Computer Science Theory
Computer Science Theory
ORG
CAIE IGCSE
COMPUTER
SCIENCE
SUMMARIZED NOTES ON THE THEORY SYLLABUS
Prepared for Tanish Paruchuri for personal use only.
CAIE IGCSE COMPUTER SCIENCE
1100 C 12
Final Answer: 0010000111111101
1101 D 13
1110 E 14 Converting Binary to Hexadecimal
1111 F 15
Divide the binary value into groups of 4 starting from the
right. If at the end, the last division is less than 4, add 0s
1.2. Number Conversions until it reaches 4
For each group, find the denary value as shown above,
Converting Binary to Denary and then convert each denary value to its corresponding
hexadecimal value (if less than 10, then itself, else, 10 is
Place the binary value in columns of 2 raised to the power A, 11 is B, 12 is C, 13 is D, 14 is E and 15 is F).
of the number of values from the right starting from 0.
After conversion, just put all the hexadecimal values in
e.g. For binary value 11101110, place it in a table like this: order to get the final answer
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by Tanish Paruchuri at ;lkjhgfcxdzx on 02/08/24.
CAIE IGCSE COMPUTER SCIENCE
Convert the value to binary, and then convert it to Shifting 10101010 - 1 place left:
hexadecimal as explained above 1. The furthest bit in the direction to be logically
shifted is removed ( in this case, one at the LHS is
removed) - ==(if it were two places, 2 bits would
1.3. Binary Calculations have been removed)==
2. Every bit is moved in given places to the given
Binary values are not added the way denary values are
direction ( every bit is moved one place to the left
added, as when adding 1 and 1, we cannot write two
in this case, and the leftover bit in the right is
because it doesn’t exist in binary.
marked 0, so 10101010 would become 01010100)
Steps to add Two Values (With Example) Converting negative values to two complement
The values we will add are 1 1 0 1 1 1 0 and 1 1 0 1 1 1 1 0
Find the binary equivalent of the value ignoring the - sign
1. Convert both the bytes into 8 bits (add zero to the
Convert the binary value to two’s complement
left-hand side to match them).
Make the MSB 1, if not already
e.g., 1 1 0 1 1 1 0 would become 0 1 1 0 1 1 1 0
2. Add the values as follows with the points given
Converting Two’s Complement Value to Denary:
above
We do it the same way as a normal value is converted
Carry 1 1 1 1 1 1 1
from binary to denary; we only replace 128 with -12,8 e.g.,
Byte 1 0 1 1 0 1 1 1 0 for 1011101,0 we do the:
Byte 2 1 1 0 1 1 1 1 0
OVERFLOW -128 64 32 16 8 4 2 1
Solution 1 0 1 0 0 1 1 0 0 1 0 1 1 1 0 1 0
Note: We move from RHS to LHS, and when adding values, we -128 + 32 + 16 + 8 + 2 = -70
use the rules given above. If the bit crosses the limit
1.4. Use of the Hexadecimal System
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by Tanish Paruchuri at ;lkjhgfcxdzx on 02/08/24.
CAIE IGCSE COMPUTER SCIENCE
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by Tanish Paruchuri at ;lkjhgfcxdzx on 02/08/24.
CAIE IGCSE COMPUTER SCIENCE
the bit can either be 0 or 1, with 0 being white and 1 being The size of a mono sound file is calculated as sample rate
black) (in Hz) × sample resolution (in bits) × length of sample (in
Increasing colour depth increases the size of the file when seconds). (For a stereo sound file, you would then
storing an image. multiply the result by two.)
MP4
Conventional System
This format allows the storage of multimedia files rather
Name of memory No. of than just sound
Equivalent Denary Value
size Bytes Music, videos, photos and animations can be stored
1 kilobyte (1KB) 103 1 000 bytes Videos could be streamed without losing any real
discernible quality
1 megabyte (1MB) 106 1 000 000 bytes
Joint Photographic Experts Group (JPEG)
1 gigabyte (1GB) 109 1 000 000 000 bytes
1 terabyte (1TB) 1012 1 000 000 000 000 bytes JPEG is a file format used to reduce photographic file sizes
1 000 000 000 000 000 Reducing picture resolution is changing the number of
1 petabyte (1PB) 1015 bytes pixels per centimetre
When a photographic file undergoes compression, file
size is reduced
Calculation of File Size
JPEG will reduce the raw bitmap image by a factor
between 5 and 15
The file size of an image is calculated as image resolution
(in pixels) × colour depth (in bits)
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by Tanish Paruchuri at ;lkjhgfcxdzx on 02/08/24.
CAIE IGCSE COMPUTER SCIENCE
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by Tanish Paruchuri at ;lkjhgfcxdzx on 02/08/24.
CAIE IGCSE COMPUTER SCIENCE
Parity Checks Check digits are calculated from all the other digits in the
data (ex-codes). The check digit would be the last digit of
It uses the number of 1-bits in a byte the code.
Type Types - These are used to identify mistyping errors such as -
Even - Even number of 1-bits 6372 typed as 6379
Odd - Odd numbers of 1-bits 8432 typed as 842
Example (Even Parity) -
Automatic Repeat Requests (ARQs)
0 1 0 1 1 0 1 0
Uses acknowledgements and timeouts to make sure the
The LMB (Left-Most Bit) is the parity bit. As the number of user received the data
1s is even, the parity bit would be set to even. The receiver would check the data for any errors; if none
Limitations with Parity Checks are found, a positive acknowledgement is sent to the
Two bits may change during transmission; therefore error sender. However, if errors are found, a negative
is not found acknowledgement will be sent, and the data will be sent
Even though the parity checks would reveal the errors, the again.
bit(s) changed wouldn’t be identified The sender uses timeouts to wait for a pre-determined
amount for the acknowledgement.
Parity Blocks If no acknowledgements are received after the timeout,
the data will be sent again to the receiver.
To overcome the limitations of parity bits, Parity blocks
would be used.
2.4. Encryption
Encryption is a process of turning the data into an
unreadable form so it doesn’t make sense to hackers and
other attackers.
Any changes in bits would be identified through the rows Symmetric and Asymmetric Encryption
and columns
Symmetric Encryption:
Checksum It uses an encryption key for the encryption process;
the same key is used for encrypting and decrypting
Whenever a block of data needs to be sent, the sender the data.
would calculate the checksum value using a specific Asymmetric Encryption:
algorithm. Uses a public key and a private key. The public key is
Once the data has been sent, The receiver would available to everyone, whereas the private key is only
calculate the checksum again with the same set of data available to the user.
and the same algorithm used before. The receiver would have the private key, and they
The receiver would then compare the value received and would send the public key to the sender. The sender
the newly calculated value. If they aren’t matched, A
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by Tanish Paruchuri at ;lkjhgfcxdzx on 02/08/24.
CAIE IGCSE COMPUTER SCIENCE
can encrypt the message with the public key, and the
data can be decrypted using the private key.
3. Hardware
3.1. Computer Architecture & Von
Neumann Architecture
The central processing unit (CPU) (also known as a
Source: Cambridge IGCSE and O Level Computer
microprocessor or processor) is central to all modern
Science - Second Edition (Hodder Education)
computer systems
Overclocking
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by Tanish Paruchuri at ;lkjhgfcxdzx on 02/08/24.
CAIE IGCSE COMPUTER SCIENCE
Using a clock speed higher than the computer was designed 3D scanners can scan solid objects and produce a three-
for. dimensional image
It leads to multiple issues. Scanners take images at several points, x, y and z (lasers,
magnetic, white light)
Operations become unsynchronised - (the computer The scanned images can be used in Computer-Aided
would frequently crash and become unstable) Design (CAD) or in a 3D printer to produce a working
can lead to serious overheating of the CPU model
The wider the data buses, the better the performance of the Make use of (OCR) to produce digital images which
computer represent the passport pages
Text can be stored in ASCII format
Cache The 2D photograph in the passport is also scanned and
stored as jpeg image
Cache memory is located within the CPU itself The passenger’s face is also photographed using a digital
-- allows faster access to the CPU camera and compared to using face recognition software
-- stores frequently used instructions and data that need to be Key parts of the face are compared (distance between
accessed faster, which improves CPU performance eyes, width of nose)
The larger the cache memory size, the better the CPU
performance Barcode readers/scanners
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by Tanish Paruchuri at ;lkjhgfcxdzx on 02/08/24.
CAIE IGCSE COMPUTER SCIENCE
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by Tanish Paruchuri at ;lkjhgfcxdzx on 02/08/24.
CAIE IGCSE COMPUTER SCIENCE
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by Tanish Paruchuri at ;lkjhgfcxdzx on 02/08/24.
CAIE IGCSE COMPUTER SCIENCE
DRAM (Dynamic RAM) and SRAM (Static RAM) Solid-State Drive (SSD)
Blu-ray Disks
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by Tanish Paruchuri at ;lkjhgfcxdzx on 02/08/24.
CAIE IGCSE COMPUTER SCIENCE
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by Tanish Paruchuri at ;lkjhgfcxdzx on 02/08/24.
CAIE IGCSE COMPUTER SCIENCE
Routers
Router functionality:
A router is a networking device that directs data
packets between different networks.
It determines the most efficient path for data
transmission.
Sending data to a specific destination on a network:
A router examines the destination IP address of Source: Cambridge IGCSE and O Level Computer Science -
incoming data packets. Second Edition (Hodder Education)
It uses routing tables to determine the next hop or the
next router on the path to the destination. Memory Management - Manages the RAM and the
The router forwards the data packet to the HDD/SSD during the execution of programs
appropriate next hop. Security Management - Providing security features such
Router's role in IP address assignment: as Anti-Virus, System updates and so on
A router can act as a DHCP server (Dynamic Host Hardware Peripheral Management - Managing the device
Configuration Protocol) and assign IP addresses to drives, Inputs, Outputs, Queues and buffers
devices on a local network. File Management - Opening, Creating, Deleting,
It dynamically allocates IP addresses from a Renaming, and many more functions
predefined range to connected devices. Multitasking - OS would share the hardware resources
DHCP allows for automatic IP address configuration with each of the processes
and simplifies network management. Management of User Accounts - OS would allow multiple
Connecting a local network to the Internet: users to customise their accounts individually.
A router serves as the gateway between a local
network and the internet. 4.1. Running of Applications
It connects the local network to an internet service
The computer starts its OS (booting up the computer)
provider (ISP) network.
through the bootstrap loader.
The router receives data packets from devices on the
The BIOS (Basic Input/Output System) tells the computer
local network and forwards them to the internet.
the location of the OS in the storage.
It also receives incoming data packets from the
internet and routes them to the appropriate devices BIOS is often referred to as the firmware
on the local network.
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by Tanish Paruchuri at ;lkjhgfcxdzx on 02/08/24.
CAIE IGCSE COMPUTER SCIENCE
Translators
Compiler
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by Tanish Paruchuri at ;lkjhgfcxdzx on 02/08/24.
CAIE IGCSE COMPUTER SCIENCE
Source: Cambridge IGCSE and O Level Computer program loading and running, and security management,
Science - Second Edition (Hodder Education) making computers more user-friendly.
Utility programs: Software that manages, maintains, and
Integrated Development Environments (IDEs) controls computer resources by carrying out specific
tasks, such as virus checking, disk repair and analysis, file
An IDE would usually have these features - management, and security.
Code Editor
Translator Application Software:
Debugger
Error Reports Word Processor: Software used for manipulating text
Auto-Completion and Auto-Correction documents, including creating, editing, and formatting
Auto-Documenter text with tools for copying, deleting, spell-checking, and
Pretty Printing importing images.
Spreadsheet: Organizes and manipulates numerical data
4.3. Types of Software and Interrupts using a grid of lettered columns and numbered rows, with
each cell identified using a unique combination of
columns and rows. It can calculate using formulas,
Types of Software
produce graphs, and do modelling and "what if"
1. System Software e.g. Operating System, Utility calculations.
programs and device drivers Database: Software used to organize, analyze, and
2. Application Software e.g. spreadsheet, word manipulate data consisting of one or more tables that
processor, etc. hold records and fields. It provides the ability to query and
report on data and add, delete, and modify records in a
System Software: table.
Control and Measuring Software: A program designed to
these are a set of programs which control and manage interface with sensors and allow a computer or
the operations of hardware microprocessor to measure physical quantities and
gives a platform for other software to run control applications by comparing sensor data with stored
it is required to allow hardware and software to run data and altering process parameters accordingly.
without problems Apps: Software designed to run on mobile phones or
provides a human-computer interface (HCI) to the user tablets, downloaded from an "App Store" and ranging
controls the allocation and usage of hardware resources from games to sophisticated software such as phone
banking. Common examples include video and music
Application Software: streaming, GPS, and camera facilities.
Photo and Video Editing Software: Software that allows
allows a user to perform specific tasks using the users to manipulate digital photographs or videos,
computer’s resources including changing colour, brightness, and contrast,
maybe a single program (for example, NotePad) or a suite applying filters and other enhancements, and creating
of programs (for example, Microsoft Office) transitions between clips.
user can execute the software when they require, and it is Graphics Manipulation Software: Software that allows the
mostly not automatic manipulation of bitmap and vector images, with bitmap
graphics editors changing pixels to produce a different
Examples image, while vector graphics editors manipulate lines,
curves, and text to alter the stored image as required.
System Software:
Interrupts
Compiler: Translates high-level language into machine
code, allowing for direct use by a computer to perform An interrupt is a signal sent to the microprocessor, either
tasks without re-compilation. from a device or software, prompting the microprocessor to
Linker: Combines object files produced by a compiler into pause its ongoing tasks and handle the interrupt temporarily.
a single program, allowing the use of separately written Various factors can trigger interrupts, including:
code modules in the final program.
Device driver: Software that enables hardware devices to Timing signals: Scheduled signals prompt the
communicate with a computer's operating system, microprocessor to pause and handle tasks at specific
without which a device like a printer would be unable to intervals.
work. Input/Output processes: Events such as a disk drive or
Operating system: Software that manages basic printer requiring additional data cause an interruption in
computer functions such as input/output operations, the microprocessor's activities.
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by Tanish Paruchuri at ;lkjhgfcxdzx on 02/08/24.
CAIE IGCSE COMPUTER SCIENCE
Hardware faults: Issues like a paper jam in a printer, retrieve data as the HDD read-write head needs several
signalling the microprocessor to halt its operations and movements to find the data.
address the hardware problem. When a file is deleted or extended, new data does not fill
User interaction: Instances like a user pressing specific the vacant sectors immediately, causing the files to
keys on a keyboard (e.g., ), leading to an interrupt in the become more scattered throughout the disk surfaces.
system's operation. A disk defragmenter rearranges the data blocks to store
Software errors: Problems such as missing .exe files files in contiguous sectors wherever possible, allowing for
needed to initiate a program, conflicts like two processes faster data access and retrieval.
accessing the exact memory location, or attempts to The defragmentation process can free up previously
divide by zero. These errors trigger interrupts, prompting occupied sectors and empty some tracks.
the microprocessor to handle the issues.
Backup Software
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by Tanish Paruchuri at ;lkjhgfcxdzx on 02/08/24.
CAIE IGCSE COMPUTER SCIENCE
Without the appropriate device driver, a hardware device It is software used to connect to the internet
cannot work with a computer and may not be recognised It translates the HTML code
by the operating system. ensures SSL & TLS security can be established
USB device drivers contain descriptors, which include a Offers additional features like search history & ad
vendor ID (VID), product ID (PID) and unique serial blockers
number that allow the operating system to identify the
device. Retrieval and Location of web pages
Serial numbers must be unique to avoid confusion if two
The browser sends the URL to the domain name server
devices with the same serial number are plugged into a
(DNS)
computer simultaneously.
DNS stores the index and matches it with the IP
IP is sent to the browser if it exists
5. The Internet and Its Uses The browser sends a request to the IP of the webserver
Browser interprets the HTML
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by Tanish Paruchuri at ;lkjhgfcxdzx on 02/08/24.
CAIE IGCSE COMPUTER SCIENCE
Malware
The first block is called the genesis block as it doesn’t point to
any previous block (Previous Hash Value - 0000) Stands for Malicious Software. A few examples are -
Virus - A program that can replicate itself with the
5.3. Cyber Security intention of deleting or corrupting files, causing a
computer malfunction
Brute Force Attack: Ransomware - Attackers encrypt the user’s data until a
certain amount of money is paid
Hackers try to guess your password by trying all the
Adware - Displays unwanted ads on the user’s screen
different combinations of letters, numbers and symbols. Trojan Horse - Programs that are disguised as
Effect: legitimate software
Hacker gets access to user’s personal data (credit Spyware - Sends data about all the activities of the
cards, passwords and more) user to the attacker
To remove risk:
Worms - Programs that can replicate themselves with
Use stronger passwords with more characters and the intention of corrupting the entire network instead
symbols of the computer alone
Data Interception: Phishing
This involves stealing data by tapping into a wired or a Attackers send legitimate-looking emails to bait the user
wireless transmission line into giving out their information.
Wardriving - The act of locating and using wireless
To remove risk:
internet connections illegally Don’t open links from unknown receivers
Packet Sniffing - Uses Packet sniffers to examine Use anti-phishing tools
packets sent over a line; all the data collected is sent Block pop-up ads
back to the attacker
Have an up-to-date browser
Effect:
It can cause a computer to crash Pharming
Can delete or corrupt files/data
To remove risk: The attacker installs a malicious code on the computer,
Install anti-virus software which redirects the user to fake websites
Don’t use software from unknown sources Effect:
Be careful when opening emails from unknown The user gives out login details and other personal
details
Distributed Denial of Service Attacks (DDoS) To remove risk:
Using anti-virus software
An attempt at preventing users from accessing part of a Checking the spelling and the weblink carefully
network Make sure that the green padlock is present in the
Usually temporary but may be damaging URL bar
An attacker may be able to prevent the user from:
Accessing their emails Social Engineering
Accessing websites
Accessing online services Attackers create a social situation which leads to victims
giving out their details (For example - Spam calls
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by Tanish Paruchuri at ;lkjhgfcxdzx on 02/08/24.
CAIE IGCSE COMPUTER SCIENCE
informing them that their account has been hacked) Privacy Settings - Used to limit who can access and see a
user’s profile
Keeping data safe from threats SSL (Secure Socket Layer) - Set of rules used while
communicating with other users on the internet.
Access Levels - Having Different levels of access for
different people (for example - Only doctors can have
access to patient’s data) 6. Automated and Emerging
Antivirus - Protects user’s computer from malware attacks
Authentication - User proving who they are. The most Technologies
common methods are passwords, PINs, Mobiles (OTPs),
biometrics and more)
6.1. Automated Systems
Benefits and Drawbacks of Biometric Method
Automated Systems are a combination of software and
Biometric
Benefits Drawbacks hardware designed to function without human
Methods
intervention.
Most development
Intrusive as used to Process of Automated Systems
methods are very easy
identify criminals, Sensors take inputs, and they are sent to the
Fingerprint to use and require
Can’t be used if the microprocessor. The data is usually analogue, so it
Scans very low storage has to go through Analogue-to-Digital Converter
finger gets dirty or
space to store the (ADC)
damaged (e.g. cuts)
biometric data.
The microprocessor processes the data and makes
With very high It is very intrusive, the necessary decisions based on its program
accuracy, it Impossible Takes longer to verify, The actions are then executed by the actuators
Retina Scan
to replicate a person’s Expensive to install (Motors, wheels and so on)
retina and set up
Can’t identify if there Advantages and Disadvantages of Automated Systems
Face Non-intrusive method, are any changes in the Advantages Disadvantages
Recognition Relatively cheaper lighting, change in age Expensive to set up and
Faster and Safer
or person’s age. maintain
Voices can be Any changes can be identified Any computerised systems
recorded and used for quickly are prone to attacks
verification, but low Over-reliance on automated
Non-Intrusive method,
accuracy and illnesses Less Expensive in the long run systems may cause humans
Voice verification is done
such as colds or to lose skills
Recognition quickly and relatively
coughs can affect a Higher Productivity and
cheaper
person’s voice, making Efficiency
identification
impossible.
You should be able to describe the advantages and
disadvantages of an automated system used for a given
Two-Step Verification - Requires two methods of scenario.
authentication to prove who the user is Including scenarios from:
Automatic Software Updates - Latest updates contain
patches which improve device security industry
Spelling and Tone - Fake emails tend to have wrong transport
spelling and grammar (amazonn instead of amazon), and agriculture
the tone would also seem urgent weather
Firewalls - Hardware or Software which monitors the gaming
traffic between a network and the user’s computer lighting
Proxy Servers - Acts as an intermediate between the science
user’s computer and the web server. They are used for -
Filtering Internet traffic
6.2. Robotics
Keeping the user’s IP Address Confidential
Blocking access to certain websites
Robotics is the branch of computer science that combines
Attacks like DDoS and Hacking attack the proxy robot design, construction and operation.
server, keeping the web server safe. Isaac Asimov’s Laws of Robotics -
Acts as a firewall as well. A robot may not injure a human through action or
inaction
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by Tanish Paruchuri at ;lkjhgfcxdzx on 02/08/24.
CAIE IGCSE COMPUTER SCIENCE
A robot must obey orders given by humans unless it General AI - A machine is similar to a human when
comes into conflict with Law 1 doing one specific task
a robot must protect itself unless this conflicts with law Strong AI - Machine has superior performance to a
1. human in many tasks
Characteristics of a robot - Characteristics of AI -
Ability to sense their surroundings Collection of Data and Rules
Have a degree of movement Ability to Reason
Programmable Ability to learn and adapt
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by Tanish Paruchuri at ;lkjhgfcxdzx on 02/08/24.
CAIE IGCSE
Computer Science
© ZNotes Education Ltd. & ZNotes Foundation 2024. All rights reserved.
This version was created by Tanish Paruchuri on 02/08/24 for strictly personal use only.
These notes have been created by Abdullah Aamir, Abhiram Mydi and Shriram Srinivas for the 2023-2025 syllabus
The document contains images and excerpts of text from educational resources available on the internet and
printed books. If you are the owner of such media, test or visual, utilized in this document and do not accept its
usage then we urge you to contact us and we would immediately replace said media.
No part of this document may be copied or re-uploaded to another website. Under no conditions may this
document be distributed under the name of false author(s) or sold for financial gain.
“ZNotes” and the ZNotes logo are trademarks of ZNotes Education Limited (registration UK00003478331).