Skip to content

IGCSE计算机 核心笔记

IG CS是一门比较难的学科,因为它的内容非常抽象,只能通过想象进行理解。生活中的例子都没法完美类比CS中的许多概念。而当这些概念需要用英文进行应答时,就会变得更加困难。

学习时建议先确保自己对于概念充分理解,一定要多花时间进行基本框架的构建,然后再使用标准的英语进行解释和定义,记背是必不可少的。这样才能在答题时得到高分。


Course Progress Tracker

Progress 0%

Think of computers as really simple machines that only understand two things: electricity on or off. That’s why binary (just 0s and 1s) is perfect for them. But here’s the thing - humans aren’t great at reading long strings of 0s and 1s. That’s where hexadecimal comes in as our “translator.”

Why Binary?

Here’s how these three number systems relate:

SystemBaseDigitsCommon Use
Denary100-9What humans naturally use
Binary20-1What computers naturally use
Hexadecimal160-9, A-FHuman-friendly representation of binary
Question
Answer

Click to flip • Press Space or Enter

Denary to Binary - Think about place values!

Convert Denary to Binary

Binary to Denary - Just add up the place values where you see a 1!

Convert Binary to Denary

Binary ↔ Hexadecimal - The easy one!

Hexadecimal is just a shorthand for binary. Group binary digits into chunks of 4 (nibbles), since .

Binary to Hex Conversion

Question
Answer

Click to flip • Press Space or Enter

Denary to Hexadecimal - Use division!

Denary to Hex

Binary Addition follows the same rules as denary, but simpler!

Binary Addition Rules

Binary Addition

Logical Binary Shifts - A clever shortcut for multiplication and division by powers of 2.

Question
Answer

Click to flip • Press Space or Enter

Question
Answer

Click to flip • Press Space or Enter

Left Shift Practice

Two’s Complement - Representing Negative Numbers

Section titled “Two’s Complement - Representing Negative Numbers”

Computers need to store negative numbers too. Two’s complement is the clever system they use.

Understanding Two's Complement

Converting Negative Denary to Two’s Complement:

Two's Complement Conversion

Question
Answer

Click to flip • Press Space or Enter


Everything in a computer - words, music, photos - is ultimately just numbers in binary. Here’s how that magic happens:

Question
Answer

Click to flip • Press Space or Enter

Character SetBits per CharacterTotal CharactersWhat It Includes
ASCII7 bits128Basic English letters, numbers, symbols
Unicode16-32 bits100,000+All languages, emojis, special symbols

Sound waves are continuous (analog), but computers are digital. To convert sound to digital:

Sound Digitization

The Quality Trade-off:

FactorHigher ValueResult
Sample RateMore samples/secondBetter accuracy, larger file
Sample ResolutionMore bits/sampleMore precise amplitude, larger file
Question
Answer

Click to flip • Press Space or Enter

Images are made of pixels (picture elements) arranged in a grid.

Image Properties

Calculate Image File Size


Storage Units - The Computer’s Measuring System

Section titled “Storage Units - The Computer’s Measuring System”
UnitSizeRemember This
Bit1 binary digitSmallest unit
Nibble4 bitsOne hex digit
Byte8 bitsOne ASCII character
Kibibyte (KiB)1024 bytes
Mebibyte (MiB)1024 KiB bytes
Gibibyte (GiB)1024 MiB bytes
Tebibyte (TiB)1024 GiB bytes
Question
Answer

Click to flip • Press Space or Enter

Image File Size:

Sound File Size:

Sound File Calculation

Files can be huge. Compression makes them smaller so they’re faster to send and take up less space.

Two Types of Compression

Lossless Compression: Run Length Encoding (RLE)

Instead of storing repeated values, store: value + count.

RLE Practice

Lossy Compression

MethodWhat It DoesUsed For
MP3 AudioRemoves frequencies humans can’t hear wellMusic streaming
JPEG ImagesReduces colour depth and resolution slightlyPhotos on websites

2.1 Types and Methods of Data Transmission

Section titled “2.1 Types and Methods of Data Transmission”

When you send data over the internet, it doesn’t go as one big chunk. Think of it like sending a long letter - you break it into pages, mail them separately, and reassemble them at the destination.

What's in a Packet?

Question
Answer

Click to flip • Press Space or Enter

Routers direct packets along the network, and each packet might take a different route. They arrive potentially out of order, then get reassembled at the destination. Brilliant!

TypeHow It WorksAdvantagesDisadvantagesUsed For
SerialBits sent one after another over one wireReliable over long distancesSlowerUSB, Ethernet, long distances
ParallelMultiple bits sent simultaneously over multiple wiresFaster over short distancesData can desynchronise (skew) over distanceInside CPU, old printer cables
Question
Answer

Click to flip • Press Space or Enter

Think about conversations:

ModeData FlowReal-Life ExampleTechnical Use
SimplexOne direction onlyRadio broadcast (you only listen)Sensor → Monitor
Half-DuplexBoth directions, but one at a timeWalkie-talkie (take turns speaking)-
Full-DuplexBoth directions simultaneouslyPhone call (can interrupt each other)Broadband internet

Why USB is Everywhere


Things can go wrong during transmission - electrical interference, loose cables, cosmic rays (seriously!). We need ways to detect errors.

Add an extra bit to make the total number of 1s either always even or always odd.

Even Parity

MethodHow It WorksStrength
ChecksumCalculate a value from all the data (e.g., sum of bytes), send it alongDetects multiple errors better than parity
Echo CheckReceiver sends data back, sender comparesVery reliable but doubles transmission time
Check DigitSpecial digit calculated from others using an algorithmUsed in barcodes, ISBNs
Question
Answer

Click to flip • Press Space or Enter

Automatic Repeat Query (ARQ) - Error Correction

Section titled “Automatic Repeat Query (ARQ) - Error Correction”

This is the full protocol for guaranteeing error-free transmission:

ARQ Protocol Steps


Imagine sending a postcard versus sending a sealed letter. Encryption is like that sealed envelope - it scrambles data so only the intended recipient can read it.

Question
Answer

Click to flip • Press Space or Enter

Pros: Fast, efficient

Cons: How do you securely share the key in the first place? That’s the key distribution problem!

The clever solution: use two different keys!

Public & Private Keys

Understanding Asymmetric Encryption


The CPU is the “brain” of the computer - it processes all instructions and data. Every calculation, every decision, every operation goes through here.

Question
Answer

Click to flip • Press Space or Enter

These components work together in a beautiful choreographed dance to execute programs:

Registers (tiny, super-fast storage inside the CPU):

RegisterFull NameWhat It Stores
PCProgram CounterAddress of the next instruction
MARMemory Address RegisterAddress in RAM being accessed right now
MDRMemory Data RegisterData being transferred to/from RAM
CIRCurrent Instruction RegisterInstruction currently being decoded/executed
ACCAccumulatorResults of calculations from ALU

Processing Units:

CPU Core Components

Buses (highways for data inside the computer):

BusCarriesDirection
Address BusMemory addressesCPU → RAM (one-way)
Data BusActual data/instructionsBoth ways (two-way)
Control BusControl signals (read, write, clock)Both ways (two-way)
Question
Answer

Click to flip • Press Space or Enter

This happens billions of times per second in your computer. Every single instruction goes through these three stages:

FDE Cycle Steps

Detailed FDE Steps:

FETCH:

  1. PC holds the address of next instruction
  2. Copy address from PC to MAR (via Address Bus)
  3. Instruction at that address copied into MDR (via Data Bus)
  4. Instruction from MDR copied to CIR
  5. PC incremented (points to next instruction)

DECODE: 6. CU decodes the instruction in CIR (Is it ADD? LOAD? JUMP?)

EXECUTE: 7. CU sends control signals to execute the instruction 8. ALU performs operation if needed, stores result in ACC

Trace the FDE Cycle

Performance Factors

Question
Answer

Click to flip • Press Space or Enter

Question
Answer

Click to flip • Press Space or Enter

Different CPUs can have different instruction sets (like different languages). That’s why a program compiled for an Intel CPU might not work on an ARM CPU.

Not all computers are PCs! Many devices have specialized computers inside them.

Embedded Systems Characteristics

Examples:

  • Washing machines (control cycles and timing)
  • Cars (Engine Management System, ABS, airbags)
  • Digital cameras (image processing)
  • Smart home devices (thermostats, security cameras)
  • Microwave ovens (timing and power control)

Identify Embedded vs General-Purpose


Key Takeaways

Exam Prep Checklist

Progress 0%