Paper 1 Revision - Start of A Level
Paper 1 Revision - Start of A Level
Paper 1 - Theory
Matilda Baines GCSE Computer Science Year 11
System Architecture
This is called Von
Neumann architecture
where the program
instructions and the data
the programs are using
are both stored in the
same memory.
Registers
There are 5 main registers within the CPU:
Program Counter (PC) – Holds the location of the next instruction/data address in
main memory.
Memory Address Register (MAR) –
Holds the memory address of the
current instruction about to be
executed.
Memory Data Register (MDR) –
Stores the data to be sent/received
from RAM.
Accumulator (ACC) – Holds the
result of an instruction before it is
transferred to memory.
Current Instruction Register (CIR) –
Holds the current instruction that the processor is executing.
Buses
A bus in the CPU is a data pathway between two
internal components of a computer. They are a set
of parallel wires which connect components. The
width of the bus is directly proportional to the
number of bits that can be transferred
simultaneously.
Address Bus: The CPU signals to Main
Memory that it wants to fetch (load) data
using the address bus. It is used to specify
the address of a memory location to either
read data from or write data to that memory location. There is a one way connection
from the processor to the address bus and one way connection from the address bus
to the main memory and to I/O controllers
Matilda Baines GCSE Computer Science Year 11
Data Bus: The data bus is used to transfer data and instructions, in which the bus is
bidirectional. Data is transferred to and from the processor + main memory + I/O
controllers. Instruction are carried from main memory into the processor (to be
decoded and executed)
Control Bus: The control bus is used to send control signals that manage and
orchestrate the operations that take place inside a computer system, it is
bidirectional.
Included is the exchanging of status signals between components, transmitting clock
signals required for the co-ordination of operations. A control signal can be used to:
request communication between two units, acknowledge a communication request,
specify the type of data that is being transferred via other buses and synchronise the
communication between the components using the clock pulses. Thus examples:
Memory read: Places data from a specific memory location (whose address is on the
address bus) onto the data bus
Memory write: Stores the data from the data bus onto a specific memory location
(whose address is on the address bus)
Bus request: Signifies that a component needs to access a bus
Bus grant: Signifies that a component is informed that it can use the bus it requested
access to
Bus busy: Signifies that a bus is not available for use (as it is used by another
component)
Interrupt request: Signifies that an error or exception has occurred that requires the
attention of the processor (CPU)
Clock signals: The control bus supplies the components with clock pulses generated
by the system clock
cache. Program instructions and data that are fetched are stored in cache in case they are
needed again soon.
Level 1 = Level 1 is extremely fast but small in capacity (between 2-256KB), located
on the CPU. Each core will have its own level 1 cache.
Level 2 = Level 2 is usually given to each core. It is very fast, but a little slower than
level 1. Level 2 is bigger in capacity and the typical size is 256KB-8MB.
Level 3 = Level 3 is the slowest type of cache, but still faster than RAM. Bigger in
capacity than Level 1 and Level 2. It is usually located on the CPU and stores 4MB-
50MB. The cache is shared between all the cores on the processor.
Benefits of Cache: The data used most often by the CPU is held in Level 1 cache so is
available extremely quickly. In most systems, Level 1 cache is used about 50% of the time,
with Level 2 cache being accessed about 90% of the time, this greatly reduces the time that
the CPU must wait for data from main memory.
Embedded Systems
An embedded system is a small computer built into a piece of equipment to perform a
specific task. An embedded computer is frequently used to control a device using simple
inputs. A computer system that is made up of both hardware and software is known as
firmware.
All the components are on a single printed circuit board and usually for very specialised
tasks and don’t contain an operating system. They have a single microprocessor with RAM,
ROM and a CPU. Without embedded systems, a digital device would not be able to perform
specific functions. Most embedded systems run the firmware added to the device by the
manufacturer, However, some devices can have their firmware updated by the user.
Characteristics:
o Highly efficient o Slow CPU speeds o Compact in size.
o Extremely reliable o Cheap to produce. o Low in power
Examples:
Traffic Lights Fitness Tracker
Sounds System Robots
Tumble dryer Car Systems
MRI Scanner Digital Watch
Matilda Baines GCSE Computer Science Year 11
Computers understand only two things: power on or power off. This is represented by
switches and computers are essentially calculators made up of billions of switches.
Power on = 1 Power off = 0
The most significant bit (MSB) is the bit with the largest value, so the bit furthest to the left.
The least significant bit (LSB) is the bit with the smallest value, so the bit furthered to the
right.
Binary Arithmetic
This here is binary addition, and you work right to left and
apply these simple rules:
1) Put the binary numbers into columns and starting
from the right, add the numbers in columns.
0+0=0 1 + 1 = 0 (Carry 1)
0+1=1 1 + 1 + 1 = 1 (Carry 1)
1+0=1
Overflow Error
Computers work with a fixed number of bits
at a time. If the result of an addition is too
large for the number of bits, the computer
works with there will be an overflow error.
An overflow error can lead to a loss of data
and a loss of accuracy in your answer. It
could also cause software to crash if it
doesn’t have a way of dealing with the extra
bit.
Logical Binary Shift Operations
A binary shift left of one bit moves all the
bits one place to the left. The vacant bit
spaces are filled with zeros. Logical shifts
can very quickly multiply or divide a
binary number by a factor of two. A loss
of accuracy can occur if a 1 is removed.
The 9th bit is known as a the carry bit.
Sign and Magnitude
Decimal
+/- 64 32 16 8 4 2 1 result
0 1 0 0 1 1 0 1 77
1 1 1 1 1 1 1 1 -127
In this case it is still a byte yet, instead of 128, it is replaced with a +/- in order to represent negative
number up to the numerical value of 127
Binary Complement
Decimal
-128 64 32 16 8 4 2 1
result
0 1 1 1 1 1 1 1 127
Matilda Baines GCSE Computer Science Year 11
1 0 0 0 0 0 0 0 -128
1 0 1 0 1 0 1 0 -86
Normalisation
Normalisation is a technique used to help reduce data duplication when designing data structures,
also resulting in an improvement in data integrity.
Matilda Baines GCSE Computer Science Year 11
Hexadecimal
Computers don’t work in hex, but humans use hex numbers when working as it is much
easier to express binary number representation in hex than it is in any other base number
system. Hex is a base-16 number system and as we only have 10 digits, it uses 0-9 and
letters A to F.
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
0 1 2 3 4 5 6 7 8 9 A B C D E F
A hexadecimal value is much easier to read and remember than a string of binary
digits.
It is quicker to write or type, since hex digit takes up only one character, not four.
There is less chance of making an error when typing hex characters than a string of
1s and 0’s. Note: the computer does not use hex, but rather it’s a way for us to enter
into the computer for it to convert to binary.
You can denote that the value is a hexadecimal value by using the symbols 0x
In general, show your working out completely
Conversions
Denary 234
Su m
ma Binary 128 64 32 16 8 4 2 1 ry
of
1. Convert
1 1 1 0 1 0 1 0
to Binary
2 Nibbles 8 4 2 1 8 4 2 1
2. Split into
1 1 1 0 1 0 1 0
2 nibbles
Hexadecimal E A
Uses:
Display error codes e.g., Error #404
Notation of colour in HTML
MAC addresses
Display machine code.
Characters
Matilda Baines GCSE Computer Science Year 11
Every character on the keyboard is represented by a binary value. Uppercase letters have
different values from lowercase characters, Punctuation symbols have their own character
code. A British keyboard needs to contain 26 uppercase letters, 26 lowercase letters, 10
numbers and around 36 other characters. Therefore, 7 bits would give 128 different
combinations which can represent a total of 128 different characters.
A character set is a defined set of letters, symbols and digits that can be represented by a
computer. There are two major character sets:
ASCII UNICODE
Images
Digital images can be stored on a computer in many different file formats. But there are two
main categories of this:
Bitmap: BMP, JPG, GIF, PNG + TIF Vector: WMF, SVG + EPS
Bitmap
Bitmap images are made up of pixels (picture element). A pixel is
the smallest identifiable area of an image. Each pixel is a single colour
and is given a binary value which represents that colour. A pixel’s
colour can be changed by changing this value.
Image resolution: Resolution is the concentration of pixels
within a specific area. The area is defined by the image width
and height in pixels. 72 PPI (Pixels Per Inch) = Typical screen
resolution
Image Dimension: The area defined by the image width and
height in pixels. For example, an image that is 300 pixels wide
and 168 pixels high (300 * 168) contains 50,400 pixels.
Image Metadata: Metadata is data about data, and it is
information other than the image data that is stored with a
file. This will include colour depth in bits per pixel, resolution,
date created and the author.
Colour & Bit Depth
Matilda Baines GCSE Computer Science Year 11
When you increase the number of colours in an image, you need more bits per pixel. Each pixel can
represent a finite number of colours.
1 bit = 2 colours 3 bits = 8 colours 4 bits = 16 colours
2 bits = 4 colours
o A pixel is attributed a few n bits.
o The number of combinations (2n) dictates the bit depth and therefore the number of colours
that can be represented.
o A higher bit depth gives a greater range of colour and a better quality of image.
Each pixel has a proportion of red, green and blue. Colour values of individual pixels are expressed in
software as denary RGB values and in hexadecimal. RGB values range
between 0-255. The file size of the image is 200 bits
(10 wide * 10 high) * 2 bits.
Sound
Sound travels as waves, which are vibrating particles.
Analogue sounds signals are continuous however the
computer does not like this, so stores it as digital
sounds. Sounds must be converted into a digital form
to be stored and processed by the computer. Digital
is made up of discrete samples of numeric data.
Sound Sampling
A sound sample is a measurement of amplitude of a sound wave at a given time. Sounds is sampled
using a bit depth and a sample rate. Analogue sound passes through an ADC and sampled at regular
time intervals where the amplitude is measured. Each sample is stored as a binary number and
stored sequentially
The bit depth determines how closely the wave is sampled on the y-axis. It is the number of
bits available for each sample.
The sample rate is the number of samples taken per second.
The
Sample Resolution is the number of bits (audio bit depth) used to record each measurement. More
bits used er sample enables the height of the wave to be more accurately measured but increases
file size.
Sample Rate is usually measured in Hertz (Hz) and 1 Hz is equal to 1 sample per second. The
frequency or sample rate per second affects the level of detail in the digital representation. The
greater the frequency, the greater the accuracy.
Calculating sound file sizes = Sample rate * Bit depth * Duration
6 samples per second * 4-bit resolution * 3 seconds = 72 bits or 9 bytes
Compression
Compression is the name given to algorithms which reduce file sizes. Decompression is the opposite.
This is heavily used with sound, image and video files. Usually, it is used for when files when they are
sent via the internet to reduce download times and data allowances to go further. There are two
types of compression:
Buffering
Video or music streaming causes buffering if the download speed is slower than the
playback speed. Therefore, files for video and music streaming are compressed, however
the TV or computer needs to decompress the data as it is playing the video. Before the
video begins playing, it will buffer enough to allow for the network occasionally being slow.
Benefits of Compression
o Smaller files = Fewer packets = Faster transmission time
o Reduces download times of video, sound (including speech used for VOIP systems)
and image files.
o Images inside web pages appear faster.
Matilda Baines GCSE Computer Science Year 11
Primary Storage
There are many types of memory used in computers. In Von Neumann architecture, primary
storage is memory/storage that is directly accessible to the CPU. It stores programs that are
currently running and need to be accessed by the CPU. The two types of primary storage
are:
RAM (Random Access Memory) – RAM is often referred to as main memory and the
name comes from the ability of the CPU to access any part of the memory in the
same amount of time.
A Level Definition: The hardware in a computing device where the operating system,
application programs and data in current use are kept so they can quickly reached
and used by the devices processor
It can be read from and written to and at any one time it will normally store: the
operating system, the software currently in use and the data which the software is
using.
The computer stores running programs and data in RAM when your computer is
turned on. When your computer is turned off, data stored in RAM is lost. So, we call
RAM volatile.
o When the computer is first turned on, no data is stored in RAM. However,
when you reach the maximum amount of memory and you need more, it
goes to virtual memory that is part of the hard drive used as an extension to
RAM.
o Advantage: uses cheap secondary storage on the hard drive, prevents error
messages as
ROM (Read Only Memory) – Some data needs to permanently held in primary storage even
when the computer has no power. ROM holds this data.
o Read – only: Nothing can be written onto it.
o It is non-volatile so no data is lost if the power goes off.
What ROM holds:
o ROM stores the initial program that is run when the device is first turned on, known
as the bootstrap (tells where the operating system is on the hard drive).
o Also stores the BIOS (Basic Input/Output System) which controls the basic technical
configuration of the computer such as the processor speed and system time.
Secondary Storage
Secondary storage is non-volatile memory external to the CPU and used for long-term
storage of programs and data. There are three main types of secondary storage:
Magnetic: Mechanical parts move
over the disks surface to read and write
data magnetically, or a drive head reads a
magnetic tape.
Matilda Baines GCSE Computer Science Year 11
The disk contains concentric circles called tracks; each is divided into a sector. Mechanical
arms read and write. Parts are magnetised differently; one level of magnetism will be 1 and
the second will be 0.
Solid State: Data is recorded onto solid memory chips without any
moving parts. Solid-state disks use non-volatile flash memory to store
information. Very fast read/write speeds as it doesn’t need to wait for
a disk to spin to the correct location and an arm to move. No
mechanical or moving parts meaning these disks are very durable.
Flash memory is how data is stored in an SSD. It is non-volatile memory that can be read from and
written to. Large electric current used to force electrons through a barrier and trap them on the
other side. They remain on the other side until ‘flashed’ with a new current. Trapped (charged) or
not trapped = 0 or 1
Storage Characteristics
Capacity: How much data can be stored – e.g., 700 MB, 50 GB or 2 TB
Speed: The rate (usually in MB/s) at which data can be read or written
Portability: how easy it is to carry – is the device small and portable?
Durability: will the device break if dropped? How well does it work with extreme
temperatures or magnetic fields?
Reliability: how likely is the data (or some of it) to be lost?
Cost: what is the cost of a device? How much is it to store 1 MB of data.
Solid 2 1 1 1 1 3
State
A network is a system that allows computer systems to communicate and share resources
with each other. There are two main types of networks: LAN (Local Area Network) and WAN
(Wide Area Network)
Matilda Baines GCSE Computer Science Year 11
Each packet is then sent independently to its destination and via different networks on its
route. The router at each node decides the route a packet should take. Once at its
destination, the packets are reordered. Corrupt or missing files are re-sent. Breaking data
into smaller packets allow for a faster, efficient and secure transfer.
IPv4 and IPv6
An IP address is the unique identification number given to every device by the ISP that is connected
to the internet. It represents the unique location on which you are connected to the internet,
allowing devices all over the world to communicate with each other; basically, the set of rules
governing the format of data sent via the internet or local network.
An IPv4 address looks like - 65.123.217.14 – There 4.3 billion of them and there are four 8-bit fields
separated by full stops.
Matilda Baines GCSE Computer Science Year 11
Network Hardware
Network Interface Card (NIC) = A component in the computer that is required to connect to a
network. It can do both wired and wireless connections. It is hard-wired with a unique 'address',
called a Media Access Control address (or MAC address). No two MAC addresses are the same; thus,
networks can use them to uniquely identify the connected devices and use them to direct data to
the correct device.
The NIC is responsible for converting data on the computer into the format used by the network,
and vice versa. Each network has its own set of rules, called a network protocol, and it's the NIC's job
to ensure that the connected device follows these rules.
Router = The router selects paths for data packets to cross networks and reach destinations. It is
essentially responsible for the transmission of data between networks as it connects them together.
It receives packets from a network and
forwards them to other computers on the
network.
Switch = Switches connect each node in a
LAN. It learns the MAC address of each
individual device and it forwards inbound
packets only to the intended recipient, using the recipient’s MAC address and the port it is
connected to.
Wireless Access Point (WAP) = A wireless transmitter receives data via a physical connection, and
this converts it into radio waves that are then transmitted. Any wireless device receives this radio
signal through a Wi-Fi adapter which allows us to communicate or download data from the data
source.
Transmission Media = the way that communication is sent through the network. CAT 5e/6 are 4
twisted copper cables, the twist reduces internal interference. Coaxial are a single copper wire with
plastic around for insulation and shielding. Fibre-Optic cables are made of flexible glass where data is
transmitted as light. They don’t suffer interference and last distance without a loss of signal.
Wireless Technologies
Wi-Fi: Wireless connections use
radio waves to transmit data
through the air. Devices
communicate with a wireless
access point (WAP).
Bluetooth: Wireless method of
connecting devices together over a
short distance. Pairing Bluetooth
devices together mean making a
persistent link between two
devices.
Matilda Baines GCSE Computer Science Year 11
Encryption
Encryption is the encoding of data so that it can no longer be easily understood. When using
websites such as shopping or banking, you want to keep your data safe. The encryption
method used is called SSL (Secure Socket Layer). A tiny padlock appears in your browser
window, and the website address starts with HTTPS:/
Plaintext: the original message to be Key: a sequence of numbers used to
encrypted encrypt or decrypt, often data using a
Ciphertext: the encrypted message mathematical formula
Encryption: the process of converting Encryption algorithm: the formula for
plaintext into ciphertext encrypting the plaintext.
Symmetric encryption: A single key is used to encrypt and decrypt a message and must be given to the
recipient of your message to be able to decrypt the data.
Asymmetric encryption: Two keys are used – a public key to encrypt and a private key to decrypt data.
This is more secure as it means that you never have to send or reveal your decryption key.
Organisation of Networks
Client Server: A server is a powerful computer which
provides services and resources required by any of the
clients. A client is a computer which requests the services or
resources from the server.
Clients send requests to the server and the server
processes the request and responds.
Pros of Servers: easier to keep track of files as they are
centrally stored; easier to perform backups; easier to
manage network security; are reliable and always on,
easier to install software updates.
Cons of Servers: expensive to setup and needs IT specialists to maintain the network and servers;
server dependence; can be overloaded.
Peer-to-Peer Networks:
Here, there are no servers. All computers on a P2P can see files on all other
computers and they can communicate with each other without a server.
Pros of P2P: easier to setup as computers can be cabled together; no
need for dedicated server equipment; individual computers can share a
printer, router etc.
Cons of P2P: malware is more easily transferred as there is no central
firewall.; data recovery and backup is not done centrally, so each has to have its
own backup system; files are not centrally managed; if a computer is turned off,
data on there cannot be retrieved from other computers.
Matilda Baines GCSE Computer Science Year 11
The ‘Cloud’ is a term used to refer to multiple remote servers working together to create
one service. It is a location on the internet from which software applications are run and
where data is stored.
This enables users connected to any Internet-enabled computer can access these services.
Hosting = An organisation or business that stores web pages/databases/files on server on
the Internet so that websites can be accessed at all times by thousands of users
Some cloud computing
applications include iCloud,
Google Drive, OneDrive and
Dropbox. These applications
provide services including
email, file transfer, cloud
storage and software. Cloud
data is stored on cloud file
servers and a hosting
company is responsible for
storing data for thousands of Cloud Storage
people on these file servers.
depends upon the quality of signal – the range of the device, interference from other
devices and physical obstructions.
o Number of users o Type of media
o Interference o Wi-Fi Frequency
o Bandwidth
Latency: Latency is the measure of how long it takes a message to travel between
devices across a network. Limited bandwidth affects this, as well as the type of
network.
Error Rate: Less reliable connections increase the number of errors that occur when
data is transferred. This means the data has to be resent until it arrives correctly.
Network Security
There many different forms of attack and threats posed to a network. There are mainly
three categories of cyber security threats:
Hacking Social Engineering
Malware
Malware
Malware refers to any software written with malicious intent. Malware is executable
programs that run on a computer. They could be used to disrupt computer users from their
work, corrupt files, gain unauthorised access to a computer program or files. Types of
malwares:
Spyware Adware
Matilda Baines GCSE Computer Science Year 11
Viruses Trojans
Ransomware
Worms
Virus
A virus attaches itself to existing software programs which will activate and infect
your computer when you run a program. They corrupt or delete data on a computer,
even delete everything on the hard disk. They can replicate and spread to others
connected to you via email, LAN connection, swapping removable disks and peer-to-
peer file sharing.
Worms
A worm is a standalone file that does not need a host program to attach itself to. A
worm can replicate itself without any human interaction.
Trojans
A trojan is a non-self-replicating virus that masquerades as a harmless file that
tempts you to open it.
Ransomware
A ransomware holds a computer hostage by locking or encrypting access to it or files.
If the data is encrypted, not even a cyber security professional will be able to recover
the data unless backups are available. Once a ransom is paid to the attacker, access
is restored.
Keylogging
Keylogging is a type of spyware that records the action of when keys are struck so
that the person using the keyboard is unaware that they are being tracked. This is to
attempt to gain fraudulent access to passwords and other confidential information.
Exploiting vulnerabilities
There are several ways in which hackers can exploit technical vulnerabilities, two of these
include:
Unpatched software – if software updates and security updates are not installed
then the software will be vulnerable.
Out-of-date anti-malware – if this isn’t updated regularly then it won’t be able to
detect the latest viruses.
Social Engineering
Social engineering is the ability to obtain confidential information by asking people for it
or influencing people.
A common form of social engineering takes place over the telephone – someone rings
up an employee of a company and pretends to be a network administrator usually. The
social engineer gains their trust and persuades them to disclose confidential
information.
Phishing
Phishing is when criminals send emails or texts claiming to be from a well-known
business. These emails contain links to spoof versions of websites. They require them to
Matilda Baines GCSE Computer Science Year 11
update personal information. When they type this in, the criminal then has access to
their actual login details. You should look out for:
Greeting: The phishers don’t know your name – just your email address, so the
greeting is not personalised
The sender’s address is often a variation on a genuine address.
Forged link: The link looks genuine, but it may not link to the website given. Roll
your mouse over it to check. Also, no http instead of https
Request for personal information: Genuine organisations never do this.
Sense of urgency: Criminals try to persuade you that something bad will happen
if you don’t act fast.
Poor spelling and grammar
SQL Injections
Networks which use databases are most vulnerable to this type of attack. SQL stands for
Structured Query Language, and it is one of the main coding languages used to access
information in databases. SQL injections are pieces of SQL typed into websites input box
which then reveal sensitive information.
Preventing Vulnerabilities
With all these attacks and security issues, people these days need to be able to protect and
prevent these from occurring. Some of the ways to look after your data is:
Penetration Testing Passwords
Anti-Malware Software Encryption
Firewalls Physical Security
User Access Levels
Matilda Baines GCSE Computer Science Year 11
System Software
A user interface is a program that looks a user to interact with a computer. There are many
types including:
Graphical User Interface (GUI): GUI uses a term called WIMP which shows how we
can interact the computer. WIMP stands for Windows, Icons, Menus, Pointers. It the
Matilda Baines GCSE Computer Science Year 11
easiest one to use and looks most pleasing to the eye; but requires a lot of
processing to be shown.
Menu-Driven Interface: Menu-driven interfaces are often used by devices that have
a dedicated function including MP3 players, ATM machines and Self-Service
checkouts.
Command Line Interface (CLI): Text commands are entered into the computer. This
requires very little processing and can save on the need for an expensive graphics
card, yet they are extremely powerful. For expert users, who know the commands it
can be far faster to enter commands than using a mouse. A command line interface
requires much less hard disk storage space. It will also require less RAM.
Voice Activated: Speech recognition technology that allows people to interact with a
computer through voice commands. (Apple’s Siri, Amazon’s Alexa and Microsoft’s
Cortana)
Real-Time: Sensors detect inputs, actuators output actions.
Memory Management
To run a program, the computer must copy the program from storage into main memory.
Data used by the program is copied into main memory. The operating system keeps a record
of where each program and its data are located. The operating system will make sure not to
overwrite existing programs and data.
Multi-Tasking
Multi-tasking is where an operating system manages many tasks happening at the same
time. This may be having a web browser open whilst playing music and messaging friends.
Many other background processes are also running. The operating system decides which
process will run next on the CPU and for how long.
Peripheral Management
Peripheral hardware is any hardware device that is not inside the computers main body.
This will include any input/output device as well as storage devices. But for each to work a
device drive must be installed. It is a small program that controls peripheral devices such as
printers, mice and displays. Each device communicates with the OS via its own drive.
Interrupts
An interrupt are signals sent to the CPU by external devices to indicate an event that needs
immediate attention. It requires the operating system to stop and figure out what to do
next. It temporarily stops a service or current process.
Hardware interrupts are generated by hardware devices: printer out of paper.
Software interrupts are generated by programs: divide-by-zero error.
The computer can send data to a printer much faster than it can be printed. The data will be sent to
a print queue or buffer which is a special area of memory in a computer print server.
Any data in the print queue is transmitted to the printer, typically a page at a time.
The printer will send its status back to the operating system which reports any errors it the
user. For example, the operating system may display an “out of paper” error message.
Access Rights
If a computer is used by more than one person, each user should be able to see only their
own files. Users and system administrators have different levels of access rights, and some
users may be allowed to read files but not edit them.
Utility software helps to keep the computer working well. Utility programs perform extra
functionality and housekeeping tasks that keep the computer running efficiently. Some
tanks performed by utility programs:
Disk Defragmentation = reduce the
amount of fragmentation in file
systems (magnetic storage)
Disk Clean-Up = deleting unwanted
files
Encryption = Disguises the contents of
files so it can only be understood by
the authorised users
File Management = searching, opening, renaming, deleting and grouping
Compression = unused files can be compressed, stored and easily extracted when
required.
Disk Management = manage various drives such as hard drives, optical drives and
flash drives
Matilda Baines GCSE Computer Science Year 11
Anti-Virus and Firewall = prevent harmful programs and files from entering the
system
Matilda Baines GCSE Computer Science Year 11
Impacts of Technology
With technology, there is often a huge impact upon society as they are developed very
quickly. These include:
Ethical: refer to issues that are morally right or wrong
Legal: refer to issues that are illegal or against the law
Cultural: refers to issues that impact ideas, behaviours, beliefs and values of groups
of people
Environmental: refer to issues that have an impact on the environment
Privacy: refer to issues about our personal details and details of our activity
Ethical Issues Privacy Plagiarism Fake News
Censorship Net Neutrality Netiquette
Internet of Things Social Media Trolling/Bullying
Job loses De-skilling
Legal Issues Copyright designs Data Protection Computer Misuse
and Patent Act Act/GDPR Act
Software
Cultural Issues Digital Divide Remote working Education
Social Divide Health and Work life balance
Consumers Wellbeing Globalisation
Social Interaction
Environmental E-waste Energy Carbon dioxide
Matilda Baines GCSE Computer Science Year 11
Ethics are moral principles or rules that govern a person’s behaviour or attitude. These apply
to the use of computers as well as other things. The main ethical issues include:
Ensuring Public Safety: As new technologies are constantly arising to the shops,
keeping public safety is of paramount importance. Driverless cars are an example of
this.
The designers not only have to be concerned with the drivers and passengers safety,
but those of other drivers and pedestrians. Ethics applies here on when the software
has to make a priority of who to ensure the safety of.
Data Security: Personal data is very precious to the person and has to be kept safe.
Many people try to hack accounts such as social media to obtain this. Some even use
malware such as ransomware where people are forced to hand it over otherwise,
they are denied access to their device. The data is all encrypted and will not be
released until a ransom is paid.