Save
computer science
Paper 1 computer science
Save
Share
Learn
Content
Leaderboard
Learn
Created by
james
Visit profile
Subdecks (1)
Computer science Topic 1.3 Network
computer science > Paper 1 computer science
27 cards
Cards (89)
CPU
(Central Processing Unit)
The
brain
of the computer, responsible for
processing instructions
and data
Fetch
-Execute Cycle
1. Fetch: The CPU
retrieves
an instruction from
memory
2. Decode: The CPU
decodes
the
instruction
to understand what needs to be done
3. Execute: The CPU carries out the instruction, which might involve
calculations
, data manipulation, or
accessing memory
Common CPU Components
ALU (
Arithmetic Logic Unit
): Performs
arithmetic
and logical operations
CU (Control Unit): Fetches instructions from
memory
, decodes them, and controls the overall flow of data through the
CPU
Cache
: A small, high-speed memory that stores frequently accessed data and
instructions
Registers
: Temporary storage locations within the CPU that hold
data
or addresses during execution
Von
Neumann Architecture
A basic model for computer architecture that describes the
separation
of data and instructions in
memory
and the fetch-execute cycle
Von
Neumann Architecture Components
MAR (
Memory Address Register
): Stores the memory address of the instruction to be fetched
MDR (
Memory Data Register
): Stores the data fetched from memory or written to memory
Program Counter (PC): Keeps track of the
memory address
of the next
instruction
to be fetched
Accumulator
: A
register
that holds data used in an operation
CPU Performance
Clock Speed
: Measured in
GHz
, represents the number of cycles the CPU can perform per second
Cache Size
: Larger cache size allows for
faster
access to frequently used data and instructions
Number of Cores: Modern CPUs have
multiple cores
, allowing them to handle
multiple tasks
simultaneously
Primary Storage (RAM)
Temporary, volatile memory that holds data and programs currently being used
ROM
(Read-Only Memory)
Non-volatile
memory that stores permanent data like the computer's
startup
instructions (BIOS)
Secondary
Storage
Stores data
permanently
, even when the computer is turned
off
(e.g., HDDs, SSDs, optical media)
Units of Data Storage
bit
nibble (4 bits)
byte (8 bits)
kilobyte (KB)
megabyte (MB)
gigabyte (GB)
terabyte (TB)
petabyte (PB)
Data storage devices have limited
capacities.
We need to calculate storage requirements based on
file size.
Data
storage Numbers
1. Convert between
denary
(base 10) and
binary
(base 2)
2. Binary addition requires understanding
overflows
3. Convert between
denary
, hexadecimal (base 16), and
binary
4. Binary shifts move bits
left
or right, affecting the number's
value
Character
Sets and Data Representation
Characters are represented in
binary
using
codes
like ASCII or Unicode
More bits allow for a
wider
range of characters
LAN
(
Local Area Network
)
Connects computers in a
small
area (e.g., home, office)
WAN
(
Wide Area Network
)
Connects
geographically
dispersed networks (e.g., the
internet
)
Network
performance
Affected by
bandwidth
(data transfer rate) and number of
connected
devices
Network
Topologies
Client-server
: Servers provide resources to clients
Peer-to-peer
: Computers share resources directly with each other
Hardware for LANs
Routers
Switches
Access points
Network interface cards (NICs)
Cables
Wired connections (
Ethernet
)
Reliable
and
fast
Wireless connections
(Wi-Fi,
Bluetooth
)
Convenient
but can be
slower
and less secure
Encryption
Scrambles data for
secure
transmission
Threats to Computer Systems and Networks
Malware: Malicious software like viruses, worms, and ransomware
Social engineering: Tricking users into revealing personal information or clicking malicious links
Brute-force attacks: Trying a large number of passwords to gain unauthorized access
Denial-of-service attacks: Overwhelming a system with traffic to make it unavailable to legitimate users
Data interception and theft: Intercepting data transmissions or stealing data from systems
SQL injection: Attacking a database by injecting malicious code into SQL queries
Identifying and Preventing Vulnerabilities
Penetration testing
: Simulating attacks to identify weaknesses
Anti-malware software
: Detects and removes malicious software
Firewalls
: Monitor incoming and outgoing traffic, blocking suspicious activity
User access levels
: Restricting user access to only the resources they need
Passwords
: Strong passwords are essential for security
Encryption
: Scrambles data to make it unreadable without a decryption key
Physical security
: Protecting devices from unauthorized physical access
Operating
System (
OS
)
Manages the
hardware
and
software
resources of a computer
Functions of an OS
User interface
: Provides a way for users to interact with the computer
Memory management
: Allocates memory to programs and data and allows multitasking
Peripheral management
and
drivers
: Controls devices like printers and monitors
User management
: Creates user accounts and controls access rights
File management
: Manages files and folders
Utility
Software
Encryption
software: Protects data by
scrambling
it
Defragmentation
: Improves hard drive performance by
reorganizing
fragmented files
Data compression
: Reduces the size of files for storage or
transmission
Impacts of Digital Technology
Ethical:
Privacy
concerns, data ownership,
digital
divide
Legal: Copyright
infringement
,
cybercrime
, online safety
Cultural: Impact on
traditional
media, cultural homogenization
Environmental:
E-waste
,
energy
consumption of data centers
Relevant Legislation
Data Protection Act
2018
: Regulates how
personal
data is collected, stored, and used
Computer Misuse
Act
1990
: Makes unauthorized access to computer systems a crime
Copyright
, Designs and Patents Act 1988: Protects
intellectual property
such as software
Software
Licences
Open source: Source code is
freely available
, allowing modification and
redistribution
Proprietary: Source code is not available, and users must purchase a
license
to use the
software
Threats
to Computer Systems and Networks
Malware
Social engineering
Brute-force
attacks
Denial-of-service
attacks
Data interception
and
theft
SQL injection
Malware
Malicious software like viruses,
worms
, and ransomware that can damage or
steal
data
Social
engineering
Tricking users into revealing
personal
information or clicking
malicious
links (e.g., phishing)
Brute-force attacks
Trying a large number of
passwords
to gain
unauthorized
access
Denial
-of-service attacks
Overwhelming a system with traffic to make it unavailable to legitimate users
Data
interception and
theft
Intercepting
data transmissions or
stealing
data from systems
SQL injection
Attacking a database by injecting
malicious code
into SQL queries
Identifying and Preventing Vulnerabilities
Penetration
testing
Anti-malware
software
Firewalls
User
access
levels
Passwords
Encryption
Physical
security
Penetration
testing
Simulating
attacks
to identify
weaknesses
in a system's security
Anti
-malware software
Detects
and
removes
malicious software
Firewalls
Monitor
incoming
and outgoing traffic, blocking
suspicious
activity
See all 89 cards