My Revision Notes Ocr Gcse Computer Science Third Edition Sample Pages 9781398321144
My Revision Notes Ocr Gcse Computer Science Third Edition Sample Pages 9781398321144
OCR
REVISION
NOTES GCSE (9–1)
COMPUTER
SCIENCE
3RD EDITION
✚ Plan and organise your revision
✚ Reinforce skills and understanding
✚ Practise exam-style questions
COMPUTER SCIENCE
George Rouse
This book draws on material written for and published in OCR GCSE Computer Science,
Second Edition (978 1 5104 8416 0) by George Rouse, Lorne Pearcey and Gavin Craddock.
The publisher would like to thank Lorne Pearcey and Gavin Craddock for permission to
re-use their work in the present volume.
Lorne Pearcey and Gavin Craddock have not written any content specifically for this
revision guide, including the exam-style questions and examiner’s tips.
The Publishers would like to thank the following for permission to reproduce copyright
material.
Photo credits
Figure 1.5.1: Background photograph © Mike Berenson/Colorado Captures/Getty Images
Acknowledgements
Adobe is either a registered trademark or trademark of Adobe in the United States and/or
other countries.
Google and the Google logo are registered trademarks of Google LLC, used with permission.
Microsoft product screenshot(s) used with permission from Microsoft.
Microsoft and Windows are either registered trademarks or trademarks of Microsoft
Corporation in the United States and/or other countries.
Every effort has been made to trace all copyright holders, but if any have been inadvertently
overlooked, the Publishers will be pleased to make the necessary arrangements at the first
opportunity.
Although every effort has been made to ensure that website addresses are correct at time of
going to press, Hodder Education cannot be held responsible for the content of any website
mentioned in this book. It is sometimes possible to find a relocated web page by typing in
the address of the home page for a website in the URL window of your browser.
Hachette UK’s policy is to use papers that are natural, renewable and recyclable products
and made from wood grown in well-managed forests and other controlled sources. The
logging and manufacturing processes are expected to conform to the environmental
regulations of the country of origin.
Orders: please contact Hachette UK Distribution, Hely Hutchinson Centre, Milton Road,
Didcot, Oxfordshire, OX11 7HH. Telephone: +44 (0)1235 827827. Email education@hachette.
co.uk Lines are open from 9 a.m. to 5 p.m., Monday to Friday. You can also order through our
website: www.hoddereducation.co.uk
ISBN: 978 1 3983 2114 4
© George Rouse, Lorne Pearcey and Gavin Craddock 2021
First published in 2021 by
Hodder Education,
An Hachette UK Company
Carmelite House
50 Victoria Embankment
London EC4Y 0DZ
www.hoddereducation.co.uk
Impression number 10 9 8 7 6 5 4 3 2 1
Year 2025 2024 2023 2022 2021
All rights reserved. Apart from any use permitted under UK copyright law, no part
of this publication may be reproduced or transmitted in any form or by any means,
electronic or mechanical, including photocopying and recording, or held within any
information storage and retrieval system, without permission in writing from the
publisher or under licence from the Copyright Licensing Agency Limited. Further details
of such licences (for reprographic reproduction) may be obtained from the Copyright
Licensing Agency Limited, www.cla.co.uk
Cover photo © Patrick P. Palej - stock.adobe.com
Illustrations by Aptara, Inc. and Integra Software Services Pvt. Ltd
Typeset in India by Aptara, Inc.
Printed in India
A catalogue record for this title is available from the British Library.
Get the most from this book
My Revision Planner
My Revision Planner
Countdown to my exams environments
94 2.5.1 Languages
Exam breakdown
95 2.5.2 The integrated development environment
it and test your understanding. These Revision Notes Section 1 Computer systems Check your understanding answers Exam style question answers
revision and don’t hesitate to write in it – personalise 1.3 Computer networks, connections and protocols
33
41
1.3.1 Networks and topologies
1.3.2 Wired and wireless networks, protocols and layers
Check your understanding and progress at www.hoddereducation.co.uk/myrevisionnotes OCR GCSE Computer Science Third Edition
Countdown to my exams
Exam breakdown
6–8 weeks to go One week to go The specification
✚ Start by looking at the specification – make sure you ✚ Try to fit in at least one more timed practice of an The OCR GCSE Computer Science specification includes a list of all content
each topic.
✚ Make a note of any problem areas as you revise and of your studies (Year 11 for most students).
ask your teacher to go over these in class. Date: ......................................................................................
✚ Look at past papers. They are one of the best ways Time: ...................................................................................... Question types
to revise and practise your exam skills. Write or
Location: ................................................................................
prepare planned answers to the exam style Paper 01
questions provided. Check your answers online at
Paper 02 Expect a range of question types in paper 01 including short answer questions
www.hoddereducation.co.uk/myrevisionnotes.
Date: ...................................................................................... requiring just a few words or even a one-word answer, and questions
✚ Use the Now test yourself activities to try out different
requiring longer descriptions or explanations requiring several full sentences.
revision methods. For example, you can make notes Time: ......................................................................................
using mind maps, spider diagrams or flash cards. Typically these questions are marked by points; for a three or more mark
Location: ................................................................................
✚ Track your progress using the revision planner question, a single sentence is unlikely to contain all the relevant points.
and give yourself a reward when you have Make sure your answer contains as many distinct points as there are marks
achieved your target. available.
The paper will also include some quality of written communication questions.
These are indicated by an asterisk (*) on the question paper next to the
number of marks for the question.
It is vital that you read the question carefully and cover everything asked. If
the question asks for a discussion or justification of something, it is important
that you cover both sides (perhaps negatives and positives, or reasons for or
against something). Precise use of terminology and clear understanding is
also required for high marks. This means that for an eight-mark question, you
do not have to worry about hitting eight distinct points but instead need to
6 concentrate on giving a full and balanced answer. 7
Check your understanding and progress at www.hoddereducation.co.uk/myrevisionnotes OCR GCSE Computer Science Third Edition
Key point
Common mistake
Further explanation of some important issues.
Common mistakes that candidates make and how to
avoid them.
Exam-style questions
Practice exam questions to consolidate your revision and
Check your understanding
practise your exam skills.
Questions to test your understanding of basic facts.
Countdown to my exams
Exam breakdown
My Revision Planner
development environments
94 2.5.1 Languages
96 2.5.2 The integrated development environment
✚ Start by looking at the specification – make sure you ✚ Try to fit in at least one more timed practice of an
know exactly what material you need to revise and entire past paper and seek feedback from your
the style of the examination. Use the revision planner teacher, comparing your work closely with the
on pages 4 and 5 to familiarise yourself with the mark scheme.
topics. ✚ Check the revision planner to make sure you haven’t
✚ Organise your notes, making sure you have covered missed out any topics. Brush up on any areas of
everything on the specification. The revision planner difficulty by talking them over with a friend or getting
will help you to group your notes into topics. help from your teacher.
✚ Work out a realistic revision plan that will allow you ✚ Attend any revision classes put on by your teacher.
time for relaxation. Set aside days and times for all Remember, they will be an expert at preparing people
the subjects that you need to study and stick to your for examinations.
timetable.
✚ Set yourself sensible targets. Break your revision
down into focused sessions of around 40 minutes,
divided by breaks. These Revision Notes organise the The day before the examination
basic facts into short, memorable sections to make
✚ Browse through these Revision Notes for useful
revising easier.
reminders, for example the exam tips, common
mistakes and key points.
✚ Check the time and place of your examination.
2–6 weeks to go ✚ Make sure you have everything you need – extra pens
and pencils, tissues, a watch, bottled water, sweets.
✚ Read through the relevant sections of this book and ✚ Allow some time to relax and have an early night to
refer to the exam tips, common mistakes and key ensure you are fresh and alert for the examinations.
points. Tick off the topics as you feel confident about
them. Highlight those topics you find difficult and look
at them again in detail.
✚ Test your understanding of each topic by working
through the Check your understanding questions in My exams
the book.
Paper 01
✚ Make a note of any problem areas as you revise and
ask your teacher to go over these in class. Date: .......................................................................................
✚ Look at past papers. They are one of the best ways Time:.......................................................................................
to revise and practise your exam skills. Write or
Location:.................................................................................
prepare planned answers to the exam-style
questions provided. Check your answers.
Paper 02
✚ Use the Now test yourself activities to try out different
revision methods. For example, you can make notes Date: .......................................................................................
using mind maps, spider diagrams or flash cards. Time:.......................................................................................
✚ Track your progress using the revision planner
Location:.................................................................................
and give yourself a reward when you have
achieved your target.
6
1.1 System architecture
A computer system consists of hardware and software working together to
process data.
Hardware is the name for the physical components that make up the
computer system.
Software is the name for the programs that provide instructions for the
computer, telling it what to do.
A computer system receives information as an input, processes and stores
that information, and then outputs the results of that processing.
The CPU processes the data.
Storage
The CPU operates at high speeds governed by the clock chip. The fetch–execute cycle
✚ The clock chip uses a vibrating crystal to maintain a constant speed. is the basic operation of the
✚ The speed of the clock chip is measured in hertz, Hz (cycles per second) CPU. It continually fetches,
and typically works at up to 4 GHz (four billion cycles per second). decodes and executes
✚ The clock speed is the number of fetch–execute cycles per second. instructions stored in
memory.
Cache memory
The purpose of cache memory is to provide temporary storage that the CPU
can access very quickly.
✚ It stores instructions and data that are used repeatedly or are likely to be
required for the next CPU operation.
Cache memory sits between the processor and main memory (RAM).
✚ The CPU looks in the cache for required data.
✚ If it is not there, it requests it from RAM.
✚ The data is moved into cache before being accessed by the CPU.
Registers
In Von Neumann architecture, data and instructions are stored in the
Von Neumann
same memory.
architecture is the most
Typical Von Neumann architecture uses a number of registers. common organisation of
computer components,
Registers are memory locations within the CPU that hold data temporarily
where instructions and
and can be accessed very quickly. data are stored in the same
Their role in the CPU is to accept, store and transfer data and instructions for place.
immediate use by the CPU.
Four of the registers found in the CPU are the ACC, PC, MDR and MAR. Exam tip
Accumulator (ACC) Questions on these topics
✚ Stores the results of any calculations made by the Arithmetic Logic Unit often require you to know
(ALU). these definitions.
✚ Stores the value of inputs and outputs to and from the CPU.
Program counter (PC)
✚ Keeps track of the memory location (known as an address) for the next
instruction.
✚ The program counter is incremented (increased by 1) to the next memory
location at the fetch stage of the fetch–execute cycle, to allow the program
to be executed line by line.
✚ Program instructions can modify the value in the program counter to alter Exam tip
the flow of the program so that it continues from a new location. You will often be asked
Memory data register (MDR) about what type of
✚ Stores any data fetched from memory or any data that is to be transferred information is held in
each of these registers,
to and stored in memory.
an address or data or an
Memory address register (MAR) instruction. Just saying data
✚ Stores the location in memory (an address) to be used by the MDR – that is, or address is not enough,
where the MDR needs to fetch data from or send data to. you must explain more
about the data or address.
Note: You do not need to know about buses for your examination.
Figure 1.1.2 is a simplified diagram showing the layout of these components,
and how the CPU communicates with memory and input/output devices.
10
Memory
Address bus
Registers
Control bus
Control
ALU Input/Output
unit
Figure 1.1.2 A CPU with Von Neumann architecture; the arrows represent the flow of
data between components
Revision activity
Load a web version of Little Man Computer (https://peterhigginson.co.uk/lmc/) and,
from the box marked ‘select’, choose ‘add’. This will load a simple program. Run this
by selecting ‘step’ to see how the fetch–execute process uses the key registers in the
CPU to add together two numbers input by the user.
11
their performance
Clock speed Exam tip
The CPU is constantly fetching and executing instructions.
You need to know how all of
The speed at which it does this is determined by an electronic clock. these factors work together
to determine how quickly
The faster the clock speed, the more instructions that can be executed every the computer works.
second.
The clock speed is measured in Hertz; 1 Hz = once per second.
12
The main components of a computer are either manufactured onto a single
chip (a microcontroller), or separate circuits for processing and memory are
combined into a larger device.
The embedded system will typically include some ROM (read-only memory)
6 Describe three features that make an embedded system appropriate for use in a
small drone helicopter.
Answers on p. 98
13
✚ Clock speed
✚ To carry out a set of instructions contained in a
✚ Cache memory
computer program using the fetch–execute cycle
✚ Number of cores
Common CPU components and their function
The purpose and characteristics of embedded systems
✚ ALU to carry out arithmetic calculations and logical
✚ Designed for a dedicated function as part of a bigger
decisions
system
✚ CU to decode instructions and control how data moves
✚ Often manufactured as a single chip
in the CPU to execute the instructions
✚ Dedicated hardware and software to perform a limited
✚ Cache memory to temporarily hold instructions and
set of tasks
data that the CPU is likely to need
✚ Programs often uploaded at manufacturing stage
✚ Registers, which are memory locations within the CPU
✚ Limited options to modify the programs
that hold data
✚ Low power consumption
Von Neumann architecture ✚ Small
✚ In Von Neumann architecture, data and instructions are ✚ Rugged
stored in the same memory ✚ Low cost
✚ Four key registers in Von Neumann architecture are:
✚ Accumulator to store the results of calculations
carried out by the ALU
✚ Program counter to hold the address of the next
instruction
✚ Memory data register to hold the data fetched from
memory or to be sent to memory
✚ Memory address register to hold the address of the
next memory location to be accessed
1 Make a list of the main components of the CPU and what they do.
2 List the stages of the fetch–execute cycle and what happens at each stage.
3 Make a list of the factors that affect the speed of the CPU.
4 List some embedded systems and identify the inputs and outputs.
Exam-style questions
1 A computer is advertised as having a clock speed 2 a) State one item that might be held in the ROM in
of 2.8 GHz, 2.5 MB cache and four cores. an embedded system inside a washing machine. [1]
a) Describe how the clock speed affects the b) State two items of data that might be held in
performance of the computer. [2] RAM in an embedded system inside a washing
b) Describe why having more cache memory will machine.[2]
improve the performance of the computer. [2] c) Describe two important features of an embedded
c) State the purpose of the memory address system that make it appropriate for use in a car
register (MAR). [2] engine management system. [4]
d) Explain how a multi-core CPU can improve the 3 a) Describe three types of operation carried out by
performance of the computer. [2] the ALU. Give an example for each one. [6]
b) Describe what happens at the fetch stage of the
fetch–execute cycle. [3]
Answers on p. 103
14
INDEX
INDEX
device drivers 51
A C digital signals 29
domain name server (DMS) 38
abstraction 60 cache memory 10, 12
DO WHILE (DO UNTIL) loops 71–2
access rights 47 Caesar cipher 53
DVDs 17–18
accumulator (ACC) 10 case function 75
algorithmic thinking 60 casting 74–5
algorithms 60, 63 CDs 17–18 E
flowcharts 62 censorship 57
inputs, processes and central processing unit (CPU) editors 96
outputs 61 architecture 9–11 electronic keys 83
pseudocode 63 performance 12 embedded systems 12–13
searching 65–6 purpose 9 encapsulation 42
sorting 66–9 characters 74 encryption 41, 47, 53
structure diagrams 61 character sets 26–7 environmental issues 56
trace tables 62 checksums 42 error diagnostics 96
analogue signals 29 client–server networks 35–6 error identification 86–7, 88
AND 73–4 clock speed 12 error rate 35
AND gate 90 closed-circuit television (CCTV) 56 Ethernet 41
AND and NOT gate 91 cloud computing 39 ethical issues 55
AND and OR gate 91 colour depth 28–9 examination structure 7
anti-malware software 47 colour representation 28
application software 50 command line interfaces (CLIs) 51
arithmetic logic unit (ALU) 9 comments 85 F
arithmetic operators 72–3 compilers 95
facial recognition 56
arrays 78–9 compression 31
fetch–execute cycle 9, 11
ASCII conversion function 75 computational thinking 60
fibre-optic cables 37
ASCII system 26 Computer Misuse Act 1990 58
file handling 76
assembly languages 94 concatenation 75
file management 52
assignment 70 condition-controlled loops 71–2
file sizes 20
automatic number plate recognition constants 70
images 29
(ANPR) 56 control unit (CU) 10
sound 29–30
copper cables 37
text 27
Copyright, Designs and Patents Act
B 1988 58
File Transfer Protocol (FTP) 42
final/terminal testing 86
count-controlled loops 71
bandwidth 34 firewalls 47
Creative Commons 59
binary 20 flags 66
cultural issues 55
addition 22 flash memory 17
conversion to/from denary 21 float 74
conversion to/from hexadecimal 24 D flowcharts 62
binary codes 26 flowchart symbols 62
binary search 65–6 data capacity calculations 20 fragmentation 19, 53
binary shifts 25 data compression 31, 54 functions 79–80
biometric data 47, 83 data interception 46
bit depth 29–30 prevention methods 48
bits (b) 19 Data Protection Act 2018 57–8 G
black box testing 86 data representation
graphical user interfaces (GUIs) 50
Bluetooth 37, 41 characters 26–7
Blu-Ray 17–18 images 27–9
Boolean data type 74, 90 sound 29–30 H
Boolean operators 73–4 data storage, units 19
combining logic gates 91 data types 74–5 hacking 58
simple logic diagrams 90 Boolean 90 hacktivists 46
use in problem solving 92 decomposition 60 hardware 9
botnets 46 defensive design 83–5 hexadecimal (hex) 23
brute force attacks 46 defragmentation 19, 53 conversion to/from binary 24
prevention methods 48 denial of service (DoS) attacks 46 conversion to/from denary 23
bubble sort 66, 69 prevention methods 48 hierarchical files systems 52
108 bytes (B) 19 destructive testing 86 high-level languages 94–5
Hypertext Transfer Protocol memory address register (MAR) 10 pharming 46
(HTTP) 42 memory data register (MDR) 10 phishing 45
Hypertext Transfer Protocol Secure memory management 51 pixelation 29
(HTTPS) 42 merge sort 67, 69 pixels 27
mesh network topology 40 Post Office Protocol (POP) 42
INDEX
I metadata 28
mnemonics 94
pretexting 45
pretty printing 96
image metadata 28 modular programming 86 primary storage 15–16
image representation 27–9 modulus (MOD) 72 privacy issues 56–7
indentation 85 most significant bit (MSB) 20 procedures 79–80
input–process–output 9 processing 61
processor cores 12
inputs 13, 61
input validation 83
N program counter (PC) 10
insertion sort 66–7, 69 programming languages
network diagram 38
integers 74 high-level 94–5
network interface controllers (NIC) 36
integrated development environment low-level 94, 95
network policies 47
(IDE) 96 proprietary software 58, 59
networks
internet 38–9 protocols 42
client–server 35–6
internet hosts 38 pseudocode 63
factors influencing performance
Internet Message Access Protocol 34–5
(IMAP) 42
Internet Protocol (IP) 38, 42
hardware 36–7 Q
internet 38–9
Internet Protocol addresses 41 IP and MAC addressing 41 question types 7–8
interpreters 95 LANs and WANs 33–4 quotient (DIV) 72
iteration 71–2 layers 42–3
iterative testing 86 mesh topology 40
peer-to-peer 36 R
L protocols 42
random access memory (RAM) 15–16
standards 42
random number generation 80
layers 42–3 star topology 39
ransomware 45
least significant bit (LSB) 20 wired and wireless 41
read-only memory (ROM) 15
legal issues 55 network security
real numbers 74
Computer Misuse Act 1990 58 forms of attack 45–6
records 77
Copyright, Designs and Patents Act identifying and preventing
registers 10
1988 58 vulnerabilities 47–8
resolution of an image 29
Data Protection Act 2018 57–8 nibbles 19
routers 37
software licences 58–9 nodes 37
run-time environment 96
length function 75 NOT 73
linear search 65, 66 NOT gate 90
local area networks (LANs) 33 S
logic circuits 90
combining logic gates 91 O sample rates 29–30
creation from expressions 91–2 searching algorithms
one-dimensional arrays 78
problem solving 92 binary search 65–6
open-source software 58–9
logic errors 87 linear search 65, 66
operating systems 50–2
loops (iterations) 71–2 secondary storage 17–18
operators
lossy and lossless compression 31, 54 fragmentation 19
arithmetic 72–3
low-level languages 94, 95 selection 71
Boolean 73–4
sequence 70–1
optical storage 17–18
M OR 73
servers 35
shouldering 45
OR gate 90
machine code 94 Simple Mail Transfer Protocol (SMTP)
outputs 13, 61
magnetic storage 17, 18 42
overflow errors 25
maintainability 84 social engineering 45
malware 45 prevention methods 48
prevention methods 48 P social media, privacy issues 57
man in the middle attacks 46 software 9
Media Access Control (MAC) packets 37 software licences 58–9
addresses 36, 41 packet sniffing 46 solid-state drives (SSDs) 17, 18
memory passwords 47, 83 sorting algorithms 69
cache memory 10, 12 peer-to-peer networks 36 bubble sort 66
primary storage 15–16 penetration testing 47 insertion sort 66–7
RAM and ROM 15 peripheral management 51 merge sort 67–8
personal identification numbers sound sampling and storage 29–30
secondary storage 17–19 109
virtual 16 (PINs) 46 spyware 45
virtual machines 96
strings 74 Transmission Control Protocol virtual memory 16
structure diagrams 61 (TCP) 42 viruses 45
Structured Query Language transmission errors 35 volatile and non-volatile memory 15
(SQL) 46, 77 transmission media 34, 37 Von Neumann architecture 10–11
subprograms 79–80, 84 Trojans 45
subroutines 62 trolling 55
substring function 75 truth tables 90–2 W
switches 37 two-dimensional arrays 78
syntax 63 two-factor authentication 83 web hosting companies 38
syntax errors 86–7 WHILE loops 71–2
system software 50 wide area networks (WANs) 33–4
operating systems 50–2 U internet 38–9
utility software 52–4 Wi-Fi 37
Unicode 26–7 Windows, Icons, Menus and Pointers
user access rights 47 (WIMP) interfaces 50
T user authentication 83 wired and wireless networks 41
user interfaces 50–1 wireless access points (WAP) 37
tables 77 user management 52 Wireless Access Protocol 2/3
test data 87 usernames 83 (WAP 2/3) 47
testing utility software 52–4 worms 45
error diagnostics 96
error identification 86–7, 88
110
OCR GCSE (9–1)
COMPUTER SCIENCE
Target exam success with My Revision Notes. Our updated approach to revision
will help you learn, practise and apply your skills and understanding. Coverage of
key content is combined with practical study tips and effective revision strategies
to create a guide you can rely on to build both knowledge and confidence.
My Revision Notes: OCR GCSE (9–1) Computer Science will help you:
Computer scientists use hexadecimal because binary numbers are more difficult Creative Commons is an organisation that issues licences allowing a user to
to work with and remember. For example, 11011011 in hexadecimal is DB. This is modify or distribute parts of the software under certain conditions. It is also
far easier to remember and communicate without introducing errors. known as ‘some rights reserved’.
Hexadecimal to binary Typically, the authors might insist that the software is only used without
payment in a non-commercial setting or that any use of the software includes
To convert from hexadecimal to binary:
statements that attribute the software to the original developers.
✚ convert each hex symbol to the equivalent binary
✚ combine both 4-bit binary numbers (nibbles) into an 8-bit binary number.
Check your understanding
Worked example 4 State which law makes it illegal to distribute a virus.
Convert CF in hexadecimal to binary. 5 Explain what is meant by data minimisation in the Data Protection Act.
6 Describe what is meant by Creative Commons.
Hex C F
Denary 12 15 Answers on p. 100
through exam-style
Ethical, legal, cultural and environmental impact
✚ Impacts of digital technology on wider ✚ Legislation relevant to computer
Binary to hexadecimal Exam tip society science
provided
2 List two other acts and their purpose.
Binary 0101 1101
3 List the differences between open source and proprietary software.
Denary 5 13
Hex 5 D
Exam-style questions
1011101 in binary is 5D in hexadecimal.
1 Karen runs a small business with four employees, each with their own computer
workstation connected to the internet. Exam tip
Check your understanding a) Karen is thinking about using open-source software. Discuss the issues
she needs to consider before making a decision. [4] If an exam question says
13 Convert the following hexadecimal numbers to binary.
b) Karen is concerned about staff using the internet for personal use ‘discuss’, you should look
a) 8C b) 5B c) FE at more than one aspect of
while at work. Explain why she might have concerns about this. [4]
14 Convert the following binary numbers to hexadecimal. the topic, for example look
2 Discuss the environmental impact of widespread computer use. [8]
a) 10100011 b) 11001010 c) 1001110 at positive and negative
Answers on p. 105 aspects.
Answers on p. 98
24 59