Computer Science GCSE Knowledge Organisers
Computer Science GCSE Knowledge Organisers
COMPUTING
Knowledge Organisers
KEY VOCABULARY
CPU Central Processing Unit. - The “brain” of the computer An example of a typical PC’s innards.
Control Unit. - Part of the CPU that manages the functions of all other parts of the
CU
CPU
Decoder Part of the CU which decodes the binary instructions fetched from memory
Random Access Memory - The main volatile memory into which programs are loaded
RAM
from the hard drive
Memory Address Register - Small fast memory used to store the RAM address of the
MAR
next instruction
Memory Data Register - Small, fast memory used to store the information collected
MDR
from the RAM before processing
PC Program Counter - Keeps track of the current instruction number of the program
Accumulator Small, fast memory, used to keep track of the data currently being processed
Arithmetic and Logic Unit - Does the basic mathematics and comparisons during
ALU
processing
A physical connection between two elements of a computer system that allows the
Bus
transfer of data.
Cache Incredibly fast, but very expensive volatile memory using in the CPU
Junctions on a motherboard where the bus connections are controlled and routed.
Bridge (North /
Northbridge deals with core functions, whilst the Southbridge deals with the
South)
peripherals, input and output devices and Secondary Storage.
von Neumann The method used by all modern computers to allow the programming of a machine to
Architecture be changed depending on the required function.
Fetch / Decode / Basis of the von Neumann architecture – the repeated process where instructions are
Execute Cycle fetched from RAM, decoded into tasks and data, then carried out.
The number of FDE cycles that a CPU can carry out per second. Measured in Ghz
Clock Speed
(1 Ghz = 109 cycles per second or 1,000,000,000hz)
Some processors have multiple CPUs which can work in parallel, sequentially or can
Cores
multitask. Dual and Quad cores are common in modern PCs
Computing GCSE – 1.1
J276/01 – Systems Architecture b
FETCH
Control Unit •The instructions are fetched from
(CU) the memory
Cache
DECODER * ACC
REGISTERS
* MAR
CPU BUS
CLOCK
* MDR
EXECUTE DECODE
* PC •Once decoded, the CU tells each •The CU’s Decode works out what
part of the CPU what to do with the instruction is saying to do, by
ADDRESS BUS
CONTOL BUS
the data and the instructions are separating the Opcode from the
DATA BUS
Program
MAR
Counter ADDRESS BUS
ADDRESS DATA
0 LOAD loc 4
1 ADD loc 5
CLOCK Control Unit 2 STO loc 6
DECODER 3 END
4 23
CPU BUS
5 12
ALU Cache 6
7
…
EXAMPLE FILE SIZES SECONDARY STORAGE SPECS CONSIDERATIONS WHEN SELECTING SECONDARY STORAGE
1 page text 100kb TYPE CAPACITY SPEED Capacity How much data will it need to hold?
1 photo 6mb Magnetic HDD Terabytes 50-120 MB/s Speed How quickly must the data be written / read?
3 min MP3 6mb CD 700 mb 0.146 MB/s Does the storage device need to be transported?
Portability If yes, then size, shape and weight are important. Will it
3 min audio DVD 4.7 gb 1.32 MB/s
50mb require other devices to be used (eg. An optical reader).
track (CD) Blu-Ray 128 gb 72 MB/s
How robust is the device? Can it be moved without fear
DVD film 4gb SD Cards 4-32 gb 50-120 MB/s Durability of damage? Will it be used in a difficult environment?
HD film 8-15gb USB Drive Up to 1 tb 45-90 MB/s Does it need to be single use or rewritable?
Blu-Ray film 20-25gb Solid State Up to 4 tb but Does it need to be used over and over again without
200-550 MB/s Reliability failing, or will it receive minimal reuse? Will it need to
4k film 100gb + Drive (SSD) very expensive
store the information for long periods of time?
Cost Needs to be compared with the above and considered.
Computing GCSE – 1.4a WHY NETWORK?
J276/01 – Wired and Wireless Networks There are many reasons to create networks of computers, and increasingly few reasons not to.
Positives Negatives
KEY VOCABULARY
• Communication between users • Higher cost than single machines
Stand Alone A single machine, not connected to another • Sharing of files • Requires additional hardware
A collection of machines which can • Sharing of peripheral devices • Requires administration
Network
communicate with one another • Monitoring user activity • Open to attacks
• Access control or other security features • Client-Server systems are vulnerable to
The end-user has no need to know the • Centralised administration of machines server failure
Transparent
specifics of a network’s infrastructure • Multiple work stations available for users
Node A device on a network (PC or other device) • Possible to distribute workload for large
tasks
Link The connections between nodes
LAN Local Area Network (Single location) NETWORK HARDWARE All clients need an NIC to
connect to a ROUTER. This
Wide Area Network (Multiple connected
WAN could be a wireless adapter
locations)
or a network card.
VPN Virtual Private Network The Router in this simple
or
UTP Unshielded Twisted Pair – a type of cable connection can host
multiple clients, but more
Client The user machines on a network advanced hardware is
The central ‘controller’ machine on a Client NIC Router / WAP Internet needed for bigger networks
Server
network, including main data storage
P2P Peer-2-Peer. A network without a server. NETWORK ORGANISATION
CLIENT - SERVER PEER TO PEER
WAP Wireless Access Point Peer
Peer
NIC Network Interface Controller Server Peer
Controls the sending of data around a
Router
network Peer
Peer
A central connection for a small network,
Hub
which broadcasts all data to all clients
A smart hub for larger networks which only Client Client Client Client Client Peer
Switch Peer Peer
sends the data to the intended client
A single high-spec machine is designated the A distributed system where each node is equal.
Internet A worldwide collection of networks server, which includes the main file storage. Every computer can serve and request data
WAP Wireless Access Point Each client then requests data from the from all others. The system is easy to set up,
server which responds and fulfills the request. but slow and difficult to administer.
Computing GCSE – 1.4b How DNS works
J276/01 – The Internet All webpage has an IP Address which is a unique reference to find that page. But 87.245.200.153 isn’t
as easy for users to remember as google.com
KEY VOCABULARY
When the user types google.com into a web browser’s
WAN Wide Area Network address bar, the client sends a request to the DNS for
VPN Virtual Private Network the current location of google.com. The DNS returns
the request, telling the browser to go to
Client The user machines on a network 87.245.200.153. The browser now connects to the
The central ‘controller’ machine on a google server, at the IP address given, and looks for the
Server index.html file to start displaying the webpage.
network, including main data storage
Internet A worldwide network of networks
DNS Domain Name Server
Storing a file on a web-server for access DNS Hierarchy Each level on the hierarchy is separated with a ”.” and
Hosting root builds to make the URL for the data stored on the host
via the internet
Cloud A service which is stored remotely
Transmission Control Protocol / Internet com uk org edu Top Level Domain
Protocol.
TCP/IP These are the standards that allows
network nodes to communicate with one google co org thekibworthschool 2nd Level Domain
another on the internet
WWW World Wide Web - Pages of content
bbc 3rd Level Domain
email Electronic mail, sent through the internet
URL Unique Resource Location
The Cloud
Virtual Private Networks As our devices are all connected to the internet, they
VPNs are small collections of devices that act as though start to become client nodes in a web connected
physically connected in a LAN, but are actually widely “cloud” network. It’s called cloud because your data,
distributed and use a the internet as their network services and applications are available everywhere
connections. without wires. It’s just ‘there’ – like a cloud.
VPNs allow users to store data in a small, private area of the PCs like the Google Chromebook utilise the cloud to
internet, so they can get to it at any time, using an internet provide very cheap, very fast hardware, which just
connected device. connects you to the internet. All the storage,
The benefits are low cost and widely available data, but users applications and communication is done by services
must ensure that the data is protected as, without security, hosted on google’s servers.
their data is available to anyone connected to the internet!
Computing GCSE – 1.5a
J276/01 – Network Topology
Topology means “how a network is laid out and the connections between computers”
NAME DIAGRAM DESCRIPTION ADVANTAGES DISADVANTAGES
Ring Each node is connected to 2 All data flow in 1 direction – greatly reduced All data passes through every workstation
others, and packets tend to chance of collisions. on route
travel in 1 direction.
No need for network server If 1 node shuts down, then network
collapses
High speed
Hardware is more expensive than switches
Additional nodes can be added without / NICs
affecting performance
Star Each node connects to a hub Centralised management through the server Potentially higher set up costs, especially
or switch. A central machine in server and switch set ups.
acts as server whilst the Easy to add more machines to the network
outer nodes are clients. Central server determines the speed of the
If 1 machine fails, the others are unaffected network and the number of possible nodes
WHY LAYER?
Layering allows problems to be broken down into small
chunks, and then smaller solutions created to specific LAYER 4: Network
parts of the problem. These small parts interact in an This layer deals with the physical transmitting of the data. It converts the data into binary electronic signal that can be
understood by the network hardware. It uses protocols such as Ethernet or 802.11 (wireless) so the signal is hardware
agreed manner, allowing the solution to be built by independent and can use any available compliant physical medium, such as UTP or fibre optic wire.
different teams or companies.
Data transfer occurs by
Layering is not unique to computing. In the car industry, a LAYER 1 LAYER 1 breaking the file into small
Ford engine might be used with a Jaguar gearbox in a LAYER 2 LAYER 2 packets, adding each layer
Mazda car. By separating these ‘layers’, but agreeing on LAYER 3 to the packet in order at
LAYER 3
the interface between the layers, each company is free to the sending device, then
develop their layer as they see fit, without affecting the LAYER 4 LAYER 4
decoding in reverse order
other layers. It is also possible to swap one layer out, and Physical connection (wired/wireless) at the receiving device
replace it with another one – such as swapping an engine before rebuilding the file.
for a more powerful one.
This interoperability is important as it allows data (in Packet switching is the process that modern networks use to send large data between devices. The
data is split into small packets and numbered. The packets can travel by any route to the destination
computing) to be passed from one layer to the next.
where the receiving machine reassembles them into the correct order.
Computing GCSE – 1.6a KEY VOCABULARY - PROTECTIONS
J276/01 – System Security
Employing a white hat hacker to try to break into a system to test how
Penetration
KEY VOCABULARY - VULNERABILITIES good the security is. Any problems in the security can then be fixed
Testing
before they become vulnerable to real attack
Attempting to bypass a system’s security
Hacking features to gain unauthorised access to a Network procedures that capture, record and analyse all network
Network forensics
computer events to discover the source of security attacks
Malware is malicious software, loaded onto Network Policies Rules which govern how a network may be used – see over page
a computer with the intention to cause Software which analyses files, network traffic and incoming data to look
Malware
damage or to steal information. Viruses are for known malware such as viruses or worms. An infected file is
a type of malware Anti-malware
quarantined, and either cleaned or securely deleted to prevent further
software
Phishing is a common way to try to steal infection. Needs updating very regularly to ensure that the newest
information like passwords. Emails are sent, malware is being checked for
Phishing requesting the user logs into a website, but A firewall protects a system by checking all incoming and outgoing
the site is a fake, and the users details are Firewall
network traffic is legitimate
logged
Limiting the access of a user by their requirements to carry out their job.
People are the weakest point of any system. An admin will have more rights than a student, for example. Often even
Social If a hacker can convince a user to give over User level access admins do not give themselves full rights to prevent accidents, and will
engineering their data, this is the easiest way into a instead have a super-user account that will be used only for special
secure system high level jobs.
Using and algorithm to try every possible Encoding all data with a secure private, asymmetric key system, so that
Brute force encryption
combination of characters to ‘guess’ the if data is stolen, it cannot be read or used.
attack
users password.
Data interception, or Man in the Middle TYPES OF MALWARE
attacks are hacks that use ‘packet sniffer’
software to look at every piece of data being A program designed to infect a computer, then copy itself. Requires human
Data Virus ‘help’ to spread; usually through infected software being installed or spread
transmitted in the local area to find ones that
interception through unsecure removable media such as usb-drives
meet the hacker’s criteria. Often done by
creating ‘fake’ wireless networks to record Worm
A self-replicating program, which can run itself allowing it to spread very
users details quickly
Using SQL statements to trick a database A program which disguises itself as legitimate software, and appears to
Trojan Horse
SQL injection management system (DBMS) into providing perform one task, but is actually performing another
large amounts of data to the hacker Ransomware secretly encodes a users data and files, then offers to un-encode
Ransomware
Hackers flood a network with huge amounts the files if a large amount of money is paid to the hacker
Denial of
of fake data and requests in an attempt to A rootkit allows a hacker to gain full, and often repeated, control of a computer,
Service Attack Rootkit
overload the system so that it crashes including the host operating system, which helps the hacker avoid detection
Computing GCSE – 1.6b
J276/01 – System Security – Network Policy
Black Hat – The Bad Guys. They break into systems to cause chaos and
steal data for their own benefits
White Hat – Penetration Testing professionals. Often employed by
companies to test systems and provide feedback on security
Grey Hat – Not trying to cause damage, but aren’t trying to help either.
Red Hat – Scary people – stop Black Hat hackers by revenge hacking and
destroying the hacker’s system
Green Hat – n00bz trying to learn hacking. Often just download scripts
from the internet and run them without understanding the code. Often
exploited by Black Hat hackers to do stupid things
KEY VOCABULARY
An abstracted program which
Algorithm completes a given task, whatever the
data provided
Searching is looking through data,
making comparisons with a search
Search
term, until the algorithm either finds the
data, or identifies that it is not present.
Putting given sets of data into specified
order – usually ascending
Sort
(alphabetical) or descending (reverse
alphabetical) MERGE SORT
INSERTION SORT
A type of search where the computer
checks every variable, in order, until it
Linear Search
finds the search term. Potentially very
slow.
KEY VOCABULARY
An abstracted program which completes a
Algorithm
given task, whatever the data provided
Abstraction is moving a problem out of the
specific in order to create a general
Abstraction solution that would work in similar
scenarios. Ignoring the gritty details to
focus on the problem
¬
signals V
A tabular representation of the
possible inputs and outputs from a
Truth Table
given logic gate, or collection of
gates
1 to 1 instructions coded in mnemonics For coders to be able to write code quickly, high-level coding language have been made
Machine Code (STO, ADD, MOD, DIV etc) which must which allow the coder to use almost natural language (like English) to solve problems.
be converted to binary to run These ABSTRACTED LANGAUGES must be converted into binary code instructions that the
CPU can execute in order to work. This conversion of instructions is done in 1 of 2 ways.
Removing a level of detail to allow focus
on the problem solving rather than the They are either interpreted, one line at a time, and executed immediately, or they are
specifics. Python, and all other High translated by converting the entire code file in one go, then attempting to run the
Abstraction program only once the converter has finished compiling. c
Level languages are abstracted. You do
not need to know the machine code to
get something to happen Features of an Integrated Development Environment (IDE)
A utility to convert High Level Code into FEATURE PURPOSE and BENEFITS
Translator binary machine code so it can be
executed An IDE’s text editor is where the code is typed. It is not concerned with the
A utility which translates High Level look of the code, but usability. Additional features of IDE text editors are:
Text Editor
code on a line by line basis and line numbers, code colouring by context, automatic indentation,
Interpreter autocomplete, code-folding, overview ‘map’, multiple cursors
executes the program as it goes in a
special test environment IDEs will give real-time feedback to the coder to show any obvious errors
IDE Integrated Development Environment Error before compiling. These are often with highlighting or line markers.
Diagnostics Additionally, any errors which show up during compiling are flagged with
A place to type code, focused on the helpful guidance to the coder about the error type and the line number
Text Editor
content of the file, not the look of the file
A utility which attempts to turn the program into a runnable program. This
To test a program and provide feedback Compiler
Error Diagnostics will either be a translator/compiler or an interpreter
to the coder so that errors can be fixed
Run-Time A ‘safe sandbox’ where code can be tried out without installing it to the
Run Time Part of an IDE which allows a piece of Environment computer. Often ring-fenced from the main machine to prevent accidents.
Environment code to be tested without installation
Computing GCSE – 2.6a REMEMBER MAXIMUM VALUES!
J276/02 – Data Representation 1 Max value which can be represented with 8 bits (1 byte) = 255
Total number of available values = 256 (255 + 0)
KEY VOCABULARY
UNITS OF DATA IN COMPUTER SYSTEMS
Base 10 number system. Uses digits
Denary UNIT VALUE SIZE
0,1,2,3,4,5,6,7,8,9
bit (b) 0 or 1 1/8 of a byte
Base 2 number system. Uses digits 0 and 1
Binary nibble 4 bits ½ a byte (a nibble… get it?!)
only.
Base 16 number system. Uses characters 0-9 byte (B) 8 bits 1 byte
Hexadecimal (Hex)
and A,B,C,D,E and F kilobyte (kB) 10001 bytes 1,000 bytes
Contraction of BINARY DIGIT – a single value megabyte (mB) 10002 bytes 1,000,000 bytes
BIT
of 0 or 1 gigabyte (gB) 10003 bytes 1,000,000,000 bytes
Binary Code Representation of values using multiple bits terabyte (tB) 10004 bytes 1,000,000,000,000 bytes
A list of unique values, stored in binary, which petabyte (pB) 10005 bytes 1,000,000,000,000,000 bytes
Character Set represent the letters, numbers and symbols a
computer can show/use. BINARY PLACE VALUES
American Standard Code for Information BASE Exponent 27 26 25 24 23 22 21 20
Interchange.
ASCII PLACE
A character set which uses 7 bits to store 128 128 64 32 16 8 4 2 1
(27) characters VALUE
A character set which uses 8 bits to store 256 CONVERTING DENARY TO BINARY TO HEX
Extended ASCII
(28) characters
A characters set which uses 16 bits to store HEXADECIMAL
UNICODE There are two
65,535 characters (216) DENARY HEX
methods for
A whole number (value written to 0 decimal 0-9 0-9 converting a
INTEGER
places) 10 A HEX value to
FLOAT A decimal value 11 B Denary
Moving a value from one data 12 C
Conversion type/representation to another, for example
Binary to Hex
13 D OR:
14 E 5F = (5x16) + F
Mathematical term which tells you how many 5F = 80 + 15
Exponent 15 F
time to multiply a BASE by itself. 5F = 95
Computing GCSE – 2.6b
J276/02 – Data Representation 2
1 0 0 1 0 1 0 1 1
Joint Photographic Experts Group shift. The same is true at the highest
JPEG / JPG
Compression for images – lossy place value
Graphics Interchange Format 8 4 2 1
GIF
Lossless bitmapped image format for limited colours. This value is not counted, it is =11
Printable Document Format
overflow. 1 0 1 1
PDF Open standard for reproducing text and graphic In 8 bits, this sum reads : 203 + 94 =
documents without editing permissions – lossless 43! A single LEFT SHIFT (multiply by 2)
would result in an overflow error (when
Moving Pictures Expert Group
MPEG represented with 4 bits.)
Audio-Visual encoding for video Lossy
Moving Pictures Expert Group Audio Layer 3 8 4 2 1
Digital music files. Lossy compression, but very good
=10
MP3
and generally only removes sounds that are beyond 1 0 1 1 0
human hearing range
Computing GCSE – 2.6c
J276/02 – Data Representation 3
File Size
Colour Depth The number of bits used to represent
(bit depth) each pixel. Shown in bits per pixel (bpp)
The number of pixels used per unit eg
Resolution
pixels per inch (ppi)
Sound Quality
Data about the data – in relation to
images, it is the data that allows the
Metadata
computer to recreate the image from it’s
BIT DEPTH = NUMBER OF COLOURS ESTIMATING FILE SIZES
binary form.
Bit depth Available colours IMAGES:
Continuous changing values – no
Analogue 21 = 2
“smallest interval” 1 bit (Monochrome)
width X height X colour depth = size
The number of bits used to store the 2 bits 22 = 4
Bit Depth
sound 3 bits 23 = 8 SOUND:
The number of bits used to store 1 8 bits 28 = 256
Bit Rate No of channels X sample rate X bit depth
second of sound
16 bits (High Color) 216 = 65,536
The number of times the sound is To get the value into mB, you divide by
Sample Rate sampled in 1 second; measured in kHz 24 bits (True Color) 224 = 16.7 million
1,000,000!
(kilohertz or 1000’s per second) 32 bits (Deep Color) 232 = 4.3 billion