0% found this document useful (0 votes)
504 views26 pages

Computer Science GCSE Knowledge Organisers

Uploaded by

Anandhi Vijay
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
504 views26 pages

Computer Science GCSE Knowledge Organisers

Uploaded by

Anandhi Vijay
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 26

OCR (J276) GCSE

COMPUTING
Knowledge Organisers

for i in knowledge organiser :


long_term_memory.append[i]
Computing GCSE – 1.1
J276/01 – Systems Architecture a

KEY VOCABULARY
CPU Central Processing Unit. - The “brain” of the computer An example of a typical PC’s innards.
Control Unit. - Part of the CPU that manages the functions of all other parts of the
CU
CPU
Decoder Part of the CU which decodes the binary instructions fetched from memory
Random Access Memory - The main volatile memory into which programs are loaded
RAM
from the hard drive
Memory Address Register - Small fast memory used to store the RAM address of the
MAR
next instruction
Memory Data Register - Small, fast memory used to store the information collected
MDR
from the RAM before processing
PC Program Counter - Keeps track of the current instruction number of the program
Accumulator Small, fast memory, used to keep track of the data currently being processed
Arithmetic and Logic Unit - Does the basic mathematics and comparisons during
ALU
processing
A physical connection between two elements of a computer system that allows the
Bus
transfer of data.
Cache Incredibly fast, but very expensive volatile memory using in the CPU
Junctions on a motherboard where the bus connections are controlled and routed.
Bridge (North /
Northbridge deals with core functions, whilst the Southbridge deals with the
South)
peripherals, input and output devices and Secondary Storage.
von Neumann The method used by all modern computers to allow the programming of a machine to
Architecture be changed depending on the required function.
Fetch / Decode / Basis of the von Neumann architecture – the repeated process where instructions are
Execute Cycle fetched from RAM, decoded into tasks and data, then carried out.
The number of FDE cycles that a CPU can carry out per second. Measured in Ghz
Clock Speed
(1 Ghz = 109 cycles per second or 1,000,000,000hz)
Some processors have multiple CPUs which can work in parallel, sequentially or can
Cores
multitask. Dual and Quad cores are common in modern PCs
Computing GCSE – 1.1
J276/01 – Systems Architecture b

BASIC DIAGRAM OF CPU The FETCH – DECODE – EXECUTE cycle

FETCH
Control Unit •The instructions are fetched from
(CU) the memory
Cache
DECODER * ACC

REGISTERS
* MAR
CPU BUS
CLOCK
* MDR
EXECUTE DECODE
* PC •Once decoded, the CU tells each •The CU’s Decode works out what
part of the CPU what to do with the instruction is saying to do, by
ADDRESS BUS
CONTOL BUS

the data and the instructions are separating the Opcode from the
DATA BUS

carried out Operand


ALU
KEY VOCABULARY
A program, stored in binary, that the CPU undertakes the
Machine
RAM FDE cycle on. All programs must be in machine code to
Code
work
A single line of machine code, containing the command
INPUT OUTPUT Instruction and data location on which it is to be executed. Stored in
binary
Opcode The first part of the instruction, is the command
Multi Core Processing
The second part of the instruction is the data on which to
Some processors have multiple CPU cores
carry out the command. This may be actual data stored in
on one chip. They all have their own Level Operand
binary form, or a memory location reference of where to
1 cache, but share Level 2 cache, allowing
find the data
them to collaborate quickly on large tasks.
Computing GCSE – 1.1
J276/01 – Systems Architecture – CPU and Fetch/Decode/Execute Cycle

Program
MAR
Counter ADDRESS BUS
ADDRESS DATA
0 LOAD loc 4
1 ADD loc 5
CLOCK Control Unit 2 STO loc 6
DECODER 3 END
4 23

CPU BUS
5 12
ALU Cache 6
7

Accumulator MDR DATA BUS INPUT /


OUTPUT
CONTROL BUS DEVICES
Computing GCSE – 1.1
J276/01 - Memory PRIMARY STORAGE - MEMORY
RAM is volatile memory, which stores data in a single transistor and capacitor. This means
KEY VOCABULARY it needs a constantly recycled charge to hold its data. If the power is turned off, it cannot
refresh the data and it is lost. This is known as DYNAMIC memory. The computer uses
Memory which requires constant electrical
RAM to store the current program or data being used.
Volatile charge. If the power is turned off, then the
data is lost
ROM is non-volatile. The data is hardcoded onto the chip by the manufacturer, and cannot
Memory which can retain its data when be overwritten by the user. Because it holds its information even when the power is
Non-volatile
the power is turned off turned off, this makes ROM ideal for storing the instructions needed to get the computer
RAM Random Access Memory started up – the BOOT PROCESS, and POST.

ROM Read-Only Memory Flash Memory is a new(ish) type of ROM


chip which holds its data when there is no
Very fast memory, on, or very close to the
Cache power making it non-volatile but that can be
CPU
rewritten easily by the user. By using a
A section of the HDD which can be used relatively large electric current, electrons
Virtual Memory as RAM for very memory intensive can be forced through a barrier and into the
processes storage layer. The pattern of electrons can
Flash Memory A type of dynamic (changeable) ROM be read as data without affecting the data.

The instructions needed to start the


VIRTUAL MEMORY
Boot Process computer and to initialize the operating
To increase the speed and efficiency of RAM, most machines allocate a small portion of
system.
the Hard Disk to VIRTUAL MEMORY. The contents of the RAM are moved between the
Power On Startup Test slower Virtual Memory and RAM as and when they are needed.
A series of checks done on the hardware
POST
of the computer to ensure the machine Using / Increasing Virtual Memory does not improve the speed of the computer, but
can run. rather using Virtual Memory increases the threshold at which a computer locks, by
increasing the usable memory, and preventing deadlock due to filling the available primary
PRIMARY MEMORY memory.
RELATIVE
TYPE VOLATILE? DYNAMIC?
SPEED
Cache YES YES Very Fast
RAM YES YES Fast
ROM NO NO Slow
Flash NO YES Slow
Virtual YES YES Very Slow Transfer Speed Increases / Capacity decreases
Computing GCSE – 1.3 All basic computing functions are done using Primary Storage – but this is either volatile RAM
J276/01 – Storage or static ROM. To allow storage of a user’s information once the power is turned off, non-
volatile, secondary storage is required.
KEY VOCABULARY SECONDARY STORAGE
Primary storage is RAM. Secondary TYPE CAPACITY COST SPEED Pros Cons
Secondary
storage refers to long term, non-volatile
Storage Slow read and write
data storage. Cheap and readily
speeds. Moving parts
Memory which can retain its data when available. Can have
Non-volatile make it susceptible to
the power is turned off Magnetic Very High Low Fast very high storage
damage if moved. Data
capacity and is
Data is stored by altering the magnetic can be wiped if placed
reliable
Magnetic charge (+ or -) to represent binary near a magnet
information Requires an optical
Cheap. Can be
A reflective layer or dye is marked to drive to be read. Data
Optical Low Very Low Slow either Read or
either reflect or not reflect a laser beam. corruption occurs over
Optical Read/Write.
The computer reads the reflections as time (10+ yrs)
binary data Much faster than Expensive and
Also known as Flash Memory, the data is magnetic drives. No relatively low capacity.
Flash /
stored by forcing (or flashing) electrons Low High Very Fast moving parts, so Has limited usable life
Solid State Solid State
through a barrier into a storage layer. hard to damage by – about 100,000
Here it is read as binary information movement. Silent. rewrites.

EXAMPLE FILE SIZES SECONDARY STORAGE SPECS CONSIDERATIONS WHEN SELECTING SECONDARY STORAGE
1 page text 100kb TYPE CAPACITY SPEED Capacity How much data will it need to hold?
1 photo 6mb Magnetic HDD Terabytes 50-120 MB/s Speed How quickly must the data be written / read?
3 min MP3 6mb CD 700 mb 0.146 MB/s Does the storage device need to be transported?
Portability If yes, then size, shape and weight are important. Will it
3 min audio DVD 4.7 gb 1.32 MB/s
50mb require other devices to be used (eg. An optical reader).
track (CD) Blu-Ray 128 gb 72 MB/s
How robust is the device? Can it be moved without fear
DVD film 4gb SD Cards 4-32 gb 50-120 MB/s Durability of damage? Will it be used in a difficult environment?
HD film 8-15gb USB Drive Up to 1 tb 45-90 MB/s Does it need to be single use or rewritable?
Blu-Ray film 20-25gb Solid State Up to 4 tb but Does it need to be used over and over again without
200-550 MB/s Reliability failing, or will it receive minimal reuse? Will it need to
4k film 100gb + Drive (SSD) very expensive
store the information for long periods of time?
Cost Needs to be compared with the above and considered.
Computing GCSE – 1.4a WHY NETWORK?
J276/01 – Wired and Wireless Networks There are many reasons to create networks of computers, and increasingly few reasons not to.
Positives Negatives
KEY VOCABULARY
• Communication between users • Higher cost than single machines
Stand Alone A single machine, not connected to another • Sharing of files • Requires additional hardware
A collection of machines which can • Sharing of peripheral devices • Requires administration
Network
communicate with one another • Monitoring user activity • Open to attacks
• Access control or other security features • Client-Server systems are vulnerable to
The end-user has no need to know the • Centralised administration of machines server failure
Transparent
specifics of a network’s infrastructure • Multiple work stations available for users
Node A device on a network (PC or other device) • Possible to distribute workload for large
tasks
Link The connections between nodes
LAN Local Area Network (Single location) NETWORK HARDWARE All clients need an NIC to
connect to a ROUTER. This
Wide Area Network (Multiple connected
WAN could be a wireless adapter
locations)
or a network card.
VPN Virtual Private Network The Router in this simple
or
UTP Unshielded Twisted Pair – a type of cable connection can host
multiple clients, but more
Client The user machines on a network advanced hardware is
The central ‘controller’ machine on a Client NIC Router / WAP Internet needed for bigger networks
Server
network, including main data storage
P2P Peer-2-Peer. A network without a server. NETWORK ORGANISATION
CLIENT - SERVER PEER TO PEER
WAP Wireless Access Point Peer
Peer
NIC Network Interface Controller Server Peer
Controls the sending of data around a
Router
network Peer
Peer
A central connection for a small network,
Hub
which broadcasts all data to all clients
A smart hub for larger networks which only Client Client Client Client Client Peer
Switch Peer Peer
sends the data to the intended client
A single high-spec machine is designated the A distributed system where each node is equal.
Internet A worldwide collection of networks server, which includes the main file storage. Every computer can serve and request data
WAP Wireless Access Point Each client then requests data from the from all others. The system is easy to set up,
server which responds and fulfills the request. but slow and difficult to administer.
Computing GCSE – 1.4b How DNS works
J276/01 – The Internet All webpage has an IP Address which is a unique reference to find that page. But 87.245.200.153 isn’t
as easy for users to remember as google.com
KEY VOCABULARY
When the user types google.com into a web browser’s
WAN Wide Area Network address bar, the client sends a request to the DNS for
VPN Virtual Private Network the current location of google.com. The DNS returns
the request, telling the browser to go to
Client The user machines on a network 87.245.200.153. The browser now connects to the
The central ‘controller’ machine on a google server, at the IP address given, and looks for the
Server index.html file to start displaying the webpage.
network, including main data storage
Internet A worldwide network of networks
DNS Domain Name Server
Storing a file on a web-server for access DNS Hierarchy Each level on the hierarchy is separated with a ”.” and
Hosting root builds to make the URL for the data stored on the host
via the internet
Cloud A service which is stored remotely
Transmission Control Protocol / Internet com uk org edu Top Level Domain
Protocol.
TCP/IP These are the standards that allows
network nodes to communicate with one google co org thekibworthschool 2nd Level Domain
another on the internet
WWW World Wide Web - Pages of content
bbc 3rd Level Domain
email Electronic mail, sent through the internet
URL Unique Resource Location
The Cloud
Virtual Private Networks As our devices are all connected to the internet, they
VPNs are small collections of devices that act as though start to become client nodes in a web connected
physically connected in a LAN, but are actually widely “cloud” network. It’s called cloud because your data,
distributed and use a the internet as their network services and applications are available everywhere
connections. without wires. It’s just ‘there’ – like a cloud.
VPNs allow users to store data in a small, private area of the PCs like the Google Chromebook utilise the cloud to
internet, so they can get to it at any time, using an internet provide very cheap, very fast hardware, which just
connected device. connects you to the internet. All the storage,
The benefits are low cost and widely available data, but users applications and communication is done by services
must ensure that the data is protected as, without security, hosted on google’s servers.
their data is available to anyone connected to the internet!
Computing GCSE – 1.5a
J276/01 – Network Topology
Topology means “how a network is laid out and the connections between computers”
NAME DIAGRAM DESCRIPTION ADVANTAGES DISADVANTAGES
Ring Each node is connected to 2 All data flow in 1 direction – greatly reduced All data passes through every workstation
others, and packets tend to chance of collisions. on route
travel in 1 direction.
No need for network server If 1 node shuts down, then network
collapses
High speed
Hardware is more expensive than switches
Additional nodes can be added without / NICs
affecting performance
Star Each node connects to a hub Centralised management through the server Potentially higher set up costs, especially
or switch. A central machine in server and switch set ups.
acts as server whilst the Easy to add more machines to the network
outer nodes are clients. Central server determines the speed of the
If 1 machine fails, the others are unaffected network and the number of possible nodes

If the server fails then the network fails


Mesh Every nodes is Multiple devices can transmit data at once, Cost is higher due to increased hardware
interconnected with every therefore can handle large amounts of data requirements
other, allowing for distributed
transmission. A failure of 1 device does not affect the rest Building and maintaining a mesh network
Mesh topology can be FULL of the network is costly and time consuming
MESH (where every possible
connection is made) or Adding devices does not impact on data The chance of redundant connections is
PARTIAL MESH (at least 2 transmission between existing devices very high, which increases the cost, and
computers are connected makes the network cost inefficient
with multiple links)
Bus Bus or Line topology is a Works well with small networks Difficult to fault test because who network
network where all nodes are crashes when there are errors
connected to a single cable Easiest option for connecting nodes with
(backbone). shared peripherals Additional devices slow down the network

Least costly in terms of hardware and cabling


Computing GCSE – 1.5b
J276/01 – Network Protocols

KEY VOCABULARY ENCRYPTION


The rules and standards that are agreed in order to make it possible for different Encryption is taking a message and changing the
Protocol letters in such a way that it is not readable. The
devices to talk to one another
correct recipient knows how to unscramble the
Each node on a network is given a unique 32 bit address (4x8bits) for example
IP Address
192.168.0.1 There are 4 billion possible combinations.
message and can read the text.
Modern encryption is 128bit and secure against
Dynamic Host Configuration Protocol – this protocol allows the network server to brute force attacks
DHCP
control the allocation of IP addresses PUBLIC KEY ENCRYPTION
Media Access Control Public Key Encryption is a method of securely
Unique addresses hard-coded into the network interface controller. Gives the sending data over the internet. The recipient’s
MAC Address
manufacturer, NIC type and unique identifying number. 48 bits displayed as Hex (eg computer uses an algorithm to produce 2 linked
01-23-45-67-89-ab-cd-ef) keys: a public key and a private key.
Transmission Control Protocol / A set of protocols that governs the transfer of data
TCP/IP
Internet Protocol over a network 1. Alice (the sender) requests Bob’s (the
Standards for writing webpages to display content for recipient) public key. This is shared.
HTTP Hyper Text Transfer Protocol 2. Alice uses Bob’s public key to encrypt the
display
message she wishes to send
Client-server protocol for requesting (client) and
Hyper Text Transfer Protocol 3. The encrypted document is sent over the
HTTPS delivering (server) resources, such as HTML,
Secure internet – it is secure.
securely
4. When Bob receives the encrypted document
Used to directly send files from one node to another
he combines his public key with the secret
FTP File Transfer Protocol over the internet. Commonly used for uploading files
private key. This allows the message to be
to webservers
decrypted and turned back into plain text
Used by email clients to download email from the
remote email server and save it onto the users
POP Post Office Protocol
computer. More or less redundant now, and has been
replaced by IMAP
Internet Message Access An alternative to POP, allowing more control such as
IMAP
Protocol the complete control of remote mailboxes
An old standard for transmission of email. SMTP can
only be used to push mail to client machines, whilst
SMTP Simple Mail Transfer Protocol
both POP and IMAP ae used by clients to retrieve
mail.
Computing GCSE – 1.5c
J276/01 – Network Layering TCP/IP Protocol Layers
KEY VOCABULARY LAYER 1: Application
The rules and standards that are
This layer ensures data is produced in a form that is acceptable to the application that will use it, such as
Protocol agreed in order to make it possible for web-browsers or email clients. This is where IMAP or HTML protocols would be used.
different devices to talk to one another
Rules organised into a distinct order in
Layering
which they need to be applied
The ability for different systems and LAYER 2: Transport
software to communicate, exchange This layer establishes the connection across the network. The transmitting device agrees with the
Interoperability receiving device the speed or data transfer, the size and number of packets and any error checking to be
data and use the information used. This layer uses TCP protocols
exchanged
Enclosing data inside another data
Encapsulation
structure to form a single component LAYER 3: Internet
Removing data from inside and
De-encapsulation This layer is concerned with transmitting the data across different networks. It identifies the destination
encapsulated item. and establishes the path the data will take between nodes. It uses IP protocols

WHY LAYER?
Layering allows problems to be broken down into small
chunks, and then smaller solutions created to specific LAYER 4: Network
parts of the problem. These small parts interact in an This layer deals with the physical transmitting of the data. It converts the data into binary electronic signal that can be
understood by the network hardware. It uses protocols such as Ethernet or 802.11 (wireless) so the signal is hardware
agreed manner, allowing the solution to be built by independent and can use any available compliant physical medium, such as UTP or fibre optic wire.
different teams or companies.
Data transfer occurs by
Layering is not unique to computing. In the car industry, a LAYER 1 LAYER 1 breaking the file into small
Ford engine might be used with a Jaguar gearbox in a LAYER 2 LAYER 2 packets, adding each layer
Mazda car. By separating these ‘layers’, but agreeing on LAYER 3 to the packet in order at
LAYER 3
the interface between the layers, each company is free to the sending device, then
develop their layer as they see fit, without affecting the LAYER 4 LAYER 4
decoding in reverse order
other layers. It is also possible to swap one layer out, and Physical connection (wired/wireless) at the receiving device
replace it with another one – such as swapping an engine before rebuilding the file.
for a more powerful one.
This interoperability is important as it allows data (in Packet switching is the process that modern networks use to send large data between devices. The
data is split into small packets and numbered. The packets can travel by any route to the destination
computing) to be passed from one layer to the next.
where the receiving machine reassembles them into the correct order.
Computing GCSE – 1.6a KEY VOCABULARY - PROTECTIONS
J276/01 – System Security
Employing a white hat hacker to try to break into a system to test how
Penetration
KEY VOCABULARY - VULNERABILITIES good the security is. Any problems in the security can then be fixed
Testing
before they become vulnerable to real attack
Attempting to bypass a system’s security
Hacking features to gain unauthorised access to a Network procedures that capture, record and analyse all network
Network forensics
computer events to discover the source of security attacks
Malware is malicious software, loaded onto Network Policies Rules which govern how a network may be used – see over page
a computer with the intention to cause Software which analyses files, network traffic and incoming data to look
Malware
damage or to steal information. Viruses are for known malware such as viruses or worms. An infected file is
a type of malware Anti-malware
quarantined, and either cleaned or securely deleted to prevent further
software
Phishing is a common way to try to steal infection. Needs updating very regularly to ensure that the newest
information like passwords. Emails are sent, malware is being checked for
Phishing requesting the user logs into a website, but A firewall protects a system by checking all incoming and outgoing
the site is a fake, and the users details are Firewall
network traffic is legitimate
logged
Limiting the access of a user by their requirements to carry out their job.
People are the weakest point of any system. An admin will have more rights than a student, for example. Often even
Social If a hacker can convince a user to give over User level access admins do not give themselves full rights to prevent accidents, and will
engineering their data, this is the easiest way into a instead have a super-user account that will be used only for special
secure system high level jobs.
Using and algorithm to try every possible Encoding all data with a secure private, asymmetric key system, so that
Brute force encryption
combination of characters to ‘guess’ the if data is stolen, it cannot be read or used.
attack
users password.
Data interception, or Man in the Middle TYPES OF MALWARE
attacks are hacks that use ‘packet sniffer’
software to look at every piece of data being A program designed to infect a computer, then copy itself. Requires human
Data Virus ‘help’ to spread; usually through infected software being installed or spread
transmitted in the local area to find ones that
interception through unsecure removable media such as usb-drives
meet the hacker’s criteria. Often done by
creating ‘fake’ wireless networks to record Worm
A self-replicating program, which can run itself allowing it to spread very
users details quickly
Using SQL statements to trick a database A program which disguises itself as legitimate software, and appears to
Trojan Horse
SQL injection management system (DBMS) into providing perform one task, but is actually performing another
large amounts of data to the hacker Ransomware secretly encodes a users data and files, then offers to un-encode
Ransomware
Hackers flood a network with huge amounts the files if a large amount of money is paid to the hacker
Denial of
of fake data and requests in an attempt to A rootkit allows a hacker to gain full, and often repeated, control of a computer,
Service Attack Rootkit
overload the system so that it crashes including the host operating system, which helps the hacker avoid detection
Computing GCSE – 1.6b
J276/01 – System Security – Network Policy

COMMON AREAS OF NETWORK POLICY


Governs the general use of the computer system and equipment by
Acceptable Use employees. Usually limited to that which is required to carry out only
the tasks that a user is employed to undertake
Rules to ensure that passwords are strong enough to prevent guessing
or brute force attack - often requiring the use of upper and lower case
Passwords letters, numbers and special characters. Also usually a minimum
length is required. Passwords usually have to be changed on a regular
basis
Email Governs what may and may not be sent by email
Even modest desktop computers can undertake
billions of cycles a second these days. Therefore,
The configuration of web browsers may limit the types and categories without any security features, such as limited
Web Access
of website that can be accessed
password attempts, or asking for only selected
Mobile Use What devices are and are not allowed to be used characters from a password, a home PC could
Govern what can be accessed from outside the system, and what can brute force crack commonly used passwords in
Remote Access very, very short periods of time!
only be accessed onsite
Govern how wireless access points (WAPs) are secured, who has
Wireless PEOPLE ARE ALWAYS THE WEAKEST PART OF A
access, and under what circumstances
COMPUTER SYSTEM!
Governs who can install software, and which users are able to use that
Software
software. May have different levels of access once inside the software
Rules about what services are provided by the institution and who may
Server
access data stored centrally and for what purposes
Back up policy determines how frequently back ups are undertaken,
and what type of back up (full, incremental, differential). It will also
Back Up state where the back up media must be stored and for how long. Often
a full weekly back up is required to be stored in a fire proof box in an
offsite location
Details what to do if something goes wrong, or if an attack is
Incident Response Plan
discovered.
Computing GCSE – 1.7a
J276/01 – Operating Systems

KEY VOCABULARY Operating Systems


Operating
systems Collections of programs that tell the computer hardware what to do.
(OS)
User The means of communication between the user and the computer.
interface These are typically either command line or GUI.
Command The most simple form of user interface where users type
Line commands into a prompt
Graphic User Most modern computers have a GUI, which uses icons to represent
Interface the programs and files. The user runs the programs through a
(GUI) touch-screen or mouse-controlled pointer
Voice Increasingly users are able to speak commands to devices such as
Command Google Home and Amazon’s Alexa
File Management User Interface
Memory The OS controls available memory, moving programs to and from
Windows Command Prompt
management secondary storage to RAM
Often users have more than 1 program running at once. In reality,
each CPU core can only carryout 1 task at a time, but the OS
Multitasking
alternates between the programs to make it appear that multiple
tasks are running simultaneously
Computers must communicate with a range of external devices
Peripheral such as printers, monitors and scanners (peripherals). The OS
management uses drivers to correctly pass data to the device and ensure correct
function.
A driver is a piece of software which provides communication Apple Graphical Interface
Drivers
between the CPU and a peripherals device
Multiple users can have accounts on the same computer, each with
User their own files, settings and applications, protected with passwords.
management The OS will ensure that only users who are granted permissions
can use files or programs belonging to other users.
File Computers store files and data in hierarchical folder systems. This
management is efficient and allows for quick navigation
Computing GCSE – 1.7b
J276/01 – Systems Software

KEY VOCABULARY TYPES OF BACK UP


Utility software supports the OS by Description Positives Negatives
performing a limited and specific task.
All files and folders are Only requires last back Requires the most space
Utility Software They are used to manage specific
Full backed up every time up to restore; quickest to on back up drive;
actions of the system, or undertake
restore slowest to back up
maintenance operations.
Only new files or files Faster to back up; Slowest to restore;
In order to keep data secure,
that have been requires less space; does needs at least one full
especially against outside threats, Incremental
changed since the last not store duplicate files back up to start
Encryption data must be encrypted. Encryption
back up are copied
software software uses complex algorithms to
encode data so it cannot be read DISK DEFRAGMENTATION:
without the private access keys.
Over time, as new files get added,
Over time, through multiple updates
and saves, files will become split up
old ones deleted and files increase A
and distributed over the platters. It through use, the parts of files get
Disk separated around the HDD. (A to B)
takes longer for the files to be
Defragmentation This separation causes computer
accessed, slowing the machine down.
Defragmentation reorganises the files’ slow-down.
parts to bring them together. See fig 1. B
Allows files to be made smaller by In order to improve performance,
Data removal of empty space or through disk defrag applications shuffle file
Compressions compression algorithms (lossy or parts back into order, and moves all
lossless) – see KO2.6b free space to the end of the
drive.(C)
In case of hardware failure or other
computer problems, data should be
C
Back Up This improves data access times
copied to external media so that it can
be restored if lost or damaged. and overall system performance.
Continually scans the system to find, A computing
Antivirus quarantine, and clean any file infected joke… get it?
with viruses.
Continually scans to identify any
Anti-malware malicious software from being
introduced to the system.
Computing GCSE – 1.8 COMPUTING LEGISLATION
J276/01 – Ethical, Legal, Cultural & Environmental Sets out how data users who store data about individuals must
The Data Protection
KEY VOCABULARY use that data. It is a set of 8 principles which say how personal
Act (1998)
data must be collected, used and destroyed. See back of sheet
Relates to right and wrong but in a moral sense
than a legal issue. For example, there is nothing Introduced to deal with the increase in computer hacking in the
Ethical to stop you legally from using Facebook to stalk late 1980s when home PCs started to become popular. It aims
an ex-partner, but whether it is right to do so, is to protect computer users against willful attacks and theft of
Computer Misuse Act
an ethical issue information. The Act makes it illegal to:
(1990)
• gain unauthorized access to another person’s data
There are certain laws set by government that • …with the intention of breaking the law further
Legal
control how computers can be used – see box • ….to delete, alter or sabotage by introducing viruses
These issues relate to society and how Provides the creators of intellectual property (ideas = IP) with
technology can affect religious, or social ideas. If Copyright and
Cultural proof of ownership, and the exclusive rights to use that idea,
people spend all their time on their phones rather Design Patents Act
and distribute their work. It makes it illegal to copy, modify or
than talking face to face, this is a cultural issue (1988)
distribute IP without permission
How computing impacts on the global and local FOI requires public organisations to publish certain data so the
environments. This might be waste production, or public can access it. It also give individuals the right to request
mining to gather resources needed to make Freedom of
Environmental to see all data from over 100,000 public bodies.
phones, or using renewable energy to charge Information Act
The act covers all electronic information, such as word docs,
phones, or recycling projects. Companies want to (2000)
emails, digital records. Organisations can withhold certain
be seen to be ‘green’. information if releasing it would affect national security
Privacy is a very important issue. A persons right Creative Commons Licensing (CC) is a way that copyright
to privacy is very important and there are strong Creative Commons
Privacy holders can grant certain privileges to publicly use, share,
law, alongside ethical guidance that govern how Licensing
adapt, alter and redistribute IP without written permission.
companies can use our data
Anyone that is impacted on, in any way, by a
Stakeholder OPEN SOURCE vs PROPRIETARY SOFTWARE
technology. They have a vested interest
Software that is created and shared with the Proprietary software is not freely
source-code able to be seen. Users are free to Open source software is freely available available. The compiled code is secured
Open source make alterations to the source-code to meet their so others can use it. Users can access and user must use the software as
own needs, or to improve the system for and modify the source-code and create provided. Any attempt to modify, copy or
everyone their own versions. redistribute the software is a breach of
Copyright.
Software that is created but the source code is
Proprietary locked. This is often sold and the company wants EXAMPLES: EXAMPLES:
to protect its intellectual copyright Linux, Firefox, Android OS Microsoft Office, Adobe Photoshop, OSX
Legislation Laws that relate to a certain area
TYPES OF HACKER

Black Hat – The Bad Guys. They break into systems to cause chaos and
steal data for their own benefits
White Hat – Penetration Testing professionals. Often employed by
companies to test systems and provide feedback on security
Grey Hat – Not trying to cause damage, but aren’t trying to help either.
Red Hat – Scary people – stop Black Hat hackers by revenge hacking and
destroying the hacker’s system
Green Hat – n00bz trying to learn hacking. Often just download scripts
from the internet and run them without understanding the code. Often
exploited by Black Hat hackers to do stupid things

The Kibworth School - Computing GCSE


Computing GCSE – 2.1a LINEAR SEARCH BINARY SEARCH
J276/02 – Algorithms: Searching and Sorting

KEY VOCABULARY
An abstracted program which
Algorithm completes a given task, whatever the
data provided
Searching is looking through data,
making comparisons with a search
Search
term, until the algorithm either finds the
data, or identifies that it is not present.
Putting given sets of data into specified
order – usually ascending
Sort
(alphabetical) or descending (reverse
alphabetical) MERGE SORT
INSERTION SORT
A type of search where the computer
checks every variable, in order, until it
Linear Search
finds the search term. Potentially very
slow.

A search type based on repeatedly


Binary Search halving the searchable data, until the
search term is found

A method of sorting data which looks at


pairs of variable, and swaps them
Bubble Sort around if out of order. This continues
until there are no more swaps to be
made

Splits the data into increasingly small


segments, until single data points are BUBBLE SORT
Merge Sort
reached, then reassembles the data
structure one item at a time.

Checks through the data until finding


the first incorrectly places item. The
Insertion Sort algorithm then checks all the previous
places to see where the data fits,
before inserting it into this slot.
Computing GCSE – 2.1b
J276/02 – Algorithms: Pseudo Code & Flow Charts

KEY VOCABULARY
An abstracted program which completes a
Algorithm
given task, whatever the data provided
Abstraction is moving a problem out of the
specific in order to create a general
Abstraction solution that would work in similar
scenarios. Ignoring the gritty details to
focus on the problem

Breaking a problem down into smaller,


Decomposition
computational solvable chunks

A structured way of planning code, which


is ‘computational’ in style (uses Boolean
Pseudo Code logic, variables, comparisons and
arithmetic for example) but is not tied to a
strict high-level language’s syntax

A diagram, made using specific shaped


boxes, that mocks up the flow of a
Flow Diagram
program through various stages,
processes and decisions.

Using Boolean logic to guide the computer


Program Control
through a program based on decisions

The symbols used to look at a variable or


Comparison
piece of data in relation to is similarity to
Operators
another piece of data or variable

The symbols used to show the


Arithmetic
mathematics to be carried out on a piece
Operators
of data
Computing GCSE – Python
J276/02 – Programming Techniques

KEY VOCABULARY KEY VOCABULARY


A piece of stored data, used in a computer program, Declaration Assigning a value to a variable
Variable
which can be changed or altered by the program
Typecasting Casting a variable as and integer, Bool, Float or String
A piece of stored data which cannot be changed by the
Constant ‘Lists’ of data, stored in an indexable table format
program or user
An operator is a mathematical symbol, used to work with Data Arrays
Operator
data in a program
Input Data, entered into a program, by the user
A data structure which has more than 1 ‘row’ of data.
Output The returned result of an algorithm
2D arrays use 2 indexes to identify data
A set of instructions to carry out a process or problem-
Algorithm
solving operation, especially by a computer IMPORTANT!!!
Selection of code to be executed, based on the results of 2D arrays use the Y axis first in the co-ordinates, then
program control the X axis. This is the opposite way around to most other
prior operations in a program, or user input
co-ordinates!
Loop A piece of repeating code
A type of LOOP which repeats a series of steps with a
Iteration
finite number of variable changes 2D Arrays
A type of LOOP that watches a variable for a logical (T
Sentinel
to F, or F to T) and repeats until that change occurs
A method of controlling the information flow through
branching steps – the code checks if something is True,
Conditional
then carries out one set of instructions if it is, and a
different set of instructions if it is False.
A series of coded instructions for a computer to follow,
Sequence
step by step
String A character, or characters, stored as a list, within “ ”.
Integer A whole numbers, stored as its value
Real A decimal number, stored as its value
Boolean True or False. Stored as 1 or 0.
Computing GCSE – 2.3
J276/02 – Producing Robust Programs

KEY VOCABULARY TESTING DATA


Defensive Planning a program from the very beginning to prevent accidental or The data that will be used to check the code
Data Range
design purposeful misuse works correctly
Input Valid Data Obvious data which should definitely pass
Removing erroneous data from a system prior to processing
sanitization
Unusual data – the highest and lowest data –
Valid Extreme
Data validation Ensuring all data is in the correct format prior to processing on the very edge of what should pass
Contingency Having built in checks and outcomes based on what happens when Data, of correct type, which is on the very edge
Invalid Extreme
planning things go wrong of what should fail
Anticipating Building programs which do not allow a user to deliberately break Data, of the correct type, that should definitely
Invalid Data
misuse the system fail
Having different levels of user, and preventing everyday users from Erroneous Data Data that is the wrong type and should fail
Authentication
being able to significantly change a system
Expected The data the code should output if it is running
Building software which is modular to enable sections to be updated Outcome correctly
Maintainability and replaced without having to write the whole program again from
scratch
Code Annotating code so that the person maintaining or working with your ERROR TYPES
comments code in the future is able to understand your thought process An error in the code – incorrectly typed,
Syntax Error
Making code more readable by laying it out in a manner that keeps missing punctuation etc
Indentation
sections of code separate An error which, although allows the code to
Logical Error
Step by step testing to ensure that small sections of the code work, run, produces incorrect outcomes
Iterative testing before new parts are added and then retested. Important to allow The End of File has been reached, whilst
traceback to find what caused any errors EOF Error the computer is waiting for a snippet to be
Significant testing done once a program is complete under a range completed.
Terminal testing
of conditions and on multiple hardware – often called Alpha Testing Attempting to use data incorrectly – adding
Type Error
Making a small release of the software to a group of tech-literate 1 to a string etc
Beta Testing enthusiasts to broaden the usage-testing and get lots of feedback Name Error Using a variable before its declaration
prior to full release.
Indentation Error Loops or functions are incorrectly indented
syntax error An error in the typing of the code. Missing punctuation, spacing etc
Data chosen to test the program. Testers use a specific range of
Test data
data
Computing GCSE – 2.4
J276/02 – Computational Logic

KEY VOCABULARY LOGIC GATES


These gates take inputs (usually labelled A, B, C etc, and provide a single output. In this case
A system designed to perform a labelled F, but could be another letter. Each gate is shown with its TRUTH TABLE
Logic specific task according to strict
principles.

The physical switches inside an


electronic device which are able to
Logic Gates perform the calculations a computer
needs to carry out on electronic

¬
signals V
A tabular representation of the
possible inputs and outputs from a
Truth Table
given logic gate, or collection of
gates

Boolean Mathematical TRUE or FALSE


Operator A mathematical symbol in computing
+
-
Addition [ 1+2=3 ]
Subtraction [ 2-1=1 ]
V
/ Division [ 5 / 2=2.5 ] COMBINED GATES – Logic gates can be combined in any A B C NOT A B AND C X = (NOT
order to provide a range of computational possibilities. A) OR (B
AND C)
* Multiplication [ 2 * 2 = 4 ]
Inside a CPU, the physical switches are logic gates, and
0 0 0 1 0 1
Exponentiation, raising a number to but combining them in different sequences, computers
^
the power of… [ 3^3 = 3 * 3 * 3 = 27 ] can undertake incredibly complex mathematics with 0 0 1 1 0 1

these very simple tools. 0 1 0 1 0 1


Modulus division. To divide a number 0 1 1 1 1 1
MOD by another, but only return the
1 0 0 0 0 0
remainder [ 10 MOD 3 = 1 ]
1 0 1 0 0 0
Integer Division. To divide a number 1 1 0 0 0 0
DIV by another, but only return the
1 1 1 0 1 1
number of full sets. [ 10 DIV 3 = 3 ]
Computing GCSE – 2.5
J276/02 – Translators and Facilities of Languages

KEY VOCABULARY Working the Machine:


Low Level A programming language which is closer
TRANSLATION or INTERPRETING
Language to binary than English
Binary
High Level An abstracted programming language High Level Low Level
Instruction Set
Language which is closer to English than binary Language Language
OpCode &
Python, C++ Machine Code
Binary code which tells the computer CODER Operand HARDWARE
Instruction Set hardware what to do – OpCode and
Operand ABSTRACTION FROM BINARY TO HIGH LEVEL

1 to 1 instructions coded in mnemonics For coders to be able to write code quickly, high-level coding language have been made
Machine Code (STO, ADD, MOD, DIV etc) which must which allow the coder to use almost natural language (like English) to solve problems.
be converted to binary to run These ABSTRACTED LANGAUGES must be converted into binary code instructions that the
CPU can execute in order to work. This conversion of instructions is done in 1 of 2 ways.
Removing a level of detail to allow focus
on the problem solving rather than the They are either interpreted, one line at a time, and executed immediately, or they are
specifics. Python, and all other High translated by converting the entire code file in one go, then attempting to run the
Abstraction program only once the converter has finished compiling. c
Level languages are abstracted. You do
not need to know the machine code to
get something to happen Features of an Integrated Development Environment (IDE)
A utility to convert High Level Code into FEATURE PURPOSE and BENEFITS
Translator binary machine code so it can be
executed An IDE’s text editor is where the code is typed. It is not concerned with the
A utility which translates High Level look of the code, but usability. Additional features of IDE text editors are:
Text Editor
code on a line by line basis and line numbers, code colouring by context, automatic indentation,
Interpreter autocomplete, code-folding, overview ‘map’, multiple cursors
executes the program as it goes in a
special test environment IDEs will give real-time feedback to the coder to show any obvious errors
IDE Integrated Development Environment Error before compiling. These are often with highlighting or line markers.
Diagnostics Additionally, any errors which show up during compiling are flagged with
A place to type code, focused on the helpful guidance to the coder about the error type and the line number
Text Editor
content of the file, not the look of the file
A utility which attempts to turn the program into a runnable program. This
To test a program and provide feedback Compiler
Error Diagnostics will either be a translator/compiler or an interpreter
to the coder so that errors can be fixed
Run-Time A ‘safe sandbox’ where code can be tried out without installing it to the
Run Time Part of an IDE which allows a piece of Environment computer. Often ring-fenced from the main machine to prevent accidents.
Environment code to be tested without installation
Computing GCSE – 2.6a REMEMBER MAXIMUM VALUES!
J276/02 – Data Representation 1 Max value which can be represented with 8 bits (1 byte) = 255
Total number of available values = 256 (255 + 0)
KEY VOCABULARY
UNITS OF DATA IN COMPUTER SYSTEMS
Base 10 number system. Uses digits
Denary UNIT VALUE SIZE
0,1,2,3,4,5,6,7,8,9
bit (b) 0 or 1 1/8 of a byte
Base 2 number system. Uses digits 0 and 1
Binary nibble 4 bits ½ a byte (a nibble… get it?!)
only.
Base 16 number system. Uses characters 0-9 byte (B) 8 bits 1 byte
Hexadecimal (Hex)
and A,B,C,D,E and F kilobyte (kB) 10001 bytes 1,000 bytes
Contraction of BINARY DIGIT – a single value megabyte (mB) 10002 bytes 1,000,000 bytes
BIT
of 0 or 1 gigabyte (gB) 10003 bytes 1,000,000,000 bytes
Binary Code Representation of values using multiple bits terabyte (tB) 10004 bytes 1,000,000,000,000 bytes
A list of unique values, stored in binary, which petabyte (pB) 10005 bytes 1,000,000,000,000,000 bytes
Character Set represent the letters, numbers and symbols a
computer can show/use. BINARY PLACE VALUES
American Standard Code for Information BASE Exponent 27 26 25 24 23 22 21 20
Interchange.
ASCII PLACE
A character set which uses 7 bits to store 128 128 64 32 16 8 4 2 1
(27) characters VALUE

A character set which uses 8 bits to store 256 CONVERTING DENARY TO BINARY TO HEX
Extended ASCII
(28) characters
A characters set which uses 16 bits to store HEXADECIMAL
UNICODE There are two
65,535 characters (216) DENARY HEX
methods for
A whole number (value written to 0 decimal 0-9 0-9 converting a
INTEGER
places) 10 A HEX value to
FLOAT A decimal value 11 B Denary
Moving a value from one data 12 C
Conversion type/representation to another, for example
Binary to Hex
13 D OR:
14 E 5F = (5x16) + F
Mathematical term which tells you how many 5F = 80 + 15
Exponent 15 F
time to multiply a BASE by itself. 5F = 95
Computing GCSE – 2.6b
J276/02 – Data Representation 2

KEY VOCABULARY BINARY ADDITION BINARY SHIFT


Where the denary value cannot be represented with Multiplication Binary shift to the LEFT
Overflow Error
the given number of bits.
Division Binary shift to the RIGHT
The method for multiplying and dividing numbers in
Binary Shift By moving the bits to either the left of
binary. Is not necessarily mathematically correct
the right, we can double (x2) or halve
Most The left-most bit in a binary number – it has the highest (%2) the value with each movement.
Significant Bit value 8 4 2 1
Least The right-most bit in a binary number – it has the =11
Significant Bit lowest possible value = 0 or 1 1 0 1 1
Bits used to ensure that the value sent digitally is not A 1 place RIGHT SHIFT (divide by 2)
Check Digits When adding 2 large binary numbers,
corrupted on transfer
if there is not enough bits to take the
Data is removed from the file to make it smaller. This carried bit then this results in an 8 4 2 1
Lossy
Compression
data is lost and cannot be regained. Suitable where the OVERFLOW ERROR =5
loss of data is likely not to be noticed. Eg images 0 1 0 1 1
No data is lost, but rather rearranged to ensure a 1 1 0 0 1 1 0 1
Lossless The bits which are moved outside of the
perfect version of the data can be returned. Used available value places are LOST. They
Compression
where exact reproduction is vital. Eg text documents + 0 1 0 1 1 1 1 0 cannot be returned by reversing the

1 0 0 1 0 1 0 1 1
Joint Photographic Experts Group shift. The same is true at the highest
JPEG / JPG
Compression for images – lossy place value
Graphics Interchange Format 8 4 2 1
GIF
Lossless bitmapped image format for limited colours. This value is not counted, it is =11
Printable Document Format
overflow. 1 0 1 1
PDF Open standard for reproducing text and graphic In 8 bits, this sum reads : 203 + 94 =
documents without editing permissions – lossless 43! A single LEFT SHIFT (multiply by 2)
would result in an overflow error (when
Moving Pictures Expert Group
MPEG represented with 4 bits.)
Audio-Visual encoding for video Lossy
Moving Pictures Expert Group Audio Layer 3 8 4 2 1
Digital music files. Lossy compression, but very good
=10
MP3
and generally only removes sounds that are beyond 1 0 1 1 0
human hearing range
Computing GCSE – 2.6c
J276/02 – Data Representation 3

KEY VOCABULARY SOUND SAMPLING


Smallest element of an image – the dots As the sample rate
Pixel
that make up an image on a screen increases, the quality of the
An image where every pixel is ‘mapped’ sound goes up – the sound
in binary to show it’s colour, is closer to the analogue
Bitmap transparency (Alpha) and brightness original, but the file size also
(Gamma) Increasing size will lower the increases. Reduce the
quality sample rate, you reduce
quality but also file size.
An image where the lines are stored as
Vector mathematical shapes, so the size can be
increased without impacting quality
Red Green Blue – the order of colour
RGB
data in a pixel

File Size
Colour Depth The number of bits used to represent
(bit depth) each pixel. Shown in bits per pixel (bpp)
The number of pixels used per unit eg
Resolution
pixels per inch (ppi)
Sound Quality
Data about the data – in relation to
images, it is the data that allows the
Metadata
computer to recreate the image from it’s
BIT DEPTH = NUMBER OF COLOURS ESTIMATING FILE SIZES
binary form.
Bit depth Available colours IMAGES:
Continuous changing values – no
Analogue 21 = 2
“smallest interval” 1 bit (Monochrome)
width X height X colour depth = size
The number of bits used to store the 2 bits 22 = 4
Bit Depth
sound 3 bits 23 = 8 SOUND:
The number of bits used to store 1 8 bits 28 = 256
Bit Rate No of channels X sample rate X bit depth
second of sound
16 bits (High Color) 216 = 65,536
The number of times the sound is To get the value into mB, you divide by
Sample Rate sampled in 1 second; measured in kHz 24 bits (True Color) 224 = 16.7 million
1,000,000!
(kilohertz or 1000’s per second) 32 bits (Deep Color) 232 = 4.3 billion

You might also like