IGCSE 8

1.3.5 Memory, storage devices and media 컴퓨터의 기억장치

Candidates should be able to: • show understanding of the difference between: primary, secondary and off-line storage and provide examples of each, such as: primary: Read Only Memory (ROM) and Random Access Memory (RAM) secondary: hard disk drive (HDD) and Solid State Drive (SSD); off-line: Digital Versatile Disc (DVD), Compact Disc (CD), Blu-ray disc, USB flash memory and removable HDD • descri..

1.3.2 Computer architecture and the fetch-execute cycle 컴퓨터 구조와 명령어 사이클

Candidates should be able to: • show understanding of the basic Von Neumann model for a computer system and the stored program concept (program instructions and data are stored in main memory and instructions are fetched and executed one after another) • describe the stages of the fetch-execute cycle, including the use of registers and buses 폰 노이만은 기억장치에 프로그램과 데이터를 저장한 후 명령어 순서대로 처리하는 저장 프로그램 방식..

1.2.3 Internet principles of operation 인터넷의 작동 원리

Candidates should be able to: • show understanding of the role of the browser • show understanding of the role of an Internet Service Provider (ISP) • show understanding of what is meant by hypertext transfer protocol (http and https) and HTML • distinguish between HTML structure and presentation • show understanding of the concepts of MAC address, Internet Protocol (IP) address, Uniform Resourc..

1.2.2 Security aspects 컴퓨터 보안

Candidates should be able to: • show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the risks • show understanding of the Internet risks associated with malware, including viruses, spyware and hacking • explain how anti-virus and other protection software helps to protect the user from security risks 참고: 이 글은 IGCSE의 computer..

1.5 Ethics 컴퓨터 윤리

Candidates should be able to: • show understanding of computer ethics, including copyright issues and plagiarism • distinguish between free software, freeware and shareware • show understanding of the ethical issues raised by the spread of electronic communication and computer systems, including hacking, cracking and production of malware 기술과 윤리는 밀접한 관련이 있다. 악플, 사생활, 개인정보, 저작권 등 기술이 어떻게 사용되어야 하는..

1.1.3 Data storage 데이터는 컴퓨터에 어떻게 저장되는가

Candidates should be able to: •show understanding that sound (music), pictures, video, text and numbers are stored in different formats •identify and describe methods of error detection and correction, such as parity checks, check digits, checksums and Automatic Repeat reQuests (ARQ) •show understanding of the concept of Musical Instrument Digital Interface (MIDI) files, JPEG files, MP3 and MP4 ..

1.1.2 Hexadecimal 컴퓨터의 16진법 체계

Candidates should be able to: • represent positive numbers in hexadecimal notation • show understanding of the reasons for choosing hexadecimal notation to represent numbers • convert positive hexadecimal integers to and from denary (a maximum of four hexadecimal digits will be required) • convert positive hexadecimal integers to and from binary (a maximum of 16 bit binary numbers will be requir..

1.1.1 Binary Systems 컴퓨터의 이진법 체계

CSCandidates should be able to: • recognise the use of binary numbers in computer systems • convert positive denary integers into binary and positive binary integers into denary (a maximum of 16 bits will be used) • show understanding of the concept of a byte and how the byte is used to measure memory size • use binary in computer registers for a given application (such as in robotics, digital i..