN; uses MAC addresses to forward frames. | Operates at Layer 2 (Data Link). |
| Hub | Repeats incoming signals to all ports; no address filtering. | Obsolete – replaced by switches. |
| Modem | Modulates/demodulates signals for transmission over telephone or cable lines. | Provides Internet connectivity. |
| Version | Format | Number of addresses |
|---|---|---|
| IPv4 | 4 octets (e.g., 192.168.1.5) | ≈ 4.3 billion |
| IPv6 | 8 hex groups (e.g., 2001:0db8:85a3:0000:0000:8a2e:0370:7334) | ≈ 3.4 × 10³⁸ |
protocol://host[:port]/path?query#fragment| Threat | Typical defence |
|---|---|
| Malware (virus, worm, trojan) | Antivirus, regular updates, sandboxing. |
| Phishing | Email filtering, user education, two‑factor authentication. |
| DDoS attack | Network‑level filtering, rate‑limiting, CDN services. |
| Unauthorised access | Strong passwords, account lockout, encryption. |
| Data interception | Use of HTTPS/TLS, VPNs, end‑to‑end encryption. |
| Assessment Objective | Coverage |
|---|---|
| AO1 | Terminology (algorithm, flowchart, pseudocode, array, file handling, Boolean logic). |
| AO2 | Applying concepts to write/trace algorithms, convert between flowchart and pseudocode, use data structures. |
| AO3 | Testing, debugging, evaluating algorithm efficiency, choosing appropriate data structures. |
| Concept | Description | Example (Python‑like pseudocode) |
|---|---|---|
| Variables & Data Types | Store values; common types: integer, real, character, string, Boolean. | age = 15 |
| Input / Output | Read from keyboard, display on screen. | name = input("Enter name: ")print("Hello", name) |
| Selection | IF…ELSE decision making. | IF score >= 50 THEN grade = "Pass"ELSE grade = "Fail"END IF |
| Repetition | LOOP structures – WHILE, FOR. | sum = 0FOR i FROM 1 TO 10 DO sum = sum + iEND FOR |
| Arrays | Ordered collection of same‑type items; indexed from 0 or 1 depending on language. | marks = [78, 85, 62, 90, 71] |
| File handling | OPEN, READ/WRITE, CLOSE. | file = open("data.txt","r")line = file.readline()file.close() |
StudentID).
SELECT Name, Age FROM Students WHERE Age > 15;
INSERT INTO Students (StudentID, Name, Age) VALUES (101, 'Ali', 14);
UPDATE Students SET Age = 15 WHERE StudentID = 101;
DELETE FROM Students WHERE StudentID = 101;
| Gate | Symbol | Truth Table |
|---|---|---|
| AND | ∧ | 1 & 1 → 1; otherwise 0 |
| OR | ∨ | 0 | 0 → 0; otherwise 1 |
| NOT | ¬ | 0 → 1; 1 → 0 |
| NAND | ↑ | inverse of AND |
| NOR | ↓ | inverse of OR |
| XOR | ⊕ | 1 when inputs differ |
| Assessment Objective | Focus |
|---|---|
| AO1 | Define encryption, key, plaintext, ciphertext; distinguish symmetric vs. asymmetric. |
| AO2 | Apply algorithms (AES, RSA) to simple numeric examples; explain key‑distribution mechanisms. |
| AO3 | Evaluate strengths/weaknesses, choose appropriate method for a given scenario, discuss security implications. |
C = Encrypt_K(P) P = Decrypt_K(C)
00112233445566778899AABBCCDDEEFF000102030405060708090A0B0C0D0E0F69C4E0D86A7B0430D8CDB78070B4C55A (actual AES uses 10 rounds; this is the final result).K_pub – public, shared openly K_priv – private, kept secretEncryption with one key can only be decrypted with the other.
C = m^e mod n = 65^17 mod 3233 = 2790
m = C^d mod n = 2790^2753 mod 3233 = 65
| Scenario | Recommended method | Reasoning |
|---|---|---|
| Encrypting a 2 GB video file for storage on a USB drive | AES‑256 (symmetric) | Fast, strong security; key can be stored locally. |
| Sending a confidential email to a new business partner | RSA/ECC to encrypt a session key, then AES for the message (hybrid) | Secure key exchange without prior shared secret. |
| Signing software updates to prove authenticity | Digital signature using RSA/ECC private key | Provides non‑repudiation; public key can be published. |
| Protecting data on a public Wi‑Fi hotspot | VPN using IPSec or TLS (uses both asymmetric and symmetric) | Establishes a secure tunnel; protects all traffic. |
Create an account or Login to take a Quiz
Log in to suggest improvements to this note.
Your generous donation helps us continue providing free Cambridge IGCSE & A-Level resources, past papers, syllabus notes, revision questions, and high-quality online tutoring to students across Kenya.