Purpose of Systems Software
Designed to run or maintain a computer
Functionality of Systems Software
Controls the operations of computer hardware
Operating System Definition
Responsible for running the computer, managing hardware, applications, users, and resources
Uses of Operating Systems
Providing a UI, memory management/multitasking, peripheral management and drivers, user management, file management
Utility Software Definition
Designed to help maintain a computer system
Encryption Software Definition
Used for encrypting data
Defragmentation Software Definition
Reorganising data on a hard drive to put broken up files back together and collect up the free space
Data Compression Definition
Process of making the size of a file smaller
Types of Backup
Full and Incremental
Definition of Hacking
Illegal access or attack on a computer network or device
Malware
Malicious software for damaging or gaining illegal access to computer systems
Phishing
Criminals sending deceptive emails or texts posing as reputable businesses
Social Engineering
Illegally accessing data or networks by manipulating people
Brute Force Attack
Network attack using software to crack passwords through trial and error
Denial of Service Attack
Network attack preventing users from accessing part of a network or website
Data Interception and Theft
Intercepting data during network transmission, often through packet sniffing or wireless connection
SQL Injection
Entering SQL code into an input box to attempt a database attack
Poor Network Policy Example
Lack of encryption, user access control, passwords, or anti-malware/firewall software
Penetration Testing
Simulating attacks on a network to discover vulnerabilities
Network Forensics
Monitoring network traffic for investigative purposes
Network Policy
A set of rules and procedures to protect a network against attacks
Anti-Malware Software
Software to prevent malware damage to a computer or network
Firewall
Software limiting access to a computer system
User Access Levels
Controls access to files or network areas for different user groups
Secure Password
Include a varied range of characters
Encryption
Coding data for decoding with the correct key only
Network Topologies Examples
Star, Mesh, Bus, Tree
Star Network
All devices connected to a central switch or server in this topology
Mesh Network
Every device connected to every other directly or indirectly without a central switch or server
Wi-Fi
Standard for wireless connections between devices
Ethernet
Network protocol used on LANs
IP Address
A unique identifier given to a device on an IP network
MAC Address
A unique identifier assigned to a device
Common Protocols
TCP/IP, HTTP, HTTPS, FTP, POP, IMAP, SMTP
Layering System
Groups of protocols with similar functions
Application Layer
Turning data into websites and applications
Transport Layer
Controlling data flow and packet delivery
Internet Layer
Making connections between networks and handling traffic
Network Layer
Passing data over the physical network
Packet
Small units of data used for network file transfer
Packet Switching
The process of directing data packets on a network using routers and the IP protocol.
Types of Networks
LAN WAN
LAN
A network which only covers a single site
WAN
A network which connects networks in different geographical locations
Factors Affecting Network Performance
Bandwidth, number of users, wired connection, hardware, network topology
Client-Server Network
Managed by a server, takes requests from client devices
Peer-to-Peer Network
All devices are equal and connect directly to each other
Hardware for LAN Connection
WAP, routers/switches, NIC, transmission media
The Internet
A worldwide collection of computer networks
Components of the Internet
DNS, hosting, the cloud
What is DNS?
A server which stores website domain names and their IP addresses (domain name server)
What does hosting mean?
When a business uses its servers to store the files of another organisation
What is the cloud?
The use of the internet to store files and provide software
What is a virtual network?
A software-based network that exists between devices on a physical network
What is secondary storage?
External data storage used to store data so that the computer can be switched off
Why is capacity important?
To aid in the choice of media
How could you estimate the required capacity?
By adding together the file sizes for all the files that need to be stored
Name 3 common types of storage.
Optical, magnetic, solid state
State the 6 characteristics when choosing suitable storage devices.
Capacity, speed, portability, durability, reliability, cost
What is the difference between RAM and ROM?
RAM is volatile-temporary, ROM is non-volatile-permanent
Purpose of ROM in a Computer System
Tells the CPU how to boot up (BIOS)
Purpose of RAM in a Computer System
Main memory storing data, programs, and OS in use
Definition of Virtual Memory
Section of hard disk used as RAM to supplement main memory
Definition of Flash Memory
Common portable file storage form
Examples of Flash Memory
USB drive, SD card, SSD
Purpose of the CPU
Brain of the computer processing data and instructions
Parts of Von Neumann Architecture
MAR, MDR, PC, Accumulator
Definition of MAR
Holds memory address about to be used by CPU
Definition of MDR
Holds fetched or written data/instruction in memory
Definition of PC
Holds memory address of instruction for each cycle
What is the Accumulator?
Stores intermediate results in the Arithmetic Logic Unit (ALU)
Name 3 Common CPU Components
Control Unit (CU), Arithmetic Logic Unit (ALU), Cache Memory
What is the function of the ALU?
Performs mathematical and logical operations
What is the function of the CU?
Manages data flow, coordinates activities, follows Fetch-Decode-Execute (FDE) cycle
What is Cache?
High-speed memory near the CPU, stores frequently accessed data, checked before main memory
How does the CPU function?
Executes instructions in a Fetch-Decode-Execute (FDE) cycle
Name 3 factors affecting CPU performance
Clock speed, cache size, number of cores
What is an Embedded System?
Computers integrated into devices for specific functions like control systems
Examples of Embedded Systems
Dishwasher, microwave, television
What is Cloud Computing?
The delivery of computing services over the internet, including servers, storage, databases, networking, software, analytics, and intelligence.
Explain the concept of Virtualization.
The process of creating a virtual (rather than actual) version of something, such as a server, operating system, a storage device or network resources.
Define Artificial Intelligence (AI).
The simulation of human intelligence processes by machines, especially computer systems, to perform tasks that typically require human intelligence.
What is Machine Learning?
A subset of AI that provides systems the ability to automatically learn and improve from experience without being explicitly programmed.
Describe the Internet of Things (IoT).
The network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these objects to connect and exchange data.