Computer Science AS / A Level Year 1 Full Content

5.0(1)
studied byStudied by 6 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/250

flashcard set

Earn XP

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

251 Terms

1
New cards

What is the main function of the processor?

The processor is the brain of a computer and executes instructions, which allows programs to run.

2
New cards

What is the ALU and what operations does it perform?

The ALU completes all of the arithmetical and logical operations. Arithmetical operations include all mathematical operations such as addition and subtraction on fixed or floating-point numbers. Logical operations include Boolean logic operations such as AND, OR, NOT, and XOR.

3
New cards

What are the responsibilities of the Control Unit (x5)?

The Control Unit directs the operations of the CPU. Its jobs include:

  • Controlling and coordinating the activities of the CPU.

  • Managing the flow of data between the CPU and other devices.

  • Accepting the next instruction.

  • Decoding instructions.

  • Storing the resulting data back in memory.

4
New cards

What are registers and what is their general purpose?

Registers are small memory cells that operate at a very high speed. They are used to temporarily store data, and all arithmetic, logical, and shift operations occur in these registers.

5
New cards

What is the purpose of the Program Counter (PC)?

Holds the address of the next instruction to be executed.

6
New cards

What does the Accumulator (ACC) do?

Stores the results from calculations, from the ALU

7
New cards

What is the function of the Memory Address Register (MAR)?

Holds the address of a location that is to be read from or written to.

8
New cards

What is the role of the Memory Data Register (MDR)?

Temporarily stores data that has been read or data that needs to be written.

9
New cards

What does the Current Instruction Register (CIR) do?

Holds the current instruction being executed, divided up into operand and opcode.

10
New cards

What are buses in the CPU and what do they connect?

Buses are a set of parallel wires which connect two or more components inside the CPU. The three buses (data, control, and address) are collectively called the system bus.

11
New cards

What is bus width and how does it affect data transfer?

The width of the bus is the number of parallel wires it has. It is directly proportional to the number of bits that can be transferred simultaneously at any given time. Buses are typically 8, 16, 32 or 64 wires wide.

12
New cards

Describe the Data Bus.

This is a bi-directional bus (meaning bits can be carried in both directions) used for transporting data and instructions between components.

13
New cards

Describe the Address Bus.

This bus transmits the memory addresses specifying where data is to be sent to or retrieved from. The width of the address bus is proportional to the number of addressable memory locations.

14
New cards

Describe the Control Bus and its signals.

This is a bi-directional bus used to transmit control signals between internal and external components. It coordinates the use of the address and data buses and provides status information. Control signals include bus request, bus grant, memory write, memory read, interrupt request, and clock.

15
New cards

What is assembly language, and how is an instruction structured in the CIR?

Assembly code uses mnemonics (e.g., ADD for addition) to represent instructions, providing a simplified way of representing machine code. In the Current Instruction Register (CIR), an instruction is divided into an operand and an opcode. The operand contains the data or the address of the data, while the opcode specifies the type of instruction to be executed.

16
New cards

What is pipelining and how does it improve efficiency?

Pipelining is the process of completing the fetch, decode, and execute cycles of three separate instructions simultaneously. It holds appropriate data in a buffer near the CPU until required, aiming to reduce the amount of the CPU kept idle. While one instruction is being executed, another can be decoded, and another fetched. It is separated into instruction pipelining and arithmetic pipelining.

17
New cards

What is the Fetch-Decode-Execute Cycle?

It is the sequence of operations that are completed in order to execute an instruction.

18
New cards

Describe the steps of the Fetch phase in the F-D-E Cycle.

The address from the Program Counter (PC) is copied to the Memory Address Register (MAR). The instruction held at that address is copied to the Memory Data Register (MDR) by the data bus. Simultaneously, the contents of the PC are increased by 1. The value held in the MDR is copied to the Current Instruction Register (CIR).

19
New cards

Describe the Decode phase in the F-D-E Cycle.

The contents of the Current Instruction Register (CIR) are split into operand and opcode.

20
New cards

Describe the Execute phase in the F-D-E Cycle.

The decoded instruction is executed.

21
New cards

What are the three main factors affecting CPU performance?

Clock speed, number of cores, and the amount and type of cache memory.

22
New cards

How does clock speed affect CPU performance?

The clock speed is determined by the system clock, an electronic device that generates signals (switching between 0 and 1). All processor activities begin on a clock pulse (when the clock changes from 0 to 1), so a higher clock speed means more operations can start per second.

23
New cards

How do multiple cores affect CPU performance?

A core is an independent processor capable of running its own fetch-execute cycle. A computer with multiple cores can complete more than one fetch-execute cycle at any given time, theoretically allowing tasks to be completed much faster (e.g., twice as fast with dual cores). However, not all programs can efficiently utilise multiple cores if not designed to do so.

24
New cards

What is cache memory and how does it improve performance?

Cache memory is the CPU’s onboard memory. Instructions fetched from main memory are copied to the cache, allowing quicker access if they are required again. As the cache fills up, unused instructions are replaced.

25
New cards

Describe Level 1 Cache.

Very fast memory cells with a small capacity (2-64KB).

26
New cards

Describe Level 2 Cache.

Relatively fast memory cell, with a medium-sized capacity (256KB-2MB).

27
New cards

Describe Level 3 Cache.

Much larger and slower memory cell compared to Level 1 and Level 2.

28
New cards

What are the key characteristics of Von Neumann Architecture?

This architecture includes basic computer components (single control unit, ALU, registers, and memory units). It uses a shared memory and a shared data bus for both data and instructions. It is built on the stored program concept.

29
New cards

What are the advantages of Von Neumann Architecture?

Cheaper to develop as the control unit is easier to design. Programs can be optimised in size.

30
New cards

What are the key characteristics of Harvard Architecture?

Harvard architecture has physically separate memories for instructions and data. It is more commonly used with embedded processors. This design is useful when memories have different characteristics (e.g., read-only instructions, read-write data) and allows for optimising the size of individual memory cells and their buses.

31
New cards

What are the advantages of Harvard Architecture?

Quicker execution as data and instructions can be fetched in parallel. Memories can be different sizes, which can make more efficient use of space.

32
New cards

How do contemporary processors use architecture?

Contemporary processors use a combination of Harvard and Von Neumann architecture. Von Neumann is used when working with data and instructions in main memory, but Harvard architecture is used to divide the cache into instruction cache and data cache.

33
New cards

What are RISC processors characterized by?

RISC processors have a small instruction set. Each instruction is approximately one line of machine code and takes one clock cycle. Pipelining is possible. The compiler has to do more work to translate high-level code, and more RAM is required to store the code.

34
New cards

What are CISC processors characterized by?

CISC processors have a large instruction set, aiming to accomplish tasks in as few lines of assembly code as possible. These instructions are built into the hardware. They are now more used in microcontrollers and embedded systems. The compiler has less work to translate high-level code, and less RAM is required since the code is shorter. However, many specialised instructions are made, even though only a few of them are used.

35
New cards

What is a GPU and what are its uses?

A GPU is a device with lots of independent processors which work in parallel, making it very efficient at completing repetitive tasks such as image processing and machine learning. GPUs are a type of co-processor (a secondary processor designed to supplement the activities of the primary processor).

36
New cards

What are multi-core systems?

Multi-core CPUs have multiple independent cores that can complete instructions separately, resulting in higher performance. They generally perform better in larger projects than parallel systems.

37
New cards

What are parallel systems?

Parallel systems accomplish a similar task to multi-core systems but can complete tasks with a single core by using threading.

38
New cards

What is an input device? Provide examples.

An input device is one which can be used to put data and information into a computer. Examples include a keyboard, webcam, magnetic stripe reader, and barcode reader.

39
New cards

What is an output device? Provide examples.

An output device is one which can be used to send information from the computer. Examples include speakers, printers, and a projector.

40
New cards

Can a device be both an input and an output device? Provide an example.

Yes, a small number of devices can be categorised as both input and output devices. For example, a touch screen outputs information visually while acting as a device for touch input.

41
New cards

How do optical devices store and read information?

Optical devices are read from and written to using lasers. Binary information is represented by portions of the disc (pits and lands) which either reflect or scatter the incident laser light, written in spiral tracks. Pits represent a 0 and lands represent a 1.

42
New cards

Describe CDs and their characteristics.

CDs use optical technology to store small quantities of information, most commonly for audio files, text, and digital images. They are portable but are easily damaged by scratches, have limited storage capacity, and relatively slow transfer speeds. Varieties include CD-R (write once), CD-RW (rewritable), and CD-ROM (read-only after production).

43
New cards

Describe DVDs.

Similar to CDs, DVDs are optical devices with a higher storage capacity than CDs, making them suited to storing digital videos.

44
New cards

Describe Blu-Ray discs.

An advancement over DVDs, Blu-ray discs have more than five times as much storage than traditional DVDs, useful for storing high-resolution films.

45
New cards

How do magnetic devices store binary information?

Magnetic devices represent binary information using two magnetic states: polarised and unpolarised. These two states (1 and 0) are read by a read/write head.

46
New cards

Describe HDDs and their characteristics.

HDDs typically have high capacities (500GB to 5TB). They work by rotating magnetic platters at high speeds under a read/write head on an actuating arm. Disadvantages include somewhat slow data transfer speeds and a tendency to become damaged by movement due to brittle platters and moving parts.

47
New cards

Describe magnetic tape.

First used in the 1950s, magnetic tape stores data magnetically on long stretches of tape wound onto reels. It was a bulky way to store data, though improvements were made.

48
New cards

Describe floppy disks.

A floppy disk comprises a thin magnetic disk enclosed in plastic, making them incredibly portable for exchanging small amounts of data. They had a typical storage capacity of 1MB, with some later versions up to 200MB.

49
New cards

How does flash storage work and what are its key properties?

Flash storage is fast and compact, using silicon semiconductors (NAND and NOR logic gates) to store electrical charge in one of two states (high or low) representing binary values. Information is stored in blocks, which form pages. It can be electronically erased and reprogrammed, is non-volatile (retains data without power). NOR is preferred for small data, NAND for larger files. Generally, it is more expensive per gigabyte than magnetic and optical storage.

50
New cards

Describe SSDs and their advantages/disadvantages.

SSDs are extremely light and portable and have no moving parts, making them much more resistant to damage from movement than HDDs. They are renowned for their high data transfer rates. The primary disadvantages are their cost (though decreasing) and their limited lifespan, as repeated writing increases the required voltage until pages become un-writable.

51
New cards

What is RAM and its characteristics?

RAM is a type of fast primary storage used to store data and programs the computer is currently using, which speeds up execution. It has higher access speeds than even flash memory. RAM is volatile, meaning it loses its information when power is lost, so it's used for temporary storage while the computer is running, not personal files. It is more expensive per gigabyte than secondary storage devices.

52
New cards

What is ROM and its characteristics?

ROM, as the name suggests, cannot be modified once programmed; the state of its memory cells does not change. It is useful for storing fixed sequences of instructions, like a computer’s startup (bootstrap) routine. ROM is non-volatile, meaning it retains its data even when the computer is powered off.

53
New cards

What is virtual storage and its advantages/disadvantages?

Virtual storage is the name given to storing information remotely so that it can be accessed by any computer with access to the same system, for example over the Internet. Examples include cloud storage services (Google Drive, Microsoft OneDrive) and networked storage. While convenient to access and share (often an abstraction of multiple drives acting like one), its disadvantages include limitations of a user’s network speed and high costs.

54
New cards

What is an operating system?

A collection of programs that work together to provide an interface between the user and the computer. They enable user communication with the computer and manage low-level tasks like memory and resource management.

55
New cards

Name the essential features an operating system provides.

Memory management, resource management (scheduling), file management, Input/Output management (device drivers), interrupt management, utility software, security (firewall), and a user interface.

56
New cards

What is the role of memory management in an OS?

To ensure main memory is shared fairly and efficiently between multiple programs and applications, especially when main memory is not large enough for all programs being used. It uses paging, segmentation, and virtual memory.

57
New cards

What is paging in memory management?

Memory is split into equal-sized sections called pages. Programs are also made of equally-sized pages, which can be swapped between main memory and the hard disk as needed.

58
New cards

What is segmentation in memory management?

Memory is split into logical-sized divisions called segments, which vary in size. These segments represent the structure and logical flow of a program, allocated to blocks of code like conditional statements or loops.

59
New cards

What is virtual memory?

Uses a section of the hard drive to act as RAM when main memory is insufficient. Sections of programs not currently in use are temporarily moved to virtual memory via paging, freeing up RAM.

60
New cards

What is "disk thrashing" and what causes it?

When the computer 'freezes' due to pages being swapped too frequently between the hard disk and main memory. More time is spent transferring pages than running the program, worsening as virtual memory fills.

61
New cards

What are interrupts?

Signals generated by software or hardware to indicate to the processor that a process needs attention. They have different priorities, which the OS must consider when allocating processor time.

62
New cards

Where are interrupts stored, and how are they ordered?

Interrupts are stored in a priority queue within a special register called an interrupt register, ordered by their priority.

63
New cards

When does the processor check for interrupts during the F-D-E cycle?

The processor checks the contents of the interrupt register at the end of each Fetch-Decode-Execute cycle.

64
New cards

What happens if a high-priority interrupt exists?

The current contents of the CPU's special purpose registers are temporarily transferred into a stack. The processor then loads the appropriate Interrupt Service Routine (ISR) into RAM, and a flag is set to signal the ISR has begun.

65
New cards

What happens after an interrupt has been serviced?

The flag is reset, the interrupt queue is re-checked for higher priority interrupts. If no more or only lower priority interrupts exist, the contents of the stack are transferred back to the registers, and the F-D-E cycle resumes.

66
New cards

What is the purpose of scheduling in an OS?

To ensure all sections of programs being run ('jobs') receive a fair amount of processing time. This is done using various scheduling algorithms.

67
New cards

What characterises pre-emptive scheduling?

Jobs are actively made to start and stop by the operating system. Examples include Multilevel Feedback Queues, Shortest Remaining Time, and Round Robin.

68
New cards

What characterises non-pre-emptive scheduling?

Once a job is started, it is left alone until it is completed. Examples include First Come First Served and Shortest Job First.

69
New cards

Describe Round Robin scheduling.

Each job is given a time slice of processor time. Once all jobs in the queue have used their slice, the OS grants another equal slice to each. This continues until a job is completed. Disadvantage: Longer jobs take much longer due to inefficient splitting, and it doesn't consider job priority.

70
New cards

Describe First Come First Served scheduling.

Jobs are processed in the chronological order by which they entered the queue. Advantage: Straightforward to implement. Disadvantage: Does not allocate processor time based on priority.

71
New cards

Describe Multi-level Feedback Queues scheduling.

Uses multiple queues, each ordered based on a different priority. Disadvantage: Can be difficult to implement due to deciding which job to prioritise based on a combination of priorities.

72
New cards

Describe Shortest Job First scheduling.

The queue is ordered by time required for completion, with the longest jobs serviced last. Best suited for batch systems. Disadvantages: Requires the processor to know or calculate job duration (not always possible), and there's a risk of processor starvation for longer jobs if short jobs keep being added.

73
New cards

Describe Shortest Remaining Time scheduling.

The queue is ordered by the time left for completion, with jobs having the least time serviced first. Disadvantage: Risk of processor starvation for longer jobs if short jobs are continuously added.

74
New cards

What is a distributed operating system?

Run across multiple devices, allowing the load to be spread across multiple computer processors when a task is run.

75
New cards

What is an embedded operating system?

Built to perform a small range of specific tasks and catered towards a specific device. They have limited functionality, are hard to update, but consume significantly less power.

76
New cards

What is a multi-tasking operating system?

Enables the user to carry out tasks seemingly simultaneously by using time slicing to quickly switch between programs and applications in memory.

77
New cards

What is a multi-user operating system?

Multiple users make use of one computer (e.g., a supercomputer). Requires a scheduling algorithm to ensure fair sharing of processor time and avoid processor starvation.

78
New cards

What is a real-time operating system?

Designed to perform a task within a guaranteed time frame, commonly used in time-critical computer systems. Crucial for safety in applications like nuclear power station control or self-driving cars.

79
New cards

What is the BIOS and its initial role upon computer startup?

The first program that runs when a computer is switched on. The Program Counter points to its location. It's responsible for running key tests before the operating system is loaded into memory.

80
New cards

Name some key tests performed by the BIOS.

POST (Power-on self-test): ensures hardware is connected and functional. Checking CPU clock, memory, and processor are operational. Testing for external memory devices. It's critical because the OS can only load into RAM after these checks.

81
New cards

What are device drivers?

Computer programs provided by the operating system that allow the operating system to interact with hardware. They communicate hardware requests to the OS.

82
New cards

What makes device drivers specific?

They are specific to the computer's architecture (e.g., different for smartphones, games consoles, desktop PCs) and also specific to the operating system installed on the device.

83
New cards

What is a virtual machine?

A software implementation of a computer system; a theoretical computer. It provides an environment with a translator for intermediate code to run.

84
New cards

What is intermediate code?

Code that is halfway between machine code and object code. It is independent of the processor architecture, making it usable across different machines and operating systems.

85
New cards

What are common uses and benefits of virtual machines?

Creating a development environment for programmers to test programs on different operating systems, saving time and money. Protection from malware (malware affects the VM, not the device). Running incompatible software (programs for different OS or versions).

86
New cards

What is a primary disadvantage of running intermediate code in a virtual machine?

Can be considerably slower compared to running low-level code on the device it was designed for.

87
New cards

What is applications software?

Software designed to be used by the end-user to perform one specific task. It requires systems software to run. Examples: desktop publishing, word processing, spreadsheets, web browsers.

88
New cards

What is systems software?

Low-level software responsible for running the computer system smoothly, interacting with hardware, and providing a platform for applications software. The user does not directly interact with it. Examples: library programs, utility programs, operating system, device drivers.

89
New cards

What are utilities in the context of system software?

Key pieces of system software integral to ensuring the consistent, high performance of the operating system. Each utility program has a specific function linked to the maintenance of the operating system.

90
New cards

What does a compression utility do?

Enables files to be compressed and decompressed, used for transmitting large files over the Internet or for scanned files.

91
New cards

What does a disk defragmentation utility do?

Rearranges the contents of the hard drive so files (which become fragmented and stored in different parts of memory as the disk fills) can be accessed faster, thereby improving performance.

92
New cards

What is the function of an antivirus utility?

Responsible for detecting potential threats, alerting the user, and removing these threats from the computer.

93
New cards

What does an automatic updating utility ensure?

Ensures the operating system is kept up to date, with updates (tackling bugs or security flaws) being automatically installed, making the system less vulnerable to malware and hacking.

94
New cards

What is the purpose of a backup utility?

Automatically creates routine copies of specific files selected by the user, at user-specified intervals, so files can be recovered in case of power failure, malicious attack, or other accidents.

95
New cards

What is source code?

Code written by a programmer that refers to object code before it has been compiled.

96
New cards

What defines open source software?

Can be used by anyone without a license and is distributed with the source code.

97
New cards

What are the advantages of open source software?

Can be modified and improved by anyone, offers technical support from an online community, and can be modified and sold on.

98
New cards

What are the disadvantages of open source software?

Online support may be insufficient or incorrect, and no user manuals are typically provided. It may also have lower security as it might not be developed in a controlled environment.

99
New cards

What defines closed source software?

Requires the user to hold an appropriate license to use it. Users cannot access the source code as the company owns the copyright license.

100
New cards

What are the advantages of closed source software?

Offers thorough, regular, and well-tested updates, expert support and user manuals from the owning company, and high levels of security as it is professionally developed.