OCR GCSE Computer Science Paper One Overview
This guide provides a quick recap of key topics for the OCR GCSE Computer Science Paper One, focusing on essential concepts and details within a 30-minute timeframe. For thorough revision, consult additional resources.
CPU (Central Processing Unit)
- Function: Executes program instructions using data.
- Components:
- ALU (Arithmetic Logic Unit): Performs arithmetic and logic operations.
- Control Unit: Manages the fetch-execute cycle and decodes instructions.
- Cache: A small, fast type of memory storing frequently used data and instructions.
- Registers: Ultra-fast, small storage for CPU processes; includes MAR, MDR, Program Counter, and Accumulator.
Fetch-Execute Cycle
- Stages:
- Fetch: Retrieve instruction from memory.
- Decode: Interpret the instruction.
- Execute: Perform the instruction; may require data fetch.
- Clock Speed: Determines cycles per second (measured in GHz).
- Cores: More cores allow parallel processing.
Storage Types
- Primary Storage:
- RAM: Volatile memory used for currently running programs.
- ROM: Non-volatile memory storing boot-up instructions.
- Secondary Storage:
- Types: Magnetic (HDDs), Optical (DVDs), Solid State (SSDs).
- Virtual Memory: Uses secondary storage to extend RAM.
Data Representation
- Binary Units: Bit, Nibble, Byte, Kilobyte, etc.
- Binary Arithmetic: Addition, shifts, and overflow errors.
- Character Sets: ASCII (limited character set) vs. Unicode (extensive).
- Image Representation: Pixels, resolution, color depth.
- Sound Representation: Sampling, bit depth, sample rate.
Networks
- Types: LAN (local), WAN (wider area).
- Topologies: Star (central node dependent), Mesh (direct device connections).
- Network Performance Factors: Bandwidth, number of devices, collisions.
- Internet Concepts: IP addresses, packets, DNS.
Cybersecurity
- Attacks: SQL injection, brute force, DOS, social engineering.
- Defenses: Firewalls, anti-malware, user access levels, encryption.
Operating Systems
- Functions:
- User Interface: GUI vs. Command Line.
- Memory Management: Allocating and freeing RAM.
- Peripheral Management: Driver installations.
Software Categories
- Utility Software: Includes disk defragmentation tools.
- Open Source vs Proprietary Software: Open for modification vs. licensed use.
Legal and Ethical Issues
- Data Protection Act: Protects personal data.
- Computer Misuse Act: Aims to prevent hacking and malware.
- Copyright Act: Protects intellectual property.
- Privacy and Cultural Issues: Data minimization, ethical considerations.
Exam Tips
- Focus on balanced answers with contextual relevance.
- Aim for coherent points, not just separate facts.