Sunteți pe pagina 1din 14

TABLE OF CONTENTS

2
CHAPTER 1

Data Representation

4
CHAPTER 2

Communication & Internet Technologies

6
CHAPTER 3

Hardware & Software

10
CHAPTER 4

Security

12
CHAPTER 5

Ethics
CIE IGCSE COMPUTER SCIENCE//0478
HEXADECIMAL
DENARY VALUE
1. DATA REPRESENTATION VALUE
0 0
1.1 Binary Systems 1 1
 The binary system is based on the number 2 2 2
 Made up of 1s and 0s 3 3
 Use of binary numbers in computer systems 4 4
Converting Binary to Denary 5 5
 To calculate a binary number like, 10101000, place it in 6 6
columns of base 2 numbers 7 7
 Then add all the base 2 numbers 8 8
128 64 32 16 8 4 2 1 9 9
1 0 1 0 1 0 0 0 A 10
128 + 32 + 8 = 𝟏𝟔𝟖 B 11
Converting Denary to Binary C 12
 To calculate a denary number like, 84, set up the D 13
columns of base 2 numbers E 14
128 64 32 16 8 4 2 1 F 15
0 1 0 1 0 1 0 0 Converting Binary to Hexadecimal
𝟎𝟏𝟎𝟏𝟎𝟏𝟎𝟎  To convert binary number 01100001
o Separate into two nibbles (4 bits)
1.2 Measurement of the Size of Computer o Convert nibbles to denary
Memories o Change denary numbers to hex if needed (e.g. 10 = A)
 A binary digit is referred to as a BIT, 8 bits is a byte 8 4 2 1 8 4 2 1
 Byte is used to measure memory size 0 1 1 0 0 0 0 1
NAME OF NO. OF =6 =1
EQUIVALENT DENARY VALUE ℎ𝑒𝑥 𝑣𝑎𝑙𝑢𝑒 𝟔𝟏
MEMORY SIZE BITS
1 kilobyte (1KB) 210 1 024 bytes
Converting Hexadecimal to Binary
2 megabyte (1MB) 220 1 048 576 bytes
1 gigabyte (1GB) 230 1 073 741 824 bytes  To convert hex value 6C
o Change hex value to denary numbers (e.g. 12 = C)
1 terabyte (1TB) 240 1 099 511 627 776 bytes
o Separate hex value and convert to 4 bit binary value
1 petabyte (1PB) 250 1 125 899 906 842 624 bytes
o Put the two nibbles together to form an 8 bit binary
Example use of binary
ℎ𝑒𝑥 𝑣𝑎𝑙𝑢𝑒 6 𝑡𝑜 𝑏𝑖𝑛𝑎𝑟𝑦 ℎ𝑒𝑥 𝑣𝑎𝑙𝑢𝑒 𝐶 (12) 𝑡𝑜 𝑏𝑖𝑛𝑎𝑟𝑦
 A register is a group of bits, often depicted as:
8 4 2 1 8 4 2 1
o 𝟏𝟎𝟎𝟏𝟎𝟏𝟏𝟏
0 1 1 0 1 1 0 0
 Robotics
𝟎𝟏𝟏𝟎𝟏𝟏𝟎𝟎
 Digital instruments
 Counting systems
Converting Denary to Hexadecimal
 To convert denary number 98
1.3 Hexadecimal
o Convert to binary
 Closely related to the binary system
o Split the binary (8bits) into nibbles (4bits)
 Hexadecimal is a base 16 system
o Find the values separately
 Numbers 0 to 9 and letters A to Fare used to represent
128 64 32 16 8 4 2 1
each hexadecimal digit
0 1 1 0 0 0 1 0
 A =10, B = 11, C = 12, D = 13, E = 14, F = 15
8 4 2 1 8 4 2 1
=𝟔 =𝟐
PAGE 2 OF 12
CIE IGCSE COMPUTER SCIENCE//0478
Converting Hexadecimal to Denary Automatic Repeat Request (ARQ)
 To convert hex value 2B  ARQ is another method to check if data has been
o Split the hex value into two transmitted correctly
o Convert each number to binary  It uses and acknowledgement (message sent by the
o Put the two binary numbers together receiver indicating that data has been received correctly)
o Convert to denary
ℎ𝑒𝑥 𝑣𝑎𝑙𝑢𝑒 2 𝑡𝑜 𝑏𝑖𝑛𝑎𝑟𝑦 ℎ𝑒𝑥 𝑣𝑎𝑙𝑢𝑒 𝐵 (11) 𝑡𝑜 𝑏𝑖𝑛𝑎𝑟𝑦 Checksum
8 4 2 1 8 4 2 1  Checksum is another way to see if data has been
0 0 1 0 1 0 1 1 transmitted correctly
128 64 32 16 8 4 2 1  Data is sent in blocks and an additional value sent at the
0 0 1 0 1 0 1 1 end of the block
= 𝟒𝟑
Echo check
1.4 Use of the Hexadecimal System  When data is sent to another device, this data is sent
 Examples: back again to the sender
o defining colours in Hypertext Markup Language  The sender compares the two sets to check if any errors
(HTML) occurred
o Media Access Control (MAC) addresses  Not reliable
o Assembly languages and machine code
o Debugging 1.6 File types
Musical Instrument Digital Format (MIDI)
Memory Dumps  Storage of music files
 Hexadecimal is used when developing new software or  Communications protocol that allows electronic musical
when trying to trace errors instruments to interact with each other
 Memory dump is when the memory contents are output  Stored as a series of demands but no actual music notes
to a printer, monitor.  Uses 8-bit serial transmission (asynchronous)
 Each MIDI command has a sequence of bytes:
Assembly code and machine code (low level languages) o First byte is the status byte – informs the MIDI device
 Computer memory is machine code/ assembly code what function to preform
 Using hexadecimal makes it easier, faster, less error o Encoded in the status byte is the MIDI channel
prone to write code compared to binary. (operates on 16 different channels)
 Using machine code (binary) takes a long time to key in  Examples of MIDI commands:
values and prone to errors o Note on/off: indicates that a key has been pressed
o Key pressure: indicates how hard it has been pressed
1.5 Error Checking (loudness of music)
Parity Checking
 Needs a lot of memory storage
 Parity checking is used to check weather data has been
changed or corrupted following transmission from one
MP3
device to another
 Uses technology known as Audio Compression to
 A byte of data is allocated a parity bit
convert music and other sounds into an MP3 file format
o Systems that use even parity have an even number of
 This compression reduces the normal file size by 90%
1-bits
o Done using file compression algorithms which use
o Systems that use odd parity have an even number of
Perceptual Music Shaping
1-bits
o Removes sounds that human ear cannot hear properly
o Certain sounds are removed without affecting the
quality too much

PAGE 3 OF 12
CIE IGCSE COMPUTER SCIENCE//0478
 CD files are converted using File Compression Software 2.2 Serial & Parallel Transmission
 Use lossy format as the original file is lost following the  Serial data transmission is when data is sent one bit at a
compression algorithm time over a single wire
o Works well over long distances
MP4 o Data transmitted at a slower rate (USB)
 This format allows the storage of multimedia files rather  Parallel data transmission is when data several bits (1
than just sound byte) are sent down several wires at the same time
 Music, videos, photos and animations can be stored o Works well over short distance
 Videos, could be streamed without losing any real o Faster method (internal components use parallel for
discernible quality high speed)

Joint Photographic Experts Group (JPEG) 2.3 Simplex, Half-duplex and Full-duplex
 JPEG is a file formats used to reduce photographic file  Simplex data transmission is in one direction only (e.g.
sizes computer to printer)
 Reducing picture resolution is changing the number of  Half-duplex data transmission is in both directions but
pixels per centimetre not at the same time (e.g. phone conversation where
 When photographic file undergoes compression, file size only one person speaks)
is reduced  Full-duplex data transmission is in both directions
 JPEG will reduce the raw bitmap image by a factor simultaneously (e.g. broadband connection on phone
between 5 and 15 line)

1.7 Lossless and Lossy File Compression 2.4 Universal Serial Bus (USB)
Lossless File Compression  USB is an asynchronous serial data transmission method
 All the data bits from the original file are reconstructed  USB consists of:
when the file again is uncompressed o Four-wire shielded cable
 Important for files where loss of data would be o Two wires used for power and earth
disastrous (spreadsheet) o Two wires used in data transmission

ADVANTAGES DISADVANTAGES
Lossy File Compression
Automatically detected
 The file compression algorithm eliminates unnecessary Only fit one way, Maximum cable length is
bits of data like MP3 and JPEG formats prevents incorrect about 5 metres
 Impossible to get original file back once compressed connections
Different data Transmission rate is less
2. COMMUNICATION & INTERNET TECHNOLOGIES transmission rates than 500 mb/sec

2.1 Transmission of Data


 Asynchronous data transmission refers to data being 2.5 Security Aspects
transmitted in an agreed bit pattern Hacking
o Data bits are grouped together & sent with control bits  The act of gaining illegal access to a computer system
o This means the receiver of the data knows when the  Effect:
data starts and ends, prevents data getting mixed up o Leads to identity theft, gaining personal information
 Synchronous data transmission is a continuous stream of o Data can be deleted, changed or corrupted
data (not in discrete groups like asynchronous)  To remove risk:
o Ensures that the sender and receiver are synchronised o Firewalls
with each other o Strong passwords/ user IDs
o Faster method o Use of anti-hacking software

PAGE 4 OF 12
CIE IGCSE COMPUTER SCIENCE//0478
 Difference between hacking and cracking  IP address gives the location of a device on the internet
o Hacking breaks into computer system to steal data whereas the MAC address identifies the device
o Cracking is where someone edits a program code, connected to the internet
malicious  IP address changes, MAC address remains unchanged
Viruses:
HTML (HyperText Mark-up Language)
 Program that can replicate itself with the intention of
 Used when writing and developing pages
deleting or corrupting files, cause computer malfunction
 Mark-up language is used in the processing
 Effect:
 Html use <tags> to bracket piece of codes
o Can cause computer to crash
 Different intensity of colours is determined by its
o Can delete or corrupt files/data
hexadecimal value
 To remove risk:
o Install anti-virus software
Media Access Control (MAC)
o Don’t use software from unknown sources
 MAC address refers to a number which uniquely
o Be careful when opening emails from unknown
identifies a device on the internet
Wardriving:  Refers to the network interface card (NIC) which is part
 The act of locating and using wireless internet of the device
connections illegally  Usually made up of 48 bits shown as six groups of
 Effects: hexadecimal digits
o Possible to steal internet time  NN:NN:NN:DD:DD:DD
o Possible to hack into wireless network and steal user’s o (NN:NN:NN) first half is the identity number of the
password manufacturer of the device
 To remove risk: o (DD:DD:DD) second half is the serial number of the
o Use complex passwords device
o Firewalls  Types of MAC Address:
o Universally Administrated MAC Address (UAA)
Spyware:
o Locally Administrated MAC Address (LAA)
 Software that gathers info by monitoring key presses on
o UAA is the most common type set by the
the user’s keyboard and info is sent back
manufacturer
 Effects:
 Reasons to change MAC address using LAA
o Access to all data entered
o To ensure they follow the correct formula
o Software is able to install other spyware, read cookie
o To bypass MAC address filter on a router or a firewall
data
o To get past certain types of network restrictions
 To remove risk:
o Use of anti-spyware software
Web addresses
o Use a mouse to select characters from passwords
 Each character on the keyboard has its own ASCII code
rather than typing them
 Can be represented using hexadecimal or decimal values
2.6 Internet Principles of Operation  Hexadecimal addresses are used in the address of files or
 Internet Service Protocol: These are companies that webpages as a security figure
provide user with access to the internet  Takes longer to type in URL but advantage is that you are
unlikely to fall into the trap of copying a fake website
Internet Protocol (IP) Address
 Each device on the internet is given a unique address Cookies
known as the IP address  A packet of information sent by a web server to a web
 32-bit number written in the form: 109.108.158.1 browser
 Generated each time the user visits the website
PAGE 5 OF 12
CIE IGCSE COMPUTER SCIENCE//0478
 Every time a user visits a website, cookies will have  XOR gate:
A B Output
collected some key information about the user ̅̅̅̅̅̅̅̅
𝐴⨁𝐵
0 0 0
 They are able to carry out user tracking and maintain 0 1 1
user preferences 1 0 1
 Cookies are pieces of data 1 1 0
 Information gathered by cookies doesn’t contain
personal information
3.2 Computer Architecture & Fetch-Execute
3. HARDWARE & SOFTWARE Cycle
Computer Architecture
3.1 Logic Gates  Address bus – unidirectional
 Logic Gates: use one or more inputs and produces a  Data bus – bi-directional
single logical output  Control bus – unidirectional and bi-directional
 AND gate: If both inputs high, output is high
𝐴. 𝐵 A B Output  Processor: The processor contains the Arithmetic and
0 0 0 Logic Unit (ALU)
0 1 0  Control Unit: The control unit controls the operation of
1 0 0 the memory, processor and input/output devices
1 1 1
 OR gate: If either inputs The Fetch-Execute Cycle
high, output is high 1. PC contains address of the next instruction to be
𝐴+𝐵 A B Output fetched
0 0 0 2. This address is copied to the MAR via the address bus
0 1 1 3. The instruction of the address is copied into the MDR
1 0 1
temporarily
1 1 1
4. The instruction in the MDR is then placed in the CIR
 NOT gate: an inverter 5. The value in the PC is incremented by 1, pointing the
𝐴̅ next instruction to be fetched
A Output 6. The instruction is finally decoded and then executed
1 0
0 1 3.3 Input Devices
SCANNERS:
 NAND gate: Two-dimensional Scanners:
̅̅̅̅̅
𝐴. 𝐵  Used to input hard-copy documents
A B Output  The image is converted into an electronic form which
0 0 1 can be stored in the computer
0 1 1 o Document is placed on a glass panel
1 0 1 o A bright light illuminates the document
1 1 0
o A scan head moves across the document until the
 NOR gate: whole page is scanned. And image of the document is
̅̅̅̅̅̅̅̅
𝐴+𝐵 produced and sent to a lens using a series of mirrors
A B Output o The lens focuses the document image
0 0 1 o The focused image now falls onto a charge couple
0 1 0
device (CCD) which consists of a numbers of integrated
1 0 0
1 1 0 circuits
o Software produces a digital image from the electronic
form
PAGE 6 OF 12
CIE IGCSE COMPUTER SCIENCE//0478
 Optical Character Recognition (OCR) is a software which Digital Cameras
converts scanned documents into a text file format  Controlled by microprocessor which automatically
 If the original document was a photo/image, then the adjusts the shutter speed, focus the image, etc.
scanned image forms an image file such as JPEG  Photo is captured when light passes through the lens
onto a light sensitive cell
Three-dimensional Scanners  Cell is made up of pixels
 3D scanners can scan solid objects and produce a three-  Number of pixels determines size of the file
dimensional image
 Scanners take images at several points, x, y and z (lasers, Keyboards
magnetic, white light)  Connected to computer with a USB connection or by
 The scanned images can be used in Computer Aided wireless connection
Design (CAD) or to a 3D printer to produce a working  Each character has an ASCII value and is converted into a
model digital signal
 Slow method
Application of 2D Scanners at an Airport:
 Prone to errors
 Make use of (OCR) to produce digital images which
represent the passport pages
Pointing devices
 Text can be stored in ASCII format
 Mouse/trackball
 The 2D photograph in the passport is also scanned and o Traditional; mechanical ball, connected by USB port
stored as jpeg image
 Modern type; red LEDs to detect movement
 The passenger’s face is also photographed using a digital
camera and compared using face recognition software Microphones
 Key parts of the face are compared (distance between  Used to input sound to a computer
eyes, width of nose)
 When a microphone picks up sound, a diaphragm
vibrates producing an electric signal
Barcode readers/scanners
 The signal goes to a sound card and is converted into
 A barcode is a series of dark and light parallel lines of
digital values and stored in computer
varying thicknesses
 Voice recognition, voice is detected and converted into
 The numbers 0 -9 are each represented by a unique
digital
series of lines
 The left and right hand sides of the barcode are separate
Touchscreens
using guard bars
 Capacitive (medium cost tech)
 Allows barcode to be scanned in any direction
o Made up of many layers of glass
o Barcode is read by a red laser or red LED
o Creating electric fields between glass plates in layers
o Light is reflected back off the barcode; dark areas
o When top layer of glass is touched, electric current
reflect little light which allows the bars to be read
changes
o Reflected light is read by sensors (photoelectric cells)
o Co-ordinates where the screen was touched is
o Pattern is generated which is converted to digital
determined by an on-board microprocessor
Quick Response (QR) Codes  Infra-red heat (expensive)
 Another type of barcode is the QR codes o Use glass as the screen material
 Made up of a matrix of filled in dark squares on a light o Needs warm object to carry an input operation
background  Infra-red optical (expensive)
 Can hold more storage (7000 digits) o Uses glass as screen material
 Advantages of QR codes: o Uses an array of sensors (grid form)
o No need for the user to write down website address o Point of contact is based on which grid co-ordinate is
o QR codes can store website addresses touched
PAGE 7 OF 12
CIE IGCSE COMPUTER SCIENCE//0478
 Resistive (inexpensive) 2. Printing drum is given a positive charge; as the drum
o Upper layer of polyester, bottom layer of glass rotates, a laser beam is scanned across it removing the
o When the top polyester is touched, the top layer and positive charge leaves negatively charged areas which
bottom layer complete a circuit match the text/image
o Signals are then sent out which are interpreted by a 3. Drum is then coated with positively charged toner, it
microprocessor, determine where screen was touched only sticks to negatively charged parts of the drum
4. A negatively charged sheet is rolled over the drum
Sensors
5. Toner on the drum now sticks to the paper to produce
 Devices which read or measure physical properties copy of page
 Data needs to be converted to digital 6. Paper finally goes through a fuser (set of heated
 Analogue to Digital Converter (ADC) converts physical rollers); heat melts the ink so it is permanent
values into digital 7. Discharge lamp removes all electric charge from the
drum, ready to print next page
Control of Street Lighting
 Light sensor sends data to the ADC 3D Printers
 Digitises data and sent to the microprocessor  Used for models of cars
 Microprocessor samples data every minute  Produce solid objects that work
 If data from sensor < value stored in memory:  Built up layer by layer, using powdered resin, ceramic
o Signal sent from microprocessor to street lamp powder
o Lamp switched on  A design is made using Computer-aided Design (CAD)

3.4 Output Devices


2D and 3D Cutters
PRINTERS:
 3D cutters can recognise objects in x, y, z direction
Inkjet Printers
 3D laser cutters can cut; glass, crystal, metal, wood
 Used to print one-off pictures and documents
1. Data from document sent to printer driver
Actuators
2. Printer driver ensures data is in correct format
 Used in many control applications involving sensors and
3. Check made by printer driver that chosen printer is
devices (ADC and DAC)
available
4. Data is sent to printer, stored in a temporary memory
Loudspeakers/Headphones
(printer buffer)
 Sound is produced by passing the digital data through a
5. Sheet of paper is fed; sensor detects if paper is available
DAC then through amplifier and then emerges from
in paper tray
loudspeaker
6. Print head moves across paper printing text/image, four
ink colours sprayed in exact amount  Produced by voltage differences vibrating a cone in the
7. Paper is advanced so next line is printed speaker at different frequencies
8. Repeated until buffer is empty
9. Once it is done, printer send an interrupt to the LCD and LED Monitors
processor (request for more data to be sent)  Front layer of monitor is made up of Liquid Crystal
Display (LCD), these tiny diodes are grouped together in
Laser Printers threes as pixels (LCD doesn’t emit any light)
 Used to print flyers, high quality  LCD monitors are back lit using Light Emitting Diode
 Use dry powder ink (toner) and static electricity to (LED) because:
produce text and images o LEDs reach their maximum brightness immediately
o LEDs sharpens image (higher resolution), CCFL has
 Prints the whole page in one go
yellow tint
1. (steps 1-4 same as inkjet)
o LEDs improve colour image

PAGE 8 OF 12
CIE IGCSE COMPUTER SCIENCE//0478
o Monitors using LED are much thinner than CCFL 3.5 Memory, Storage Devices & Media
o LEDs consume very little power PRIMARY MEMORY:
 Before LEDs, LCD monitors were backlit using CCFL Random Access Memory (RAM)
 CCFL uses two fluorescent tubes behind the LCD screen  Features of RAM
which supplies the light source o Volatile/temporary memory (contents lost if RAM is
turned off)
LIGHT PROJECTORS: o Used to store; data, files
 Two common types of light projectors: o It can be written to or read from and the contents
o Digital Light Projector (DLP) from the memory can be changed
o LCD Projector  Larger the size of the RAM, faster the computer will
 Projectors are used to project computer output onto operate
larger screens/interactive whiteboards  RAM never runs out of memory, continues to run slow
 As RAM becomes full, the processor has to continually
Digital Light Projectors (DLP) access the hard drive to overwrite old data on RAM with
 Uses millions of micro mirrors new data
 the number of micro mirrors and the way they are
arranged on the DLP chip determines the resolution of Read Only Memory (ROM)
the image  Features of ROM
 When the micro mirrors tilt towards the light source o Non-volatile/permanent memories (contents remain
they are on even when ROM is turned off)
 When the micro mirrors tilt away from the light source o Used to store start up instruction (basic input/output
they are off systems)
 This creates a light or dark pixel on the projection screen o Data/contents of a ROM chip can only be read, cannot
 A bright white light source passes through a colour filter be changed
on its way to the DLP chip
SECONDARY STORAGE:
 White light splits into primary colours
Hard Disk Drives (HDD)
 Data is stored in a digital format on the magnetic surface
LCD Projectors
of the disks (platter)
 Older technology than DLP
 Number of read/write heads can access all of the
 A powerful beam of white light is generated from a bulb
surfaces of the disk
 This beam of light is then sent to a group of chromatic-
 Each platter will have two surfaces which can be used to
coated mirrors; these reflect the light back at different
store the data
wavelengths
 Data is stored on the surfaces in sectors and tracks
 When the white light hits the mirrors, the reflected light
 HDD have very slow data access compared to RAM
has wavelengths corresponding to red, green and blue
 These three different light pass through three LCD
Solid-State Storage (SDD)
screens; these screens show the image to be projected
 No moving parts and all data is received at the same
as millions of pixels in grayscale
time (not like HDD)
 When the coloured light passes through the LCD screens,
 Store data by controlling the movement of electrons
a red, green and blue version of the grey image emerges
within NAND chips, as 1s and 0s
 Finally, the image passes through the projector lens onto
 Non-volatile rewritable memory
the screen
 Benefits of using SDD rather than HDD:
o More reliable (no moving parts)
o Considerably lighter (suitable for laptops)
o Lower power consumption

PAGE 9 OF 12
CIE IGCSE COMPUTER SCIENCE//0478
o Run much cooler than HDDs Compiler
o Very thin  Translates a program written in high-level language into
o Data access if faster than HDD machine code
 Drawback – questionable longevity (20GB per day)  Used without compiler
 Executable file of machine code produced
OFF-LINE STORAGE  One high-level language translated into several machine
CD/DVD Disks code instructions
 Laser (red) light is used to read and write data in the  Used for general use
surface of the disk
 Use a thin layer of metal alloy to store data Interpreter
 Both systems use a single, spiral track which runs from  Executes a high-language program a statement at a time
the centre of the disk to the edge  No executable file of machine code produced
 DVD uses Dual-Layering which increases the storage  One high-level language program statement may require
capacity (two individual recoding layers) several machine code instructions to be executed
 Cannot be used without interpreter
Blu-ray Disks  Used when program is being developed
 Uses blue laser to carry out read and write operations
 Wavelength of laser light is less than CD and DVD (stores Assembler
up to five times more data than DVD)  Translates a low-level language program into machine
 Automatically come with secure encryption (prevent code
piracy and copyright infringement)  Executable file of machine code produced
 Used as back-up systems  One low-level language translated into one machine
code instructions
USB Flash Memories  Can be used without assembler
 Very small, lightweight suitable from transferring files  Used for general use
 Small back-up devices for photo, music
 Solid state so need to be treated with care Syntax Errors:
 When program is being compiled, if any syntax errors
3.6 High- & Low-Level Languages are found no translated program is produced
High-Level Languages  Instead, a list of all errors in program is produced
 Easier to read and understand as the language is closer  Programmer corrects program and recompiles
to human language
 When a program is being interpreted, the interpreter
 Easier to write in shorter time preforms the action until syntax error is found
 Easier to debug at the development stage  The programmer is the alerted to the place in the
 Easier to maintain once in use program where error was found
 The error is corrected and interpretation continues
Low-Level Languages
 Refer to machine code 4. SECURITY
 Binary instructions that computer understands
 Need to keep data safe from accidental damage,
including corruption and human errors
TRANSLATORS:
 Need to keep data safe from malicious actions, including
 A program must be translated into binary before a
unauthorised viewing, deleting, copying and corruption
computer can use it
 Types of translators; Compiler, Interpreter and
Assembler

PAGE 10 OF 12
CIE IGCSE COMPUTER SCIENCE//0478
4.1 Firewalls & Proxy Servers 4.3 Encryption
 A firewall sits between the user’s computer and an  Used to protect data in case it has been hacked
external network (internet) and filter information in and  Doesn’t prevent hacking, makes data meaningless
out of the computer
 Tasks carried out by firewall: Symmetric Encryption
o Examining ‘traffic’  A secret key which can be a combination of characters
o Checking weather incoming or outgoing data meets  If this key is applied to a message, its contents is
criteria changed
o If data fails the criteria, the firewall blocks ‘traffic’  One key is needed to encrypt a message and another key
o Firewall can keep a list of all undesirable IP addresses is needed to decrypt a message
o Helping to prevent viruses or hackers entering the  Increasing the length of the key increases the strength of
user’s computer the encryption
 Proxy servers act as an intermediary between the user
and a web server Plain text and Cypher Text
 Functions of proxy servers:  Plain text is the normal representation of data before it
o Allowing the internet ‘traffic’ to be filtered goes through an encryption algorithm
o By using cache, they can speed up access to  Cypher text is the output from an encryption algorithm
information from a website
o Keeping the user’s IP address secret Authentication
 Acting as a firewall  Authentication is used to verify that data come from a
trusted source
4.2 Security Protocols  Works with encryption to strengthen internet security
Secure Sockets Layer (SSL)
 Passwords: usually a user id/name and password are
 Type of protocol that allows data to be sent and received used to log on to systems
securely over the internet
 Digital Signatures: public key encryption; ensure an
 When a user logs onto a website, SSL encrypts the data electronic document is authentic
 https or padlock in the status bar  Biometrics: relies on the unique characteristics of human
 When user wants to access a secure website: beings (fingerprint scans, retina scans)
o User’s web browser sends a message so it can connect
with required website which is secured by SSL 4.4 Phishing, Pharming & DoS
o Web browser requests that the web server identifies Phishing:
itself  Creator sends out a legitimate-looking email; as soon as
o Web server responds by sending a copy of its SSL recipient clicks on link, user is sent to a fake website
certificate  Effect:
o Web browser checks if certificate is authentic o Creator of email can gain personal data; bank account
o Sends signal back to web browser o Can lead to fraud
o Starts to transmit data once connection is established  To remove risk:
o If not secure, browser will display an open padlock o Many ISPs filter out phishing emails
Transport Layer Security (TLS) o User should be cautious
Pharming
 Form of protocol that ensures the security and privacy of
data between devices and users when communicating  Malicious code installed on a user’s hard drive or on the
over the internet web server, code will redirect the user to a fake website
 Designed to provide encryption, authentication and data  Effect:
integrity in a more effective way than SSL o Creator of malicious code can gain personal data; bank
account
 Possible to extend TLS by adding new authentication
o Can lead to fraud or identity theft
methods
PAGE 11 OF 12
CIE IGCSE COMPUTER SCIENCE//0478
 To remove risk: Shareware
o Some anti-spyware can identify and remove pharming  All the features of the full version of software are not
code from hard drive made available; full version needs to be purchased first
o User should be alert  Subject to all copyright laws
 Permission needs to be obtained before software is
Denial of Service Attacks (DoS)
copied and given to friends or family
 An attempt at preventing users from accessing part of a
network
 Usually temporary but may be damaging
 Attacker me be able to prevent user from:
o Accessing their emails
o Accessing websites
o Accessing online services

4.5 Applications
 Ways bank protect their costumers from online fraud
o Banks use 10/12-digit code unique to the costumer
o May be asked to input three random numbers from a
four-digit PIN
o Some use a hand-held device into which a customer
inserts their card. Device will generate an eight-digit
code which the customer types into web page
o Some ask to key in parts of their passwords using
drop-down boxes (using a mouse)

5. ETHICS
 A set of principles set out to regulate the use of
computers
 Plagiarism is when a person takes another person’s
idea/work and claims it as their own

5.1 Types of Softwares


Free Software
 Software source code can be freely accessed and
modified as required
 Run, copy, change or adapt free software (e.g. Scribus,
Abiword)
 Possible to distribute modified versions of software to
friends and family

Freeware
 A software a user can download from the internet free
of charge
 Once it has been downloaded, there are no fees
associated (e.g. Adobe, Skype)
 Subject to all copyright laws
 User is not allowed to study, modify code

PAGE 12 OF 12

S-ar putea să vă placă și