0% found this document useful (0 votes)
6 views

Computing-GCSE - Paper 1

The document provides an overview of CPU architecture, performance factors, embedded systems, primary and secondary storage types, data storage units, and character encoding. It explains the components of the CPU, such as the control unit, cache, and arithmetic logic unit, as well as the differences between volatile and non-volatile memory. Additionally, it covers various storage technologies, including magnetic, solid-state, and optical storage, along with their characteristics and performance implications.

Uploaded by

girlmasjid
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views

Computing-GCSE - Paper 1

The document provides an overview of CPU architecture, performance factors, embedded systems, primary and secondary storage types, data storage units, and character encoding. It explains the components of the CPU, such as the control unit, cache, and arithmetic logic unit, as well as the differences between volatile and non-volatile memory. Additionally, it covers various storage technologies, including magnetic, solid-state, and optical storage, along with their characteristics and performance implications.

Uploaded by

girlmasjid
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 29

1.1.

1 Architecture of the CPU Other components in the CPU:


Purpose
The Von Neumann Architecture consists of the CPU and Control Unit: Cache: Arithmetic Logic Unit:
Memory which are interconnected and can both store Decodes instructions and Stores frequently Responsible for
instructions and data. The CPU itself consists of different sends signals the other used instructions. performing arithmetic
components: Registers, Cache, Control Unit and Arithmetic components on how to calculations and logical
Logic Unit. The purpose of the CPU is to fetch, decode and respond to this instruction. decisions.
execute instructions.

Registers What is a register?


Program Counter: Memory Data A location within the CPU that stores
Stores the next Register: addresses and data which can be
instruction ready to Data written to and accessed quickly.
be used. from the main
Did you know?
memory.
The clock is another component found
in the CPU. This controls the rate in
which cycles are processed every
second. The rate is determined by the
Memory Address Accumulator: Clock Speed.
Register: Stores the results of
Stores the location the arithmetic Key terms:
of the next address calculations.
to be fetched. Fetch Decode Execute
Instructions Data Signals
1.1.2 CPU Performance Cache Size Clock Speed Cores
Purpose Definition/Meaning: Definition/Meaning: Definition/Meaning:
To get the best out of a CPU, The cache stores instructions that This controls how many cycles It acts as the ‘brain’ of the CPU
there are a number of are previously used or can be processed per second. and is responsible for executing
characteristics that can determine frequently used. It acts as the The higher the clock speed, the instructions. Modern CPU’s will
how well it performs: intermediary between the CPU more instructions executed per use a multi-core processor. (i.e.
• Clock Speed and Main Memory. second. multiple cores)
• Cores
• Cache

Did you know?


CPU’s can run at a higher clock
speed then it was designed to
run. This is known as
overclocking and is commonly How does an increase in How does an increase in How does an increase in
done with PC’s designed to play Cache Size impact CPU Clock Speed impact CPU cores impact CPU
video games. performance? . performance? performance?
• More instructions used can • An increase in Hz (Hertz) . • It allows instructions to be
be stored on the CPU. can lead to more tasks split up between the
Revision tip: • This means that data stored being executed per second. processors.
in the cache doesn’t need to • As a result, • As a result, they can be
If you struggle to remember any
be fetched from main programs/software will executed simultaneously.
of the characteristics that impact
memory. respond faster. • This will help to reduce the
the performance of the CPU,
• As a result, creating a more amount of time required to
remember they all begin with the
efficient process run a program.
letter C
.
1.1.3 Embedded Systems Real time systems
What is an embedded system?
A real-time system is well-defined system with
An embedded system is a computer system that is fixed time constraints meaning it will provide an
typically found within another device and is designed to immediate response to an input. For example, if
perform a set of dedicated/specific functions. They are you press a button on a digital camera, it will
also referred to as Special-Purpose Computer Systems. send a signal to capture the image immediately.

General-Purpose Computer Systems Special-Purpose Computer System


Laptop Browse the internet, open Microwave Set the time manually, pre-set
documents, send emails. options for defrosting certain
foods.

Smartphone Browse the internet, use GPS, Washing Pre-set functions for washing
play games, calls, text Machine clothes at different
messages. temperatures, different times,
selecting spin speed.

Games Play games, browse the MP3 Player Listen to music, select tracks,
Console internet, watch movies. skip tracks.
1.2.1 Primary Storage Virtual Memory
Purpose Description:
A primary storage device is a medium When the RAM becomes full, the overflow of data
that holds memory for short periods of normally stored in the RAM will be stored in Virtual
time while a computer is running. There Memory which is located on the hard drive. Once
are two types of primary storage used space becomes available, data will move from VM
by computer systems: RAM and ROM. and back to RAM. However this is a slow process.

RAM and ROM Difference between volatile and non-volatile


RAM (Random Access Memory) and ROM (Read-Only Memory) both store data but memory.
there are a number of key differences between the two. Volatile memory means when the computer is switched
off, data is lost. Whereas, non-volatile memory has the
ability to retain data even when the computer is
RAM ROM switched off.

Volatile memory Non-volatile memory BIOS:


Read and write data Reads data BIOS stands for Basic Input/Output System. It designed
Stores programs/data currently in use. Stores instructions required to boot up to boot up the computer using a POST (Power on
the computer (BIOS) self-test) and determine what hardware is connected to
the system.
Expandable Soldered onto the motherboard
Contents change frequently Contents hardly ever change. Key terms:
(Temporary) (Permanent) Volatile Non-volatile Storage Read Write
1.2.2 Secondary Storage Magnetic Storage Revision tip:
Definition/Meaning: Description A common misconception is that
The most common example of magnetic secondary storage backs up
Secondary storage has the ability to data. If a duplicate copy is
store files even when the computer is storage is a Hard Drive. The hard drive
contains a number of moving mechanical created then the device used to
switched off. Therefore, it’s a back it up would be classed as
non-volatile form of storage. parts such as a spinning platter with a thin
magnetic coating. A "head" moves over the tertiary storage.
platter, writing 0's and 1's on the platter.

Review Key terms:

Cost Capacity Reliability Cost How much the device costs per MB.
Expensive from the Enough capacity to Can perform well for Capacity How much space is available on the storage device.
outset, but cost per store different types a long period of time
MB represents value of files. You can buy but performance will Reliability Longevity – how well it can maintain the same level
for money. hard drives that can eventually of performance over time.
hold 4TB of data. deteriorate.
Durability how resistant it is to external factors such as being
dropped, scratched and how it responds to being in
Durability Portability Speed extreme conditions.
If it’s external then it Would have to be Uses a head that Portability How easy is it to transport from one place to
can become detached from the moves over a platter another.
damaged if dropped computer and it’s to read and write
Speed How quickly the data can be read and transferred
because it has moving heavy. data so it’s not
from the storage device.
parts. instant.
1.2.2 Secondary Storage Solid-State Storage Revision tip:
Definition/Meaning: Description A common misconception is that
A solid-state drive (SSD) is a solid-state secondary storage backs up
Secondary storage has the ability to data. If a duplicate copy is
store files even when the computer is storage device that uses integrated circuit to
store data persistently, typically using flash created then the device used to
switched off. Therefore, it’s a back it up would be classed as
non-volatile form of storage. memory. Examples include Solid-State Drive,
USB Flash Drive and SD Card. tertiary storage.

Review Key terms:

Cost Capacity Reliability Cost How much the device costs per MB.
Expensive, even the You can purchase up It has a limited
cost per MB. to 4TB of data, not as number of read and Capacity How much space is available on the storage device.
Although, the price is much as you can with write cycles which Reliability Longevity – how well it can maintain the same level
beginning to come a HDD. means performance of performance over time.
down. will deteriorate
quickly. Durability how resistant it is to external factors such as being
dropped, scratched and how it responds to being in
Durability Portability Speed extreme conditions.
Resistant to being Most devices are It doesn’t use a Portability How easy is it to transport from one place to
dropped because it small, lightweight and mechanical arm and another.
has no moving parts. easy to carry around. relies on the
Speed How quickly the data can be read and transferred
Easy to transfer files. processors embedded
from the storage device.
within.
1.2.2 Secondary Storage Optical Storage: Revision tip:
Definition/Meaning: Description A common misconception is that
Optical storage is any storage type in which secondary storage backs up
Secondary storage has the ability to data. If a duplicate copy is
store files even when the computer is data is written and read with a laser.
Common examples of optical storage include: created then the device used to
switched off. Therefore, it’s a back it up would be classed as
non-volatile form of storage. CD, DVD, and Blu-ray.
tertiary storage.

Review Key terms:

Cost Capacity Reliability Cost How much the device costs per MB.
Cheap to buy and CD’s can only store If CD’s are stored in
cheaper to buy as a 700 MB which might cases or plastic Capacity How much space is available on the storage device.
bulk. You can get a not be enough to wallets then they can Reliability Longevity – how well it can maintain the same level
blank CD for less than store larger files. continue to be used of performance over time.
£1. Blu-ray can hold up for long periods.
to 25GB. Durability how resistant it is to external factors such as being
dropped, scratched and how it responds to being in
Durability Portability Speed extreme conditions.
Sensitive to scratches Most devices are It is slow reading the Portability How easy is it to transport from one place to
and dust which can small, lightweight and data because it has another.
make it difficult to easy to carry around. to access the optical
Speed How quickly the data can be read and transferred
read the data. Easy to transfer files. drive (the drive used
from the storage device.
to read the CD).
1.2.3 Units Sound file size: Worked example:
Why do computers use bits? Sample rate = 3
Formula: Duration = 1 minute 30 seconds
Binary is a number system that only uses two digits: 1 and 0. All Bit depth = 2
information that is processed by a computer is in the form of a sound file size = sample rate x
sequence of 1s and 0s. Therefore, all data that we want a duration (s) x bit depth
3 x 90 x 2 = 540 bits
computer to process needs to be converted into binary. These
digits 1 and 0 are often referred to as bits. Image file size: Worked example:
An image that is 400 x 400 with a
Units of data storage: colour depth of 4 bits.
Formula:
image file size = colour depth x
Order Unit Equivalent (400 x 400) x 4 = 640000 bits
image height (px) x image width
(Smallest to largest) 640000/8 = 80,000 bytes
(px)
1 Bit 0 or 1
2 Nibble 4 bits Text file size: Worked example
3 Byte 8 bits Document that consists of 56
Formula: characters.
4 KB 1,000 Bytes
text file size = bits per character x
number of characters 50 x 8 = 400 and 6 x 8 = 48
5 MB 1,000 KB
(400 + 48 = 448 bits)
6 GB 1,000 MB
Exam tip:
7 TB 1,000 GB
Use of 1,024 for conversions and calculations would be acceptable.
8 PB 1,000 TB Allowance for metadata in calculations may be used
1.2.4 Data Storage Binary addition:
Binary
Binary is the language of the computer. Computers are
made up of complex circuitry. These consist of billions of
transistors that act as switches and they can only be in one
of two states. ON (1) or OFF (0)

Denary to Binary: Binary shift: Binary overflow

When numbers are


added together,
there is a risk that
a binary overflow
may occur. This is
when there is not
enough space to
store a piece of
data. For example,
255 bits can be
stored in one byte.
So the number
256.
1.2.4 Data Storage Hexadecimal to Denary: Hex Table:
Hexadecimal Denary Hex
In 1859, Nystrom proposed a hexadecimal (base 16) system of 0 0
notation, arithmetic, and metrology called the Tonal system.
Hexadecimal numerals are widely used by computer system designers 1 1
and programmers because they provide a human-friendly 2 2
representation of binary-coded values.
3 3
4 4
Hexadecimal to Binary:
5 5
6 6
7 7
8 8
9 9
10 A
11 B
12 C
13 D
14 E
15 F
1.2.4 Data Storage Binary representation of ASCII:
Characters Example:
On the right is a section of the ASCII table
Every word is made up of symbols or
which identifies each character and it’s ASCII
characters. When you press a key on
(Decimal) and Binary representation.
a keyboard, a number is generated
that represents the symbol for that
For example, the acronym ASCII in binary
key. This is called a character code. A
would be….
complete collection of characters is a
character set. A character set is a
01000001 01010011 01000011 01001001
defined list of characters used so they
01001001
can be encoded by a computer.

Character sets: Exam tip


Don’t define a character set as a ‘set of
ASCII Extended ASCII Unicode characters’. As this just repeats the
question. You run the risk of losing
Consists of up to 128 Consists of up to 256 Consists of 143,859
marks in the examination.
characters (0-127) characters (0-255) characters.
Uses 7 bits Uses 8 bits UTF-8/UTF-16 Exam tip
Contains letters, numbers, Contains extra characters such A universal encoded character Remember uppercase and lowercase
control characters, and other as characters from foreign set that supports storage of are represented by different binary
symbols. languages and special symbols information from most numbers. Also numbers represented as
for drawing pictures. languages in a single character characters are also different to their
set denary equivalent.
1.2.4 Data Storage Colour Depth and Resolution:
Images Colour Depth:
A bitmap image is a digital image Colour depth refers to how many possible colours can
that is made up of a series of picture be represented in each pixel (bits per pixel)
elements (known as pixels) which are Resolution:
used to display images on our screen. Image resolution is typically described in PPI, which
refers to how many pixels are displayed per inch of
an image.

How an image is represented on a computer


Impact:
• Each square is known The impact of an increase in colour depth and
as a Pixel resolution results in more pixel information and
• Each pixel has the creating a high-quality, crisp image.
ability to store binary On the other hand, it does increase the size of the
value. file.
• The binary value
depends on how many Metadata
bits can be stored in
Metadata is ‘data about data’. In other, it’s data
each pixel.
about the image itself.
• Each binary value
represents a unique Examples include:
colour. Dimensions (Height and Width), File type, File size,
Time/Date, Resolution, Colour depth.
1.2.4 Data Storage Sampling:
Sound Definition
When we make sounds, it causes When sound is recorded, samples
vibrations in the air thus creating are taken at regular intervals as
sound waves. Technology has the you can see in the diagram on the
ability to convert these sound waves right. The sample rate is measured
into digital form. in Hz (Hertz)

How sound becomes digitised:


Impact:
The impact of more samples being taken at regular
intervals will lead to an increase in the quality of a
file and it will create a more accurate representation
of the original sound. However, it will lead to an
increase in file size.

Bit depth
Bit depth is the number of bits available for each
sample . If the bit depth increases it can increase the
Analogue to Digital:
dynamic range of volume (this affects how loud the
During the conversion process, samples are taken that are then converted from
sound will be). This will also contribute to the quality
analogue into a digital recording.
of the sound file improving.
1.2.4 Data Storage Impact on size: Impact on quality:
Compression
Compression is an
algorithm designed to Example:
reduce the size of a file. The top file has been compressed using lossy and this will:
There are two types of • Save space on the device it’s being stored.
compression: Lossy and • Use less bandwidth if file is transferred over a network (i.e.
Lossless. e-mail)

Lossy and Lossless Compression:

Lossy Compression Lossless Compression


It reconstructs all the original data but this Data is reconstructed and doesn’t remove
means data is lost during the compression any data.
process.
Once data is removed, it’s permanent and Because data is retained, it’s reversible so
cannot be restored. It’s irreversible. changes can continue to be made. Example:
This can impact the overall quality of the The overall quality of the graphic is As you can see above, the image at the
graphic. retained. top has been saved in a lossless format
whereas the image below, has been
It does significantly reduce the overall size The size of these files tend to be large.
saved in a lossy format. You can see that
of the file.
the quality of the image below has
JPG is a common file format that uses lossy PNG/PSD are common file formats that use reduced because data has been
compression. lossless compression. permanently removed.
1.3.1 Networks and topologies Exam tip: LAN
What is a network? Defining LAN as covering a local area and
WAN as a wide area will not get you any
A group of interconnected devices with the Description:
marks. This is merely repeating what has
intention of sharing resources over a network. A LAN is a Local Area Network which is
been stated in the question.
designed to cover a small geographical
area and take ownership of hardware
Client-Server Network: Peer-to-Peer Network: required to set it up.

Examples:
Your home
Your school

WAN

Description: Description:
This allows all files can be stored centrally In this network, files might be stored on Description:
so workers can access files from any their own computers or spread across many A WAN is a Wide Area Network which is
computer and all computers can update the computers. This means each would need to designed to cover a large geographical
central database. Backups and software perform their own backups and software area. It’s usually made up of a series of
updates can also be implemented centrally. updates. All devices on the network have LAN’s
The server has sole responsibility. equal responsibility.
Examples:
Examples: Examples: Banks Internet
Your school Your home Mobile Phone Networks
1.3.1 Networks and topologies Transmission Media:
Network hardware Description:
These are devices which are required for communication This is the technology used to transmit data
and interaction over a computer network. from sender to receiver, usually in the form
of a cable. On the right are some common
examples.

Examples: Examples:

Network All computers need one to connect Switch They store the MAC addresses, which
Interface to a network. It formats data sent is a way of uniquely identifying a
Controller to and received by the computer. device on a network. So when data is
(NIC) sent to a switch, it’s only redirected to
the intended destination.
Router To connect different networks
Wireless These are used to connect cabled
together. It works by receiving data
Access networks. They convert data received
and inspecting it’s IP address. Once
Point through cables into wireless signals.
it determines who the data is
intended for, it is then forwarded to
the correct network.
Server A piece of hardware that can store
Hub To connect all the devices together
and share your files; share a single
on a network. It’s designed not to
internet connection between all your
filter any data so when data
devices.
arrives, it’s sent to all the other
devices on that network.
1.3.1 Networks and topologies Domain Name System (DNS):
What is the internet? What is DNS? Step 1: Step 2: Step 3:
It contains a User enters the Client contacts DNS If the domain name
The Internet is a global network of
database of domain name into to find domain doesn’t exist, it will try a
networks while the Web, also referred
domain names that the web browser. name. second server.
formally as World Wide Web (www)
is collection of information which is allows users to look
the IP address and Step 6: Step 5: Step 4:
accessed via the Internet. The internet
its associated Client contacts the The server returns The second server finds
is an example of a WAN (Wide Area
domain name. host using the IP the IP address to the domain name and
Network)
address. client. returns to first server.

Cloud Computing: Hosting


Pros Cons
Data is backed up Data is held offsite by a
What is Cloud frequently and easy to company you do not
Computing? recover. control.
It’s the delivery of You can extend the amount If your Internet connection
computing services of available storage by fails, so does your access to
Description
including: servers, varying how much you pay. remotely stored data.
Web hosting is a service that allows organisations and
storage, Since your data is stored Difficult to migrate data to individuals to post a website or web page onto the
databases, remotely you can access it another cloud provider Internet. They store the websites data on servers and
networking, over whether you are in later on. provide the data when it is requested by the client
the Internet Manchester or Madrid. (User trying to access the website)
1.3.1 Networks and topologies Did you know? Partial Mesh:
What is a network topology? Bandwidth and Number of users to are two Description:
common causes for a drop in network In a partial mesh not all nodes are
A network topology describes the
performance. Bandwidth refers to the connected directly to each other.
structure of a network.
amount of data that can be transferred over As you can see in the diagram.
a network in a given amount of time.
Star Network Mesh Network

Description: Description:
In a star network each device on the In a mesh topology there is no central
network has its own cable that connection point. Instead, each node is
connects to a switch or hub. connected to at least one other node
and usually to more than one.
Examples:
Your school Examples: Traffic light control

Pros Cons Pros Cons


If one cable or device fails to If the server fails to work then Data should transmit quickly and It would require a lot of
work then every device would no device can connect to the reliably because there are so investment in the maintenance
still work because the server is network until the server works. many routes the data can travel side.
still up and running. through.
Computers can be added or New nodes can be added without Difficult to manage – cannot be
removed without disturbing the interruption because everything is maintained by one network
whole network. already interconnected. manager.
1.3.2 Wired and wireless networks, Packet switching
protocols and layers
Step 1: Step 2: Step 3: Step 4:
Purpose Request processed Request put into Packets given Packets sent across
All methods of communication need rules by web server. packets. address & number. the network
in place in order to pass on the message
successfully. These sets of rules are called Step 8: Step 7: Step 6: Step 5:
protocols. Network protocols are a set of If yes, packets put If not – back to Have all packets Packets received
rules that determine how data is in order. Step 4. arrived? by host server.
transmitted over a network.
Layers Protocols

HTTP Data sent between web browser and


Application Layer Layers allows different protocols to be divided
server.
HTTP, HTTPS, FTP, SMTP, POP, into different sections.
IMAP This is because each protocol performs a HTTPS Data sent between web browser and
specific task. server securely using encryption.
Transport Layer
It also means that when one layer needs to be FTP Transfer files between computers.
TCP
changed, then the others remain interrupted.
SMTP To send emails.
Internet Layer
IP Example: POP To retrieve/store emails on a device.
If you request to use a website and the
Wi-Fi is disconnected then it will fail to IMAP To retrieve/store emails on a server.
Data Link Layer
transmit the data. However, if the Wi-Fi TCP/IP Data packets sent to the intended location.
Ethernet/Wi-Fi
reconnected then the request can be
completed.
1.3.2 Wired and wireless networks, Wired technologies: Wireless technologies:
protocols and layers
Modes of connection Ethernet cable: Wi-Fi:
The most common type of Technology that allows a
Modes of connection refers to the way in PC, laptop, mobile phone,
network cable used on a
which we choose to communicate over a or tablet device to
wired network whether at
network. This could be through a wired or connect at high speed to
home or a small business.
wireless connection. the internet without the
need for a physical wired
connection.
Wired v Wireless
Bluetooth:
Bluetooth is a wireless
Wired Wireless
technology that uses a
Difficult to set up as cables would have to Easy to set up because all you need is a radio frequency to share
be run from the router to all rooms. wireless router. data over a short
Installation is expensive It’s cheaper because you only need to buy distance, eliminating the
the router. need for wires

Very fast bandwidth: 1 Gbps Not as fast as wired but new technology is
catching up. Did you know?
Should not experience any interference. Can be affected by walls, electronic Wi-Fi operates over two frequency bands:
equipment, distance from the router. • 2.4 GHz – The standard which can
You have to unplug and re-connect if you You can access the network from any room transmit over long distances.
wanted to use it elsewhere. within a certain radius. • 5 GHz – Can transmit data quicker than
2.4 but only over a shorter distance.
1.3.2 Wired and wireless Did you know? Encryption:
networks, protocols and layers
NIC’s (Network Interface Controllers) use MAC
Definition/Meaning: addresses to uniquely identify that device. This
means if the network uses a switch, it can store
Definition:
Both MAC Address and IP Address are Encryption is an algorithm designed to
used to uniquely identify a machine on the MAC address to ensure data goes the
intended recipient. scramble data into an unreadable form. This
the internet. is to stop potential hackers intercepting the
data over a network. This is because in order
IP Addressing MAC Addressing to decrypt the data into it’s unreadable form,
you would need a private key.
172.16.254.1 E4-BC-E9-8D-45-7A
Properties: Properties:
IP addresses can be changed / MAC addresses can't be changed /
are allocated as needed every device has a fixed MC
address
IP(v4) addresses are 4 bytes
long MAC addresses are 6 bytes long.
IP(v4) addresses are normally MAC addresses are normally Example
written in denary written in Hex. Here there has been a shift to the left three
IP addresses are configured by MAC addresses are configured in times. So E is now B, D is now A and so on.
software hardware.
Encrypted websites include:
IP addresses are used for MAC addresses are only used Banking, Shopping, Social media accounts.
routing across a WAN / internet within the LAN Anything that will store sensitive data.
1.4.1 Threats to computer systems What is SQL? SQL Injection:
and networks It stands for Structured Query
Network threats: Language and its code uses to Definition:
create, access and maintain This attack is used to interfere with
Many attacks on networks use methods queries that an application makes to
databases. A database allows
that bypass the users and target the its database in order to gain
you to store records that can
network operating system and security.. unauthorised access to users data.
be accessed, modified and
deleted.

Brute Force Attack: Distributed Denial of Service Attack: Packet Sniffers:

Definition: Definition: Definition:


This method of attack requires This method overloads the network This involves the use of packet
very little ‘specialist knowledge’. by using bots to send useless analysers (packet sniffers)
Hackers will use automated requests to servers to a point in These are used to intercept data
software to try millions of which is becomes flooded and packets on a network which are then
different password combinations. unresponsive. These bots can be analysed. Sensitive data such as login
Therefore this can be referred to designed to perform malicious names, passwords and credit card
as a ‘trial and error method’. tasks such as stealing data. numbers can be stolen.
1.4.1 Threats to computer systems and Virus Trojan
networks
Description: Description:
What is Malware? A type of malware that can copy itself and Enter users computer as a normal file or
Short for malicious software, is a blanket term spread to other users by attaching itself to program and once downloaded, will
for viruses, worms, trojans and other harmful other files. perform malicious tasks.
computer programs

Adware Worm Bot:

Description: Description: Description:


This is designed to provide users with This needs user actions to spread it and as An automated type of malware used to
advertisements in the form of pop-ups that a result, can continue to spread, exploiting perform DDOS attacks to get access to
redirect them elsewhere. the network and consuming bandwidth. servers

Ransomware Spyware Rootkit

Description: Description: Description:


Encrypts the user personal data using Used to track users activity without their Created to provide remote access to a
strong encryption methods and will demand knowledge and might use key loggers to computer without detection. This can allow
a ransom to decrypt. This ransom will monitor actions taken by the user and gain it to modify system settings and even install
usually be in the form of a fee. personal information. other types of malware.
1.4.2 Identifying and preventing Physical security Strong passwords:
vulnerabilities
Definition: Definition:
Network threats:
This could involve A strong password
All networks need to be protected to fitting alarms, using would consist of
prevent unauthorised access to sensitive locks, keypads, upper and lower case
data. There are a range of strategies biometric or CCTV. letters, numbers and
used to tackle this. symbols.

Penetration testing: Network forensics: User measures: Anti-malware software:

Definition:
A computer program
used to prevent,
detect, and remove
malware.

Definition: Definition: Definition:


Did you know?
This used to test a This monitors, records User access levels to
computer system or a and analyses network determine the rights Encryption and Firewall are two common
network to find events such as: who has users have with methods used to identify and prevent attacks.
vulnerabilities. Ethical logged on, when, how regards to the data You can read more about these in 1.5.2
hackers are employed to many unsuccessful login they have access to. Utility Software.
assess security and test attempts, user activity (e.g. some files might In addition to this, organisations can put
users own awareness of and what has been only be read-only for network policies in place to educate
security. deleted/modified. certain users) employees on how to use the network.
1.5.1 Operating Systems User management: Peripheral device management
Definition/Meaning Description: Description:
Systems Software comprises of two parts: To allow administrator to manage users It allows the operating system to control
Operating System and Utility Software. access to a variety of resources such as how the peripheral devices function and
The purpose of the operating system is to devices, settings, applications etc. they do this by using device drivers.
provide an interface that will allow the user
to interact with the computer. Below are some Examples: Examples:
popular examples of operating systems we At school you will see three typical levels If you wanted to connect a new mouse then
use today. of access: Administration, Staff and you plug it in via the USB port, the device
Students. For example, students won’t be will install a driver onto the computer so it
able to download software because they they can communicate.
don’t have the rights.

User interface: Memory management: File Management


Description: Description: Description:
The user interface is design to provide a It will manage data by allocating memory The purpose is to create a logical structure
platform that will allow the user to interact to applications currently in use. As a result, in which files can be stored to make it
with the computer. this allows multitasking to take place. easier for the user to locate.
Examples: Examples:
GUI – Graphical User Interface It assigns portions called blocks to various Examples:
Command Line Interface running programs to optimise overall It allows you to create new files/folders,
Natural Language Interface system performance. These could either be re-name, delete, password-protect, move
WIMP – Windows, Menus, Icons and physical divisions (paging) or logical and compress them. It also allows you to
Pointers. divisions (segmentation) create shortcuts to go onto your desktop.
1.5.2 Utility Systems Software Anti-virus Backup Compression
Definition/Meaning
Purpose: Purpose: Purpose:
Systems Software comprises of two It is designed to Designed to create It is designed to
parts: Operating System and Utility protect your computer duplicate copies of reduce the size of
Software. from viruses that can files so they can be one or more files in
The purpose of the utility software infect your computer distributed or order to take up less
is to maintain and optimise the or steal confidential retrieved in the case disk space.
performance of the computer. data. of data loss.

Exam tip
Learn the mnemonic ABCDEF. Encryption Firewall
Defragmentation
A = Anti-virus
B = Backup
C = Compression Purpose: Purpose: Purpose:
D = Defragmentation Data is divided into Designed to make Firewall software
E = Encryption multiple chunks of data unreadable to monitors what data
F = Firewall data that are stored users that should is attempting to
on the hard drive. This have no access to enter your computer
Backup methods: means they’re not this information or network.
There are two common types of grouped together.
backup methods:
Incremental – Only backs up files
changed since the last backup. Alternative examples of utility software include:
Full – Creates a backup for all
System Monitor Registry Cleaner Disk Clean-up Debugger Disk Partition Editors
files regardless.
1.6.1 Ethical, legal, cultural and Data Protection Act Freedom of Information Computer Misuse Act
environmental impact
Legislation
Purpose: Purpose: Purpose:
Many countries have created legislation or
It controls how your An act that gives An act to make provision
have passed laws about the use of computers
personal information is individuals and for securing computer
and data to protect data about people;
used by organisations, organisations the right to material against
Hacking computer systems; Protecting
businesses or the request official unauthorised access or
copyright and patents.
government. information held by modification; and for
Copyright public authorities. connected purposes.

Copyright is the legal Creative Commons License


right to protect the This license was developed to allow copyrighted material to be more freely distributed.
original work of the
people whom it may Attribution: Material can be copied, modified and used. However, the
belong to. original creator must be given credit.

Copyright can protect…. Non-commercial: Material can be copied, modified and used as long as
there is no intention to make money from it.
Books Music
No derivative works: Material can be copied and use but it cannot be
Art Images modified.

Share-a-like: Material can be modified and used but must be covered by


Sound Software
a similar license.
1.6.1 Ethical, legal, cultural and environmental Source code
impact
Definition:
Software licenses: The part of software that most computer users
Proprietary software is software that is owned by one don't ever see; it's the code computer
person/organisation and they have exclusive control programmers can manipulate to change how
over it. Open-source software allows users to access the a piece of software works.
source code and modify the software to meet their
needs.

Open-source v Proprietary Software Did you know?


Licensed software that can be used at no
extra cost is known as Freeware. Users also
have the option to pay an optional fee if
Open-source Proprietary
they wish.
Very little professional and technical Professional and technical support
support and no user manuals to available. User manuals provided for Examples:
troubleshoot. troubleshooting.
Examples of Proprietary Software:
Reliable as there are community of users Stable product that will contain regular
Windows, Adobe Web Premium,
constantly creating updated versions. updates to automatically fix any bugs.
Microsoft Office, Internet Explorer.
There are very little or no upfront costs. Can be costly to buy a license.
Examples of Open-source Software:
Source code can be viewed, shared and Source code cannot be modified. Linux, WordPress, Mozilla Firefox, Open
modified. Office
1.6.1 Ethical, legal, cultural and Stakeholders: Cultural issues:
environmental impact
Description: Online services:
Impacts of digital technology on wider A stakeholder is a person with an interest Online sales as a proportion of all
society: or concern in something, especially a retailing reached a record high of 22.3%
Technology affects the way individuals business. Examples include: in March 2020 as consumers switched to
communicate, learn, and think. It helps society • Customers online purchasing following the pandemic.
and determines how people interact with • Businesses It’s changed the way we shop, bank, game
each other on a daily basis. • Local communities and access news.
• Government Remote working
• Managers It’s change the way we work and how we
• Shareholders receive our education.

Environmental issues: Ethical issues: Privacy issues:

E-Waste: Digital divide: GPS Tracking:


Old computer equipment ends up as This is the gap between people who have Our movements can be detected through
electronic waste that goes to landfill sites. access to technology to those that don’t. the location settings on our phones and
Energy consumption: The common cause for this is diverse levels nearby phone masts can track phone calls.
Devices need charging, servers need to run of disposable income. Surveillance
24/7 and this means more electricity is The increasing need to use CCTV to monitor
being used. everyday activity. Some people will
Recycling: welcome this as it aims to keep communities
It creates more opportunities to upcycle old safe. However, some people would argue
devices and sell them as refurbs. it’s an invasion of privacy.

You might also like