Back to Explore
teach me like i know nothing, COMPUTER SCIENCE 047... Summary & Study Notes
These study notes provide a concise summary of teach me like i know nothing, COMPUTER SCIENCE 047..., covering key concepts, definitions, and examples to help you review quickly and study effectively.
2.2k words2 views
NotesFlashcards
TERM2 REVISION WORKSHEETI.pdf 📝
- This is a revision worksheet for the course labelled "0478 ComputerScience" covering Chapter 4 and Chapter 10 with numbered questions and blank answer slots.
- The file contains placeholders for answers (ANS) but no worked solutions, so it is a prompt to practice and check answers against a textbook or teacher notes.
What this source is for
- Use it as a practice checklist of topics you must be able to answer from Chapters 4 and 10.
- Treat each numbered item as a short test: write the answer, then justify each step.
How to use this worksheet (step-by-step)
- Read a question and identify the underlying topic in one phrase (e.g., "binary conversion", "encryption").
- Recall or look up the atomic definition of the main terms in the question.
- Solve by writing numbered steps or showing arithmetic—never just give a final number.
- Cross-check your answer against the textbook (the other source in these notes) or ask your teacher.
Smallest building blocks to apply to each question
- Ask: what is the input type? (number, binary string, image specs, text)
- Ask: what is the desired output? (binary, hex, checksum, file size)
- List the formulas or methods you need (division method, positional weights, sampling rate × bits × time).
Example approach (applies to most worksheet questions)
- If question is "convert denary to binary":
- Identify the number and required bit-length.
- Use repeated division by 2 or subtract powers of two (choose one method).
- Write final binary with leading zeros if bit-length required.
- If question is "calculate file size":
- Multiply pixels × bits per pixel for images, or sample rate × bit depth × channels × seconds for audio.
- Convert bits to bytes and then to KB/MB using appropriate unit system.
Quick checklist to mark your answers
- Did I show each step? (Yes / No)
- Did I label units and bit-length? (Yes / No)
- Could an off-by-one or overflow error change my answer? (Check range limits)
Key terms to remember from this worksheet
- Revision worksheet — a set of practice questions for exam preparation
- Chapter 4 — (use textbook to map topics)
- Chapter 10 — (use textbook to map topics)
Suggested next action
- Take each blank (ANS) and attempt to solve using the course book section on number systems, encoding, and CPU fundamentals in the companion source.
Computer science Course book.pdf 📘
- This source is a condensed summary of the Cambridge IGCSE/O Level Computer Science Student Book and supporting materials covering data representation, algorithms, programming and computer systems.
- It explains number systems (binary/hex), encoding (text, images, sound), data storage and compression, error detection, encryption, CPU/memory architecture, and embedded systems.
Foundations: what a number system is
- A number system defines symbols and a base that sets the value of each digit position.
- For denary (decimal) the base is 10 and each position represents powers of 10; for binary the base is 2 and positions represent powers of 2.
- binary — uses digits 0 and 1; each bit is a single binary digit.
Two methods to convert denary to binary (small steps)
- Method 1: Subtract powers of two (positional method).
- Find the largest power of 2 ≤ the number (powers: ).
- Subtract it, put 1 in that bit position, repeat with remainder.
- Fill lower unused positions with 0.
- Method 2: Repeated division by 2 (remainder method).
- Divide the number by 2, record remainder (0 or 1).
- Repeat with the quotient until quotient is 0.
- Read remainders in reverse order to get the binary number.
Worked example: convert 59 to binary (both methods)
- Method 1 (powers):
- Largest power ≤ 59 is ; 59−32=27 → bit for is 1.
- Next ≤ 27; 27−16=11 → bit for is 1.
- ≤ 11; 11−8=3 → bit for is 1.
- > 3 → bit for is 0.
- ≤ 3; 3−2=1 → bit for is 1.
- ≤ 1; 1−1=0 → bit for is 1.
- Binary: 00111011 (showing 8 bits).
- Method 2 (division):
- 59 ÷ 2 = 29 rem 1
- 29 ÷ 2 = 14 rem 1
- 14 ÷ 2 = 7 rem 0
- 7 ÷ 2 = 3 rem 1
- 3 ÷ 2 = 1 rem 1
- 1 ÷ 2 = 0 rem 1
- Read remainders upward: 111011 → pad to 8 bits: 00111011
Hexadecimal basics and conversions (small pieces)
- Hex is base 16 using 0–9 then A–F where A=10 to F=15.
- Each hex digit maps exactly to 4 binary bits; group binary in fours from the right to convert easily.
Example: binary → hex
- Binary 11011111 → group: 1101 1111 → hex digits D F → result: DF.
Example: hex → denary
- Hex 1A3 means (1×16^2) + (10×16^1) + (3×16^0) = 256 + 160 + 3 = 419.
Converting denary to hex (division method)
- Repeatedly divide by 16, recording remainders.
- Read remainders in reverse to get hex digits.
Key term to memorize
- hexadecimal — base-16 representation useful for compact binary display.
Binary addition, overflow and carries (stepwise)
- Addition rules: 0+0=0, 0+1=1, 1+1=0 with carry 1, 1+1+1=1 with carry 1.
- If adding two n-bit numbers produces an (n+1)-th bit 1, that is an overflow for fixed n-bit storage.
Example: adding two 8-bit numbers (conceptual)
- If sum > 255 then you will generate a ninth bit and data will not fit into 8 bits.
- Detect overflow by checking the carry out of the most significant bit.
Logical shifts (small concept)
- Shifting left by one moves all bits one place left and fills the rightmost bit with 0; it multiplies the numeric value by 2 if no bits are lost.
- Shifting right divides by 2 (discarding remainder) and fills leftmost with 0 for logical shift.
- Shifting beyond bit-width can discard significant bits and cause errors.
Two's complement representation (stepwise)
- Purpose: represent negative integers in binary with the same addition rules.
- For n-bit two's complement:
- Positive numbers: standard binary representation with left-most bit 0.
- Negative numbers: take absolute value in binary, invert bits, add 1.
- Range for 8 bits: -128 to +127.
Example: convert -18 to 8-bit two's complement
- +18 in binary: 00010010.
- Invert bits: 11101101.
- Add 1: 11101101 + 1 = 11101110.
- So -18 = 11101110 (8-bit two's complement).
Character encoding: ASCII vs Unicode (concise)
- ASCII — standard 7-bit codes for basic English characters; extended ASCII uses 8 bits for extra symbols.
- Unicode — supports many languages and symbols, uses up to 4 bytes per character depending on encoding (e.g., UTF-8 variable length).
Sound representation (small bits)
- Analog sound is sampled at a regular rate; each sample records amplitude with a certain bit depth (resolution).
- File size for PCM audio = sample rate × bit depth × channels × duration (in seconds).
Audio example: compute storage quickly
- For 10 seconds, mono, 16-bit, 44,100 Hz:
- Samples = 44,100 × 10 = 441,000 samples.
- Bits = 441,000 × 16 = 7,056,000 bits.
- Bytes = 7,056,000 ÷ 8 = 882,000 bytes ≈ 861 KB.
Image representation and file size
- Bitmaps store every pixel's color; color depth = bits per pixel (bpp).
- File size (bits) = width × height × bpp. Convert to bytes then KB/MB.
Example: bitmap size
- 4096 × 3072 pixels at 24 bpp:
- Pixels = 4096 × 3072 = 12,582,912.
- Bits = 12,582,912 × 24 = 301,990, (approx) 301,989,888 bits.
- Bytes ≈ 37,748,736 bytes ≈ 36 MB.
Data units and measurements
- Bits and bytes; larger units KB, MB, GB, TB can be SI (1000-based) or binary (1024-based); memory sizes commonly use binary.
Compression: lossy vs lossless (core ideas)
- Lossless compression: original data can be perfectly reconstructed (example: Run-Length Encoding, RLE).
- Lossy compression: reduces file size by discarding some data that is less noticeable (examples: JPEG for images, MP3 for audio).
- lossless compression — use when exact data is required (e.g., text, some images).
RLE (Run-Length Encoding) example and steps
- Replace runs of the same value with a count and the value.
- Example: AAAA B B B C C → 4A 3B 2C.
- Works best with lots of repetition; useless on already random data.
Data transmission and bandwidth
- bandwidth — maximum data transfer rate over a network link, measured in kbps or Mbps.
- Higher bandwidth allows faster transfer of large files but is affected by latency and congestion.
Error detection methods (small pieces)
- Parity check: add a single parity bit to make the number of 1-bits even (even parity) or odd (odd parity); detects single-bit errors.
- Checksums: compute a numeric summary of a block and send it with data; receiver recalculates and compares.
- Echo checks: receiver returns data to sender for comparison; simple but slow.
- Check digits: extra digit calculated from others to detect entry errors (used in barcodes/ISBN).
- ARQ (Automatic Repeat reQuest): receiver sends ACK/NACK; on error sender retransmits.
Example: parity check quick idea
- Byte 1011001 has four 1s; even parity bit would be 0 (keeps total 4 even); if receiver sees odd count it flags error.
Encryption basics (small steps)
- Symmetric encryption: same secret key used for encryption and decryption; fast but key distribution is a challenge.
- asymmetric encryption: uses a public key for encryption and a private key for decryption; keys come in pairs.
Tom & Jane example (step-by-step)
- Jane generates a key pair: public key (shareable) and private key (keep secret).
- Jane sends public key to Tom.
- Tom encrypts the document using Jane's public key and sends ciphertext.
- Jane decrypts using her private key and reads the document.
Error detection vs encryption note
- Error detection ensures data integrity; encryption ensures confidentiality. Both can be used together.
CPU and memory basics (small building blocks)
- MDR (Memory Data Register) — temporarily holds data moving to/from memory.
- MAR (Memory Address Register) — holds the address for the memory operation.
- PC (Program Counter) — holds address of next instruction to fetch.
- System buses:
- Address bus: unidirectional, carries addresses.
- Data bus: bidirectional, carries actual data.
- Control bus: carries control signals (read/write, interrupts).
Fetch–Decode–Execute cycle (numbered steps)
- Fetch: CPU places address from PC into MAR, sends read signal, data returned into MDR.
- Decode: instruction in MDR is decoded by control unit to determine actions.
- Execute: ALU or control signals perform the operation; PC is updated to next instruction.
Factors affecting CPU performance (small list)
- Clock speed (higher → more instructions per second).
- Bus width (wider → more bits transferred at once).
- Cache memory (faster access reduces wait time).
- Number of cores (more cores → parallel tasks but need parallelisable work).
Embedded systems (stepwise idea)
- Definition: a dedicated combination of hardware and software designed to perform a specific task.
- Examples: microcontrollers in washing machines, voting machines, vehicle control units, smart thermostats.
- Trade-offs: efficient and small but can be hard to upgrade or debug.
Practice problems and worked solutions (from the course book examples)
Problem: Convert 59 (denary) to binary
Solution:
- Use division method: 59 ÷ 2 = 29 rem 1; 29 ÷ 2 = 14 rem 1; 14 ÷ 2 = 7 rem 0; 7 ÷ 2 = 3 rem 1; 3 ÷ 2 = 1 rem 1; 1 ÷ 2 = 0 rem 1.
- Read remainders upward: 111011; pad to 8 bits: 00111011.
- Answer: 00111011.
Problem: Convert binary 11011111 to hex
Solution:
- Group bits into fours from right: 1101 1111.
- Convert groups to hex: 1101 = D, 1111 = F.
- Answer: DF.
Problem: Add two 8-bit numbers and show overflow (example)
Given: 11011111 (223) + 10000010 (130). Solution:
- Add decimal values: 223 + 130 = 353.
- 8-bit max unsigned value = 255; 353 > 255 so result needs 9 bits.
- Overflow occurs because the ninth bit would be 1; in 8-bit storage this overflows and low 8 bits only represent 353 − 256 = 97.
- Answer: Overflow detected; stored 8-bit result equals binary of 97 if truncated.
Problem: Compress AAAAABBBBCC using RLE
Solution:
- Count runs: 5 A, 4 B, 2 C.
- RLE result: 5A 4B 2C.
- Answer: 5A4B2C.
Final key terms to review from this source
- two's complement, binary, hexadecimal, asymmetric encryption.
Suggested study path using this source
- Master conversions (denary↔binary↔hex) with both methods and many examples.
- Practice binary arithmetic and detect overflow cases.
- Solve file-size and sampling problems until fast and accurate.
- Learn error-detection methods and run small examples by hand.
- Understand CPU registers and execute the fetch-decode-execute cycle on paper for short programs.
Sign up to read the full notes
It's free — no credit card required
Already have an account?
Continue learning
Explore other study materials generated from the same source content. Each format reinforces your understanding of teach me like i know nothing, COMPUTER SCIENCE 047... in a different way.
Create your own study notes
Turn your PDFs, lectures, and materials into summarized notes with AI. Study smarter, not harder.
Get Started Free