Data and instructions are both stored as binary and in main memory.
Instructions are sequentially fetched from memory one at a time.
The processor decodes and executes an instruction before cycling around to fetch the next instruction.
The cycle continues until no more instructions are available.
Arithmetic logic unit
Control unit
Clock
Register
Cache
Bus
The ALU carries out these functions:
Logical operations (AND, OR, NOT)
Shift operations (Binary shifts)
Arithmetic operations (addition, multiplication)
The control unit fetches, decodes and executes instructions inside the CPU:
ensures the execution of instructions is in the correct sequence and decodes them
sends control signals that control hardware
regulates processor timing using regular pulses from the system clock
sends and recieves control signals from other devices within the computer
Clock speed
Number of processor cores
Cache size
The CPU continually reads instructions stored in main memory and executes them as required.
Fetch: The next instruction is fetched from the main memory to the CPU
Decode: The instruction is decoded to work out what it is
Execute: The processor executes one instruction at a time. This may involve reading/writing to main memory
Solid state drives use electrical circuits to persistently store data.
It has no moving parts, so its portable and durable
Faster to access than magnetic storage
Lightweight, ideal for phones and tablets
More expensive than magnetic storage
Magnetic disks are read with a moving head inside the disk drive. Each section of a metal disk represents 1 bit. A magnetised section represents a binary ‘1’ and a demagnetised section represents a binary ‘0’
Moving head makes it slow to read from and write to
Moving head makes it more susceptible to damage
Vulnerable to magnetic fields
Cheaper than solid state storage
Huge capacity
Optical devices ue a laser to scan the surface of a spinning disc. The laser bounces light onto the surface which is covered in pits and lands. A sensor detects reflected light. Non-reflective pits are a binary ‘0’ and reflective lands are a binary ‘1’
Cheap to produce
Lightweight, easy to distribute
Can be corrupted or damaged easily by excessive sunlight or scratches
Data can be easily accessed from anywhere with an internet connection
Data can be shared more easily than sharing data stored locally
Additional storage and be added easily without having to invest in additional hardware with local storage
Backup is not an issue, as it is the responsibility of the provider to protect the data
You are dependent on an internet connection to access your data
Users are concerned about security, data can be easily attacked by a hacker with an internet connection
Embedded system software is custom-written to work for specific hardware. Non-embedded systems are more general purpose.
Their limited functions mean they are cheaper to build.
They require less processing power, so less power overall, and so some run on batteries.
Examples of embedded systems- dishwashers, electronic calculators, central heating systems
Examples of non-embedded systems- software in a PC, dedicated servers
Resource sharing- users can share peripheral devices, e.g. printers, and can distribute software, reducing costs
Communication- allows collaboration
Roaming access- users can sign into any computer on the network and access their files
Centralised updates and security
Scalability- networks can be easily expanded to accommodate growing needs
Risk of viruses spreading across a network
Expensive hardware
More difficult to manage larger networks
Performance degrades as network traffic increases
Users can move around freely within the area of the network without being disconnected
Users can share files without needing to be connected to a port
Cheaper and easier than having to install cables through walls
Easier to add new devices
Connection can be obstructed by walls and furniture
Less secure and easier to hack into as no physical connection is needed to intercept data
Susceptible to interference from other wireless devices or networks
More secure and harder to hack into as a physical connection is needed to intercept the data
No interference from other networks
Faster transfer speeds
Can support larger amounts of data
Installation costs can be expensive and requires space
User is restricted to physical connections and cannot move freely
Harder to add new devices than wireless networks- limited scalability
Susceptible to damage from environmental factors or construction work
Each node is seperately connected with its own cable, so the disconnection and failure of one cable doesn’t impact the rest of the network
Consistent performance even when the network is heavily used
New nodes can be added just by connecting them to the switch
High performance as message is passed onto intended node only- fast, reliable secure
Network is dependent on the switch, if the switch fails then no node can communicate
A wired star topology would require a lot of cables which can be expensive in a large network (wouldn’t impact wireless star topologies)
Easy to connect nodes to the network
Cheap to install as less cabling than in a star topology
Network depends on the backbone cable, whole network fails if backbone cable is broken
Terminators need to be installed
Increased chance of data collisions since all data travels along the central cable. Large amounts of network traffic causes more data collisions, so the network slows down if many devices are connected
Security risk, since all data travels along the central cable, so other nodes can “see” it
Biometric measures
Password systems
CAPTCHA
Tasks difficult for computers to form, but easy for humans, to distinguish between humans and computers and stop computers repeatedly trying to access a site
Email confirmations to confirm a user’s identity
Automatic software updates
Patching bugs before they can be exploited