Y10
Dates & Times:
Mondays: 14:20 - 15:15
Wednesdays: 13:25 - 15:15 (double lesson)
Y11
Dates & Times:
Mondays: 09:35 - 10:30
Tuesdays: 13:25 - 15:15 (double lesson)
Book:
We will be mostly using the ClearRevice Computer Science book. This guide has been expertly compiled and edited by successful former teachers of Computer Science, highly experienced examiners and a good dollop of scientific research into what makes revision most effective.
Past examinations questions are essential to good preparation, improving understanding and confidence. This guide has combined revision with tips and more practice questions than you could shake a stick at. All the essential ingredients for getting a grade you can be really proud of.
Each specification topic has been referenced and distilled into the key points to make in an examination for top marks. Questions on all topics assessing knowledge, application and analysis are all specifically and carefully devised throughout this book.
We will use the book in conjuction with Worksheets, Videos and Past Paper Questions
ACTIVITIES:
Introduce myself to the students and get to know them.
Set expectations for the course, including ground rules for computer use.
Introduce the IGCSE Computer Science syllabus and the upcoming exams in Year 11 (2025-2026).
Guide students in joining the Teams class and accessing the course website.
Distribute textbooks and copybooks for note-taking.
Start the first topic if time permits.
LESSON RESOURCES: NONE
ACTIVITIES:
Understand number systems (binary, denary, hexadecimal) and their uses.
Learn how to convert between binary, denary, and hexadecimal.
Complete a worksheet on number systems in their copy books (workings shown), with any unfinished work assigned as homework. (see Lesson Resources)
LESSON RESOURCES:
Number_System_Conversions.pdf
ACTIVITIES:
Check HW Lesson 2 (Pair Based)
If done play the binary game (see Lesson Resources)
Read Text, Images, Sound in ClearRevise
LESSON RESOURCES:
ACTIVITIES:
Read Binary Addition, Logic Shifts, 2's Complement in ClearRevise.
LESSON RESOURCES:
ACTIVITIES:
Read Compression in ClearRevise
See video on compression (Lossy vs Lossless)
Start Examination Practice Questions
EXTRA:
Why 2's complement? Well, the two main reasons are addition with positive and negative values and one representation for 0. (source: Wikipedia) :
The two's-complement system has the advantage of not requiring that the addition and subtraction circuitry examine the signs of the operands to determine whether to add or subtract. This property makes the system both simpler to implement and capable of easily handling higher precision arithmetic. Also, zero has only a single representation, obviating the subtleties associated with negative zero, which exists in ones'-complement systems.
LESSON RESOURCES:
ACTIVITIES:
Watch and follow along with the playlist of IGCSE CS Past Paper Questions of Topic 1
LESSON RESOURCES:
ACTIVITIES:
Start Topic 2: Data Transmission
Read 2.1 in ClearRevise
LESSON RESOURCES:
ACTIVITIES:
Focusing on 2.2 Error Detection in Transmission of Data.
We will be looking at parity checks.
We are counting the ones!
Even parity means make the ones even with an extra 1 or put a 0 if already even ones
Can also be the opposite (EVEN=0 and UNEVEN=1 ) which is Uneven Parity. It will be given in the question.
LESSON RESOURCES:
ACTIVITIES:
Read pages Check Digit and Encryption in ClearRevise
Watch video on CHECK DIGIT (see Lesson Resources)
Watch video on ENCRYPTION (see Lesson Resources)
Attempt the Examination Practice questions of Topic 2 in ClearRevise (in your copybook)
LESSON RESOURCES:
ACTIVITIES:
Watch video on internet and how it works.
Make a start on Topic 3.
LESSON RESOURCES:
ACTIVITIES:
The learning review will be compilation of Topic 1 and Topic 2 questions from past papers.
We will practice in class and you can practice at home as well.
LESSON RESOURCES:
[PAST PAPERS]: Computer Science Past Paper Questions and Answers LINK 1
[PAST PAPERS]: Computer Science Past Paper Questions and Answers LINK 2
[PAST PAPERS]: Computer Science Past Paper Questions and Answers LINK 3
ACTIVITIES:
Watch and follow along with the playlist of IGCSE CS Past Paper Questions of Topic 2.
LESSON RESOURCES:
ACTIVITIES:
Read 3.1 in ClearRevise and make notes
LESSON RESOURCES:
ACTIVITIES:
Read 3.1 in ClearRevise and make notes
LESSON RESOURCES:
ACTIVITIES:
Objective: You will research and present on specific chapters from Topic 3. Your presentation should incorporate information from ClearRevise, the course book, and additional reliable sources from the internet. While you can go beyond the IGCSE syllabus, be clear about what is within the syllabus and what is extra information. Your presentation should be around 20 minutes long and designed to help your peers study for their IGCSE exams (and the Learning Review)
Note: Each student will work on two presentations, one with a peer and one in a different group or alone. This will help you gain a broader understanding and improve collaboration skills.
Content:
Include information from ClearRevise, the course book, and the internet.
Clearly distinguish between syllabus content and extra information.
Incorporate as many IGCSE past paper questions as possible on your topic.
Use interactive elements like Kahoot quizzes, videos, or other engaging tools.
Presentation:
Aim for a 10/15-minute presentation.
Ensure your slides are clear and useful for your peers to study from.
Work collaboratively with your group members.
RECORD EVERY SOURCE USED, WATCHED, EXAMINED (any videos on youtube, links to explanations etc.) INCLUDING ALL IMAGES
(Prelimenary) Deadline:
December 1st
Topics:
Embedded Systems
Scanners
Digital Cameras
Keyboards, Mice, and Microphones
Touch Screens
Screen Types
Projectors
Printers
3D Printers
Speakers
Actuators and Sensors
Primary Storage
Secondary Storage
Device Operation
Virtual Memory
Cloud Storage
Network Hardware
IP Addresses
ACTIVITIES:
Watch and follow along with the playlist of IGCSE CS Past Paper Questions of Topic 3.
LESSON RESOURCES:
ACTIVITIES:
Watch the video on SQL
Do the exercises on SQL Bolt
LESSON RESOURCES:
ACTIVITIES:
Watch and follow along with the playlist of IGCSE CS Past Paper Questions of Topic 9.
LESSON RESOURCES:
ACTIVITIES:
Go trough slides on logic gates
Explore the interactive logic gates (Logic.ly)
Work through the lesson on truth tables and converting real scenarios to logic gates
Complete the worksheet with past paper questions on logic gates and truth tables
LESSON RESOURCES:
[INTERACTIVE LESSON]: Logic Gates Interactive Lessons: Logic.ly Lessons
[SLIDES]: Truth Tables and Logic Problems: Truth Tables and Logic Problems
[WORKSHEET]: Past Paper Questions on Logic Gates and Truth Tables
ACTIVITIES:
Read Topic 8 in ClearRevise
Read the explanations on Pseudonajadocs
Try out the IGCSE Past paper Pseudocode Questions on Pseudonaja Editor
LESSON RESOURCES:
ACTIVITIES:
Watch the Topic 6 videos
Read pages 62 and 63 in ClearRevise
Have a look at:
Automated Systems
Robotics
Artificial Intelligence (AI)
Try the exam-style questions on page 64 in ClearRevise
After completing these points, another topic will be finished! 😊 Only 2 theory topics remaining.
NEXT TIME: We will finish the programming concepts and start programming on paper.
LESSON RESOURCES:
ACTIVITIES:
Read Topic 5.3 in ClearRevise
LESSON RESOURCES:
ACTIVITIES:
A worm can replicate and spread itself from one computer to another. On the other hand, a virus cannot self-replicate, and it needs to be sent by a user or software to travel between two different computers.
Finish Topic 5
Watch the Videos on Phishing, Viruses, Worms, Adware, Ransomware etc.
Watch the hacking videos from a tv series and try to identify the type of hack.
Do Examination Practice Questions Topic 5 in ClearRevise.
LESSON RESOURCES:
ACTIVITIES:
Go through ClearRevise Topic 1-6 for any extra questions.
Mark Paper 1 as Completed.
Set Date For Paper 1 Learning Review.
Start practicing with Paper 1 Past Papers (continued every week)
LESSON RESOURCES:
[PAST PAPERS]: Computer Science Past Paper Questions and Answers LINK 1
[PAST PAPERS]: Computer Science Past Paper Questions and Answers LINK 2
[PAST PAPERS]: Computer Science Past Paper Questions and Answers LINK 3
ACTIVITIES:
Go through Structure Diagrams
Go through Testing
Go through Functions and Procedures
Go through Local and Global Variables
Go through Arrays and 2D Arrays
Go through File Handling
Go through SQL (practice necessary)
LESSON RESOURCES:
[PAST PAPERS]: Computer Science Past Paper Questions and Answers LINK 1
[PAST PAPERS]: Computer Science Past Paper Questions and Answers LINK 2
[PAST PAPERS]: Computer Science Past Paper Questions and Answers LINK 3
Question Type: Identify or list output devices. Guide:
Understand Output Devices: Output devices are hardware that receive data from a computer and present it to the user. Examples include monitors, printers, and speakers.
Common Output Devices: Familiarize yourself with common output devices:
Monitor: Displays visual output from the computer.
Printer: Produces a physical copy of digital documents.
Speaker: Outputs sound from the computer.
Distinguish from Input Devices: Be able to distinguish output devices from input devices (e.g., keyboard, mouse) and storage devices (e.g., hard drive, SSD).
Question Type: Convert binary numbers to hexadecimal. Guide:
Group Binary Digits: Group the binary digits into sets of four, starting from the right. For example, for the binary number 10010011, group it as 1001 0011.
Convert Each Group: Use a binary-to-hexadecimal chart to convert each group:
1001 converts to 9
0011 converts to 3
Combine Results: Write the hexadecimal digits together to get the final answer: 93.
Example: Convert 00001101 to hexadecimal:
Group as 0000 1101
0000 converts to 0
1101 converts to D
Final answer: 0D
Question Type: Perform logical shifts on binary numbers. Guide:
Understand Logical Shifts: A logical right shift moves all bits to the right and fills the leftmost bits with zeros. For example, shifting 01111010 three places to the right results in 00001111.
Shift Bits: Move each bit to the right by the specified number of places.
Fill Zeros: Fill the leftmost bits with zeros.
Example: Perform a logical right shift of three places on 01111010:
Original: 01111010
Shift right by 3: 00001111
Question Type: Explain why hexadecimal is used to represent binary numbers. Guide:
Simplification: Hexadecimal simplifies binary representation by reducing the number of digits. For example, 1111 in binary is F in hexadecimal.
Readability: It is easier for humans to read and understand hexadecimal numbers compared to long binary strings.
Efficiency: It is quicker to write and debug hexadecimal numbers.
Example: Explain that 10101010 in binary is AA in hexadecimal, making it easier to read and write.
Question Type: Describe how text is converted to binary. Guide:
Character Encoding: Explain the use of character encoding schemes like ASCII or Unicode. Each character is assigned a unique binary code.
Binary Representation: For example, the ASCII code for A is 65, which is 01000001 in binary.
Example: Convert the text "Hi" to binary:
H -> ASCII 72 -> Binary 01001000
i -> ASCII 105 -> Binary 01101001
Combined: 01001000 01101001
Question Type: Describe how lossless compression works. Guide:
Data Patterns: Identify and eliminate redundant data patterns. For example, in Run Length Encoding (RLE), AAAA can be compressed to 4A.
Reconstruction: Ensure the original data can be perfectly reconstructed from the compressed data.
Algorithms: Mention common algorithms like RLE.
Example: Explain how AAABBBCC can be compressed to 3A3B2C using RLE.
Question Type: Describe serial and parallel data transmission. Guide:
Serial Transmission: Data is sent one bit at a time over a single channel. It is slower but more reliable over long distances.
Parallel Transmission: Multiple bits are sent simultaneously over multiple channels. It is faster but can suffer from data skew over long distances.
Benefits: Discuss the advantages of each method, such as speed and reliability.
Example: Explain that USB uses serial transmission, while older printer cables use parallel transmission.
Question Type: Describe what is meant by cloud storage. Guide:
Definition: Explain that cloud storage involves storing data on remote servers accessed via the internet.
Advantages: Mention benefits like accessibility, data backup, and scalability.
Disadvantages: Discuss potential issues like security concerns and reliance on internet connectivity.
Example: Describe how services like Google Drive and Dropbox provide cloud storage solutions.
Question Type: Describe the difference between high-level and low-level languages. Guide:
High-Level Languages: Easier to read and write, machine-independent. Examples include Python, Java, and C++.
Low-Level Languages: Closer to machine code, hardware-specific. Examples include Assembly language.
Examples: Provide examples of tasks that are easier in high-level languages (e.g., web development in Python) versus low-level languages (e.g., hardware control in Assembly).
Question Type: Complete statements about cookies. Guide:
Types of Cookies: Differentiate between session and persistent cookies. Session cookies are temporary and deleted when the browser is closed, while persistent cookies remain on the device until they expire or are deleted.
Functions: Explain common uses of cookies, such as tracking user sessions, storing login details, and saving user preferences.
Example: Describe how an online shopping cart uses cookies to remember items added by the user.
Question Type: Draw and annotate a diagram of a DDoS attack. Guide:
Diagram: Show multiple compromised computers (bots) sending requests to a target server.
Annotations: Label the components and describe the process. For example, "Malware downloaded to computers turning them into bots," "Bots send requests to a web server at the same time," "The web server fails due to too many requests."
Example: Explain how a DDoS attack can overwhelm a website, making it unavailable to legitimate users.
Question Type: Describe the characteristics of an IPv4 address. Guide:
Format: Explain the 32-bit structure divided into four octets. For example, 192.168.0.1.
Range: Discuss the range of values for each octet (0-255).
Uniqueness: Mention that each address is unique and can be static or dynamic.
Example: Describe how 192.168.1.1 is a common default IP address for home routers.
Question Type: Identify components of an expert system. Guide:
Components: Mention the knowledge base, inference engine, and user interface.
Inference Engine Role: Describe how it applies rules to the knowledge base to draw conclusions.
Example: Explain how an expert system in medical diagnosis uses symptoms (input) to suggest possible diseases (output).
Question Type: Describe the difference between system software and application software. Guide:
System Software: Manages hardware and provides a platform for applications (e.g., operating system).
Application Software: Performs specific tasks for users (e.g., word processors).
Examples: Provide examples of each type of software:
System Software: Operating systems like Windows, macOS, Linux.
Application Software: Programs like Microsoft Word, Google Chrome, Adobe Photoshop.
Example: Explain how the operating system manages hardware resources, while application software allows users to perform specific tasks.
Question: The table contains five statements about the role of registers in the fetch–decode–execute cycle of a CPU. Identify the incorrect statements and suggest corrections. Guide:
Identify Incorrect Statements: Read each statement carefully and identify any inaccuracies.
Correct the Statements: Use your knowledge of the fetch-execute cycle to correct the statements.
Example: If the statement says "MAR stores the instructions of the program that is running," correct it to "MAR stores addresses, not instructions."
Question: Explain how the number of cores and the amount of cache affect the performance of a CPU. Guide:
Number of Cores:
Explanation: More cores allow a CPU to execute multiple instructions simultaneously, improving performance.
Example: A dual-core processor can handle more tasks at once compared to a single-core processor.
Amount of Cache:
Explanation: More cache allows the CPU to store frequently accessed data closer to the processor, reducing access time and improving performance.
Example: Increasing cache from 8 kB to 64 kB means the CPU can access more data quickly without fetching it from slower RAM.
Question: Describe what is meant by RAM and identify other items stored in ROM. Guide:
RAM:
Description: RAM is volatile memory used to store data and instructions that the CPU needs to access quickly. It is used for currently running programs and processes.
Example: Explain that when you open a program, it is loaded from the hard drive into RAM.
ROM:
Items Stored: Besides start-up instructions, ROM can store firmware and parts of the operating system.
Example: Mention that BIOS is commonly stored in ROM.
Question: Complete the table with OS functions and descriptions. Guide:
Managing Memory:
Description: Allocates memory to processes and ensures that two processes do not access the same memory simultaneously.
Managing Peripherals:
Description: Manages communication between the CPU and peripheral devices, such as printers and keyboards.
Example: Allocates data to buffers and transmits data to hardware.
Question: Explain how the processor manages the current program and an interrupt. Guide:
Interrupt Signal: The interrupt signal is sent to the CPU.
Priority Check: The CPU checks the priority of the interrupt.
Save State: If the interrupt has a higher priority, the CPU saves the current state of the program.
Execute ISR: The CPU executes the interrupt service routine (ISR).
Resume: After handling the interrupt, the CPU resumes the previous program.
Example: Describe how a keyboard interrupt is handled when a key is pressed.
Question: Draw and annotate a diagram showing the process from entering a URL to displaying the web page. Guide:
URL Entry: The user enters the URL in the web browser.
DNS Lookup: The browser sends a request to the DNS server to resolve the URL to an IP address.
Request to Server: The browser sends a request to the web server using the IP address.
Server Response: The web server processes the request and sends the web page data back to the browser.
Display: The browser renders the web page and displays it to the user.
Example: Annotate each step with arrows and labels to show the flow of data.
Question: Complete the description of digital currencies using the provided terms. Guide:
Understand the Context: Digital currencies are accessed electronically and use blockchains for transaction records.
Fill in the Blanks: Use the terms to complete the description accurately.
Example: "A digital currency does not exist physically, it can only be accessed electronically. Some digital currencies have digital ledgers called blockchains."
Question: Explain how sensors, microprocessors, and actuators work together in a self-driving tractor. Guide:
Sensor Data: Sensors continuously send data to the microprocessor.
Comparison: The microprocessor compares the data to predefined thresholds.
Action: If a person is detected within 3 meters, the microprocessor sends a signal to the actuator to stop the tractor.
Example: Describe how an infra-red sensor detects a person and the microprocessor processes this data to stop the tractor.
Question: Describe the role of the self-driving tractor and the farmer’s computer in an echo check. Guide:
Data Transmission: The tractor sends data to the farmer’s computer.
Echo Back: The farmer’s computer sends the same data back to the tractor.
Comparison: The tractor compares the returned data with the original data to check for errors.
Example: Explain how this process ensures data integrity during transmission.
Question: Describe the differences between symmetric and asymmetric encryption. Guide:
Symmetric Encryption:
Shared Key: Uses the same key for both encryption and decryption.
Example: Both sender and receiver must know the key.
Asymmetric Encryption:
Public and Private Keys: Uses a pair of keys – a public key for encryption and a private key for decryption.
Example: The public key is known to everyone, but only the intended recipient knows the private key.
Question: Explain the concept of packet switching. Guide:
Data Packets: Data is broken into packets, each with a header containing the destination address, sender address, and packet number.
Routing: Packets are sent independently through the network and may take different routes.
Reassembly: At the destination, packets are reassembled in the correct order.
Example: Describe how packet switching is used in the internet to transmit data efficiently.
Question: Convert denary to hexadecimal and explain the benefits of using hexadecimal. Guide:
Conversion: Convert the denary number to hexadecimal by dividing by 16 and using the remainder.
Example: Convert 236 to hexadecimal: 236 ÷ 16 = 14 remainder 12, so the result is EC.
Benefits: Hexadecimal is easier for humans to read and write, takes up less space, and reduces the likelihood of errors.