Computing-GCSE - Paper 1
Computing-GCSE - Paper 1
Smartphone Browse the internet, use GPS, Washing Pre-set functions for washing
play games, calls, text Machine clothes at different
messages. temperatures, different times,
selecting spin speed.
Games Play games, browse the MP3 Player Listen to music, select tracks,
Console internet, watch movies. skip tracks.
1.2.1 Primary Storage Virtual Memory
Purpose Description:
A primary storage device is a medium When the RAM becomes full, the overflow of data
that holds memory for short periods of normally stored in the RAM will be stored in Virtual
time while a computer is running. There Memory which is located on the hard drive. Once
are two types of primary storage used space becomes available, data will move from VM
by computer systems: RAM and ROM. and back to RAM. However this is a slow process.
Cost Capacity Reliability Cost How much the device costs per MB.
Expensive from the Enough capacity to Can perform well for Capacity How much space is available on the storage device.
outset, but cost per store different types a long period of time
MB represents value of files. You can buy but performance will Reliability Longevity – how well it can maintain the same level
for money. hard drives that can eventually of performance over time.
hold 4TB of data. deteriorate.
Durability how resistant it is to external factors such as being
dropped, scratched and how it responds to being in
Durability Portability Speed extreme conditions.
If it’s external then it Would have to be Uses a head that Portability How easy is it to transport from one place to
can become detached from the moves over a platter another.
damaged if dropped computer and it’s to read and write
Speed How quickly the data can be read and transferred
because it has moving heavy. data so it’s not
from the storage device.
parts. instant.
1.2.2 Secondary Storage Solid-State Storage Revision tip:
Definition/Meaning: Description A common misconception is that
A solid-state drive (SSD) is a solid-state secondary storage backs up
Secondary storage has the ability to data. If a duplicate copy is
store files even when the computer is storage device that uses integrated circuit to
store data persistently, typically using flash created then the device used to
switched off. Therefore, it’s a back it up would be classed as
non-volatile form of storage. memory. Examples include Solid-State Drive,
USB Flash Drive and SD Card. tertiary storage.
Cost Capacity Reliability Cost How much the device costs per MB.
Expensive, even the You can purchase up It has a limited
cost per MB. to 4TB of data, not as number of read and Capacity How much space is available on the storage device.
Although, the price is much as you can with write cycles which Reliability Longevity – how well it can maintain the same level
beginning to come a HDD. means performance of performance over time.
down. will deteriorate
quickly. Durability how resistant it is to external factors such as being
dropped, scratched and how it responds to being in
Durability Portability Speed extreme conditions.
Resistant to being Most devices are It doesn’t use a Portability How easy is it to transport from one place to
dropped because it small, lightweight and mechanical arm and another.
has no moving parts. easy to carry around. relies on the
Speed How quickly the data can be read and transferred
Easy to transfer files. processors embedded
from the storage device.
within.
1.2.2 Secondary Storage Optical Storage: Revision tip:
Definition/Meaning: Description A common misconception is that
Optical storage is any storage type in which secondary storage backs up
Secondary storage has the ability to data. If a duplicate copy is
store files even when the computer is data is written and read with a laser.
Common examples of optical storage include: created then the device used to
switched off. Therefore, it’s a back it up would be classed as
non-volatile form of storage. CD, DVD, and Blu-ray.
tertiary storage.
Cost Capacity Reliability Cost How much the device costs per MB.
Cheap to buy and CD’s can only store If CD’s are stored in
cheaper to buy as a 700 MB which might cases or plastic Capacity How much space is available on the storage device.
bulk. You can get a not be enough to wallets then they can Reliability Longevity – how well it can maintain the same level
blank CD for less than store larger files. continue to be used of performance over time.
£1. Blu-ray can hold up for long periods.
to 25GB. Durability how resistant it is to external factors such as being
dropped, scratched and how it responds to being in
Durability Portability Speed extreme conditions.
Sensitive to scratches Most devices are It is slow reading the Portability How easy is it to transport from one place to
and dust which can small, lightweight and data because it has another.
make it difficult to easy to carry around. to access the optical
Speed How quickly the data can be read and transferred
read the data. Easy to transfer files. drive (the drive used
from the storage device.
to read the CD).
1.2.3 Units Sound file size: Worked example:
Why do computers use bits? Sample rate = 3
Formula: Duration = 1 minute 30 seconds
Binary is a number system that only uses two digits: 1 and 0. All Bit depth = 2
information that is processed by a computer is in the form of a sound file size = sample rate x
sequence of 1s and 0s. Therefore, all data that we want a duration (s) x bit depth
3 x 90 x 2 = 540 bits
computer to process needs to be converted into binary. These
digits 1 and 0 are often referred to as bits. Image file size: Worked example:
An image that is 400 x 400 with a
Units of data storage: colour depth of 4 bits.
Formula:
image file size = colour depth x
Order Unit Equivalent (400 x 400) x 4 = 640000 bits
image height (px) x image width
(Smallest to largest) 640000/8 = 80,000 bytes
(px)
1 Bit 0 or 1
2 Nibble 4 bits Text file size: Worked example
3 Byte 8 bits Document that consists of 56
Formula: characters.
4 KB 1,000 Bytes
text file size = bits per character x
number of characters 50 x 8 = 400 and 6 x 8 = 48
5 MB 1,000 KB
(400 + 48 = 448 bits)
6 GB 1,000 MB
Exam tip:
7 TB 1,000 GB
Use of 1,024 for conversions and calculations would be acceptable.
8 PB 1,000 TB Allowance for metadata in calculations may be used
1.2.4 Data Storage Binary addition:
Binary
Binary is the language of the computer. Computers are
made up of complex circuitry. These consist of billions of
transistors that act as switches and they can only be in one
of two states. ON (1) or OFF (0)
Bit depth
Bit depth is the number of bits available for each
sample . If the bit depth increases it can increase the
Analogue to Digital:
dynamic range of volume (this affects how loud the
During the conversion process, samples are taken that are then converted from
sound will be). This will also contribute to the quality
analogue into a digital recording.
of the sound file improving.
1.2.4 Data Storage Impact on size: Impact on quality:
Compression
Compression is an
algorithm designed to Example:
reduce the size of a file. The top file has been compressed using lossy and this will:
There are two types of • Save space on the device it’s being stored.
compression: Lossy and • Use less bandwidth if file is transferred over a network (i.e.
Lossless. e-mail)
Examples:
Your home
Your school
WAN
Description: Description:
This allows all files can be stored centrally In this network, files might be stored on Description:
so workers can access files from any their own computers or spread across many A WAN is a Wide Area Network which is
computer and all computers can update the computers. This means each would need to designed to cover a large geographical
central database. Backups and software perform their own backups and software area. It’s usually made up of a series of
updates can also be implemented centrally. updates. All devices on the network have LAN’s
The server has sole responsibility. equal responsibility.
Examples:
Examples: Examples: Banks Internet
Your school Your home Mobile Phone Networks
1.3.1 Networks and topologies Transmission Media:
Network hardware Description:
These are devices which are required for communication This is the technology used to transmit data
and interaction over a computer network. from sender to receiver, usually in the form
of a cable. On the right are some common
examples.
Examples: Examples:
Network All computers need one to connect Switch They store the MAC addresses, which
Interface to a network. It formats data sent is a way of uniquely identifying a
Controller to and received by the computer. device on a network. So when data is
(NIC) sent to a switch, it’s only redirected to
the intended destination.
Router To connect different networks
Wireless These are used to connect cabled
together. It works by receiving data
Access networks. They convert data received
and inspecting it’s IP address. Once
Point through cables into wireless signals.
it determines who the data is
intended for, it is then forwarded to
the correct network.
Server A piece of hardware that can store
Hub To connect all the devices together
and share your files; share a single
on a network. It’s designed not to
internet connection between all your
filter any data so when data
devices.
arrives, it’s sent to all the other
devices on that network.
1.3.1 Networks and topologies Domain Name System (DNS):
What is the internet? What is DNS? Step 1: Step 2: Step 3:
It contains a User enters the Client contacts DNS If the domain name
The Internet is a global network of
database of domain name into to find domain doesn’t exist, it will try a
networks while the Web, also referred
domain names that the web browser. name. second server.
formally as World Wide Web (www)
is collection of information which is allows users to look
the IP address and Step 6: Step 5: Step 4:
accessed via the Internet. The internet
its associated Client contacts the The server returns The second server finds
is an example of a WAN (Wide Area
domain name. host using the IP the IP address to the domain name and
Network)
address. client. returns to first server.
Description: Description:
In a star network each device on the In a mesh topology there is no central
network has its own cable that connection point. Instead, each node is
connects to a switch or hub. connected to at least one other node
and usually to more than one.
Examples:
Your school Examples: Traffic light control
Very fast bandwidth: 1 Gbps Not as fast as wired but new technology is
catching up. Did you know?
Should not experience any interference. Can be affected by walls, electronic Wi-Fi operates over two frequency bands:
equipment, distance from the router. • 2.4 GHz – The standard which can
You have to unplug and re-connect if you You can access the network from any room transmit over long distances.
wanted to use it elsewhere. within a certain radius. • 5 GHz – Can transmit data quicker than
2.4 but only over a shorter distance.
1.3.2 Wired and wireless Did you know? Encryption:
networks, protocols and layers
NIC’s (Network Interface Controllers) use MAC
Definition/Meaning: addresses to uniquely identify that device. This
means if the network uses a switch, it can store
Definition:
Both MAC Address and IP Address are Encryption is an algorithm designed to
used to uniquely identify a machine on the MAC address to ensure data goes the
intended recipient. scramble data into an unreadable form. This
the internet. is to stop potential hackers intercepting the
data over a network. This is because in order
IP Addressing MAC Addressing to decrypt the data into it’s unreadable form,
you would need a private key.
172.16.254.1 E4-BC-E9-8D-45-7A
Properties: Properties:
IP addresses can be changed / MAC addresses can't be changed /
are allocated as needed every device has a fixed MC
address
IP(v4) addresses are 4 bytes
long MAC addresses are 6 bytes long.
IP(v4) addresses are normally MAC addresses are normally Example
written in denary written in Hex. Here there has been a shift to the left three
IP addresses are configured by MAC addresses are configured in times. So E is now B, D is now A and so on.
software hardware.
Encrypted websites include:
IP addresses are used for MAC addresses are only used Banking, Shopping, Social media accounts.
routing across a WAN / internet within the LAN Anything that will store sensitive data.
1.4.1 Threats to computer systems What is SQL? SQL Injection:
and networks It stands for Structured Query
Network threats: Language and its code uses to Definition:
create, access and maintain This attack is used to interfere with
Many attacks on networks use methods queries that an application makes to
databases. A database allows
that bypass the users and target the its database in order to gain
you to store records that can
network operating system and security.. unauthorised access to users data.
be accessed, modified and
deleted.
Definition:
A computer program
used to prevent,
detect, and remove
malware.
Exam tip
Learn the mnemonic ABCDEF. Encryption Firewall
Defragmentation
A = Anti-virus
B = Backup
C = Compression Purpose: Purpose: Purpose:
D = Defragmentation Data is divided into Designed to make Firewall software
E = Encryption multiple chunks of data unreadable to monitors what data
F = Firewall data that are stored users that should is attempting to
on the hard drive. This have no access to enter your computer
Backup methods: means they’re not this information or network.
There are two common types of grouped together.
backup methods:
Incremental – Only backs up files
changed since the last backup. Alternative examples of utility software include:
Full – Creates a backup for all
System Monitor Registry Cleaner Disk Clean-up Debugger Disk Partition Editors
files regardless.
1.6.1 Ethical, legal, cultural and Data Protection Act Freedom of Information Computer Misuse Act
environmental impact
Legislation
Purpose: Purpose: Purpose:
Many countries have created legislation or
It controls how your An act that gives An act to make provision
have passed laws about the use of computers
personal information is individuals and for securing computer
and data to protect data about people;
used by organisations, organisations the right to material against
Hacking computer systems; Protecting
businesses or the request official unauthorised access or
copyright and patents.
government. information held by modification; and for
Copyright public authorities. connected purposes.
Copyright can protect…. Non-commercial: Material can be copied, modified and used as long as
there is no intention to make money from it.
Books Music
No derivative works: Material can be copied and use but it cannot be
Art Images modified.