📚

OCR GCSE Computer Science Revision Notes

Sep 10, 2024

OCR GCSE Computer Science Paper One Revision Notes

Introduction

  • Purpose: Quick revision overview of OCR GCSE Computer Science, specifically Paper One.
  • Reminder: Not a substitute for thorough revision.
  • Suggestion: Check other videos in the playlist for additional content.

CPU (Central Processing Unit)

  • Definition: Central component of a computer that executes program instructions using data.
  • Distinction: Instructions (what to do) vs Data (applied bits).

Key Components

  1. ALU (Arithmetic Logic Unit)
    • Performs mathematical operations and logical operations (Boolean logic).
  2. Control Unit
    • Oversees the fetch-execute cycle and decodes instructions.
  3. Cache
    • Small, fast memory (megabytes) holding frequently accessed items (instructions, data, addresses).
    • Checked before RAM.
  4. Registers
    • Ultra small and fast memory locations within the CPU.
    • Types of registers:
      • Memory Address Register (MAR): Address in memory being accessed.
      • Memory Data Register (MDR): Stores data fetched from memory.
      • Program Counter (PC): Points to the next instruction address.
      • Accumulator: Holds results from ALU calculations.

Von Neumann Architecture

  • Structure includes CPU components and operates through the fetch-execute cycle.
  • Fetch: Retrieve instruction from memory using the PC.
  • Decode: Control unit interprets instruction.
  • Execute: Carry out the instruction, usually needing additional data from RAM.
  • Clock Speed: Measured in gigahertz; affects how fast the fetch-execute cycle occurs.
  • Cores: Multiple cores allow for simultaneous execution of instructions, increasing performance.
  • Cache Size: Larger cache improves speed by reducing dependency on slower RAM.
  • Embedded Systems: Simple, dedicated computers within devices (e.g., household appliances).

Storage

Types of Storage

  1. Primary Storage

    • RAM: Volatile memory; data lost when power off.
    • ROM: Non-volatile; contains boot-up instructions for OS.
  2. Secondary Storage

    • Types:
      • Magnetic Storage (e.g., HDD): Reliable but not durable; uses magnetic polarity.
      • Optical Storage (e.g., DVDs): Portable and reliable; uses light reflection.
      • Solid State Storage (e.g., SSD): Fast, durable, no moving parts, but costlier.

Data Representation

  • Binary Units: 1 bit = 0 or 1, 1 byte = 8 bits, 1 kilobyte = 1000 bytes.
  • Conversions: Use place value tables for binary to decimal and hexadecimal conversions.
  • Binary Addition: Similar to decimal with carry rules; overflow errors can occur if the result exceeds storage capacity.

Character Encoding

  • Character Sets: Groups of codes for characters.
    • ASCII: 8-bit code for 256 characters (limited for global languages).
    • Unicode: Supports thousands of characters (16 bits minimum).
  • Images: Pixels represent colors; resolution = width x height; color depth = bits per pixel.
  • Sound: Digital sound involves sampling amplitude, influenced by sample rate and bit depth.

Networks

Types of Networks

  1. LAN (Local Area Network): Small area (e.g., a building).
  2. WAN (Wide Area Network): Larger area; hardware owned by multiple entities.

Network Types

  • Client-Server Model: Clients request resources from servers; centralized control.
  • Peer-to-Peer (P2P): No central control; devices connect independently.

Topologies

  1. Star: Central node; easy to add devices but reliant on central node.
  2. Mesh: Direct connections; complex but high performance with fewer collisions.

Network Components

  • WAP (Wireless Access Point): Provides wireless signal.
  • Router: Forwards packets between networks.
  • Switch: Directs packets within a single network using MAC addresses.

IP Addresses

  • Definition: Identifies devices geographically.
  • Types: IPv4 (limited) and IPv6 (extensive).
  • DNS: Converts domain names to IP addresses.
  • Cloud Computing: Remote access to resources; requires internet connection.

Protocols

  • Definition: Set of rules for device communication.
  • TCP: Handles data splitting into packets and error checking.
  • Email Protocols: POP, IMAP, SMTP; POP does not sync, while IMAP does.
  • Wired vs Wireless: Wired networks are reliable, less interference, but less flexible.

Cybersecurity

Types of Cyber Attacks

  1. SQL Injection: Attack via user input to manipulate databases.
  2. Brute Force Attacks: Trying all combinations to guess passwords.
  3. Denial of Service (DoS): Flooding server with traffic to disrupt service.
  4. Social Engineering: Manipulating users to gain sensitive information.
  5. Malware: Malicious software that affects systems and extracts information.

Prevention Techniques

  • Penetration Testing: Simulated attacks to find vulnerabilities.
  • Firewalls: Monitor incoming/outgoing packets; can block suspicious activity.
  • Physical Security: Guarding access to computers (CCTV, locks).
  • Anti-malware: Scans and removes malicious software.
  • User Access Levels: Control who can access or modify data.
  • Encryption: Scrambles data for security, allowing only authorized users to decrypt.

Operating Systems

Functions

  1. User Interface: Graphical vs Command Line Interfaces.
  2. Memory Management: Controls loading and execution of programs.
  3. Multitasking: Rapid switching between tasks to simulate concurrent execution.
  4. Peripheral Management: Uses drivers to communicate with external devices.
  5. User Management: Manages user accounts and permissions.

Utility Software

  • Examples: Encryption, data compression, defragmentation (only for HDDs).

Legislation

Key Laws

  1. Data Protection Act: Protects personal data; organizations must secure it and gain consent.
  2. Computer Misuse Act: Criminalizes hacking and malware use.
  3. Copyright Designs and Patents Act: Protects intellectual property rights.

Software Licensing

  • Open Source: Free, modifiable, and publicly available source code.
  • Proprietary Software: Paid, with restricted access to source code.

Privacy and Ethical Issues

  • Privacy concerns regarding data collection and surveillance.
  • Ethical issues about the moral implications of technology use.
  • Cultural and environmental considerations in technology impact.

Exam Strategy

  • For 8-mark questions, provide a balanced answer discussing both pros and cons.
  • Connect points logically and plan answers beforehand.
  • Focus on context and relevance to the question.

Conclusion

  • Good luck with the exam! Try your best and answer every question.