Coconote
AI notes
AI voice & video notes
Try for free
📚
OCR GCSE Computer Science Revision Notes
Sep 10, 2024
OCR GCSE Computer Science Paper One Revision Notes
Introduction
Purpose: Quick revision overview of OCR GCSE Computer Science, specifically Paper One.
Reminder: Not a substitute for thorough revision.
Suggestion: Check other videos in the playlist for additional content.
CPU (Central Processing Unit)
Definition
: Central component of a computer that executes program instructions using data.
Distinction
: Instructions (what to do) vs Data (applied bits).
Key Components
ALU (Arithmetic Logic Unit)
Performs mathematical operations and logical operations (Boolean logic).
Control Unit
Oversees the fetch-execute cycle and decodes instructions.
Cache
Small, fast memory (megabytes) holding frequently accessed items (instructions, data, addresses).
Checked before RAM.
Registers
Ultra small and fast memory locations within the CPU.
Types of registers:
Memory Address Register (MAR)
: Address in memory being accessed.
Memory Data Register (MDR)
: Stores data fetched from memory.
Program Counter (PC)
: Points to the next instruction address.
Accumulator
: Holds results from ALU calculations.
Von Neumann Architecture
Structure includes CPU components and operates through the
fetch-execute cycle
.
Fetch
: Retrieve instruction from memory using the PC.
Decode
: Control unit interprets instruction.
Execute
: Carry out the instruction, usually needing additional data from RAM.
Clock Speed
: Measured in gigahertz; affects how fast the fetch-execute cycle occurs.
Cores
: Multiple cores allow for simultaneous execution of instructions, increasing performance.
Cache Size
: Larger cache improves speed by reducing dependency on slower RAM.
Embedded Systems
: Simple, dedicated computers within devices (e.g., household appliances).
Storage
Types of Storage
Primary Storage
RAM
: Volatile memory; data lost when power off.
ROM
: Non-volatile; contains boot-up instructions for OS.
Secondary Storage
Types
:
Magnetic Storage
(e.g., HDD): Reliable but not durable; uses magnetic polarity.
Optical Storage
(e.g., DVDs): Portable and reliable; uses light reflection.
Solid State Storage
(e.g., SSD): Fast, durable, no moving parts, but costlier.
Data Representation
Binary Units
: 1 bit = 0 or 1, 1 byte = 8 bits, 1 kilobyte = 1000 bytes.
Conversions
: Use place value tables for binary to decimal and hexadecimal conversions.
Binary Addition
: Similar to decimal with carry rules; overflow errors can occur if the result exceeds storage capacity.
Character Encoding
Character Sets
: Groups of codes for characters.
ASCII
: 8-bit code for 256 characters (limited for global languages).
Unicode
: Supports thousands of characters (16 bits minimum).
Images
: Pixels represent colors; resolution = width x height; color depth = bits per pixel.
Sound
: Digital sound involves sampling amplitude, influenced by sample rate and bit depth.
Networks
Types of Networks
LAN (Local Area Network)
: Small area (e.g., a building).
WAN (Wide Area Network)
: Larger area; hardware owned by multiple entities.
Network Types
Client-Server Model
: Clients request resources from servers; centralized control.
Peer-to-Peer (P2P)
: No central control; devices connect independently.
Topologies
Star
: Central node; easy to add devices but reliant on central node.
Mesh
: Direct connections; complex but high performance with fewer collisions.
Network Components
WAP (Wireless Access Point)
: Provides wireless signal.
Router
: Forwards packets between networks.
Switch
: Directs packets within a single network using MAC addresses.
IP Addresses
Definition
: Identifies devices geographically.
Types
: IPv4 (limited) and IPv6 (extensive).
DNS
: Converts domain names to IP addresses.
Cloud Computing
: Remote access to resources; requires internet connection.
Protocols
Definition
: Set of rules for device communication.
TCP
: Handles data splitting into packets and error checking.
Email Protocols
: POP, IMAP, SMTP; POP does not sync, while IMAP does.
Wired vs Wireless
: Wired networks are reliable, less interference, but less flexible.
Cybersecurity
Types of Cyber Attacks
SQL Injection
: Attack via user input to manipulate databases.
Brute Force Attacks
: Trying all combinations to guess passwords.
Denial of Service (DoS)
: Flooding server with traffic to disrupt service.
Social Engineering
: Manipulating users to gain sensitive information.
Malware
: Malicious software that affects systems and extracts information.
Prevention Techniques
Penetration Testing
: Simulated attacks to find vulnerabilities.
Firewalls
: Monitor incoming/outgoing packets; can block suspicious activity.
Physical Security
: Guarding access to computers (CCTV, locks).
Anti-malware
: Scans and removes malicious software.
User Access Levels
: Control who can access or modify data.
Encryption
: Scrambles data for security, allowing only authorized users to decrypt.
Operating Systems
Functions
User Interface
: Graphical vs Command Line Interfaces.
Memory Management
: Controls loading and execution of programs.
Multitasking
: Rapid switching between tasks to simulate concurrent execution.
Peripheral Management
: Uses drivers to communicate with external devices.
User Management
: Manages user accounts and permissions.
Utility Software
Examples
: Encryption, data compression, defragmentation (only for HDDs).
Legislation
Key Laws
Data Protection Act
: Protects personal data; organizations must secure it and gain consent.
Computer Misuse Act
: Criminalizes hacking and malware use.
Copyright Designs and Patents Act
: Protects intellectual property rights.
Software Licensing
Open Source
: Free, modifiable, and publicly available source code.
Proprietary Software
: Paid, with restricted access to source code.
Privacy and Ethical Issues
Privacy concerns regarding data collection and surveillance.
Ethical issues about the moral implications of technology use.
Cultural and environmental considerations in technology impact.
Exam Strategy
For 8-mark questions, provide a balanced answer discussing both pros and cons.
Connect points logically and plan answers beforehand.
Focus on context and relevance to the question.
Conclusion
Good luck with the exam! Try your best and answer every question.
📄
Full transcript