Paper 1 Exam Revision Y10
Paper 1 Exam Revision Y10
Fetch – In this stage an instruction is fetched from Main Memory (RAM). The
oldest instruction is always fetched
Decode – In this stage the instruction is broken down and converted into a language
that can be understood (binary)
Execute – In this stage the instruction is executed and carried out, and the user
receives what they requested
CU (Control Unit)
This works with the CPU to control the flow of data within the system and to decode
instructions
Cache
The is memory located on the processor chip. It acts as a very small amount of memory
located in between the processor and Main Memory (RAM). We store frequently used
instructions here to make accessing them quicker and easier
Registers
This is a small amount of memory within the CPU. There are a variety of registers, all of
which do different jobs (MAR/MDR/ACC/PC)
Program Counter
This stores the address of the next instruction to be processed, which then goes onto the
MAR
Accumulator
This stores the results , and also temporarily stores data whilst calculations are being
processed by the ALU
ROM stands for Read Only Memory. It is called Read Only because it is not rewritable,
therefore it can only be read (it cannot be changed).
The advantages and disadvantages of different storage devices and storage media
relating to these characteristics:
Capacity
This refers to the amount of data that can be stored on the media. The higher the capacity,
the more data it can store without becoming full.
Speed
This refers to the speed in which the data can be read and transferred. The higher the speed,
the faster data can be read and transferred to and from the media.
Portability
This refers to how easy the media is to transport and move around from one place to
another. The better
Durability
This refers to how robust the media is, how likely it is to break when shaken or dropped.
The better the durability, the less likely the device is to break or lose data if dropped or
shaken.
Reliability
This refers to how likely it is to be able to be used repeatedly, without failing. The better the
reliability, the less likely the media is to fail over time.
Cost
This refers to how expensive the media is to buy. The better the cost, the cheaper the media
is to buy.
1.2.3 - Units
The units of data storage:
Used as a measurement of storage. The order is as follows:
Bit – Nibble – Byte – Kilobyte – Megabyte – Gigabyte – Terabyte – Petabyte
Bit
Smallest data unit (0 or 1)
Nibble (4 bits)
Byte (8 bits)
• 8 bits in a byte
Megabyte (1,000KB)
For computer systems to be able to process and execute our instructions they must be in a
format the computer understands. Computers do not understand sound, or pixels, or letters.
All these must be converted into binary so that the instructions can be understood and
executed.
Data capacity and calculation of data capacity requirements
For this requirement you should be able to answer questions like
How many MB in 4TB?
How many KB in 4MB?
If a movie is 500mb , how many movie can you store in 1TB?
How to add two binary integers together (up to and including 8 bits) and explain overflow
errors which may occur
How to convert positive denary whole numbers into 2-digit hexadecimal numbers and vice
versa
How to convert binary integers to their hexadecimal equivalents and vice versa
Binary shifts
Characters:
The use of binary codes to represent characters
The relationship between the number of bits per character in a character set, and the number
of characters which can be represented, e.g. ASCII, Unicode
For example, ASCII is a character encoding standard for computer systems. Here characters
are given a code within the system. In the original version of ASCII, a total of 127
characters were covered. This was because the system used a 7-bit encoding system,
meaning the maximum number of characters represented was 127. In extended ASCII, this
rose to 255 as the system used an 8-bit encoding system, increasing the maximum number
of characters.
As we said above, the more bits per character we have, the more characters we can have
within our character set. ASCII used 7-bits, meaning a maximum of 127 characters,
extended ASCII used 8-bits, meaning a maximum of 255 characters. UNICODE however
uses up to 32 bits per character, meaning there are over 1.1 million characters that are in
UNICODEs character set.
Of course, using this many bits per character means more characters which means more
languages etc. can be covered, but storing these characters means more storage space is
taken up on your device
Images:
How an image is represented as a series of pixels, represented in binary
An image is made up of millions of pixels. A pixel is an individual ‘square’ on an image,
that when combined produce an image.
As you can see in the above example, the image is a simple black and white image.
However, when displayed in binary to show how the computer would store each pixel, we
can see each white square is represented as a 0, and each black square is represented as a 1.
In this image the resolution would be low as we only have a small number of pixels in the
image (100 pixels). The colour depth is also small too. We are using 1 bit per pixel (each
pixel is being represented using just a single bit (a single number), either 1 or 0. This means
the maximum number of colours we could have using this number of bits per pixel is 2.
Now let’s have a look at an image that has a greater colour depth
Sound:
How sound can be sampled and stored in digital form
As with images (and everything else) sound must also be converted to and stored in binary
In the image below we have our analogue wave in the background. What our device does is,
at intervals, takes a measurement of the frequency of the wave. These measurements are
then joined together to create a digital wave
In the above example, the intervals where the sound is sampled is represented using the
grey lines. This means this sound is sampled 6 times a second. The average sound for a CD
is sampled over 44,000 times a second. The more samples we do a second the better the
quality of the sound, but the more information we are storing per second and therefore the
file size increases.
Below we can now see the points of each sample, represented with the black dots:
The more samples we do a second the better the quality of the sound, but the more
information we are storing per second and therefore the file size increases.
1.2.5 - Compression
The need for compression
Compression is when the size of a file is reduced by changing some of the files attributes
e.g. its file type, dimensions etc. For example, we may compress a WAV sound file (which
has a high audio quality but a large file size) down to an MP3 sound file (which has a lower
sound quality but a much lower file size). This would then allow us to store more sound
files on a device such as an iPod, due to the file sizes being smaller.
We may also need to compress a file to allow us to have additional room on a storage
device, or to make a file small enough to send in an email.
Types of compression:
Lossy
Lossy Compression – This is when the size of the file is reduced, however the quality of the
file also reduces (meaning the quality gets worse)
Lossless
Lossless Compression – This is when the size of the file is reduced, however the quality of
the file remains the same
Types of networks:
LAN
A LAN covers a small geographical area such as one building, or two buildings close together.
Examples of LANs would be a school, a house, and a police
WAN
A WAN covers a large geographical area such as a city, country, or the world. Examples of WANs
would be the internet, an international bank, or ATMs (Automated Teller Machine)
Number of Users:
The number of users on the network will impact upon the performance of the network. Too
many users on the network will mean more of the bandwidth is being spread out to try and
meet all the users’ needs. When there is not enough bandwidth to manage all the users on
the network, the network will slow down.
Transmission Media:
The media you choose to use in your network will impact upon how well it can perform. A
wired network for example has a higher bandwidth compared to a wireless network, due to
less interference. Using fibre optic cabling rather than copper cabling will have a higher
bandwidth, due to less interference again.
Latency:
This is the delay from transmitting data to receiving it. This can be increased by not having
the correct network hardware to direct traffic around the network appropriately, causing
‘traffic jams’ and therefore slowing data down.
The hardware needed to connect stand-alone computers into a Local Area Network:
Disadvantages:
❖ When something is uploaded to the cloud, you can sometimes lose ownership to it,
which can lead to Copyright issues
❖ You are usually limited to a small amount of storage space for free, before having to pay
for further storage
The applications provided may not always offer you all the features you
want or need, compared to the bought versions
❖ Data is easier to hack when stored online. Despite companies who offer
cloud services providing security measures, it is not possible to
guarantee data security
❖ Users must always have an internet connection in order to access applications and files.
Therefore, if your internet connection drops, you would not be able to access your files
or applications
Web servers and clients
Data for websites is stored on a web server. These are special, dedicated servers responsible
for managing requests from clients and sending data so websites can be viewed and
accessed. A client is a device that is requesting this data. When loading up a website the
client will send a request to the web server for the relevant websites data; the web server
will process this request (here a process called packet switching takes place) and then send
the requested data to the client.
Star and Mesh network topologies
MESH
This is a type of LAN. In a mesh topology all the devices on the network connect to as many other
devices on the network as they can. Each device on the mesh network is called a node. Data
travels in multiple directions and via multiple routes in a mesh network. We draw the mesh
topology like this:
Star
In a star topology all devices are connected to a central switch of hub, via their own cable. Each
device on the star network is called a node. Data travels through the central switch of hub,
therefore reducing data collisions and speeding up data transfer
Modes of connection:
Wired:
- Ethernet
Ethernet is a standard for networking technologies, used for communication on a wired
LAN (Local Area Network).
Twisted Pair Cables are commonly used now for creating ethernet connections. This is
because it allows data to be both sent and received at the same time, due to different wires
being used for both. Previously, a special protocol called CSMA/CD (Carrier Sense
Multiple Access/Collision Detection) was used to detect when data was being transmitted
over a wired network. It would detect communication on the network to avoid transmitting
data at the same time, therefore avoiding data collisions. Due to Twisted Pair Cables having
separate cables for sending and receiving, this is no longer necessary.
When data is transmitted via an ethernet connection, it is transmitted in frames. These
include:
▪ Bits used to synchronise transmission and receiver clocks
▪ Start frame deliminator to signify the start of the data packet of the frame
▪ Sender and receiver MAC Addresses
▪ Actual data
▪ Cyclic redundancy check used for error checking on the frame
Wireless:
- Wi-Fi
- Bluetooth
Wi-fi: Frequencies, Channels, and Encryption
Wi-fi is a common standard used for wireless networks. It is often what we refer to when
connecting to a wireless network.
In order for data to be sent via Wi-fi, frequencies and channels are used.
Frequencies are used to transmit signals. 2.417GHz is an example of a frequency. In order
to make the frequency more convenient to remember and use, it is given a channel number.
For example:
2.417GHz – Channel 1
2.427GHz – Channel 2
2.437GHz – Channel 3
In order for devices to connect via Wi-fi, the channels must be set to the same. For
example, if your router is set to channel 2, but your computer is set to channel 3, the
devices will not be able to connect to each other. The channel is set by the NIC (Network
Interface Controller/Card) but this can be changed by the user. As long as two devices on
the network are set to the same channel, they can communicate with each other.
This is where interference can also affect your network too. If other devices are set to the
same channel, they can interfere with the signals being sent between your device and the
router. This can then slow your connection down.
However, if data is being sent wirelessly, it is easier to intercept and steal. Data therefore
must be encrypted, in order to protect it whilst being transmitted.
Encryption
Encryption involves scrambling data before being transmitted, into a secret code. In order
to decrypt the code, you must have a ‘master’ key. Only the device sending and the device
receiving the data has this key. This is because prior to the data being a sent, a ‘handshake
protocol’ is used to ensure the same correct and valid key is being used by both the sender
and receiver
IP addressing and MAC addressing
In order for data to be transmitted over and between networks, IP Addresses and MAC
Addresses are required.
An IP (Internet Protocol) Address is unique to each device connected to the internet. IP
Addresses are used to allow data to be directed around the internet from senders to the
correct receivers.
A MAC (Media Access Control) Address however is specific to a piece of hardware on a
network. They are built into the hardware (NIC) and therefore cannot be changed.
Standards
Allows communication between two or different brands
▪ Leaving computers logged on and unattended ▪ Writing passwords down on sticky notes
and storing them on desks ▪ Sharing passwords with colleagues ▪ Not ensuring protection
software is up to date ▪ Opening email attachments without ensuring they are safe first
Brute-force attacks
This is when an automated program continually tries to gain access to the network. This is
to try and potentially steal data or access corporate systems
Denial of service attacks
This is when a networks server is overloaded with requests which it cannot handle,
causing the server to crash. This therefore brings down the network
Data interception of theft
This is when data is intercepted (stolen) from the network, either directly from the
network or during transmission. It may be usernames and passwords to access the
network, or other crucial information such as customer information
The concept of SQL injection
This is when the contents of a database are outputted, revealing private and confidential
information. It also opens up the possibilities for data to be amended, appended, or
removed from the database.
Anti-malware software
This software is used to prevent and remove malware. It scans devices and alerts users to
potential threats found on their device, so they can be removed
Firewalls
This is used to control what goes in and what goes out of the network. It prevents
unauthorised access by only allowing authorised access to the network.
Passwords
These allow users to access the network using a combination of letters, numbers, and
characters only they know
Encryption
This is a security measure when sending data. Data is scrambled into a secret code, which
can only be decrypted using a master ‘key’. Only the sender and receiver have this key,
which therefore prevents the data being hacked/intercepted, and understood.
Prior to encrypted data being sent, both devices check with each other to ensure they have
the correct master key.
Physical security
This refers to the process of securing the actual hardware of the network with physical
measures such as locking doors to server rooms, placing servers in cabinets that lock etc.
There are two types of compression, these are: ▪ Lossy Compression – This is when the size
of the file is reduced, however the quality of the file also reduces (meaning the quality gets
worse) ▪ Lossless Compression – This is when the size of the file is reduced, however the
quality of the file remains the same
1.6.1 - Ethical, legal, cultural and environmental impact
Legal issues
A legal issue relates to whether something is right or wrong to do by law. If something is
done against the law, it can lead to consequences such as fines and imprisonment
Cultural issues
A cultural issue relates to whether something could have a positive or negative impact on a
person, or group of peoples, culture. Again, a cultural issue is not necessarily illegal, but
could be seen as being wrong to do.
Environmental issues
An environmental issue relates to whether something is right or wrong to do in relation to
the environment. This means how much of a positive or negative impact something could
have on wildlife, plants, the air etc.
Privacy issues
A privacy issue relates to whether someone personal and private life could be put in
question. This could involve personal data about them, images of them etc.
Proprietary Software
This is when software is released and the programming code (source code) is not accessible
to all users to edit. It often has a cost and users cannot modify and distribute the software
legally. This type of software is often owned and sold by a company.