Last Minute Revision Notes for OCR GCSE Computer Science
CPU and Its Components
Central Processing Unit (CPU): The main processor in a computer that carries out instructions of a computer program using data.
- Distinction between Instructions and Data: Instructions are the commands executed by the CPU, and data is the information processed by those commands.
Components of CPU:
- Arithmetic Logic Unit (ALU): Performs arithmetic and logic operations required for executing instructions.
- Control Unit (CU): Coordinates operations within the CPU, managing the fetch-execute cycle and decoding instructions.
- Cache: A small, fast type of volatile memory that stores frequently accessed data and instructions to improve speed. It's checked before the CPU accesses RAM.
- Registers: Ultra-fast, small storage locations within the CPU for temporary data storage. Key registers include:
- Memory Address Register (MAR): Holds the address of a memory location that is being accessed.
- Memory Data Register (MDR): Contains data that is either being fetched from or written to memory.
- Program Counter (PC): Holds the address of the next instruction to be executed.
- Accumulator: Stores the results of calculations performed by the ALU.
Fetch-Execute Cycle
Fetch-Execute Cycle: A process consisting of three main steps:
- Fetch: The instruction is retrieved from memory using the address in the Program Counter.
- Decode: The Control Unit interprets the instruction to understand what action is needed.
- Execute: The ALU performs the required operation, often fetching additional data if necessary.
Clock Speed: Indicates how many cycles per second the CPU can perform, measured in gigahertz (GHz). Higher clock speeds lead to faster processing.
Number of Cores: Refers to the number of processing units within the CPU. More cores allow simultaneous processing of multiple instructions, enhancing performance.
Embedded Systems: Computers designed for specific tasks within another device (e.g., household appliances, cars).
Storage Types
Primary Storage: RAM (volatile) and ROM (non-volatile). Cache and registers are not typically categorized in primary storage.
- RAM: Temporary storage that loses data when powered off. Virtual memory can sometimes be used when RAM is full.
- ROM: Contains the startup program to load the operating system and is non-volatile, retaining information when powered off.
Secondary Storage: Long-term storage of data and programs, primarily three types:
- Magnetic Storage: Example is Hard Disk Drives (HDD), utilizing magnetic polarity to store data.
- Optical Storage: Example is DVDs, using light reflections to represent data.
- Solid State Storage: Example is Solid State Drives (SSDs), which offer faster data access without moving parts.
Binary Units: Know conversions from bits to kilobytes, megabytes, etc. Basics include:
- 1 Byte = 8 bits
- 1 Kilobyte (KB) = 1,000 Bytes
Binary and Data Representation
- Character Sets: ASCII (8-bit, 256 characters) vs. Unicode (16+ bits, thousands of characters).
- Images: Composed of pixels, resolution is width x height. Color depth indicates bits per pixel.
- Sound: Sample rate (measured in Hz) and bit depth are crucial for digital sound quality.
Networks
Types of Networks:
- LAN (Local Area Network): Covers a small area, like a building.
- WAN (Wide Area Network): Covers a large geographic area with infrastructure owned by multiple entities.
Network Topologies:
- Star Topology: Central node manages all connections (easy to add devices but reliant on central device).
- Mesh Topology: Every device connects directly, high performance but complex.
Network Hardware:
- Devices like Switches and Routers manage data packets across networks using MAC addresses and IP addresses.
Protocols: Set of rules for data communication, examples include TCP (splits packets, error handling), POP, IMAP, SMTP (email protocols). The Internet uses IP addresses for routing.
Cybersecurity Threats
- SQL Injection: Attack through inserting SQL code into user input forms to manipulate databases.
- Brute Force Attacks: Attempting all password combinations. Mitigation: use of complex passwords.
- Denial of Service (DoS) Attacks: Flooding servers to disrupt service.
- Social Engineering: Manipulating people to gain confidential info, e.g., phishing.
Cybersecurity Measures
- Firewalls: Monitor and control incoming and outgoing network traffic based on security rules.
- Antimalware: Detects and removes malicious software.
- User Access Levels: Controls who can access sensitive information.
- Encryption: Secures data by converting it into a format that can only be read by someone with the decryption key.
Operating Systems
Role of OS: Manages hardware and software resources, provides an interface for users, and oversees tasks like multitasking and peripheral communication.
Utility Software: Supports system maintenance tasks (e.g., defragmentation). Not to be confused with application software targeted at users.
Data Protection and Legal Aspects:
- Data Protection Act: Obligates organizations to protect personal data and provides rights to individuals regarding their personal data.
- Computer Misuse Act: Makes hacking and unauthorized computer access illegal.
- Copyright, Designs and Patents Act: Protects intellectual property, ensuring creators retain rights to their works.
Ethical and Cultural Issues
Privacy Issues: Balancing data usage with individual rights.
Environmental Issues: Considerations on recycling and resource extraction for technology.
Exam Tips: For long-form answers (8-mark questions), focus on balanced arguments, context-relevant points, and logical flow in writing. Avoid lengthy introductions and conclusions, emphasizing clarity and detail in your responses.