Index
ISBN 13 60–1 memory 78, 119–20 packet trailers 46
iteration applications 123 packets 45–8
cache memory 81 paging 129–30
populating arrays 330 RAM 77, 120–2 paracetamol manufacture 220
programming languages 312–14 ROM 122 parallel data transmission 51, 52
pseudocode 268–70 virtual 128–30 parameters 321–3
iterative testing 259 parity bits 55
memory address register (MAR) 77, 78 parity blocks 57–8
J memory data/buffer register (MDR) parity bytes 57–8
parity checking 55–8
Java 300, 301–2 77, 78 passwords 189, 200
JPEG files 35 memory dumps 12 patient monitoring systems 114
memory management 157 payloads 46
K memory size systems 32 performance, influencing factors 79,
memory sticks 125–6
keyboards 93–4 microphones 94–5 80–2, 121
knowledge bases 244–5 minimum values 273–4 persistent cookies 184
MOD 317, 327–8 prettyprinting 173
L modulo-11 61–2 pH sensors 112, 116, 117
moisture sensors 112, 117 pharming 195
laser printers 105 monitoring systems 113, 114 phenotyping 237
latency 124 most significant bit 18 phishing 194–5, 206
least significant bit 18 MP3 and MP4 files 35 piezoelectric crystals 104
length checks 277–8 multitasking 159–60 pixels 30
level sensors 112 plaintext 63
library routines 327–8 N ports 138
LiDaR (Light Detection and Ranging) post-condition loops 314
NAND gate 359 pre-condition loops 313
234 nested statements 318–20 presence checks 278–9
light emitting diodes (LEDs) network interface card (NIC) 133 pressure sensors 112, 114
networks primary keys 343–4
backlighting 107–8 primary memory 119–20
LED screens 107–9 hardware 133–7
organic (OLED) 108–9 wired and wireless 139 applications 123
light sensors 112, 115, 117 neural networks 250–1 RAM 120–2
lighting systems 86, 115, 227–8 NOR gate 359 ROM 122
linear search 274–5 normal data 281 printers
linkers (link editors) 150 NOT operator 318, 359 3D 106–7
liquid crystal displays (LCDs) NOT gate 358 inkjet and laser 104–5
projectors 102–3 nuclear power stations 219 privacy settings 199, 209
screens 107–9 procedures 321–3
lists 329–31 O program counter (PC) 77
Python 332 program development life cycle 258–9
local variables 325–6 operating systems (OS) 150, 155–60 programming languages 165, 299–300
logic circuits 360–4, 366–8, 371–5 optical character recognition (OCR) 97 high- and low-level 166–8
half adder and full adder circuits optical mouse 95–6 projective capacitive screens 99
optical storage devices 126–8 projectors 102–3
379–81 OR operator 318, 359 proximity sensors 112
real world applications 378 OR gate 358 proxy servers 208
logic gates 358–9 organic light emitting diodes (OLEDs) pseudocode 265–70
symbols 357 public and private keys 64–5
logical binary shifts 17–20 108–9 Python 300
logical operators 318 output devices 78
loops see iteration Q
lossless file compression 35–7 actuators 101
lossy file compression 34–5 at checkouts 89 QR (quick response) codes 90–1
loudspeakers 109–10 LED and LCD screens 107–9 quad core systems 81
low-level languages 166 light projectors 102–3 quantum cryptography 67–8
machine code 165, 166–8 loudspeakers 109–10 quarantine 151
printers 104–7 queues 292–3
M output statements 270, 305
overclocking 81 R
machine learning 247–8, 251 overflow errors 17
magnetic field sensors 112, 115 RANDOM 327–8
magnetic storage 123–4 P random access memory (RAM) 77,
maintainable programs 328–9
malware 191–4 packet headers 46 120–2
maximum values 273–4 packet sniffers 190 applications 123
Media Access Control (MAC) addresses packet structure 46
packet switching 47–8 389
13, 133, 134
INDEX
range checks 277 simplex data transmission 50 truth tables 357, 361–2, 367–9, 372,
ransomware 193–4 skewed data 51, 54 374–6
READ operation 78 social engineering 196–8
read-only memory (ROM) 122 software 147 Turing Test 242
two’s complement 20–5
applications 123 system and application 148–50
EEPROM 161 utilities 150–5 subtraction 38–9
real data type 304, 343 software updates 204–5 two-step verification 204
registers 77 solenoids 101 type checks 278
REPEAT…UNTIL loops 269, 270 solid state drives (SDD) 124–6 typo squatting 206
repetitive strain injury (RSI) 94 sound representation 29–30
requirements specification 258 MP3 and MP4 files 35 U
resistive touch screens 100–1 sound sensors 112, 114
retina scans 202–3 sound waves 29 Unicode 28
robots 230 spear phishing 195 uniform resource locators (URLs) 181
agricultural applications 236–7 spyware 193, 199 Universal Serial Bus (USB) 52–3, 138
characteristics of 231 SSL certificates 210 user accounts 160
domestic applications 238–9 stacks 292–3 user interfaces 156–7
in entertainment 239 static IP addressing 135–6 user names 200
industrial applications 232–3 static RAM (SRAM) 121–2 utility software 150–1, 150–5
medical applications 238 stock control 89–90
transport applications 233–6 storage 119–20, 123 back-up software 153–4
ROUND 327–8 cloud storage 130–1 defragmentation software 151–3
routers 47, 136–7 magnetic 123–4 device drivers 154–5
run-length encoding (RLE) 36–7 optical media 126–8 screensavers 154
solid state drives 124–6 security software 154
S string handling 315–16 virus checkers 151
strings 304
sampling rate 30 structure diagrams 261–2 V
sampling resolution (bit depth) 30 Structured Query Language (SQL)
scanners 96–8 344–7, 352 validation 276–9, 341–2
screens 107–9 surface capacitive screens 99 variables 302–3
screensavers 154 symmetric encryption 63–4
Secure Sockets Layer (SSL) 209–10 system clock 77, 80 local and global 325–6
security system software 148 vending machines 86–7
examples 150 verification 55–9, 200, 280
access levels 198–9 operating systems 155–60
anti-malware 199 utilities 150–5 two-step 204
authentication 199–204 virtual memory 128–30
automatic software updates 204–5 T virus checkers (anti-virus software)
cloud storage 131
emails and URL links 205–7 tables 331–2 151
firewalls 207–8 see also databases viruses 191–2
privacy settings 209 Visual Basic 300–1
proxy servers 208 temperature sensors 112, 116, 117 voice recognition 202
Secure Sockets Layer (SSL) 209–10 test data 281–2 volatile memory 121
Transport Layer Security 211 testing 259 von Neumann architecture 75–6
security management 158
security software 154 error detection 285–7 W
security systems 85–6, 114, 203 thermal bubble technology 104
security threats 189–98 thrash point 130 wardriving 190
selection Time Machine utility 153–4 washing machines 87
programming languages 310–12 tomography 98 weather stations 225
pseudocode 266–8 top-down design 260 web pages, retrieval and location 183
sensors 111–12, 217 totalling 272 WHILE loops 269, 270
control applications 113–14, 115–17 Wi-Fi 139
monitoring applications 113, 114 programming languages 314
sequence 307–9 touch screens 98–101 security issues 190
serial data transmission 50, 52 trace tables 283–5 WIMP (windows icons menu and
USB 52–3 trains, autonomous 234–5
session cookies 184 translators 168–70, 171 pointing device) interfaces 156
set-top boxes 85 Transport Layer Security (TLS) 211 wired and wireless networks 139–40
Trojan horses 192–3 World Wide Web (WWW) 180–1
worms 192
WRITE operation 78
X
XOR gate 359
390
Develop understanding of computer systems,
the internet and emerging technologies with
further practice questions and activities
This Workbook provides additional support
for Cambridge IGCSE™ and O Level Computer
Science.
● Become accomplished computer scientists:
the workbook provides a series of questions
designed to test and develop knowledge
of how computer systems and associated
technologies work.
● Develop understanding and build confidence:
questions and activities will aid preparation
for your course as well as examination.
Develop algorithmic and computational thinking
and programming skills with further practice
questions and activities
This Workbook provides additional support
for Cambridge IGCSE™ and O Level Computer
Science.
● Become accomplished computer scientists:
the workbook provides a series of questions
designed to test and develop computational
thinking skills in order to solve problems.
● Develop understanding and build confidence:
questions will aid preparation for your course
as well as examination.
To purchase your copies visit
www.hoddereducation.com/cambridge-igcse-computerscience