KEMBAR78
OCR GCSE Computer Science Paper1 Expanded Notes | PDF | Computer Data Storage | Computer Network
0% found this document useful (0 votes)
19 views6 pages

OCR GCSE Computer Science Paper1 Expanded Notes

The document covers key concepts in computer systems, including CPU architecture, memory types, data representation, computer networks, network security, and ethical/legal issues. It explains components like the ALU, CU, and the fetch-decode-execute cycle, alongside storage types and their evaluations. Additionally, it addresses network types, protocols, cyber threats, security measures, and the impact of technology on society and the environment.

Uploaded by

justmayonaise007
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views6 pages

OCR GCSE Computer Science Paper1 Expanded Notes

The document covers key concepts in computer systems, including CPU architecture, memory types, data representation, computer networks, network security, and ethical/legal issues. It explains components like the ALU, CU, and the fetch-decode-execute cycle, alongside storage types and their evaluations. Additionally, it addresses network types, protocols, cyber threats, security measures, and the impact of technology on society and the environment.

Uploaded by

justmayonaise007
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

OCR GCSE Computer Science - Paper 1: Computer Systems

1. Systems Architecture

The CPU:

- The Central Processing Unit (CPU) is the 'brain' of the computer, responsible for processing instructions.

Von Neumann Architecture:

- Consists of a single memory space shared between data and instructions.

- Program Counter (PC) keeps track of the instruction to be fetched next.

Key Components:

- ALU (Arithmetic Logic Unit): Handles arithmetic and logical operations.

- CU (Control Unit): Sends control signals to other parts of the CPU and coordinates the

fetch-decode-execute cycle.

- Registers:

- Program Counter (PC)

- Memory Address Register (MAR)

- Memory Data Register (MDR)

- Accumulator (ACC)

Fetch-Decode-Execute Cycle:

1. The address of the next instruction is placed in MAR.

2. Instruction is fetched and placed in MDR.

3. PC is incremented.

4. Instruction decoded by CU.

5. Instruction executed.

Performance Factors:

- Clock speed: Measured in GHz, determines how many cycles per second.

- Cores: More cores allow more parallel processing.

- Cache: Fast memory close to the CPU, reduces need to fetch from RAM.
OCR GCSE Computer Science - Paper 1: Computer Systems

- RAM: More RAM allows for more multitasking.

Embedded Systems:

- A computer system built into another device.

- Designed for a specific task.

- Examples: Microwave, washing machine, digital watches.

- Advantages: Cost-effective, energy-efficient, small size.

2. Memory and Storage

Primary Storage:

- RAM: Temporary storage for active programs and data.

- ROM: Non-volatile, stores essential programs like BIOS.

Secondary Storage:

- Needed because RAM is volatile.

- HDD: Uses spinning disks and magnetic storage.

- SSD: Uses flash memory, faster than HDDs.

Other Storage:

- Optical: Data is read by a laser (e.g., DVD, Blu-ray).

- Magnetic Tape: Sequential access, large capacity, used for backups.

Tertiary Storage:

- Long-term backup storage (e.g., cloud, tape libraries).

Storage Device Evaluation:

- Capacity: Amount of data it can store.

- Speed: Read/write times.

- Portability: Ease of transport.


OCR GCSE Computer Science - Paper 1: Computer Systems

- Durability: Resistance to damage.

- Reliability: Consistency of performance.

Memory vs Storage:

- Memory (RAM/ROM): Temporary or essential instructions.

- Storage: Long-term data retention.

3. Data Representation

Units:

- Bit (b), Nibble (4 bits), Byte (8 bits), Kilobyte (KB), Megabyte (MB), Gigabyte (GB), Terabyte (TB).

Binary and Hexadecimal:

- Binary is base-2 (used internally by computers).

- Hexadecimal is base-16 (used for easier reading).

Text Representation:

- ASCII: 7-bit, extended ASCII uses 8 bits (256 characters).

- Unicode: Covers all characters in all languages, supports emojis.

Images:

- Bitmap graphics made of pixels.

- Metadata includes resolution, colour depth.

- File size = width × height × colour depth

Sound:

- Sample rate: Frequency of samples per second (Hz).

- Bit depth: Number of bits per sample.

- Channels: Mono or Stereo.

- File size = sample rate × bit depth × channels × duration


OCR GCSE Computer Science - Paper 1: Computer Systems

Compression:

- Lossy: Data removed permanently (e.g., JPEG, MP3).

- Lossless: All original data kept (e.g., PNG, ZIP).

- Compression reduces file size and storage needs.

4. Computer Networks

Network Types:

- LAN: Local Area Network; confined to a small area.

- WAN: Wide Area Network; spans large geographical areas.

- PAN: Personal Area Network; used by personal devices like phones.

Topologies:

- Star: Each device connected to central switch/hub.

- Mesh: Each device connected to multiple others, redundancy.

Transmission Media:

- Wired: Ethernet cables, more secure and faster.

- Wireless: Uses radio waves; convenient but less secure.

Network Hardware:

- Router: Connects networks together.

- Switch: Connects devices in LAN and manages traffic.

- WAP: Wireless Access Point.

- NIC: Network Interface Card.

Protocols:

- TCP/IP: Rules for internet communication.

- HTTP/HTTPS: Web browsing.


OCR GCSE Computer Science - Paper 1: Computer Systems

- FTP: File Transfer.

- IMAP/POP3/SMTP: Email protocols.

DNS (Domain Name System):

- Translates domain names into IP addresses.

5. Network Security

Cyber Threats:

- Malware: Viruses, worms, Trojans, ransomware.

- Phishing: Fraudulent emails to steal information.

- Brute Force Attacks: Guessing passwords.

- DoS Attacks: Overwhelm server with traffic.

- SQL Injection: Injecting malicious SQL code.

Security Measures:

- Firewalls: Filter network traffic.

- Anti-virus Software: Detects and removes threats.

- Encryption: Data is scrambled and only readable with a key.

- User Access Levels: Restrict what users can access.

- Passwords and Authentication: Prevent unauthorized access.

- Pen Testing: Simulates attacks to find vulnerabilities.

Physical Security:

- Locking server rooms, biometric access, CCTV.

6. Ethical, Legal, Cultural, Environmental Issues

Ethical Issues:

- Privacy concerns.
OCR GCSE Computer Science - Paper 1: Computer Systems

- Surveillance.

- Misinformation and manipulation.

Legal Framework:

- Data Protection Act (2018): Protects personal data.

- Computer Misuse Act (1990): Prevents illegal access/modification of data.

- Copyright, Designs and Patents Act (1988): Protects intellectual property.

- Freedom of Information Act (2000): Public access to information held by public authorities.

Environmental Concerns:

- E-waste due to hardware upgrades.

- High energy usage in data centres.

- Solutions include recycling and low-energy devices.

Cultural Impacts:

- Digital divide: Unequal access to technology.

- Impact on jobs: Automation replacing repetitive tasks.

- Access to global communication and education.

You might also like