Igcse Computer Science Paper 1 Revision Notes Igcse Computer Science Paper 1 Revision Notes
Igcse Computer Science Paper 1 Revision Notes Igcse Computer Science Paper 1 Revision Notes
Igcse Computer Science Paper 1 Revision Notes Igcse Computer Science Paper 1 Revision Notes
Exam Technique
Know what the examiners can ask you questions about
Have a look at the IGCSE Computer Science syllabus that you have been studying and are going to
be taking the exam for. The list of topics will make a great checklist for your revision. If you find
something that you don’t understand or haven’t made any notes about, then find out about it.
Anything that is mentioned in the syllabus could be used in an examination question.
1.1.1Binary systems
Binary is the base 2 number system. It is used in computer systems because computers store data
with the use of of switches that are in two states: on or off, 1 or 0.
b) Convert positive denary integers into binary and positive binary integers into denary (a
maximum of 16 bits will be used)
To convert binary (base 2) to denary (base 10) we use the following table. Adding up all of the
numbers where a ‘1’ bit occurs.
8-bit example:
Original number: 01101010
27 2 25 24 23 22 21 20
6
64 3 16 8 4 3 2 1
2
0 1 1 0 1 0 1 0
= 32 + 16 + 4 + 2 = 54
To convert denary (base 10) to binary (base 2) we use the same table, placing a 1 in the correct
positions until it adds up to the value we need.
c) show understanding of the concept of a byte and how the byte is used to measure
memory size
1 bit 1 1 bit
1 nibble 4 1 nibble
1 byte 8 1 byte
1 0 1 0 0 1 1 0
Motor Motor A Motor Motor A A B B
A off B B directio directio directio directio
on on off n n n n
forwar backwar forwar backwar
d d d d
This means that motor A and B are both on. Motor B is rotating forward and motor A is rotating
backwards.
1.1.2Hexadecimal
Hexadecimal is a base 16 number system that uses the digits 0 to 9 and the letters A to F to represent
each hexadecimal digit.
Denary, Binary, Hexadecimal
0 1 2 3 4 5 6 7
0 1 2 3 4 5 6 7
8 9 10 11 12 13 14 15
8 9 A B C D E F
Hexadecimal:
● Is easier/quicker to read than binary
● Is easier/quicker to write/type than binary
● Takes up less room on the screen than binary
● Is easier to debug than binary
● Is less prone to human error than binary
To convert hexadecimal integers to and from denary it is often easier to go through binary. To start,
write out each hexadecimal digit as 4 binary bits. For example: 4AE would become 0100 1010 1110.
Then convert the number to denary as described in 1.1.1 (b).
0100 1010 1110 = 1024 + 128 + 32 + 8 + 4 + 2 = 1198.
A register is a place to store a group of bits. We can use our knowledge of how to convert between
base 2, base 10 and base 16 to represent numbers stored in registers and main memory as
hexadecimal.
1.1.3Data Storage
a) show understanding that sound (music), pictures, video, text and numbers are stored in
different formats
Video .3gp, .avi, .flv, .m4v, .mov, .mp4, .mpg, .vob, .wmv
b) identify and describe methods of error detection and correction, such as parity checks,
check digits, checksums and Automatic Repeat reQuests (ARQ)
Parity checks
Parity checks can be even (check for an even number of 1-bits) or odd (check for an odd number of
1-bits). The bit that is added to make the even or odd total is known as the parity bit. It is possible
that two errors in the data could result in an error not being detected.
Checksum
Data is sent in blocks. An additional value, called the checksum, is sent at the end of the block of
data. The checksum is calculated based on the number of bytes in the block of data. If the
checksum calculated at the receiver’s end doesn't match the checksum that is sent at the end of the
data block, then an error has occurred.
Echo Check
Data is transmitted. The data is then returned to the sender. The sender compares the data sent
with the data received back. If they are different then an error has occurred and the data needs to
be sent again.
c) show understanding of the concept of Musical Instrument Digital Interface (MIDI) files, JPEG
files, MP3 and MP4 files
MP3
MP3 uses lossy audio compression to store music in an MP3 file format. These can often be up to 90%
smaller than comparable CD music files. The music quality is retained by removing sounds that the
human ear often can’t hear.
MP4 files are slightly different as they can often store video or photos and not just audio.
d) show understanding of the principles of data compression (lossless and lossy) applied to
music/ video, photos and text files
1.2.1Data Transmission
Data transmission is where digital data is transferred from one device or component to another.
Data transmission can be wireless (wifi, bluetooth, NFC, 3g/4G/5G etc.) , or send along a
physical medium, such as a copper network cable, fibre optic cable etc.
Serial data transmission is where data is sent one bit at a time over a single wire or channel.
Parallel data transmission is where data is sent several bits at a time over multiple wires or
channels.
c) distinguish between simplex, duplex and half-duplex data transmission
Half-duplex data transmission is where data is sent in two directions, but not at the same time.
Duplex data transmission is where data is sent in two directions at the same time.
d) show understanding of the reasons for choosing serial or parallel data transmission
Serial data transmission is slower than parallel, but is good for long distances as the data cannot
become skewed.
Parallel data transmission is faster than serial, but data can become skewed over long distances (so is
more suitable for short distances)
A parity bit is added to data to give it even or odd parity. It is usually added at the beginning or the
end of the data, or each byte of data. See 1.1.3 b).
g) show understanding of the use of serial and parallel data transmission, in Universal Serial
Bus (USB) and Integrated Circuit (IC)
As its name suggests, USB uses serial data transmission, an IC normally uses parallel data
transmission.
1.2.2Security Aspects
a) show understanding of the security aspects of using the Internet and understand what
methods are available to help minimise the risks
Firewalls
Firewalls can help stop unauthorised access from the internet by examining the traffic between a
user’s computer or local network and a public network (e.g. the internet).
A firewall:
● Monitors incoming and outgoing traffic on a network
● Checks whether incoming and outgoing traffic meet certain criteria, if data fails criteria, the
firewall blocks the traffic and warns the user
● can log all incoming and outgoing traffic
● Criteria can be set to prevent access to certain websites, this can be done by the firewall
keeping a list of all undesirable IP addresses (a blacklist)
● Warns the user if software tries to access an external data source
b) show understanding of the Internet risks associated with malware, including viruses,
spyware and hacking
Hacking
Hacking is a method of gaining unauthorised (and sometimes illegal) access to a computer system.
This can lead to identity theft and loss or corruption of data. The risk of hacking can be minimised by
using strong passwords and firewalls.
Cracking
Cracking is the editing of a program source code so that it can be exploited or changed for a specific
purpose (usually without the owner's consent, and therefore illegal). It is often done for malicious
purposes, e.g. removing password protection or removing the need for a licence to run the software.
It is often difficult to guard against; software engineers need to make it difficult to identify ‘back doors’
(ways of breaking into the software).
Viruses
A virus is program code that can replicate or copy itself with the intention of deleting or corrupting
data or files, or causing the computer to malfunction in another way. They can cause the computer
to run slow (due to the hard disk filling up with data, or the processor being directed to other tasks)
or crash (due to missing critical files). The risk of viruses can be minimised by running anti-virus
software or not opening emails or software from unknown sources.
Phishing
Legitimate-looking emails are sent to users; on opening the email, the user could be asked to supply
personal or financial details or they may be asked to click on a link which sends them to a fake
website where the user could be asked to supply personal data. Many email providers try to filter out
phishing emails and are largely successful, but some still slip through the filter. There are a number
of signs to look out for in phishing emails:
● Poor spelling and grammar
● A unexpected message asks for personal information
● You did not initiate the action or communication
● A message that makes unrealistic threats e.g. sending something to everyone in your
contact list.
● A message that makes unrealistic promises e.g. cash prizes, lottery winning etc.
Pharming
Malicious code that is installed on a users computer or web server. The code redirects the use to a
fake website without their knowledge (it may look exactly like the genuine website and even appear
to have the correct URL). Once the user is sent to the fake website they may be asked to give out
personal or financial data.
Some anti-spyware or antivirus software can identify and remove pharming code on a computer. The
user could also look for clues such as lack of encryption, strange looking URL, computer running slow
etc.
Wardriving
This is the act of locating and using wireless internet connections illegally. It can lead to stealing of
internet time and bandwidth, also other user’s passwords and other data. It can be prevented with
the use of strong wireless network security (e.g WEP).
This gathers data by monitoring key presses on user’s keyboards and sending the data back to the
person who sent the spyware. Sends important data, such as passwords back to the originator of
the spyware. Prevented by use of anti-spyware or antivirus software or the use of a mouse or drop
down box to enter passwords rather than a keyboard.
c) explain how anti-virus and other protection software helps to protect the user from security
risks
Anti-virus software can scan for and detect viruses, quarantine viruses and delete viruses from a
computer system. It can be set to automatically scan new files, and periodically scan an entire system.
It will warn the user using an interrupt if it finds a virus. A false positive is when anti-virus software
flags something as a virus when it is not a virus.
Anti-spyware software can scan for and detect spyware. It will warn the user using an interrupt if it
detects spyware. It can delete spyware from a computer system.
Auto-Update software will download and install updates for your software as and when they are
available. It is good to keep programs updated as updates are often more secure (vulnerabilities
have been identified and fixed), more features have been added, or compatibility may have been
improved.
An internet browser is software which allows the user to display a web page on the computer
screen. The software interprets/translates the HTML from the website and shows the result.
An ISP is company that provides the user with access to the internet; they usually charge a monthly
fee. The ISP gives the user an account and sometimes provides the user with an email address.
c) show understanding of what is meant by hypertext transfer protocol (http and https) and
HTML
Hypertext Transfer Protocol (http) is a set of rules that must be obeyed when transferring files
across the internet, this may include web pages or individual files. Https indicates that the protocol
is using SSL encryption to send files or web pages securely.
HTML is used when writing and developing web pages. HTML uses <tags> to bracket pieces of codes.
Hexadecimal values are used to represent different colours in HTML. In HTML some tags
are used to define structure (these do not make much difference to the front-end of the website, for
example <head> and <body> tags). Other tags are used to define presentation (these are used to
define how items are displayed on the page, for example <b> would make text appear bold.
e) show understanding of the concepts of MAC address, Internet Protocol (IP) address,
Uniform Resource Locator (URL) and cookies
MAC address
a media access control address is used to uniquely identify a device on a network. The first 6 hex
digits represent the manufacturer and the latter 6 are unique to that specific device. MAC addresses
can be UAA (a universally administered address) or LAA (a locally administered address).
Cookies
Pieces of data which allow detection of web pages viewed by a user and to store their preferences.
Cookies can be deleted from the user’s desktop although this can remove some of the features of
certain websites.
1.3.1Logic gates
b) understand and define the functions of NOT, AND, OR, NAND, NOR and XOR (EOR) gates,
including the binary output produced from all the possible binary inputs (all gates, except
the NOT gate, will have 2 inputs only)
c) draw truth tables and recognise a logic gate from its truth table
d) recognise and use the standard symbols used to represent logic gates.
Type of GATE
Diagram Truth Table
AND
A B A∧
B
1 1 1
1 0 0
0 1 0
0 0 0
OR
A B AV
B
1 1 1
1 0 1
0 1 1
0 0 0
NOT
NAND
A ¬
A A
1 0 B
¬(A V B)
0 1 1
1
0
1 A B ¬(A ∧
0 B)
0 1 1 0
1 0 1
A 0 1 1
B
0 0 1
A⊻B
1
NO 1
R 0
1
0
1
XO
R
If you are asked to do this you will be given a space to show your working. It is a good idea to
annotate the circuit adding in some locations where you will work out the intermediate answers before
you evaluate your overall answer.
An example might be: The student has added in locations d and e to help them work out the overall
answer.
A B C D E X
0 0 0 0 0 0
0 0 1 0 1 1
0 1 0 0 0 0
0 1 1 0 0 0
1 0 0 0 0 0
1 0 1 0 1 1
1 1 0 1 0 1
1 1 1 1 0 1
f) Produce a logic circuit to solve a given problem or to implement a given written logic
statement.
This is perhaps one of the hardest things you will be asked to do. It is useful to annotate the
question (particularly if it is quite wordy) highlighting the key words such as AND, OR, NOT. It is also
worth annotating what value is meant by the wording in the question (for example it might say “if
the temperature is over 25 degrees” in logic terms, this means something like T=1).
a) show understanding of the basic Von Neumann model for a computer system and the stored
program concept (program instructions and data are stored in main memory and instructions
are fetched and executed one after another)
The Von Neumann model holds both programs and data in the memory. Data moves between the
memory unit and the processor.
A register is a high-speed storage area within the processor. All data must be in a register before it
can be processed. There are 5 registered used in the Von Neumann model: Memory Address Register
(MAR), the Memory Data Register (MDR), the Accumulator (ACC), the Program Counter (PC) and the
Current Instruction Register (CIR).
A bus is the connection used to move data around the processor and also send out control signals to
synchronise the internal operations. There are three different buses used: Address bus (used to carry
signals relating to addresses from the processor to the memory, it is unidirectional), Data bus (this
sends data between the processor, memory uni and the input and output devices, it is bi-directional)
and the Control bus (this carried signals relating to control and coordination of all activities within the
computer; it can be unidirectional or bidirectional depending on what it is connecting).
b) describe the stages of the fetch-execute cycle, including the use of registers and buses
1.3.3Input devices
a) describe the principles of operation (how each device works) of these input devices: 2D and
3D scanners, barcode readers, Quick Response (QR) code readers, digital cameras, keyboards,
mice, touch screens, interactive whiteboards, microphones
2D Scanners
These convert hard-copy documents into an digital format which can be stored in a computer memory.
Scanners operate by using a scan head which moves across the document shining a bright light which
reflects and produces an image which is sent to a lens via a series of mirrors. Applications of 2D
scanner include: scanning passports at airports, scanning newspapers for archives, scanning textbooks
for digital reading, scanning worksheets to complete online.
3D Scanners
3D scanners scan solid objects and produce an electronic 3D image. They use light or lasers and
measure their reflections to calculate the dimensions of an object. 3D scanners produce a 3D model of
a solid object.
Barcode Readers
Barcodes consist of a series of dark and light lines of varying thickness. Each digit or character is
represented by a number of lines. A barcode reader uses light or a laser to detect the series of lines
and input this as a series of characters into the computer.
Advantages of using barcode readers include:
● Allows for automatic stock control
● Allows for faster checkouts in shops
● Can check customer’s buying habits and customise offers based on trends
● Less chance of errors at tills
Digital Cameras
Digital cameras contain a microprocessor which automatically:
● Adjust shutter speed
● Focus the lense(s)
● Operates the flash
● Adjusts the aperture
● Removes ‘red eye’
● Reduce hand shake
Etc.
Images are captured when light passes through the lens onto a light-sensitive cell, which is made up
of thousands of tiny elements to capture each pixel.
Keyboards/keypads
Keyboards are the most common input device. Keys are pressed by the operator to enter data directly
into the computer. When a key is pressed, it completes a circuit and a signal is sent to the
microprocessor which interprets which key has been pressed.
Pointing Devices
The most common pointing devices are the mouse and the trackpad. They are used to control a cursor
on a screen or to select options from menus. Other pointing devices include: interactive whiteboards
and graphics tablets.
Microphone
Microphones are used to input sound into a computer. When the microphone picks up sound, a
diaphragm vibrates producing an electric signal. A analogue to digital converter then converts the
signal into digital values which can be processed by the computer. Voice and speech recognition
systems both use microphones.
Touchscreens
Touchscreens allow selection to be made by simply touching an icon or menu option. They are also
use in many devices to allow an input via a ‘virtual keyboard’.
Mobile phones and tablets are some of the biggest users of touchscreen technology. The most
common systems are capacitive, infra-red or resistive.
How it works - Uses layers of glass - Uses glass and can - uses upper layer of
that act as a either detect heat or polyester and
capacitor uses infrared sensors bottom layer of
- When the top layer to detect touch. glass
is touched the - microprocessor - when top layer
current changes works out where the touched, it completes a
- The microprocessor screen was touched circuit
works out the based on sensor/heat - microprocessor works
coordinates of where data out coordinates of
the screen was where the screen was
touched. touched
Benefits - this is a medium- - allows multi- - relatively
cost technology touch capability inexpensive
- good screen - can use bare technology
visibility in strong fingers, gloved hand - can use bare
sunlight or stylus fingers, gloved hand
- allows multi- - good screen durability or stylus
touch capability
- very durable
Drawbacks - can only use bare - relatively - poor visibility in
fingers or a conductive expressive strong sunlight
stylus technology - doesn’t allow multi-
- heat-sensitive touch capability
systems only allow - screen is vulnerable
bare fingers to be used to scratches
b) describe how these principles are applied to real-life scenarios, for example: scanning of
passports at airports, barcode readers at supermarket checkouts, and touch screens on
mobile devices
Please see 1.3.3 a)
c) describe how a range of sensors can be used to input data into a computer system, including
light, temperature, magnetic field, gas, pressure, moisture, humidity, pH and motion
Sensors
Sensors send data from the real world to a computer. They often require an analogue to digital
converter (ADC) to change the data into a format that the computer (or microprocessor) can
understand. Sensors form part of many monitoring or control systems.
d) describe how these sensors are used in real-life scenarios, for example: street lights,
security devices, pollution control, games, and household and industrial applications
1.3.4Output devices
a) describe the principles of operation of the following output devices: inkjet, laser and 3D
printers; 2D and 3D cutters; speakers and headphones; actuators; flat-panel display
screens, such as Liquid Crystal Display (LCD) and Light-Emitting Diodes (LED) display; LCD
projectors and Digital Light Projectors (DLP)
Printers
The three most common types of printer are: laser, inkjet and dot matrix.
3D Printer
3D printers produce an actual solid objects. They are built up in the printer in a number of think
layers. Can use a number of different materials: powdered resin, powdered metal, ceramic power,
plastic reel, or even paper. 3D printer have been used to make prosthetic limbs, aerospace parts,
fashion and art item and even to make parts that are no longer in production by conventional
manufacturing.
2D/3D Cutters
These are used to cut into materials to form 3D objects and are controlled by computers and software
(CAD/CAM). Common materials include glass, crystal, metal, plastics and wood.
Headphones/Loudspeakers
Headphones and loudspeakers convert analogue voltages into sound. If the output is form a
computer, the digital signals are first converted into analogue voltages using a digital to analogue
converter.
Actuators
An actuator is a component of a machine that is responsible for moving and controlling a mechanism
or system, for example by opening a valve.
Light Projectors
DLP (digital light projectors) use millions of micro mirrors which can switch on or off several
thousand times a second creating various shades of light. Colour filters allow the shades of light to
be converted into colours which are projected onto a large screen.
LCD projectors use chromatic-coated mirrors which reflect light at different wavelengths. The light
components pass through three LCD screens which are then recombined using a prism to produce
the colour image which is projected onto a large screen.
b) describe how these principles are applied to real-life scenarios, for example: printing single
items on demand or in large volumes; use of small screens on mobile devices
Please see 1.3.4 a)
a) show understanding of the difference between: primary, secondary and off-line storage and
provide examples of each, such as: primary: Read Only Memory (ROM), and Random Access
Memory (RAM) secondary: hard disk drive (HDD) and Solid State Drive (SSD); off-line: Digital
Versatile Disc (DVD), Compact Disc (CD), Blu-ray disc, USB flash memory and removable
HDD
Primary memory is memory that is directly accessed by the CPU, e.g. RAM, ROM.
Secondary memory is memory that is not directly accessed by the CPU, e.g. HDD, SSD and offline
storage (including CDs, DVDs and blu-rays). Off-line storage is memory that can be safely removed
from the computer.
b) describe the principles of operation of a range of types of storage device and media
including magnetic, optical and solid state
Magnetic storage devices use a magnetised medium to store data. Whether a bit is magnetised or
not indicated is that bit is a 1 or a 0. Examples include magnetic tape, standard HDDs (hard disk
drives). They are generally cheap, but not that reliable as the system includes moving parts.
Optical storage devices use a laser to read/write data stored on a disk. Red lasers are used to read
DVDs and CDs and a blue laser is used to read/write to a blu-ray disk. Bumps and pits are recorded
onto a track, which represent 1s and 0s.Most disks have a single track that starts in the centre of the
disk and spirals outwards, however, a DVD-RAM disk has tracks in concentric circles. CDs typically
store 700MB, DVDs 4.7GB and Blu-Ray discs 25GB. Dual layer DVDs store 8.5GB and dual layer Blu-
Ray disks store 50GB. Optical memory is susceptible to scratches on the surface on the disk which
can skew data, as the disk has be spun round at high speeds it is also susceptible to mechanical
failure due to moving parts.
Flash storage uses semiconductors to store data. Millions of transistors are either on or off which
represent the 1s and 0s. Flash memory is solid. There are no moving parts, unlike magnetic and
optical, this makes it more reliable. It is more expensive to manufacture than magnetic or optical
storage. SSD (solid state drives) use flash memory, as do USB flash drives and SD cards.
c) describe how these principles are applied to currently available storage solutions, such as
SSDs, HDDs, USB flash memory, DVDs, CDs and Blu-ray discs
See 1.3.5 b)
Files are measured using the measurements in 1.1.1 c). If you are asked to calculate the storage
requirements of a file you will be give all of the numbers you need in the question. They may ask you
to give your answer in a different form to that in the question (for example they may give you a
number of bits and ask you to work out the number of bytes). Image size is a popular choice for this
sort of question, it is important that you include the colour depth when calculating this size ((height in
pixels x width in pixels) x colour bit depth = total size). Be careful with units, and simplify calculations
where possible.
1.3.6Operating systems
Not every computer requires an operating system, for example the microprocessors controlling ovens
or washing machines will not require one as they carry out simple, unchanging tasks.
An interrupt is a signal sent from a device or software to the processor requesting its attention. The
interrupt will cause the processor to temporarily stop what it is doing to service the interrupt.
Examples include: pressing ALT+CTRL+BREAK, a paper jam in a printer, or software trying to
divide by zero.
a) show understanding of the need for both high-level and low-level languages
A computer program is a list of instructions that enable a computer to perform a specific task.
Computer programs can be written in high-level or low-level language depending on the task to be
performed. Low level languages access the processor and memory directly however high level
languages require translating into a low level language before they can run. Most programs are
written in high-level languages.
High-level languages enable a programmer to focus on the problem to be solved and require no
knowledge of the hardware and instruction set of the processor that will be used. High-level languages
can be used on different types of computer.
Low-level languages relate to the specific processor of a particular computer. Low-level languages can
refer to machine code or assembly language (which needs to be translates into machine code).
b) show understanding of the need for compilers when translating programs written in a high-
level language
A compiler is a computer program that translates a program written in a high-level language into
machine code so that it can be directly used by a computer to perform a task. A compiler will attempt
to translate the entire code at once, and report all of the errors at the end, at once.
An interpreter is a computer program that reads a statement from a program written in a high-
level language, performs the action specified and the does the same with the next statement
and so on. This means that any errors are reported as they occur, line by line. If an Interpreter
encounters an error it will not move onto the next line.
d) show understanding of the need for assemblers when translating programs written in
assembly language
An assembler is a computer program that translates a program written in an assembly language into
machine code so that it can be directly used by a computer to perform a required task.
1.4 Security
1.4.1
a) show understanding of the need to keep data safe from accidental damage, including
corruption and human errors
Data can be accidentally damaged by a number of external factors e.g. fire, accidental deletion,
accidental overwriting, hardware failure, software faults etc.
b) show understanding of the need to keep data safe from malicious actions, including
unauthorised viewing, deleting, copying and corruption
Malicious acts can also prevent data from being safe. Most accidental methods of data damage can be
done intentionally.
1.4.2
a) show understanding of how data are kept safe when stored and transmitted,
including:
i) use of passwords, both entered at a keyboard and biometric
Strong passwords are important. Weak passwords are easy to guess and use common,
easy to remember words or letters.
ii) use of firewalls, both software and hardware, including proxy servers
Firewalls are described in 1.2.2
iii) use of security protocols such as Secure Socket Layer (SSL) and Transport Layer
Security (TLS)
SSL is a protocol (set of rules) used by computers to communicate with each other
across a network. It allows data to be send a received securely across a network,
including the internet. HTTPS indicated that SSL is being used. When a user wants to
access a website, the web browser asks the web server to identify itself, the web
server sends a copy of the SSL certificate which the web browser authenticates. If it is
OK then SSL data transfer beings between the user’s computer and the web server.
TLS is similar to SSL but is more recent and more effective. Only recent web browsers
support TLS. It uses a record protocol and a handshake protocol.
iv) use of symmetric encryption (plain text, cypher text and use of a key) showing
understanding that increasing the length of a key increases the strength of the
encryption
Encryption can be symmetric:
● Uses a secret key; when the key is applied, the plain text goes through an
encryption algorithm to produce ciphertext. The recipient needs a key to then
decrypt the message back into plain text.
● The main risk is that the sender and recipient need the same key, which is
susceptible to being hacked or intercepted
Encryption can also be asymmetric:
● Asymmetric encryption uses public and private keys.
● The public key is available to everybody and the private key is only known to
the user.
● Both keys are needed to encrypt and decrypt messages
1.4.3
a) show understanding of the need to keep online systems safe from attacks including denial of
service attacks, phishing, pharming
A denial of service attack is an attempt at preventing users from accessing part of a network, usually
internet servers. They can prevent users from accessing certain websites or accessing online services.
This is achieved by the attacker flooding the network with useless traffic. For example, sending
thousands of requests to a website or sending out thousands of spam emails to users ‘clogging up a
system’.
1.4.4
a) describe how the knowledge from 1.4.1, 1.4.2 and 1.4.3 can be applied to real-life scenarios
including, for example, online banking, shopping
Make sure your answers to this sort of question relate directly to the context of the question. For
example, don’t mention internet security if the system in question is offline.
1.5Ethics
a) Show understanding of computer ethics, including copyright issues and plagiarism.
Computer ethics is a set of principles set out to regulate the use of computers to stop unethical things
from happening. Copyright is a system to prevent somebody from copying something without
permission. Plagiarism is the act of copying somebody's work and claiming it is your own.
Free software - Users have the freedom to run, copy, change or adapt the software. Freeware -
Users can download free of charge, but it is subject to copyright laws so the user cannot copy,
change or adapt the software.
Shareware - Users are allowed to try out shareware free for a trial period. At the end of this period,
the user will be requested to pay a few. Sometimes the trial version does not have all of the features
of the full version.
c) show understanding of the ethical issues raised by the spread of electronic communication
and computer systems, including hacking, cracking and production of malware