Computing GCE O'Level 2024 Syllabus Revision Guide
Computing GCE O'Level 2024 Syllabus Revision Guide
Binary System
(Computer System)
Processor
Processes data
Follows instructions
Control Unit
Follows instructions
Computing 1
Decides when data should be stored, received or transmitted
Memory
Stores data instructions and results of processing for later use
Types of Memory
1. Processor Registers
Main memory
Where data and instructions are stored temporarily so that they can be
quickly accessed by the processor when needed
Data is volatile
Where data and instructions that rarely need to be changed or needed for
the computer to start up are stored
Data stored in ROM cannot be easily changed and thus remains there
whether power supply is on or off
Ideal for storing instructions needed before data can be loaded into RAM
Secondary Storage
Non-volatile memory medium storing large amounts of data
1. Magnetic
Computing 2
Data is read by a magnetic ‘head’
b. Easily damaged, will break over time; much slower than solid-state
2. Optical
Data is stored as very small pits or indentations that can be read or written
by a laser
3. Solid-state
Data Bus
Transport data between memory and processor
Bi-directional
Address Bus
Transport required memory location from processor to memory
One direction
Computing 3
When the processor reads from or writes to memory (RAM), the relevant
address information is provided on the address bus
Scanner
Camera
Keyboard
Microphone
Mouse
Output
Immediate or final results produced by the computer usually in the form of
processed data
Printer
Monitor
Speaker
2. Algorithm
Input and Output
a. Input
Computing 4
i. Data / instructions that the computer receives
b. Output
2. Modular Approach
Computing 5
💡 Solve simple steps of the problem manually and identify tasks that are
of different natures, which can be separated from each other to
become distinct and/or unrelated sub-problems → results in
different sub-problems
Pattern Recognition
Patterns are clues that the solutions to these problems may be similar
Generalisation
💡 Replacing two or more similar items with a single, more general item
Computing 6
3. Flowcharts and Pseudo-code
Flowcharts
Symbols
1. Terminator
PILL SHAPED
2. Process
Do something
RECTANGLE SHAPED
3. Decision
Gives condition
DIAMOND SHAPED
Computing 7
4. Data
PARALLELOGRAM SHAPED
eg: INPUT x
Pseudo-code
Keywords
1. INPUT variable
OUTPUT “text”
and/or variable
2. IF…THEN
ELSEIF…
THEN
ELSE
ENDIF
3. WHILE…
ENDWHILE
4. FOR...
NEXT…
4. Programs
Syntax
1. Meaning
Computing 8
Rules that determine how the words and symbols in a valid instruction
are arranged
2. Error
Result of incorrect source code that does not follow the rules of the
language
Translators
Compilers
Advantages
Disadvantages
Interpreters
Advantages
Disadvantages
Computing 9
5. Programs RLA (teaches python)
Stages in developing a program
a. Gather requirements
b. Plan solutions
c. Write code
e. Deploy code
1. Gather requirements
b. Specify the complete set of inputs necessary for the problem and how they
are supplied
c. Specify the complete set of outputs necessary for the problem and their
formats
2. Plan solutions
a. Solve simplified examples manually and generalise steps for the required
output
b. Break the problem into smaller parts and refine them closer to the solution
3. Write code
Computing 10
a. Correcting mistakes made while translating the planned algorithm into
code:
d. Feeding the algorithm a set of inputs and comparing the outputs with their
corresponding expected set of outputs
5. Deploy code
iii. Evaluate usefulness of the program and consider changes which could
improve usability or effectiveness
3. Presence Check — ensure that all the required inputs are provided
Computing 11
Errors due to incorrect source code not following the rules of the
language
2. Run-time Errors
3. Logic Errors
2. Boundary Conditions
3. Error Conditions
Debugging
1. Using (intermittent) print statements
Computing 12
Storage devices may be accidentally damaged during transport
Multiple users working on the same file may accidentally overwrite each
other’s data
Preventive Measures
Set up rules when collaborating with multiple users to prevent them from
writing to the same file at the same time
Power Failure
Reasons
2. Data stored in volatile memory but not yet written to a storage device will
be lost
Preventive Measures
overuse,
manufacturing defects
or age
Preventive Measures
Computing 13
Malicious Software or Viruses
Reasons
Preventive Measures
Install and configure a firewall to prevent them from spreading through the
network
Unauthorised Access
When data owned by someone is used by someone else (eg intruder or even
member of public) without permission
Causes
1. Poor authentication
Authentication
Process of verifying the user using something the user:
1. knows, eg password
1. Password
Avoid:
using:
Computing 14
birth dates
surnames
re-using passwords
Use:
mixture of
lower-case letters
upper-case letters
numbers
symbols
2. Security Tokens
To access bank account online, the user has to confirm his/her identity by:
3. Biometrics
Computing 15
Ability of the computer to control the access of data and resources once a user is
logged in
1. File Permissions
Administrator
Special user who can override permissions for almost any file or
folder
Administrator rights
resetting passwords
2. Firewalls → networks
3. Encryption
Before the encrypted data is decoded using the secret key, it shows up as
random, meaningless data.
Computing 16
Privacy Policies
Privacy: Ability to keep specific data or resources from being known to others
Users should be aware that once data is digitised and uploaded to a public
network (internet), it can potentially remain there forever
Read and fully understand the privacy policy of the social networking
site
Set sharing settings to private to only allow people known in real life to
read shared posts
2. Pharming
Computing 17
Interception of request sent from a computer to a legitimate website and
redirection to a fake website to steal personal data or credit card details
Stolen data can be used for unauthorised access to even more of the
victim’s data
More difficult to detect than phishing as fake website uses the same
address as the real website
3. Phishing
Stolen data can be used for unauthorised access to even more of the
victim’s data
4. Spamming
5. Spyware
Collected data can be used for unauthorised access to even more of the
victim’s data
6. Trojan Horse
Once the Trojan horse is run, it does something harmful such as giving
intruders unauthorised access to computer instead
7. Unauthorised Access
8. Virus
Computing 18
Computer program that attaches itself to a normally harmless program
and modifies it
When the modified program is run by a user, the virus attaches copies of
itself to other programs it can find, “infecting” them
9. Worm
Unlike virus, worm does not need to attach itself to existing programs
a. Anti-spyware
Software to detect, remove and stop (DRS) spyware and other malware
from running
b. Anti-virus
Software to detect, remove and stop (DRS) viruses and other malware
from running
c. Operating System
d. Malware Signature
Used to:
Scan the user’s storage and email to detect and remove malware; if a
program has already been infected by a virus, it will also try to restore
the original program
Computing 19
Most anti-virus and anti-malware programs can update the list
automatically through the internet
Worms do not need human interaction to start running, but can run
automatically.
A flawed web browser may have a bug that allows websites to run
malicious programs without the user’s knowledge
Computing 20
To check destination, hover mouse cursor over the hyperlink and
the destination will appear as a pop-up or on the status bar
d. Attacker uses these details to access the victim’s bank account on the
bank’s actual website
Computing 21
Look out for options to turn off email updates or participation in
mailing lists in settings of online account
Intellectual Property
Copyright: The legal right of owners to control the use and distribution of their
intellectual property
Intellectual property: Creations of the mind that have value but can exist purely as
data with no physical form
Software where users can freely change, copy, study and share the
software
Computing 22
Software is always distributed with source code
3. Proprietary Software
a. Freeware
b. Shareware
After the evaluation period, program expires and user cannot access
the program anymore unless the user pays a registration fee
Like proprietary software, the source code is usually kept secret and
modifying
the software is usually illegal
Software Piracy
The crime of copying, distributing and/or use of proprietary software in a manner
not permitted to its licence
Specific to software
Forms:
Computing 23
Installing software on multiple devices without paying the appropriate
number of licences
Cracking software
Copyright Infringement
The use or distribution of copyrighted work without the permission of the
copyright owner illegally
Can occur for any copyrighted materials, eg text or images on the internet
Plagiarism
The act of passing off someone else’s original work as your own, without
providing proper credit or attribution to the actual author
Positive
Internet has enabled diverse cultures to interact and share ideas with
each other
Computing 24
AI has made it possible for anyone to automatically transcribe and
translate speech into different languages with remarkable speed and
accuracy
Negative
News and social networking sites use AI to promote content that the user
is interested in regardless of inaccuracy
Economic
Rise of smart phones has led to an increased focus on mobile devices and
mobile applications in the computing industry
Rise of social media has led to increased use of social media for marketing
purposes and has helped businesses better understand buying habits and
consumer needs through social media posts
Ethical
Is it right to collect and analyse social media posts in ways not intended by the
original authors?
Education
Social
Positive
Negative
Computing 25
Technology has made it more challenging for educators as students’
attention spans are getting shorter due to technology and social media
Economic
Ethical
Finance
Social
Positive
Consumers can spend, borrow, invest and save money through low-cost
and easy-to-use web and mobile applications
Negative
Threats to privacy and security of data and the ease of obtaining false
information on the internet has made people vulnerable to financial
scams and other get-rich-quick schemes
Economic
Companies have started making financial services more efficient for both
individuals and businesses
Companies use technology and software to reduce the time, cost and effort
needed for payments, investments, fundraising, trading and/or data
Computing 26
analytics for business and individuals
Ethical
Healthcare
Social
Positive
Negative
Some patients find the use of robots and other technology in healthcare
impersonal and mistrust the ability of machines to provide proper
healthcare
Other patients may misuse information from the internet and make
potentially dangerous decisions based on incorrect diagnoses
Computing 27
Economic
Ethical
Transportation
Social
Positive
Transport has become less stressful and more predictable for travellers
due to the availability of detailed maps as well as real-time information on
bus frequencies, traffic congestion levels and street-level photographs of
neighbourhoods around the world
All this information is available at low cost through popular mobile devices
Negative
This is true with regards to the collection of location data from mobile
devices as this data could reveal personal details such as home and work
addresses that they might wish to keep private
Economic
Rise of self-driving vehicles with the use of AI is likely to open new areas of
growth in the travel industry
Computing 28
Singapore is one of the first countries where self-driving cars are tested,
and if successful, could revolutionise the motor industry
Ethical
Entertainment
Social
Positive
Many computer games have active online communities and mobile games
have even managed to bring participants together through in-game
incentives to meet or team up
Negative
AI has made it possible for anyone to create doctored images and videos
that appear very convincing to the average viewer
Economic
Computing 29
Games, animation and media are areas of strong growth in the entertainment
industry with new opportunities opened by the rise of high-quality virtual
reality, augmented reality and motion-tracking technology
Many businesses are using monitoring technology and strategies from game
design to provide rewards and incentives for work-related achievements
Ethical
8. Number Systems
Applications of Binary and Hexadecimal Systems
RGB Colour Codes
Abbreviation of Red, Green, Blue
RR, GG and BB are two-digit hexadecimal numbers that represent the red,
green and blue components of the colour
IPv4
IP address is made up of 4 bytes (32 bits)
Each of the 4 numbers can neither be less than 0 or more than 255
eg: 10.133.16.165
Computing 30
IPv6
IP address now made up of 16 bytes (128 bits) → 8 numbers
Almost all computers all computers connected to the internet have an IPv4
address and many use the IPv6 address system as well
eg: 2001:0db8:0000:0000:0020:0017:0bad:c0de
Port Number
SSID
Wireless devices connected to the same WAP use the same SSID
MAC Address
IP addresses may change each time the device connects to the internet, not
permanent
Using MAC (Media Access Control) is a more permanent way of identifying the
device
Computing 31
Made up of 6 bytes (48 bits)
eg: 20:17:0B:AD:C0:DE
33 control characters
95 printable characters
Uses 7 bits to represent each character but stored in a byte (8 bits) with one
unused bit
Unicode
Can encode characters from virtually all written languages and symbols
Unicode is the modern standard for text encoding, capable of handling multiple
languages and symbols
Computing 32
9. How do Logic Circuits Make Decisions
Boolean
Computing 33
10. Spreadsheets
Basic Spreadsheet Understanding
x-axis : Horizontal, Row
Data Types
1. General
2. Number
3. Currency
4. Date
5. Time
6. Percentage
7. Text
Computing 34
Absolute Cell Referencing — Comparing against one cell for selection
Automatic Recalculation
Functions
Logical Functions
Same
Different
= (equivalent)
Text Functions
1. LEN()
3. LEFT()
4. RIGHT()
Date Functions
1. TODAY()
Lookup Functions*
1. HLOOKUP()
2. VLOOKUP()
Computing 35
Math Functions
1. CEILING.MATH()
2. FLOOR.MATH()
3. POWER(number, power)
4. SQRT()
5. ROUND(number, decimal_places)
6. RANDBETWEEN(lowest, highest)
7. RAND()
8. SUM()
9. SUMIF()
10. QUOTIENT()
11. MOD()
remainder
Statistical Functions
1. MAX()
2. MIN()
3. LARGE()
4. SMALL()
5. COUNT()
only for cells with numeric values eg numbers, percentages, dates, times
6. COUNTA()
7. COUNTIF()
8. COUNTBLANK()
9. MODE.SNGL()
Computing 36
most repeated value
10. MEDIAN()
11. AVERAGE()
Goal Seek
Reverse engineering of a given function to obtain a part of the formula when
already given the desired outcome
Conditional Formatting
Formatting cells based on a given condition through a formula or built in
condition
11. Networks
Types of Networks
1. LAN (Local Area Network)
Computing 37
eg. The Internet
Network Architecture
1. Router
2. Switch
Connects devices
Computing 38