Computer Systems
Topics
Below you will find each of the Computer Science paper 1 topics broken down in alignment with the the CIE 0478 2023 - 2025 syllabus.
This page is a work in progress in preparation for the introduction of the 2023 syllabus. Pages will become available upon completion.
IF YOU ARE SITTING YOUR EXAM IN 2021 OR 2022 BE CAREFUL NOT TO CONFUSE ANYTHING THAT YOU MIGHT FIND HERE WITH YOUR SYLLABUS!
This page is a work in progress in preparation for the introduction of the 2023 syllabus. Pages will become available upon completion.
IF YOU ARE SITTING YOUR EXAM IN 2021 OR 2022 BE CAREFUL NOT TO CONFUSE ANYTHING THAT YOU MIGHT FIND HERE WITH YOUR SYLLABUS!
1. Data Representation
1.1 Number Systems
1.2 Text, Sound and Images
1.3 Data Storage and Compression
2. Data Transmission
3. Hardware
3.1 Computer Architecture
3.2 Input and Output Devices
Topic |
Theory |
Input Devices |
Learn |
Output Devices |
Learn |
Sensors |
Learn |
3.3 Data Storage
Topic |
Theory |
Primary Storage |
Learn |
Secondary Storage |
Learn |
Types of Storage |
Learn |
Virtual Memory |
Learn |
Cloud Storage |
Learn |
3.4 Network Hardware
Topic |
Theory |
Network Interface Card (NIC) |
Learn |
MAC Address (MAC) |
Learn |
IP Addresses |
Learn |
Routers |
Learn |
4. Software
4.1 Types of Software and Interrupts
Topic |
Theory |
Running Applications |
Learn |
Interrupts |
Learn |
4.2 Programming Languages
Topic |
Theory |
High / Low Level Languages & Translators |
5. The Internet and Its Uses
5.1 The Internet and the World Wide Web
Topic |
Theory |
The Internet Vs WWW |
Learn |
URLs |
Learn |
HTTP & HTTPS |
Learn |
The Web Browser |
Learn |
Accessing a Web Page |
Learn |
Cookies |
Learn |
5.2 Digital Currency
Topic |
Theory |
Digital Currency |
Learn |
Blockchain |
Learn |
5.3 Cyber Security
Topic |
Theory |
Brute Force Attack |
Learn |
Data Interception |
Learn |
Distributed Denial of Service (DDOS) |
Learn |
Hacking |
Learn |
Malware |
Learn |
Phishing / Pharming |
Learn |
Social Engineering |
Learn |
Topic |
Theory |
Access Levels |
Learn |
Anti-Malware |
Learn |
Authentication |
Learn |
Responsible Usage |
Learn |
Firewalls |
Learn |
Proxy Servers |
Learn |
Secure Sockets Layer (SSL) |
Learn |