Detailed Revision Guide
Detailed Revision Guide
REVISION GUIDE
Component Description
Coordinates the activities of all other components and sends control
Control Unit
signals.
Arithmetic-Logic Performs arithmetic operations (addition, subtraction) and logical
Unit (ALU) operations (AND, OR, NOT).
Small, fast storage locations within the CPU used to hold temporary
Registers
data and instructions.
A communication system that transfers data between components of
System Bus
a computer.
Key Registers
Register Description
Holds the memory address of the next instruction to be
Program Counter (PC)
executed.
Current Instruction Holds the current instruction being executed, split into opcode
Register (CIR) and operand.
Memory Address Register Holds the address in memory where data is to be fetched or
(MAR) stored.
Memory Data Register Temporarily holds data moving between the processor and
(MDR) main memory.
Accumulator Holds intermediate results of arithmetic and logic operations.
Key Processes in the Fetch-Execute Cycle
Sta
Steps
ge
Fet 1. Copy address from PC to MAR. 2. Copy instruction from memory to MDR. 3.
ch Increment PC. 4. Copy MDR to CIR.
De
5. Decode instruction in CIR. 6. Split into opcode and operand. 7. Fetch additional
cod
data if needed.
e
Ex
ecu 8. Execute the instruction and store the result in the accumulator or memory.
te
Key Functions of Control Signals
1. Fetch: Copy the address of the next instruction from the Program Counter (PC)
to the Memory Address Register (MAR).
2. Read: Retrieve the instruction from memory into the Memory Data Register
(MDR).
3. Increment: Increment the Program Counter (PC) to point to the next instruction.
4. Load: Copy the instruction from the MDR to the Current Instruction Register
(CIR).
5. Decode: Decode the instruction in the CIR to determine the opcode and operand.
6. Fetch Data: If needed, fetch additional data from memory using the MAR.
7. Execute: Perform the operation specified by the opcode, storing the result in the
Accumulator or memory.
Tips: Ensure to keep track of the state of the registers at each step to avoid confusion.
Key Terms/Concepts
Factor Description
Clock Determines how quickly instructions are fetched, decoded, and executed.
Speed Higher speeds lead to better performance.
Number More cores enable simultaneous processing of multiple instructions,
of Cores enhancing multitasking capabilities.
2
Cache Larger and faster cache memory reduces the need to fetch data from slower
Memory RAM, improving overall speed.
Key Components of a Computer
Address Bus: The width of the address bus determines the maximum number of
memory addresses. An 8-bit address bus can address 256 memory locations.
Data Bus: A bi-directional bus that carries data between the CPU and memory.
Its width affects how much data can be transferred at once.
Fetch-Execute Cycle: The process by which a CPU retrieves an instruction from
memory, decodes it, and executes it.
Key Concepts in Assembly Language
3
Number of Cores: Refers to the number of independent processing units within
a CPU. More cores allow for better multitasking and parallel processing.
Cache Memory: A small amount of high-speed memory located on the CPU that
stores frequently accessed data and instructions to speed up processing.
Pipelining: A technique that allows multiple instruction stages to overlap in
execution, improving CPU efficiency by processing several instructions
simultaneously.
Fundamental Theories
John von Neumann: Mathematician and computer scientist who proposed the
stored program concept and developed the von Neumann architecture.
Alan Turing: Pioneer of computer science who contributed to the development of
theoretical foundations for computing.
Key Features of Processor Architectures
Von Neumann architecture: Instructions and data share the same memory.
Harvard architecture: Instructions and data are stored in separate memories.
CISC: Complex Instruction Set Computers use a large instruction set.
RISC: Reduced Instruction Set Computers use a minimal number of simple
instructions.
GPU: Graphics Processing Unit, specialized for parallel processing of graphics.
Reference Information
4
Von Neumann architecture is the most common architecture for general-purpose
computers.
Harvard architecture is often used in embedded systems and digital signal
processing.
Multi-core processors can significantly improve performance by executing
multiple tasks simultaneously.
Concept Comparisons
1. Identify the instruction set size: CISC has a large set, RISC has a small set.
2. Analyze the instruction complexity: CISC instructions can perform multiple
operations, while RISC instructions are simple and perform one operation.
3. Consider execution time: CISC may take multiple cycles for complex instructions,
while RISC aims for one cycle per instruction.
4. Evaluate the impact on performance: RISC can lead to higher performance
through pipelining due to its simplicity.
Device Description
Used for manual data entry; specialist keypads are used in specific
Keyboard/Keypad
applications.
Pointing Devices Includes mice and trackballs; trackballs require less desk space.
Touchscreens Used in tablets and mobile devices for direct interaction.
Interactive
Used for presentations; allows for annotations and saving of notes.
Whiteboards
Scans barcodes for data entry; includes UPC-A and Code 128
Barcode Readers
types.
Key Types of Sensors
5
Light Sensors Measures light intensity.
Temperature Sensors Measures temperature changes.
Pressure Sensors Monitors pressure levels.
Key Applications of Input Devices
Input Device
Description Examples
Type
Manual Input Keyboards, Pointing
Require human intervention to input data.
Devices devices
Automatic Automatically capture data from the
Scanners, Sensors
Input Devices environment without human input.
Barcode UPC-A, Code 128, QR
Used for tracking and identifying products.
Systems codes
Monitoring Systems that report values without altering Temperature
Systems processes. monitoring, Pollution
Control Systems that can alter processes based on Intruder alarms,
Systems input data. Environmental control
Problem-Solving Steps
To analyze data from sensors in a monitoring system:
6
2. Data Conversion: Use an ADC (Analog to Digital Converter) to convert analogue
data to digital.
3. Data Analysis: The computer checks the data against pre-set thresholds.
4. Alerting: If thresholds are exceeded, the system triggers alerts (e.g., alarms,
notifications).
5. Continuous Monitoring: The system continues to monitor until deactivated.
Key Devices
Device
Description
Type
Uses liquid ink, available in various models, often low initial cost but high
Inkjet Printer
ink costs.
Uses toner, fast and reliable, excellent print quality, commonly used in
Laser Printer
businesses.
Dot Matrix Impact printer that uses an inked ribbon to print, useful for multi-part
Printer stationery.
Creates solid objects from various materials, used in medicine and
3D Printer
manufacturing.
RFID Uses transponders and receivers for identification and tracking, can be
System passive or active.
Key Applications
Medicine: 3D printers are used to create prosthetic limbs and surgical models,
improving accuracy and reducing costs.
Manufacturing: 3D printing allows for the production of parts for old cars and
rapid prototyping in design.
Security: RFID technology is used for tracking goods and people, enhancing
security measures in various industries.
Key Features of Output Devices
Inkjet Printers: Can print in color, but may not function if a color cartridge is
empty.
Laser Printers: Known for high-speed printing and excellent quality, suitable for
bulk printing tasks.
3D Printers: Capable of producing intricate designs and functional objects, with
potential future applications in organ printing.
Key Advantages of LED Technology
7
Common output devices: printers, screens, loudspeakers, multimedia projectors.
Inkjet printers can use up to 10 different colors.
Laser printers use dry powdered ink called toner.
Dot matrix printers are also known as impact printers.
3D printers can print using various materials including plastic filament and metal
powder.
RFID systems consist of a transponder and a receiver.
Reference Information
Inkjet printers are often sold at or below production cost, while ink cartridges are
marked up.
Laser printers are preferred in businesses for their speed and reliability.
OLED screens are thinner and lighter than traditional LCD or LED screens.
Concept Comparisons
Featur
Inkjet Printers Laser Printers Dot Matrix Printers
e
Print Good for photos, can Excellent, sharp text and Poor, noisy, and less
Quality smear images detailed
Fast, suitable for high
Speed Slower than laser Slow, similar to typewriter
volume
Low initial cost, high Higher initial cost, low High initial cost, low
Cost
ink cost running cost running cost
Use Home use, photo Business documents, Multi-part stationery,
Cases printing labels rugged use
Problem-Solving Steps
To determine the best output device for a specific application:
1. Identify the primary use case (e.g., printing documents, creating prototypes).
2. Consider the required print quality (e.g., high-quality images vs. standard text).
3. Evaluate the speed needed for the task (e.g., fast printing for business vs. slower
for home use).
4. Assess the budget for both initial purchase and ongoing costs (e.g., ink or toner).
5. Research the durability and reliability of the device in the intended environment.
Device
Description
Type
Hard Disk A magnetic storage device with high capacity, fast read/write speeds, and
Drive relatively low cost.
Solid State A non-volatile storage device using flash memory, known for durability,
Drive speed, and portability.
USB Flash A portable storage device that can store up to 128GB of data, useful for
Drive transferring files.
8
Optical Includes CDs, DVDs, and BluRay, used for software distribution and media
Disks storage.
Key Advantages/Disadvantages
Storag
Advantages Disadvantages
e Type
High capacity, low cost per TB, good for Slower than SSDs, more prone to
HDD
large data storage. physical damage.
Faster access speeds, more durable, Higher cost, typically less storage
SSD
consumes less power. capacity.
Optical Cheap to manufacture, lightweight, Limited capacity compared to
Disks robust during transport. HDDs and SSDs.
Key Uses of Storage Devices
RAM: Used for running applications and temporarily storing data for quick
access.
ROM: Stores firmware and boot instructions necessary for starting the computer.
HDD: Ideal for long-term data storage and backups.
SSD: Preferred for operating systems and applications requiring fast load times.
USB Flash Drive: Convenient for transferring files between computers.
Optical Disks: Used for software distribution and media playback.
Key Characteristics of Storage Technologies
Durabilit Portabilit
Storage Type Read/Write Speed Capacity Cost
y y
HDD Moderate Moderate High Low Low
SSD High High Moderate Moderate High
Optical Disks High Low Low High Low
Facts to Memorize
RAM is volatile memory, meaning it loses its data when power is off.
ROM is non-volatile memory, retaining data even without power.
Typical hard disk speeds range from 3,600 to 7,200 RPM.
USB flash drives can store up to 128GB of data.
CD-ROM, CD-R, and CD-RW are different formats of optical disks with varying
write capabilities.
Reference Information
9
Volatility Volatile (data lost when off) Non-volatile (data retained)
Read/Write Capability Read and write Read only
Speed Very fast Slower than RAM
Usage Temporary data storage Permanent instructions
Problem-Solving Steps
To determine the best storage solution for a specific need:
Function Description
Provides a way for users to interact with the computer, hiding hardware
User Interface
complexity.
Memory
Allocates and manages RAM for different programs and processes.
Management
Interrupt Manages interrupts from hardware and software, allowing the CPU to
Handling respond to events.
Processor Determines the order and time each process can use the CPU,
Scheduling enabling multitasking.
Key Scheduling Algorithms
Algorithm Description
Round Robin Each job is given a fixed time slice in a cyclic order.
First Come First Served
The first job to arrive is executed until completion.
(FCFS)
Shortest Remaining Time The job with the shortest remaining time is executed next.
The job with the smallest total execution time is executed
Shortest Job First (SJF)
next.
Multi-Level Feedback Multiple queues with different priority levels, allowing dynamic
Queues adjustment.
Key People
David Patterson: Known for his work on computer architecture and operating
systems.
Andrew S. Tanenbaum: Author of 'Operating Systems: Design and
Implementation', a foundational text in OS education.
Key Concepts in Interrupt Handling
10
Concept Description
Interrupt Service
A special routine that the CPU executes in response to an interrupt.
Routine
Determines the order in which interrupts are processed based on
Interrupt Priority
their importance.
The CPU uses a stack to save the state of the current process when
Stack Usage
an interrupt occurs.
Facts to Memorize
The boot loader in ROM loads the Operating System (OS) into RAM.
The CPU processes jobs according to a scheduling algorithm.
A stack is a LIFO (Last In, First Out) data structure.
Reference Information
Types of scheduling algorithms: Round Robin, First Come First Served, Shortest
Job First, Shortest Remaining Time, Multi-Level Feedback Queues.
Memory management techniques: Paging, Segmentation, Virtual Memory.
Problem-Solving Steps
To understand how to manage memory in an operating system, follow these steps:
11
Fundamental Theories
Theory/
Description
Model
Virtual Software that emulates hardware, allowing one OS to run inside another or to
Machine execute intermediate code.
Device Programs that provide an interface for the OS to interact with hardware,
Drivers specific to both the device and OS.
Key Events
12
5. Update drivers: Ensure all device drivers are up to date.
6. Check for software conflicts: Look for any recently installed software that may be
causing issues.
7. Consult documentation: Refer to the OS documentation for specific
troubleshooting steps.
Key Terms/Concepts
Utility
Description
Program
Disk
Reorganizes fragmented files on a hard drive to improve access speed.
Defragmenter
Automatic Automates the process of backing up data to prevent loss, specifying
Backup where, when, and what to back up.
Automatic Detects and installs software updates automatically, enhancing features
Updating and fixing security issues.
Scans for viruses using known definitions and heuristics to identify
Virus Checker
potential threats.
Compression Reduces file sizes for easier transmission over the internet, with varying
Software effectiveness based on file type.
Key Categories of Applications Software
13
Source Code Source code is accessible and Source code is not accessible
Access modifiable by anyone. to users.
Cost Typically free to use. Requires payment for a license.
Users can modify and redistribute the Users cannot modify the
Modification
software. software.
Proprietary licenses with usage
Licensing Licensed under open source licenses.
restrictions.
Key Considerations for Selecting Applications
1. Define the Purpose: Identify what you need the application to do.
2. Check Functionality: Ensure the application meets your requirements.
3. Assess Hardware Compatibility: Verify that the application can run on your
existing hardware.
14
4. Evaluate Availability: Determine if the application is already available or needs
to be custom developed.
5. Consider Cost: Analyze the cost of the application and whether it fits your
budget.
6. Check Reliability: Look for reviews or testing results to ensure the application is
stable and bug-free.
Stage Description
Lexical Removes unnecessary spaces and comments, replacing keywords and
Analysis identifiers with tokens.
Syntax Checks the token stream against the language rules, parsing phrases and
Analysis recording errors if invalid.
Semantic Validates the meaning of the phrases, ensuring identifiers are declared
Analysis before use.
Code Generates machine code from the validated program, possibly in multiple
Generation passes for optimization.
Code
Improves the efficiency of the generated code by removing redundancies
Optimizatio
and replacing inefficient code.
n
Key People
15
Stages of Compilation: Lexical analysis, Syntax analysis, Semantic analysis,
Code generation, Code optimization.
Reference Information
Introduction
This revision guide covers essential topics in computer science,
including the components of the CPU, key processes, input/output
devices, and fundamental concepts of operating systems. Use this
guide to solidify your understanding and prepare effectively for
assessments.
Study Tips
16
1. Create flashcards for key terms like ALU, Control Unit, and
registers.
2. Use diagrams to visualize processes like the fetch-execute cycle.
3. Practice explaining each concept aloud to check your
understanding.
17