OCR GCSE paper 1 computer science

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/124

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

125 Terms

1
New cards

What does the CPU do?

Processes data and instructions by constantly repeating the fetch-execute cycle

2
New cards

What are the parts of the CPU?

control unit, arithmetic logic unit, register

<p>control unit, arithmetic logic unit, register</p>
3
New cards

What does the control unit do (CU)?

sends controls signals to direct the operation of the CPU, Control signals and timing signals are sent to the ALU and other components i.e RAM

also decodes instructions as part of the F-E cycle

4
New cards

What does the ALU do?

performs simple calculations and logical operations

5
New cards

What is a register?

temporary storage space for one instruction or address, different registers are used in the F-E cycle

6
New cards

How does a computer with Von Neuman architecture work?

stores both program and instructions in the same memory(RAM)

7
New cards

What are the names of the 5 registers in the F-E cycle?

program counter, memory address register, memory data register, current instructions register, accumulator.

8
New cards

What does the PC do?

tracks the RAM address of the next instruction to be fetched

9
New cards

What does the MAR do?

Stores the address of the data to be fetched from or the address where the data is to be stored.

10
New cards

What does the MDR do?

The MDR stores the instruction that has been transferred from RAM to the CPU.

11
New cards

What does the CIR do?

stores the instruction that has been fetched from RAM, and is about to be decoded or executed.

12
New cards

What does the accumulator do?

The ACC stores the result of mathematical or logical calculations.

13
New cards

What is the main idea of the F-E cycle?

instructions are fetched from RAM to the CPU, to be decoded (understood) and executed (processed) by the CPU.

14
New cards

How does the F-E cycle work?

1. The Program Counter (PC) register displays the address in RAM of the next instruction to be processed.

This value is copied into the Memory Address Register (MAR).

2. The PC register is increased by 1. This prepares the CPU for the next instruction to be fetched

3. The CPU checks the address in RAM which matches the address held in the MAR.

4. The instruction in RAM is transferred to the Memory Data Register (MDR).

5.The instruction in the MDR is copied into the Current Instruction Register (CIR).

6. The instruction in the CIR is decoded (understood) and executed (processed).

Any result of an execution is stored in the Accumulator (ACC) register.

7. The cycle repeats by returning to the first step and checking the program counter for the address of the next instruction.

15
New cards

What is cache memory?

Temporary storage for frequently accessed data

16
New cards

How does cache memory improve storage?

because it is close to the CPU than the RAM, so it can provide data and instructions to the CPU at a faster rate.

17
New cards

disadvantage of cache memory

Costly so most computers have a small amount

18
New cards

What is clock speed?

Clock speed is the measure of how quickly a CPU can process instructions, measured in GHz

19
New cards

How does clock speed improve performance?

The faster the clock speed, the faster the computer can perform the FDE cycle resulting in better performance because more instructions can be processed each second.

20
New cards

What is a core?

a complete set of CPU components(CU, ALU & registers). Each core can perform is own FDE cycle.

21
New cards

How does the number of cores improve performance?

A computer with more cores will have a higher performance because it can process more instructions at once

22
New cards

disadvantages of having more cores?

if one core is waiting for another core to finish processing the performance may not increase at all

23
New cards

What is an embedded system?

a computer system built into a larger machine to provide of control. uses both hard and software, perform specific tasks, have often low storage and processing power.

24
New cards

What does an embedded system do?

perform a specific pre-programmed task which is stored in ROM

25
New cards

What is a network?

A network is two or more computers linked together so that they can communicate with each other

26
New cards

What is a LAN?

Local Area Network- computer system are geographically close together (i.e. same building).

The network infrastructure of a LAN (i.e. servers & routers) is usually owned and managed by the network owner.

<p>Local Area Network- computer system are geographically close together (i.e. same building).</p><p>The network infrastructure of a LAN (i.e. servers &amp; routers) is usually owned and managed by the network owner.</p>
27
New cards

What is a WAN?

Wide Area Network- computer systems are geographically distant to each other. use 3rd part communication channels

<p>Wide Area Network- computer systems are geographically distant to each other. use 3rd part communication channels</p>
28
New cards

Advantages of a LAN

It enables: digital communication between people,

the sharing of digital information,

the sharing of peripheral devices such as printers and scanners,

computers to be updated with the latest software from a central point,

distributed processing - the ability for a single program to be run simultaneously at various computers.

29
New cards

Disadvantages of LAN

requires a bit of 'expertise' to install and maintain a large network which can be costly.

Viruses may be able to infiltrate the network and infect every computer

There are a number of security issues from unauthorised access to data

30
New cards

What is the internet?

The internet is a worldwide collection of inter-connected networks, not owned or managed by any one group of people.

Anyone can access the internet.

31
New cards

What is an IP address?

Internet Protocol- Every networked computer or device has a separate, unique IP address

e.g. 65.123.217.14

The current addressing system is called IPv4

<p>Internet Protocol- Every networked computer or device has a separate, unique IP address</p><p>e.g. 65.123.217.14</p><p>The current addressing system is called IPv4</p>
32
New cards

How does the Domain Name System (DNS) work?

1) a webpage request is sent to a Domain Name System server on the internet.

2)The DNS looks up the domain name in a database to find the IP address of the website which will then allow your browser to request the data/files in order to load the page.

3)If the DNS doesn't find the domain name, it forwards the request onto another DNS connected to the internet in order to try to locate the page.

33
New cards

What is a client-server network?

clients make requests to a server and it completely dependent on it to provide and manage the info

34
New cards

What are the advantages and disadvantages of client servers?

Can be controlled centrally,

easy to back up data and update software, hardware and software can be shared across the network

Traffic congestion will slow the network down,

If there is a fault the whole network will fail,

I t technicians may be required to manage and maintain the network

35
New cards

What is a peer-to-peer network?

where data is shared directly between systems without requiring a central server. it is optimal for sharing files.

36
New cards

What are the advantages and disadvantages of peer-to peer?

Simpler to set up as no server required,

Clients are not dependent on a server,

Can share files quickly between systems,

No central device so backups must be performed on each individual system,

Performance will decrease with more devices connected

37
New cards

What is a data packet?

when data is broken into smaller parts when data is sent across a network. Each packet is redirected by routers until it arrives at its destinations, they could split up and choose alterative routes.

38
New cards

What is the contents of a data packet?

Header- Source & address, destination, packet number, protocol

Payload- The data

Trailer- checks for any errors

39
New cards

What is a network topology?

The layout of a computer system on a local network

40
New cards

What is a star topology?

Each computer system is connected to a central device (i.e. switch) and transfers data packets there. The switch looks at the destination address and transfers the data packets directly to the intended computer

<p>Each computer system is connected to a central device (i.e. switch) and transfers data packets there. The switch looks at the destination address and transfers the data packets directly to the intended computer</p>
41
New cards

What are the advantages and disadvantages of star topology?

improved security- as data packets are sent directly to + from the switch

transfer speeds are fast

extra hardware is required

if the central system fails (switch) who networks is unstable until fixed

42
New cards

What is a mesh topology?

each computer system is connected to every other computer system.

Data packets are transferred to the destination address along the quickest path, travelling from node to node.

If a pathway is broken, there are many alternative paths that the packets can take.

<p>each computer system is connected to every other computer system.</p><p>Data packets are transferred to the destination address along the quickest path, travelling from node to node.</p><p>If a pathway is broken, there are many alternative paths that the packets can take.</p>
43
New cards

What are the advantages and disadvantages of mesh topology?

:) If one cable or system fails then data packets can take an alternative route,

withstand large amounts of data traffic-as there are many connections,

New systems can be added to the network without disrupting the entire topology.

:( expensive to install and maintain- large amount of cables

44
New cards

What are the factors that can affect the performance (speed) of a network?

The bandwidth available*

Interference (e.g. thick walls)

Applications being used

Number of users at the same time

Distance to travel / signal strength

Server / CPU Performance

Number of data collisions

Amount of data to transfer

45
New cards

What is a wireless access point (WAP)?

provides a link between wireless and wired network, it creates a wireless local area network which allows Wi-Fi enables devices to connect

<p>provides a link between wireless and wired network, it creates a wireless local area network which allows Wi-Fi enables devices to connect</p>
46
New cards

What do routers do?

they transfer/ receive data packets between networks, and use the IP address to find the best route

<p>they transfer/ receive data packets between networks, and use the IP address to find the best route</p>
47
New cards

What does a switch do?

Connects devices together,

receives data packets, reads the destination address and forward it directly to its destination, generates a list MAC addresses of devices connected to it

48
New cards

What is a network interface controller (NIC)?

An internal piece of hardware that allows a device to connect to a network, it also includes a MAC address used when sending data across a LAN

49
New cards

what are the 3 types of transmission media?

Ethernet cable, fibre optic cable, copper cables

50
New cards

How is an ethernet cable used?

typically used on LAN to transfer data between nodes and hardware i.e. switches.

<p>typically used on LAN to transfer data between nodes and hardware i.e. switches.</p>
51
New cards

How is a fibre optic cable used?

used to send data quickly along a WAN, v fast but more expensive and fragile

<p>used to send data quickly along a WAN, v fast but more expensive and fragile</p>
52
New cards

What is a copper cable?

old and slow affected by EM interference

<p>old and slow affected by EM interference</p>
53
New cards

What is cloud storage?

a network of servers accessed on the internet- they run applications store data, remote processing

data is stored on large servers owned by a hosting company

<p>a network of servers accessed on the internet- they run applications store data, remote processing</p><p>data is stored on large servers owned by a hosting company</p>
54
New cards

Adv and disadv cloud storage?

very convenient, can be accessed from different devices, huge capacity, portable

if connection fails/server attacked data could become inaccessible

55
New cards

What do wired connections require?

require physical cable(e.g. copper or fibre optic) & an NIC to connect to a network

56
New cards

What do wireless connections require?

require a wireless NIC (WNIC) as they use no cables, slower and can be affected by distance and obstacles (e.g. walls, weather)

57
New cards

What is a protocol?

A protocol is a set of rules that allow devices on a network to communicate with each other.

defines rules for data transmission

58
New cards

What is TCP (transmission control protocol)

TCP is a protocol that allows packets to be sent and received between computer systems.

It breaks the data into packets and reassembles them back into the original data at the destination.

59
New cards

What is an IP (internet protocol)?

IP is a protocol in charge of routing and addressing data packets. This ensures data packets are sent across networks to the correct destination.

It is also an addressing system - every device on a network is given a unique IP address so data packets can be sent to the correct computer system.

60
New cards

What is HTTP (hyper text transfer protocol)?

used to transfer web pages over the Internet so that users can view them in a web browser.

61
New cards

What is HTTPS (hyper text transfer protocol secure)?

HTTPS is a more secure version of HTTP that works with another protocol called SSL (Secure Sockets Layer) to transfer encrypted data.

62
New cards

What is FTP (File Transfer Protocol)?

FTP is used to transfer files across a network. It is commonly used to upload or download files to/from a web server.

63
New cards

What is SMTP (Simple Mail Transfer Protocol)?

SMTP (Simple Mail Transfer Protocol) is a protocol used to send emails to a mail server and between mail servers

64
New cards

What is POP (Post Office Protocol)?

POP and IMAP (Internet Message Access Protocol) are both protocols for receiving and storing emails from a mail server.

POP will delete an email from the email server once it has been downloaded to a device.

IMAP syncs the message with an email server so it can be accessed by different devices.

65
New cards

What is IPv4?

IPv4 is a 32-bit address, represented in denary, that allows for over 4 billion unique addresses.

It has four 8-bit segments of denary values (from 0 to 255) separated by full stops.​

EG:

145.13.218.102

66
New cards

What is IPv6?

IPv6 is a 128-bit address, represented in hexadecimal, that allows for an undecillion unique addresses.

It has eight 16-bit segments of four hexadecimal values (0000 - FFFF), separated by colons.​

EG:

736E:1029:A4B3:902D:77B2:72FF:AE62:0912

67
New cards

What is a MAC address?

a unique hexadecimal number assigned to each network interface card/controller inside a networked device such as a router or laptop.​​

A MAC address is a 48-bit address made up of six 8-bit pairs in hexadecimal, separated by dashes.

While an IP address may change, the MAC address can't be changed. MAC stands for Media Access Control.

68
New cards

what is one advantage of using a layer to construct network protocols?

it is self contained, layer can be taken out and added without effecting other layers

69
New cards

What is malware?

Malware is any type of harmful program that seeks to damage or gain unauthorised access to your computer system.

70
New cards

What is a virus?

A virus can replicate itself and spread from system to system by attaching itself to infected files.

deletes/corrupts data

71
New cards

What is a worm?

-A worm can replicate itself and spread from system to system by finding weaknesses in software.

-uses up all the bandwidth

72
New cards

What is a trojan?

A trojan is malware disguised as legitimate software so users are tricked into installing it.

A trojan secretly gives the attacker backdoor access to the system.

Trojans do not self replicate or infect other files

73
New cards

What is spyware?

Spyware secretly records the activities of a user on a computer.

The main aim of spyware is to record usernames, passwords and credit card information.

All recorded information is secretly passed back to the attacker to use.

74
New cards

What is a ransomware?

Ransomware locks files on a computer system using encryption so that a user can no longer access them.

The attacker demands money from the victim to decrypt (unlock) the data.

Attackers usually use digital currencies like bitcoin which makes it hard to trace them.

<p>Ransomware locks files on a computer system using encryption so that a user can no longer access them.</p><p>The attacker demands money from the victim to decrypt (unlock) the data.</p><p>Attackers usually use digital currencies like bitcoin which makes it hard to trace them.</p>
75
New cards

What is a SQL injection?

​A SQL injection is when a malicious SQL query (command) is entered into a data input box on a website.

​If the website is insecure then the SQL query can trick the website into giving unauthorised access to the website's database.​

An SQL injection can be used to view and edit the contents of a database or even gain administrator privileges.

76
New cards

What is a Dos attack?

attack is when a computer repeatedly sends requests to a server to overload the system. A server overload will slow the system and may take websites offline temporarily.​

A DDoS (Distributed Denial of Service) attack is a coordinated attack using a botnet of infected systems to overload a server with requests. A botnet is a large group of devices controlled and used maliciously by an attacker.

77
New cards

What is brute force attack?

Every possible combination is tested in order from start to finish. This is not a quick method but it should break the password eventually and can be sped up if multiple computer systems are used at the same time

<p>Every possible combination is tested in order from start to finish. This is not a quick method but it should break the password eventually and can be sped up if multiple computer systems are used at the same time</p>
78
New cards

What is phishing?

-fake emails sent to a person

-person enter personal data

79
New cards

what is pharming?

software that redirects user to fake website

person enters personal data

80
New cards

What is a penetration test?

Penetration tests are carried out as part of ethical hacking.

The purpose of a penetration test is to review the system's security to find any risks or weaknesses and to fix them.

81
New cards

What is a firewall?

A firewall manages incoming and outgoing network traffic

Each data packet is processed to check whether it should be given access to the network by examining the source and destination address.​

Unexpected data packets will be filtered out and not accepted to the network.

82
New cards

What are other tasks of a firewall?

-Blocking access to insecure / malicious web sites.

-Blocking certain programs from accessing the internet.

-Blocking unexpected / unauthorised downloads.

-Preventing specific users on a network accessing certain files.

83
New cards

what are uses of secure passwords?

-Usernames must be matched with a secure password to minimise the chances of unauthorised users accessing a system.

-at least 8 characters

-must be regularly changed

84
New cards

What are user access levels?

-used to only allow certain users to access and edit particular files

-Eg: read-only and read write.

85
New cards

What is encryption

-process where data is scrambled

-data cannot be intercepted

86
New cards

What is physical security?

eg: locks. biometrics, CCTV, keycards

87
New cards

What is an OS?

An operating system (OS) is software that helps to manage the resources of a computer system and provide the interface between the user and the computer's hardware.

88
New cards

What are the 5 main tasks of the OS?

Memory management & multitasking, peripherals management & drivers, user management, file management, user interface(GUI)

89
New cards

How does the OS carry out memory management and multi tasking?

Because programs must be temporarily stored in RAM for the CPU to be able to process them.

The OS transfers programs in and out of memory from the hard drive (or virtual memory) when processing is required - programs are removed from RAM when closed to free up space for other tasks.

The operating system can only perform one process at a time, but through memory management it can appear that more than one process is being executed - this is called multitasking.

90
New cards

What is a peripheral?

an external device connected to a computer system to input or output data.

<p>an external device connected to a computer system to input or output data.</p>
91
New cards

How does the OS carry out peripheral management & drivers

Data is transferred between external devices and the processor and this process needs to be managed by the operating system.

A device driver is a program that provides an interface for the OS to interact and communicate with an external device. Drivers are hardware dependent and OS-specific. The driver translates the OS' instructions into a format the specific hardware can understand.

Because the CPU and the peripheral will process data at different speeds, a buffer is typically used to temporarily store data until it can be processed.

92
New cards

How does the OS carry out user management?

The OS allows users to create, manage and delete individual accounts. User accounts can be granted different access rights such as an administrator or guest.

The OS will manage security settings such as allowing passwords to be reset and can also be used to monitor login activity.

93
New cards

How does the OS carry out file management?

The operating system creates and maintains a logical management system to organise files and directories (folders).

File management allows files to be named, renamed, opened, copied, moved, saved, searched for, sorted and deleted. It also allows users to set access rights for specific files and to view file properties.

94
New cards

How does the OS carry out user interface (GUI)

allowing a human/user to interact with the computer system. The way in which a user can navigate a computer system is known as human-computer interaction

95
New cards

How does the graphical user interface provide a user interface?

(GUI):

Icons are displayed to represent shortcuts to applications and files.

Multiple windows can be opened at the same time and switched between.

A folder and file system is displayed and manipulated allowing for copying, searching, sorting and deleting data.

The interface can be customised, such as changing font sizes and the desktop background.

The taskbar allows shortcuts to be pinned for quick access.

Menus can be opened from the Start button to display files and shortcuts.

System settings can be accessed such as network and hardware options.

96
New cards

Advantages primary storage?

very quick- directly accessed by CPU

Typically smaller in storage size.

Sometimes called 'main memory'.

Includes RAM and ROM.

97
New cards

What the characteristics of secondary storage?

Slower because it is not directly accessed by the CPU.

Typically larger in storage size.

Used for the long-term storage of data and files because it is non-volatile.

Includes magnetic, optical and solid state storage.

98
New cards

What is volatile memory?

Volatile storage is temporary - data is lost whenever the power is turned off.​

EG: RAM

99
New cards

What is non-volatile storage?

Non-volatile storage saves the data even when not being powered. Data can be stored long-term and accessed when the computer is switched on. EG: ROM

100
New cards

Why do Computers need Primary Storage?

Primary storage is low-capacity, internal storage that can be directly accessed by the CPU.

Program instructions and data must be copied from the hard drive into RAM to be processed by the CPU because primary storage access speeds are much faster than secondary storage devices like the hard drive.