CAIE-A2 Level-Computer Science - Theory
CAIE-A2 Level-Computer Science - Theory
ORG
CAIE A2 LEVEL
COMPUTER SCIENCE
SUMMARIZED NOTES ON THE THEORY SYLLABUS
Prepared for Viduranga for personal use only.
CAIE A2 LEVEL COMPUTER SCIENCE
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Viduranga at Royal Institute on 09/12/24.
CAIE A2 LEVEL COMPUTER SCIENCE
e.g.
TYPE Season = (Summer,Winter,Autumn,Spring) // No Use the diagram to state the current values of the following
Su
expressions.
it
IPointer: 4402 // This is the address that IPointer is pointing
DECLARE ThisSeason : Season
to.
DECLARE NextSeason : Season IPointer^: 33 //This is the value stored at the address (4402)
the IPointer is pointing to.
ThisSeason <-- Autum
@MyInt1: 3427 //This is the address of MyInt1
NextSeason <-- ThisSeason + 1 // NextSeason is se
IPointer^ = MyInt2 : TRUE //This compares the value of
MyInt2 to the value stored at the address (4402)
Pointer Data Type: used to reframe a memory location. Write pseudocode statements that will achieve the
It may be used to construct dynamically varying data following.
structures. The pointer definition has to relate to the
type of the variable being pointed to(it doesn’t hold a 1. Place the address of MyInt2 in the IPointer.
value but a reference/address to data). In type IPointer <-- @MyInt2
declaration, ^ shows that the TYPE being declared is a 2. Assign the value 33 to the variable MyInt1.
Pointer, and is the data type found at the memory MyInt1<-- 33
location, e.g. STRING. 3. Copy the value of MyInt2 into the memory
location currently pointed at by the IPointer.
TYPE <PointerName> = ^<Typename> IPointer^ <-- MyInt2
e.g
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Viduranga at Royal Institute on 09/12/24.
CAIE A2 LEVEL COMPUTER SCIENCE
Sequential files are records ordered and suited for long-
A text file contains data stored according to a defined term data storage and thus are considered an alternative to
character code defined by ASCII or Unicode. A text file a database. A key field is required to order a sequential file
can be created using a text editor. for which the values are unique and sequential—this way, it
A binary file is a file designed for storing data to be used can be easily accessed.
by a computer program(0's and 1's). It stores data in its
internal representation(an integer value might be stored A sequential database file is more efficient than a text file
in 2 bytes in 2's complement representation to represent due to data integrity, privacy and less data redundancy. A
a negative number), and this file is created using a change in one file would update any other files affected.
specific program. Its organisation is based on records (a Primary keys from the DBMS(database management
collection of fields containing data values). file → records system) must be unique but not ordered, unlike the key
→ fields → values field from the sequential files, which must be ordered
and unique.
Methods of File Organisation and Access A particular record is found by sequentially reading the
key field's value until the required value is found. New
Proper file organisation is crucial as it determines access records must be added to the file in the correct place.
methods, efficiency, flexibility, and storage devices.
Advantages of sequential file organisation
Serial files: contains records that have no defined order. A
text file may be a serial file with repeating lines defined by The sorting makes it easy to access records but does not
an end-of-line character(s). Records are stored, one after remove the need to access other records as the search
another, in the order they were added to the file. New looks for particular records.
records are added at the end of the file. The binary search technique can reduce record search
time by half the time.
There's no end of record character. A record in a serial
file must have a defined format to allow data to be input File Access
and output correctly. To access a specific record, it has to
go through every record until found. Records in this type of file are searched using the Sequential
Serial file organisation is frequently utilised for Access and Direct Access methods.
temporarily storing transaction files that will eventually
be moved to more permanent storage. Retrieving records using Sequential Access:
Successively read the value In the key field until the
Advantages of serial file organisation required key is found or the key field of the current
record being checked is greater than the key field
The task at hand is straightforward. searched for. (This would mean the required record
The cost is low. is not in the file).
The rest of the file does not need to be searched as the
Disadvantages of serial file organisation
records are sorted on ascending key field values. This
It becomes difficult to access because you must access method is efficient when every record in the file needs to
all proceeding records before retrieving the one being be processed.
searched.
It cannot support modern high-speed requirements for Retrieving records using Direct Access:
quick record access. This method finds the required record without reading
File access: Records in this file type are searched using other records in the file. This allows the retrieval of
Sequential Access. Successively read record by record records more quickly. An index of all the key fields is kept
until the required data is found or the whole file has and used to look up the address of the file location
been searched, and the required data is not found, thus where the required record is stored.
prolonging the process. Uses: This method is efficient when an individual record in the
Batch processing file needs to be processed.
Backing up data on magnetic tape
Banks record transactions involving customer accounts To edit/delete data:
every time there is a transaction.
Sequential Files
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Viduranga at Royal Institute on 09/12/24.
CAIE A2 LEVEL COMPUTER SCIENCE
Create a new version of the file. Data is copied from the The value in the key field is submitted to the hashing
old file to the new file until the record is reached, which algorithm, which then provides the same value for the
needs editing or deleting. position in the file that was provided when the algorithm
For deleting, reading and copying the old file, continue was used at the time of data input. It goes to that hashed
from the next record. If a record has been edited, the position and through another short linear search
new version is written to the new file and the remaining because of collisions in the hashed positions—fastest
records are copied to the new file. access.
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Viduranga at Royal Institute on 09/12/24.
CAIE A2 LEVEL COMPUTER SCIENCE
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Viduranga at Royal Institute on 09/12/24.
CAIE A2 LEVEL COMPUTER SCIENCE
For negatives, use 2's complement. Saves space by storing many numbers using the smallest
When implementing the floating point representation, a bytes possible.
decision must be made regarding the number of bits to Normalization reduces the representation of leading
use and how many for the mantissa and exponent. zeros or ones.
Usually, the choice for the total number of bits will be Maximizing the precision or accuracy of the number for
provided as an option when the program is written. the given number of bits.
However, the floating point processor will determine the Allows for the precise storage of both very large and very
split between the two parts. small numbers.
If there were a choice, it's convenient to note that Avoids the possibility of many numbers having multiple
increasing the number of bits for the mantissa would representations.
give better precision but leave fewer bits for the
exponent, thus reducing the range of possible values and Precision vs Range.
vice versa. For maximum precision, it is necessary to
normalise a floating point number. Increasing the number of bits for mantissa increases the
Optimum precision will only be made once full use is precision of the number.
made of the bits in the mantissa, therefore using the The number range can be increased by increasing the
largest possible magnitude for the value the mantissa number of bits for exponent.
represents. Precision and range will always be a trade-off between
Also, the two most significant bits must differ—0 1 for the mantissa and exponent size.
positives and 10 for negatives.
They both equal two, but the second one with the higher
bits in the mantissa is the most precise.
0.125 * 2^4 = 2 0 001 0100
0.5 * 2^2 = 2 0 100 0010
-For negatives.
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Viduranga at Royal Institute on 09/12/24.
CAIE A2 LEVEL COMPUTER SCIENCE
Peer-to-peer File Sharing Data is split into multiple packets and each packet a
route is calculated for each packet.
BitTorrent uses Peer-To-Peet file sharing model. Each packet contain a header, which has a source IP
A BitTorrent client software is made available to the address and destination IP address, and a payload.
public. Calculates the most efficient path for each packet.
Swarm: All connected peer computers that have all or Used when sending large files that don’t need to be live
parts of file being downloaded/uploaded. streamed or when it is necessary to be able to overcome
Tracker: A central server that stores information on faulty lines by rerouting like emails, text messages,
which computers have which files and which parts of sending documents, etc.
those files. It also shares the IP addresses of computers Harder to intercept as new route is used each time.
to allow them to connect to each other. Packets need to be reassembled.
Seed: is the peer computer that uploads the file that is If there’s a missing packet, a request is sent to retransmit
being downloaded. the data.
If a user wishes to join this network, they need to use a Role of Router:
BitTorrent client to load the torrent descriptor file. When a
user wishes to download a file, pieces of this file are Examines the header and finds the destination IP
downloaded and uploaded at the same time. When a user address.
has even a single piece of a file they become a seed. To be Decides the best route for the packet, with the help of
able to download this file, a complete copy needs to exist on the information from the routing table, and sends it
one of the peer computers. towards the next hop.
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Viduranga at Royal Institute on 09/12/24.
CAIE A2 LEVEL COMPUTER SCIENCE
Many different instruction formats which means that Used extensively in RISC processor-based systems to
different instructions can take a different number of reduce the time taken to run processes
clock cycles to be executed. Allows several instructions to be executed
Programmable CU. simultaneously therefore increasing the rate at which the
Uses few registers. CPU processes instructions.
Relies a lot on cache memory rather than RAM. Each instruction is divided into 5 parts:
Cache isn’t split between data and instructions. 1. Instruction Fetch (IF)
2. Instruction Decode (ID)
Reduced Instruction Set Computer (RISC) 3. Operand Fetch (OF)
4. Instruction Execute (IE)
Instructions executed in a single clock cycle as the 5. Write Back (WB)
instructions are simple and have a fixed length. During each clock cycle, each subtask is completed.
Hardwired CU. For example, when one instruction is being decoded,
Makes use of many registers. another one is being fetched in the same cycle.
Doesn’t rely on cache as much compared to RAM. No two instructions can execute the same subtask in the
Cache split between data and instructions. same cycle; only one instruction can be decoded at a
time.
Comparison
Interrupt handling
RISC CISC
Instruction complexity Simple Complex As soon as the interrupt is detected, the current
Instruction Length Fixed Variable processes are paused and moved into registers
Instruction Amount Few Many The ISR (Interrupt Service Routine) is loaded onto the
Instruction Formats Few Many pipeline and is executed.
Can be pipelined Yes No When the interrupt has been serviced, the paused
Addressing modes Few Many processes are resumed by bringing them back from the
Circuit Complexity Less complex Complex registers to the pipeline
Register use High Low RISC processors allow for providing efficient pipelining.
Memory reliance Relies on RAM Relies on cache
Pipelining is instruction-level parallelism. Its underlying
principle is that the fetch-decode execute cycle can be
Is cache split Yes No
separated into several stages.
Control unit Hardwired Programmable
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Viduranga at Royal Institute on 09/12/24.
CAIE A2 LEVEL COMPUTER SCIENCE
Pros Cons
Parallel computers with many processors execute the Performance of the guest
same instruction set using different data sets and do so Multiple operating systems can might not be accurate if it were
sequentially. be run on the same device. to be run individually as there
Can take advantage of pipelining. is a greater load on the host.
Commonly used to process 3D graphics. Cannot emulate certain
A virtual machine can crash hardware as the hardware may
Multiple Instruction Stream Single Data Stream without affecting the host. have been developer after the
virtual machine.
(MISD)
Virtual machine may be
Can run legacy software by
Parallel computers with many processors execute affected by the weakness of
running it on the guest OS.
the host.
different instructions using the same data set.
Can test software for different
Used to sort large quantities of data. platforms on the same device Greater maintenance cost as
without needing to purchase you have to maintain host and
Multiple Instruction Stream Multiple Data Stream hardware for the second guest OS.
(MIMD) system.
Register use High
Many processors execute different instructions using Memory reliance Relies on RAM
different data sets.
All processors work independently.
Commonly used in parallel computer systems. 4. Hardware and Virtual
Massively Parallel Computers Machines
A large number of computer processors that are connected
together simultaneously performing a set of coordinated 4.1. Logic Gates & Circuit Design
instructions. As the computers are connected together, they
communicate over the network by sending messages. Logic Gates: A component of a logical circuit that can
One hardware issue faced by these computers is that perform a Boolean operation (logical function).
processors need to communicate with each other to be able
AND Gate: A.B = X
to transfer data between them. One software issue faced by
these computers is that there needs to be an algorithm that A B X
splits the data between them for efficient processing. 0 0 0
When an app is being made for these computers, it needs to 0 1 0
be able to split the code to allow for simultaneous execution 1 0 0
rather than sequential.
1 1 1
OR Gate: A + B = X
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Viduranga at Royal Institute on 09/12/24.
CAIE A2 LEVEL COMPUTER SCIENCE
A B Output
0 0 0
0 1 1
1 0 1
1 1 1
NOR Gate: A + B = X
A B Output
0 0 1
0 1 0
1 0 0
NOT Gate: A = X 1 1 0
A Output
0 1
1 0
A B Output
0 0 0
NAND Gate: A.B = X 0 1 1
1 0 1
A B Output
1 1 0
0 0 1
0 1 1
1 0 1
1 1 0
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Viduranga at Royal Institute on 09/12/24.
CAIE A2 LEVEL COMPUTER SCIENCE
Double Complement: A = A
Identity Law
1.A = A
0+A = A
Null Law
0.A = 0
1+A = 1
Idempotent Law
A.A = A
A+A=A
Inverse Law
A.A = 0
Logic circuits: A circuit that performs logical operations
A+A = 1
on symbols.
Commutative Law
Sequential circuit: a circuit whose output depends on
the input and previous output values. E.g.: - Flip-flops A.B = B.A
(Section 3.3.4) A+B = B+A
Combinational circuit: a circuit whose output is Associative
dependent only on the input values (A.B).C = A.(B.C)
Half-Adder: A logic circuit that adds two bits together (A + B) + C = A + (B + C)
and outputs their sum. Distributive Law
A + B.C = (A + B).(A + C)
A. (B + C ) = A.B + A.C
Adsorption
A. (A + B ) = A
A + A.B = A
De Morgan’s Law
(A.B ) = A + B
(A + B) = A.B
{example}
Input Output
A B S C
0 0 0 0
0 1 1 0
1 0 1 0
1 1 0 1
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Viduranga at Royal Institute on 09/12/24.
CAIE A2 LEVEL COMPUTER SCIENCE
Examples
4.4. Flip-Flops
Flip flops can store a single bit of data as 0 or 1
Computers use bits to store data.
Flip-flops can be used to store bits of data.
Memory can be created from flip-flops.
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Viduranga at Royal Institute on 09/12/24.
CAIE A2 LEVEL COMPUTER SCIENCE
Virtual memory:
No need for all pages to be in memory
CPU address space is thus larger than physical space
Addresses resolved by the memory management
unit
Benefits
Not all of the program has to be in memory at
once
Large programs can be run with or without large
physical memory
JK Flip Flops Process
All pages on the disk initially
JK flip flops are an improvement over SR flip flops. One/more loaded into memory when process
Invalid input combinations are eliminated in JK flip flops. ‘ready’
All four combinations of input values (J and K) are valid in Pages replaced from disk when needed
JK flip-flops. This can be done with a FIFO queue or usage-
JK flip flops use a clock pulse for synchronization to statistics-based algorithm
ensure proper functioning. Disk thrashing: Perpetual loading/unloading of pages
Advantages of JK flip flops include the validity of all input due to a page from disk immediately requiring the page
combinations, avoidance of unstable states, and it replaced.
increased stability compared to SR flip flops.
5.2. OS Structure
An OS has to be structured to provide a platform for
resource management and facilities for users. The logical
structure provides 2 modes of operation:
1. The user mode is the one available for the user or an
application program.
2. Privileged/kernel mode has the sole access to parts
of the memory and to certain system functions that
the user mode can’t access.
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Viduranga at Royal Institute on 09/12/24.
CAIE A2 LEVEL COMPUTER SCIENCE
For interpreters:
Analysis and code generation run for each code line Compilers use RPN because any expression can be
as above processed from left to right without backtracking.
Each line is executed as soon as the intermediate
code is generated Advantages of RPN
5.4. Syntax Diagrams and BNF ● RPN expressions do not need brackets, and there is no
need for the precedence of operators
BNF is a formal mathematical way of defining syntax ● RPN is simpler for a machine to evaluate
unambiguously. ● There is no need for backtracking in evaluation as the
It consists of: operators appear in the order required for computation and
can be evaluated from left to right
A set of terminal symbols
A set of non-terminal symbols Infix to Reverse Polish Notation
A set of production rules
6. Security
6.1. Asymmetric Keys and Encryption
Methods
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Viduranga at Royal Institute on 09/12/24.
CAIE A2 LEVEL COMPUTER SCIENCE
Plain text: data before encryption. 1. The process starts with original data, plaintext,
Cipher text: the result of applying an encryption whatever form it takes.
algorithm to data. 2. This is encrypted by an encryption algorithm, which
Encryption: the making of cipher text from plain text. uses a key.
Encryption can be used: 3. The product of the encryption is ciphertext, which is
When transmitting data over a network. transmitted to the recipient.
It is a routine procedure when storing data within a 4. When the transmission is received, it is decrypted
computing system. using a decryption algorithm and a key to produce
Public key: A key that is shared between the user and the original plaintext.
sender for encryption of the data and verifying digital
signatures. Security concerns relating to a transmission:
Private key: A key which is kept to be a secret and used
Confidentiality: only the intended recipient should be
to decrypt data the data encrypted by the public key. able to decrypt the ciphertext.
Symmetric key encryption: when there is just one key Authenticity: the receiver must be confident who sent
used to encrypt and then decrypt. The sender and the the ciphertext.
receiver of a message share the secret key. Integrity: the ciphertext must not be modified during
Asymmetric encryption is when two different keys
transmission.
are used, one for encryption and another for Non-repudiation: neither the sender nor the receiver
decryption. Only one of these is a secret. should be able to deny involvement in the transmission.
Sending a private message: Availability: nothing should happen to prevent the
receiver from receiving the transmission.
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Viduranga at Royal Institute on 09/12/24.
CAIE A2 LEVEL COMPUTER SCIENCE
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Viduranga at Royal Institute on 09/12/24.
CAIE A2 LEVEL COMPUTER SCIENCE
Machine Learning
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Viduranga at Royal Institute on 09/12/24.
CAIE A2 LEVEL COMPUTER SCIENCE
Machine learning is a field of artificial intelligence in which A graph is an abstract datatype that contains a collection of
computers learn from provided data and past experiences in nodes. These nodes are connected to each other with edges.
order to improve its performance in a given task without A node usually has a name, and an edge usually has a
explicitly being programmed to know how to do the task. For numerical value.
example, rather than telling the computer that emails that One example of graphs is A* or Dijkstra's algorithm. The
advertise free products are most likely scams we feed it a lot nodes represent locations, and the edges represent the
of data and it identifies that pattern on its own. distance between them.
Deep Learning
A subset of machine learning that simulates the decision
making and data processing abilities of the human brain.
Benefits:
Reinforcement Learning
Reinforcement learning allows the computers to make
Use of Graphs
decisions that maximize the reward, it is then graded based
on how well it performed. Over time the computer learns Graphs provide relationships between different nodes.
the correct decisions it needs to make based on its past Allows AI problem to be defined as the most efficient
experiences. route between two nodes
Analyzed by machine learning algorithms such as A* to
Supervised Learning perform calculations
Graphs can also be used to represent neural networks.
In supervised learning the computer is fed labelled test data,
and it identifies the patterns that led to the data being A* and Dijkstra’s Algorithm
labelled in a specific way. This allows it to then predict labels
for new unseen data. These algorithms are used to find the shortest route
between two nodes based on the distance.
Unsupervised Learning The main issue with Dijkstra's algorithm is that it is
inefficient when searching for the shortest path.
In unsupervised learning the computer is fed unlabeled test
Dijkstra's algorithm is A* but if the heuristic value was
data, and it identifies hidden patterns.
always 0.
Back Propagation of Errors Using these algorithms
An algorithm identifies errors with the machine learning and
h is the heuristic value
is then used to adjust the model for improved accuracy by
g is the movement cost
starting at the output layer and working backwards through
F is the sum of g and h values.
the hidden layers to the input layer.
For example, if you threw a ball and missed your target.
You'd check how far off you were from the target and then
adjust things like angle and strength the next time you threw
the ball.
Regression
Regression is finding a mathematical function that best fits
out output data based on the previous results in order to
predict the future value.
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Viduranga at Royal Institute on 09/12/24.
CAIE A2 LEVEL COMPUTER SCIENCE
Python:
Opening a file
variable = open(“filename”, “mode”)
Where the mode can be:
Mode Description
It opens a file for reading only. The pointer is placed
r
at the beginning of the file.
It opens a file for writing only. Overwrites file if file
w
8. Further Programming a
exists or creates a new file if it doesn’t
Opens a file for appending. Pointer at the end of the
file if it exists or creates a new file if not
8.1. Programming Paradigms
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Viduranga at Royal Institute on 09/12/24.
CAIE A2 LEVEL COMPUTER SCIENCE
*Special Case: If the records in a sequential file are of a fixed
Reading a file: length, a record can be retrieved using its relative position.
Read all characters So, the start position in the file could be calculated for the
variable.read() record with the key number 15, for example.
Read each line and store it as a list
variable.readlines() Add a new record – Serial Organisation:
Writing to a file:
Write a fixed sequence of characters to file
variable.write(“Text”)
Write a list of strings to file
variable.write[“line1”, “line2”, “line3”]
Using direct access or Random File allows us to read Add a new record – Sequential Organisation:
records directly. ‘random’ is misleading since records are
*Some file processing tasks, like this one, require two files
still systematically read from and written to the file.
because serial/sequential files can only be opened to read
Pseudocode: from or write to in the same session.*
CLOSE <filename>
Algorithms for File Processing Operations for Serial and
Sequential Files:
Display all records:
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Viduranga at Royal Institute on 09/12/24.
CAIE A2 LEVEL COMPUTER SCIENCE
Python example of Sequential File Handling:
Python:
Python:
Delete a record:
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Viduranga at Royal Institute on 09/12/24.
CAIE A2 LEVEL COMPUTER SCIENCE
Compiler Interpreter
Directly executes/performs
Translates source code (e.g.
instructions written in a
Python code) into machine
programming language by
code, which can be run and
translating one statement at a
executed by the computer
time.
It takes significant time to
It takes less time to analyze the
analyze the source code, but
source code, but the execution
the overall execution time is
time is slower.
comparatively faster.
Generates intermediate objectNo intermediate object code is
code, which further requires
generated; hence, it is memory
linking and more memory. efficient.
It generates the error message Continues translating the
only after scanning the whole
program until the first error is
program. Hence, debugging is met, in which case it stops.
comparatively complex. Hence, debugging is easy.
Programming languages like
Programming languages like C
Python and Ruby use
and C++ use compilers.
interpreters.
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Viduranga at Royal Institute on 09/12/24.
CAIE A2 LEVEL COMPUTER SCIENCE
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Viduranga at Royal Institute on 09/12/24.
CAIE A2 Level
Computer Science
© ZNotes Education Ltd. & ZNotes Foundation 2024. All rights reserved.
This version was created by Viduranga on Mon Dec 09 2024 for strictly personal use only.
These notes have been created by Ashmit Bhola for the 2024-2025 syllabus.
The document contains images and excerpts of text from educational resources available on the internet and printed books.
If you are the owner of such media, test or visual, utilized in this document and do not accept its usage then we urge you to contact us
and we would immediately replace said media. No part of this document may be copied or re-uploaded to another website.
Under no conditions may this document be distributed under the name of false author(s) or sold for financial gain.
"ZNotes" and the ZNotes logo are trademarks of ZNotes Education Limited (registration UK00003478331).