Cambridge IGCSE Computer Science 0478 Syllabus Vocabulary Flashcards
Cambridge IGCSE Computer Science 0478 Syllabus Overview (2023, 2024, 2025)
1. Introduction
- The Cambridge IGCSE Computer Science 0478 syllabus is designed for examinations in 2023, 2024, and 2025. Exams are available in June and November series, and in March series for India only.
- Cambridge International prepares students for life by fostering curiosity and a passion for learning. It's part of the University of Cambridge.
- The Cambridge Pathway offers a structured educational journey from ages 5 to 19, allowing schools to tailor the curriculum.
- The program helps students discover abilities, explore the world, and develop essential life skills for success in education and employment.
- Cambridge programs and qualifications are created by subject experts, grounded in academic rigor, and informed by the latest educational research.
- The mission is to provide educational benefit through international programs and qualifications and to be a global leader in the field.
- Cambridge aims to develop confident, responsible, reflective, innovative, and engaged learners.
- Nearly a million Cambridge students from 10,000 schools in 160 countries prepare for their future using the Cambridge Pathway.
- Cambridge International is committed to exceptional quality, with its quality management system certified to ISO 9001:2015.
- UCLES (University of Cambridge Local Examinations Syndicate) holds the copyright on all its publications. Registered centers can copy material for internal use but need permission for third-party materials.
2. Why Choose This Syllabus?
- Cambridge IGCSE is a popular international qualification for 14-16 year olds, taught in over 4800 schools across 150+ countries.
- The curriculum balances thorough knowledge with the skills needed for further education or employment.
- Cambridge IGCSE Computer Science provides a foundation in computational thinking and programming.
- Learners appreciate automated/emerging technologies and their benefits, developing problem-solving skills using algorithms and high-level programming languages.
- Technical skills, including testing and evaluation, are developed.
- The syllabus encourages learners to be:
- Confident: Interested in computer science and using technical language.
- Responsible: Working systematically and safely with technology.
- Reflective: Learning from experiences and understanding technology's impact.
- Innovative: Solving problems and designing programs creatively.
- Engaged: Keen to develop skills and understand technology's advancements.
- Cambridge IGCSE qualifications are internationally recognized and provide a pathway for further studies.
3. International Recognition and Acceptance
- Cambridge’s expertise in curriculum, teaching, learning, and assessment facilitates the recognition of its programs globally.
- Cambridge IGCSE Computer Science provides a solid foundation for further study.
- Grades A* to C prepare students for courses like Cambridge International AS & A Level Computer Science.
- Cambridge IGCSEs are valued by universities and employers as evidence of academic achievement.
- Many universities require a combination of Cambridge International AS & A Levels and Cambridge IGCSEs (or equivalent) for entry.
- UK NARIC has benchmarked Cambridge IGCSE to be comparable to the reformed GCSE in the UK, ensuring recognition by universities worldwide.
4. Support for Teachers
- Cambridge provides a range of resources, guidance, and training for teachers to prepare students for Cambridge IGCSE.
- The School Support Hub is a secure online site for teachers with resources and online discussion forums.
- Resources include:
- Endorsed resources, online forums, coursework support.
- Candidate Results Service, examiner reports, Results Analysis.
- Example candidate responses, learner guides, past papers.
- Schemes of work, specimen papers, syllabuses, teacher guides.
- Teachers can sign up for email notifications about syllabus changes.
- Professional development includes introductory, extension, and enrichment training, as well as Cambridge Professional Development Qualifications.
- Comprehensive support and guidance is available for Cambridge exams officers.
5. Syllabus Overview: Aims
The aims are to enable students to develop:
- Computational thinking skills.
- An understanding of problem-solving using computers.
- Skills to solve computer-based problems using a high-level programming language.
- An understanding of computer system components and their interrelation.
- An understanding of the internet and its risks.
- An understanding of automated/emerging technologies.
- Cambridge Assessment International Education maintains political neutrality and treats all aspects of the exam process neutrally.
6. Content Overview
Candidates study the following topics:
- Computer Systems
- Data representation
- Data transmission
- Hardware
- Software
- The internet and its uses
- Automated and emerging technologies
- Algorithms, Programming and Logic
- Algorithm design and problem-solving
- Programming
- Databases
- Boolean logic
7. Assessment Overview
- All candidates take two components and are eligible for grades A* to G.
- Paper 1: Computer Systems
- 1 hour 45 minutes
- 75 marks, 50% of total grade
- Short-answer and structured questions
- Topics 1–6 of the subject content
- All questions are compulsory
- No calculators allowed
- Externally assessed
- Paper 2: Algorithms, Programming and Logic
- 1 hour 45 minutes
- 75 marks, 50% of total grade
- Short-answer and structured questions and a scenario-based question
- Topics 7–10 of the subject content
- All questions are compulsory
- No calculators allowed
- Externally assessed
8. Assessment Objectives
The assessment objectives (AOs) are:
- AO1: Demonstrate knowledge and understanding of computer science principles and concepts.
- AO2: Apply knowledge and understanding to a given context, including analysis and design of computational/programming problems.
- AO3: Provide solutions to problems by evaluating computer systems, making reasoned judgements, and presenting conclusions.
Weighting for assessment objectives:
| Assessment objective | Weighting in IGCSE % | Paper 1 | Paper 2 |
|---|---|---|---|
| AO1 | 40 | 60 | 20 |
| AO2 | 40 | 20 | 60 |
| AO3 | 20 | 20 | 20 |
| Total | 100 | 100 | 100 |
- AO Distribution:
- AO1: 40% Overall (60% in Paper 1, 20% in Paper 2)
- AO2: 40% Overall (20% in Paper 1, 60% in Paper 2)
- AO3: 20% Overall (20% in Paper 1, 20% in Paper 2)
9. Subject Content
- The syllabus allows flexibility in designing a course that suits learners' interests and challenges.
- Resources and examples should align with learners’ age, culture, and learning context, and should comply with school policies and legal requirements.
- Computer science is a practical subject; practical exercises are essential.
- Learners should develop computational thinking skills through problem-solving and programming.
- Learners should write, execute, test, and debug their own programs.
- Equipment and facilities should be adequate for learners to meet syllabus requirements.
- Hardware facilities must allow sufficient time for programming practice.
- Learners need access to a system with direct-access file capability and hardcopy facilities.
9.1. Computer Systems
1. Data Representation
1.1. Number Systems
Candidates should be able to:
- Understand why computers use binary to represent all data.
- Any form of data needs to be converted to binary to be processed by a computer
- Data is processed using logic gates and stored in registers
- Understand the denary, binary and hexadecimal number systems and convert between them.
- Denary is a base 10 system
- Binary is a base 2 system
- Hexadecimal is a base 16 system
- Values used will be integers only
- Conversions in both directions, e.g. denary to binary or binary to denary
- Maximum binary number length of 16-bit
- Understand how and why hexadecimal is used as a beneficial method of data representation.
- Areas within computer science that hexadecimal is used should be identified
- Hexadecimal is easier for humans to understand than binary, as it is a shorter representation of the binary
- Add two positive 8-bit binary integers and understand the concept of overflow.
- A + B
- An overflow error will occur if the value is greater than 255 in an 8-bit register
- A computer or a device has a predefined limit that it can represent or store, for example 16-bit
- An overflow error occurs when a value outside this limit should be returned
- Perform a logical binary shift on a positive 8-bit binary integer and understand the effect this has on the positive binary integer.
- Perform logical left shifts
- Perform logical right shifts
- Perform multiple shifts
- Bits shifted from the end of the register are lost and zeros are shifted in at the opposite end of the register
- The positive binary integer is multiplied or divided according to the shift performed
- The most significant bit(s) or least significant bit(s) are lost
- Use two’s complement to represent positive and negative 8-bit binary integers.
- Convert a positive binary or denary integer to a two’s complement 8-bit integer and vice versa
- Convert a negative binary or denary integer to a two’s complement 8-bit integer and vice versa
1.2. Text, Sound, and Images
Candidates should be able to:
- Understand how and why a computer represents text and the use of character sets (ASCII and Unicode).
- Text is converted to binary to be processed by a computer
- Unicode allows for a greater range of characters and symbols than ASCII, including different languages and emojis
- Unicode requires more bits per character than ASCII
- Understand how and why a computer represents sound, including the effects of the sample rate and sample resolution.
- A sound wave is sampled for sound to be converted to binary, which is processed by a computer
- The sample rate is the number of samples taken in a second
- The sample resolution is the number of bits per sample
- The accuracy of the recording and the file size increases as the sample rate and resolution increase
- Understand how and why a computer represents an image, including the effects of the resolution and color depth.
- An image is a series of pixels that are converted to binary, which is processed by a computer
- The resolution is the number of pixels in the image
- The color depth is the number of bits used to represent each color
- The file size and quality of the image increases as the resolution and color depth increase
1.3. Data Storage and Compression
Candidates should be able to:
- Understand how data storage is measured.
- Including:
- bit
- nibble
- byte
- kibibyte (KiB)
- mebibyte (MiB)
- gibibyte (GiB)
- tebibyte (TiB)
- pebibyte (PiB)
- exbibyte (EiB)
- Including:
- Calculate the file size of an image file and a sound file, using information given.
- The amount of the previous denomination present in the data storage size, e.g.:
- 8 bits in a byte
- 1024 mebibytes in a gibibyte
- Answers must be given in the units specified in the question. Calculations must use the measurement of 1024 and not 1000
- Information given may include:
- image resolution and color depth
- sound sample rate, resolution and length of track
- The amount of the previous denomination present in the data storage size, e.g.:
- Understand the purpose of and need for data compression.
- Compression exists to reduce the size of the file
- The impact of this is, e.g.:
- less bandwidth required
- less storage space required
- shorter transmission time
- Understand how files are compressed using lossy and lossless compression methods.
- Lossless compression reduces the file size without permanent loss of data, e.g. run length encoding (RLE)
- Lossy compression reduces the file size by permanently removing data, e.g. reducing resolution or color depth, reducing sample rate or resolution
2. Data Transmission
2.1. Types and Methods of Data Transmission
Candidates should be able to:
- Understand that data is broken down into packets and describe the structure of a packet, and the process of packet switching.
- A packet of data contains a
- packet header
- payload
- trailer
- The packet header includes the:
- destination address
- packet number
- originator’s address
- Data is broken down into packets
- Each packet could take a different route
- A router controls the route a packet takes
- Packets may arrive out of order
- Once the last packet has arrived, packets are reordered
- A packet of data contains a
- Describe how data is transmitted from one device to another using different methods of data transmission and explain the suitability of each method.
- Including:
- serial
- parallel
- simplex
- half-duplex
- full-duplex
- Including the advantages and disadvantages of each method
- Including:
- Understand the universal serial bus (USB) interface and explain how it is used to transmit data.
- Including the benefits and drawbacks of the interface
2.2. Methods of Error Detection
Candidates should be able to:
- Understand the need to check for errors after data transmission and how these errors can occur.
- Errors can occur during data transmission due to interference, e.g. data loss, data gain and data change
- Describe the processes involved in parity check, checksum and echo check for detecting errors after transmission.
- Including parity byte and parity block check
- Describe how a check digit detects errors in data entry and identify examples of its use.
- Including international standard book numbers (ISBN) and bar codes
- Describe how an automatic repeat query (ARQ) can be used to establish that data is received without error.
- Including the use of:
- positive/negative acknowledgements
- timeout
- Including the use of:
2.3. Encryption
Candidates should be able to:
- Understand the need for and purpose of encryption when transmitting data.
- Understand how data is encrypted using symmetric and asymmetric encryption.
- Asymmetric encryption includes the use of public and private keys
3. Hardware
3.1. Computer Architecture
Candidates should be able to:
- Understand the role of the central processing unit (CPU) and what is meant by a microprocessor.
- The CPU processes instructions and data that are input into the computer so that the result can be output
- A microprocessor is a type of integrated circuit on a single chip
- Understand the purpose of the components in a CPU (Von Neumann architecture) and describe the fetch–decode–execute (FDE) cycle.
- Including:
- units: arithmetic logic unit (ALU) and control unit (CU)
- registers: program counter (PC), memory address register (MAR), memory data register (MDR), current instruction register (CIR) and accumulator (ACC)
- buses: address bus, data bus and control bus
- Including:
- How instructions and data are fetched from random access memory (RAM) into the CPU, how they are processed using each component and how they are then executed
- Storing data and addresses into specific registers
- Using buses to transmit data, addresses and signals
- Using units to fetch, decode and execute data and instructions
- Understand what is meant by a core, cache and clock in a CPU and explain how they can affect the performance of a CPU.
- The number of cores, size of the cache and speed of the clock can affect the performance of a CPU
- Understand the purpose and use of an instruction set for a CPU.
- An instruction set is a list of all the commands that can be processed by a CPU and the commands are machine code
- Describe the purpose and characteristics of an embedded system and identify devices in which they are commonly used.
- An embedded system is used to perform a dedicated function, e.g. domestic appliances, cars, security systems, lighting systems or vending machines. This is different to a general purpose computer that is used to perform many different functions, e.g. a personal computer (PC) or a laptop
3.2. Input and Output Devices
Candidates should be able to:
- Understand what is meant by an input device and why it is required.
- Including:
- barcode scanner
- digital camera
- keyboard
- microphone
- optical mouse
- QR code scanner
- touch screen (resistive, capacitive and infra-red)
- two-dimensional (2D) and three-dimensional (3D) scanners
- Including:
- Understand what is meant by an output device and why it is required.
- Including:
- actuator
- digital light processing (DLP) projector
- inkjet printer
- laser printer
- light emitting diode (LED) screen
- liquid crystal display (LCD) projector
- liquid crystal display (LCD) screen
- speaker
- 3D printer
- Including:
- Understand what is meant by a sensor and the purposes of sensors. Identify the type of data captured by each sensor and understand when each sensor would be used, including selecting the most suitable sensor for a given context.
- Limited to:
- acoustic
- accelerometer
- flow
- gas
- humidity
- infra-red
- level
- light
- magnetic field
- moisture
- pH
- pressure
- proximity
- temperature
- Limited to:
3.3. Data Storage
Candidates should be able to:
- Understand what is meant by primary storage.
- Primary storage is directly accessed by the CPU
- Including the role of:
- random access memory (RAM)
- read only memory (ROM)
- Including why a computer needs both RAM and ROM, and the difference between them
- Understand what is meant by secondary storage.
- Secondary storage is not directly accessed by the CPU and is necessary for more permanent storage of data
- Describe the operation of magnetic, optical and solid-state (flash memory) storage and give examples of each.
- Magnetic storage uses platters which are divided into tracks and sectors. Data is read and written using electromagnets
- Optical storage uses lasers to create and read pits and lands
- Solid-state (flash memory) uses NAND or NOR technology. Transistors are used as control gates and floating gates
- Describe what is meant by virtual memory, how it is created and used and why it is necessary.
- Pages of data are transferred between RAM and virtual memory when needed
- Understand what is meant by cloud storage.
- Cloud storage can be accessed remotely in comparison to storing data locally
- Explain the advantages and disadvantages of storing data on the cloud in comparison to storing it locally.
- Physical servers and storage are needed to store data in cloud storage
3.4. Network Hardware
Candidates should be able to:
- Understand that a computer needs a network interface card (NIC) to access a network.
- A network interface card is given a MAC address at the point of manufacture
- Understand what is meant by and the purpose of a media access control (MAC) address, including its structure.
- MAC addresses are usually written as hexadecimal
- MAC addresses are created using the manufacturer code and the serial code
- Understand what is meant by and the purpose of an internet protocol (IP) address and that there are different types of IP address.
- An IP address is allocated by the network and they can be static or dynamic
- Including the characteristics of and differences between IPv4 and IPv6
- Describe the role of a router in a network.
- A router sends data to a specific destination on a network
- A router can assign IP addresses
- A router can connect a local network to the internet
4. Software
4.1. Types of Software and Interrupts
Candidates should be able to:
- Describe the difference between system software and application software and provide examples of each.
- System software provides the services that the computer requires, including operating system and utility software
- Application software provides the services that the user requires
- Describe the role and basic functions of an operating system.
- Including:
- managing files
- handling interrupts
- providing an interface
- managing peripherals and drivers
- managing memory
- managing multitasking
- providing a platform for running applications
- providing system security
- managing user accounts
- Including:
- Understand how hardware, firmware and an operating system are required to run applications software.
- Applications are run on the operating system
- The operating system is run on the firmware
- The bootloader (firmware) is run on the hardware
- Describe the role and operation of interrupts.
- Including:
- how an interrupt is generated
- how it is handled using an interrupt service routine
- what happens as a result of the interrupts
- Software interrupts include division by zero and two processes trying to access the same memory location
- Hardware interrupts include pressing a key on the keyboard and moving the mouse
- Including:
4.2. Types of Programming Language, Translators and Integrated Development Environments (IDEs)
Candidates should be able to:
- Explain what is meant by a high-level language and a low-level language, including the advantages and disadvantages of each.
- Advantages and disadvantages include:
- ease of reading and writing code, e.g. low-level is hard to read
- ease of debugging code
- machine independence
- direct manipulation of hardware
- Advantages and disadvantages include:
- Understand that assembly language is a form of low-level language that uses mnemonics, and that an assembler is needed to translate an assembly language program into machine code.
- Describe the operation of a compiler and an interpreter, including how high-level language is translated by each and how errors are reported.
- A compiler translates the whole code at once before executing it, producing an executable file
- An interpreter translates and executes the code line-by-line
- A compiler provides an error report for the whole code if errors are detected
- An interpreter stops execution when an error is found
- Explain the advantages and disadvantages of a compiler and an interpreter.
- To include an understanding that an interpreter is mostly used when developing a program and a compiler is used to translate the final program
- Explain the role of an IDE in writing program code and the common functions IDEs provide.
- Including:
- code editors
- run-time environment
- translators
- error diagnostics
- auto-completion
- auto-correction
- prettyprint
- Including:
5. The Internet and Its Uses
5.1. The Internet and the World Wide Web
Candidates should be able to:
- Understand the difference between the internet and the world wide web.
- The internet is the infrastructure
- The world wide web is the collection of websites and web pages accessed using the internet
- Understand what is meant by a uniform resource locator (URL).
- A URL is a text-based address for a web page; it can contain the protocol, the domain name and the web page/file name
- Describe the purpose and operation of hypertext transfer protocol (HTTP) and hypertext transfer protocol secure (HTTPS).
- Explain the purpose and functions of a web browser.
- The main purpose of a web browser is to render hypertext markup language (HTML) and display web pages
- Functions include:
- storing bookmarks and favorites
- recording user history
- allowing use of multiple tabs
- storing cookies
- providing navigation tools
- providing an address bar
- Describe how web pages are located, retrieved and displayed on a device when a user enters a URL.
- Including the role of:
- the web browser
- IP addresses
- domain name server (DNS)
- web server
- HTML
- Including the role of:
- Explain what is meant by cookies and how they are used, including session cookies and persistent cookies.
- Cookies are used for functions, including:
- saving personal details
- tracking user preferences
- holding items in an online shopping cart
- storing login details
- Cookies are used for functions, including:
5.2. Digital Currency
Candidates should be able to:
- Understand the concept of a digital currency and how digital currencies are used.
- A digital currency is one that only exists electronically
- Understand the process of blockchain and how it is used to track digital currency transactions.
- Blockchain, in its basic form, is a digital ledger, that is a time-stamped series of records that cannot be altered
5.3. Cyber Security
Candidates should be able to:
- Describe the processes involved in, and the aim of carrying out, a range of cyber security threats.
- Including:
- brute-force attack
- data interception
- distributed denial of service (DDoS) attack
- hacking
- malware (virus, worm, Trojan horse, spyware, adware, ransomware)
- pharming
- phishing
- social engineering
- Including:
- Explain how a range of solutions are used to help keep data safe from security threats.
- Including:
- access levels
- anti-malware including anti-virus and anti-spyware
- authentication (username and password, biometrics, two-step verification)
- automating software updates
- checking the spelling and tone of communications
- checking the URL attached to a link
- firewalls
- privacy settings
- proxy-servers
- secure socket layer (SSL) security protocol
- Including:
6. Automated and Emerging Technologies
6.1. Automated Systems
Candidates should be able to:
- Describe how sensors, microprocessors and actuators can be used in collaboration to create automated systems.
- Describe the advantages and disadvantages of an automated system used for a given scenario.
- Including scenarios from:
- industry
- transport
- agriculture
- weather
- gaming
- lighting
- science
- Including scenarios from:
6.2. Robotics
Candidates should be able to:
- Understand what is meant by robotics.
- Robotics is a branch of computer science that incorporates the design, construction and operation of robots
- Examples include factory equipment, domestic robots and drones
- Describe the characteristics of a robot.
- Including:
- a mechanical structure or framework
- electrical components, such as sensors, microprocessors and actuators
- programmable
- Including:
- Understand the roles that robots can perform and describe the advantages and disadvantages of their use.
- Robots can be used in areas including:
- industry
- transport
- agriculture
- medicine
- domestic
- entertainment
- Robots can be used in areas including:
6.3. Artificial Intelligence
Candidates should be able to:
- Understand what is meant by artificial intelligence (AI).
- AI is a branch of computer science dealing with the simulation of intelligent behaviors by computers
- Describe the main characteristics of AI as the collection of data and the rules for using that data, the ability to reason, and can include the ability to learn and adapt.
- Explain the basic operation and components of AI systems to simulate intelligent behavior.
- Limited to:
- expert systems
- machine learning
- Expert systems have a knowledge base, a rule base, an inference engine and an interface
- Machine learning is when a program has the ability to automatically adapt its own processes and/or data
9.2. Algorithms, Programming and Logic
- Standard flowchart symbols and logic gate symbols must be used.
- Students should program solutions to various problems using Python, VB.NET, or Java.
7. Algorithm Design and Problem-Solving
Candidates should be able to:
- Understand the program development life cycle.
- Limited to: analysis, design, coding and testing
- Including identifying each stage and performing these tasks for each stage:
- analysis: abstraction, decomposition of the problem, identification of the problem and requirements
- design: decomposition, structure diagrams, flowcharts, pseudocode
- coding: writing program code and iterative testing
- testing: testing program code with the use of test data
- Understand systems and problem decomposition, and use different methods to design solutions.
- Including:
- inputs
- processes
- outputs
- storage
- Including:
- structure diagrams
- flowcharts
- pseudocode
- Including:
- Explain the purpose of a given algorithm.
- Including:
- stating the purpose of an algorithm
- describing the processes involved in an algorithm
- Including:
- Understand standard methods of solution.
- Limited to:
- linear search
- bubble sort
- totalling
- counting
- finding maximum, minimum and average values
- Limited to:
- Understand the need for validation and verification checks on input data.
- Including:
- range check
- length check
- type check
- presence check
- format check
- check digit
- the purpose of each validation check and writing algorithms to implement each validation check
- Including:
- visual check
- double entry check
- The purpose of each verification check
- Including:
- Suggest and apply suitable test data.
- Limited to:
- normal
- abnormal
- extreme
- boundary
- Extreme data is the largest/smallest acceptable value
- Boundary data is the largest/smallest acceptable value and the corresponding smallest/largest rejected value
- Limited to:
- Complete a trace table to document a dry-run of an algorithm.
- Including, at each step in an algorithm:
- variables
- outputs
- user prompts
- Including, at each step in an algorithm:
- Identify errors in given algorithms and suggest ways of correcting these errors.
- Write and amend algorithms for given problems or scenarios, using: pseudocode, program code and flowcharts.
- Precision is required when writing algorithms, e.g. x > y is acceptable but x is greater than y is not acceptable
- See section 4 for flowchart symbols
8. Programming
8.1. Programming Concepts
Candidates should be able to:
- Declare and use variables and constants.
- Understand and use the basic data types.
- Including:
- integer
- real
- char
- string
- Boolean
- Including:
- Understand and use input and output.
- Understand and use sequence, selection, iteration, totalling, counting, and string handling.
- Including:
- IF statements
- CASE statements
- Including:
- count-controlled loops
- pre-condition loops
- post-condition loops
- Including:
- length
- substring
- upper
- lower
- The first character of the string can be position zero or one
- Including:
- Understand and use nested statements.
- Understand and use procedures, functions, parameters, local and global variables.
- Understand and use library routines.
- Arithmetic, limited to:
- +
- \−
- /
- *
- \^ (raised to power of)
- MOD
- DIV
- Logical, limited to:
- =
- $$<
- Arithmetic, limited to: