Computer Science Notes
Computer Science Notes
THEORY OF COMPUTER
SCIENCE
DATA REPRESENTATION
NUMBER SYSTEMS
•Candidates should be able to:
•Denary is known as a base 10 number system because it uses 10 separate digits to represent
numbers.
•The binary number system is a base 2 number system. It is based on the number 2.
•Thus, only the two ‘values’ 0 and 1 can be used in this system to represent all values.
•Using the same method as denary this gives the headings 20, 21, 22, 23, and so on.
•The typical headings for a binary number with eight digits would be:
•Each time a 1-value appears in a binary number column, the column value (heading) is added to
a total. E.g.:
• in denary
METHOD 1
• in binary
METHOD 2
•Write the result of the division including the remainder (even if it is 0) under the 142 (142 ÷ 2 =
71 remainder 0);
•Divide again by 2 (71 ÷ 2 = 35 remainder 1) and keep dividing until the result is zero.
•All data in a computer is measured in multiples of bytes which are groups of bits
•A bit is the basic unit of all computing memory storage terms and is either 1 or 0. The word
comes from binary digit. The byte is the smallest unit of memory in a computer. 1 byte is 8 bits.
•1 byte of memory wouldn’t allow you to store much information so memory size is measured in
the multiples of bytes:
•The above system of numbering now only refers to some storage devices but is technically
inaccurate. It is based on the SI (base 10/ b10) system of units where 1 kilo is equal to 1000.
•A 1 TB hard disk drive would allow the storage of bytes according to this system.
•However, since memory size is actually measured in terms of powers of 2, another system has
been adopted by the IEC (International Electrotechnical Commission) that is based on the binary
system. IEC memory size system:
1 exbibyte (1 EiB) → 260 1 152 921 504 606 846 976 bytes
•This system is more accurate. Internal memories (such as RAM and ROM) should be measured
using the IEC system.
•Registers usually hold instructions which can be used to control all the moving parts of an
electronic device.
•When a ‘1’ appears in a cell in a register, it means that some corresponding electrical
component should be powered, such as the back left wheel on a car spinning.
HEXADECIMAL
•The hexadecimal number system is closely related to the binary system because both have
bases which are powers of 2.
•Hexadecimal is a base 16 system and therefore needs to use 16 different ‘digits’ to represent
each value.
•Because it is a system based on 16 different digits, the numbers 0 to 9 and the letters A to F are
used to represent each hexadecimal digit.
•Using the same method as for denary and binary, this gives the headings , , , , etc.
•Since this means that FOUR binary digits are equivalent to each hexadecimal digit.
•The following table summarises the link between binary, hexadecimal and denary:
o Hexadecimal numbers are easier to read and remember and thus more convenient to
work with.
o Its base is a power of two which means that binary can be accurately represented in
hexadecimal.
o Hexadecimal takes less space and is less complex because four binary digits can be
represented with one hex digit.
•To convert hexadecimal numbers into denary involves the value headings of each hexadecimal
digit (4096, 256, 16, 1).
•Take each of the hexadecimal digits and multiply it by the corresponding heading value.
•Add all the resultant totals together to give the denary number.
•Remember that the hex digits A → F need to be first converted to the values 10 → 15 before
carrying out the multiplication.
•For example, to convert the hexadecimal number into denary, multiply each hex digit by its
heading value:
•Then add the three totals together to give the denary number.
•There are two methods to convert from denary to hexadecimal. is used for example.
METHOD 1
•In each stage at each header, subtract the largest multiple of the header from the number,
continuing until is reached.
First of all we have to multiply each hex digit by its heading value:
Then we have to add the three totals together (1024 + 80 + 10) to give the denary number:
METHOD 2
•Repeatedly divide by 16 until reaching “0” then read the remainders backwards.
• in hexadecimal
Since 16 = 24 this means that FOUR binary digits are equivalent to each hexadecimal digit. The
following table summarises the link between binary, hexadecimal and denary:
•Starting from the right and moving left, split the binary number into groups of 4 bits.
•If the last group has less than 4 bits, then fill it in with 0s from the left.
•Take each group of 4 bits and convert it into denary then hexadecimal, or just straight to
hexadecimal.
NB: To convert from hexadecimal to binary, follow the above steps in reverse order
ERROR CODES
•Error codes are often shown as hexadecimal values because they are simpler than binary
values.
•These numbers refer to the memory location of the error and are usually automatically
generated by the computer.
•This makes them very useful for debugging if you know how to work with them.
•Media Access Control (MAC) address refers to a number which uniquely identifies a device on a
network.
•The MAC address refers to the network interface card (NIC) which is part of the device.
•The MAC address is rarely changed so that a particular device can always be identified no
matter where it is.
•A MAC address is usually made up of 48 bits which are shown as 6 groups of two hexadecimal
digits (although 64-bit addresses also exist):
o NN-NN-NN-DD-DD-DD or
o NN:NN:NN:DD:DD:DD
•where the first half (NN-NN-NN) is the identity number of the manufacturer of the device and
the second half (DD-DD-DD) is the serial number of the device.
•Each device connected to a network is given an address known as the Internet Protocol (IP)
address.
•An IPv4 address is a 32-bit number written in denary or hexadecimal form: e.g., 109.108.158.1
(or 77.76.9e.01 in hex).
•An IPv6 address is a 128-bit number broken down into 16-bit chunks, represented by a
hexadecimal number. For example:
oa8fb:7a88:fff0:0fff:3d21:2085:66fb:f0fa
•IPv6 uses a colon (:) rather than a decimal point (.) as used in IPv4.
•All colours can be made up of different combinations of the three primary colours (red, green
and blue).
•The different intensity of each colour (red, green and blue) is determined by its hexadecimal
value.
•This means different hexadecimal values represent different colours. For example:
o # FF 00 00 represents primary colour red
o # 00 FF 00 represents primary colour green
o # 00 00 FF represents primary colour blue
o # FF 00 FF represents fuchsia
o # FF 80 00 represents orange
o # B1 89 04 represents a tan colour,
and so on producing almost any colour the user wants. The following diagrams show the various
colours that can be selected by altering the hex ‘intensity’ of red, green and blue primary colours.
The colour ‘FF9966’ has been chosen as an example:
•The colour codes are always six hexadecimal digits representing the red, green and blue
components.
•Computer memory can be referred to directly using machine code or assembly code.
•This can have many advantages to program developers or when carrying out troubleshooting.
•Using hexadecimal makes it much easier, faster and less error prone to write code compared to
binary.
•Using true machine code (which uses binary) is cumbersome and it takes a long time to key in
the values and it is easy to
•Machine code and assembly code are examples of low-level languages and are used by
software developers.
DATA STORAGE
•Candidates should be able to:
o show understanding that sound (music), pictures, video, text and numbers are stored in
different formats
o identify and describe methods of error detection and correction, such as parity checks,
check digits, checksums and Automatic Repeat reQuests (ARQ)
o show understanding of the concept of Musical Instrument Digital Interface (MIDI) files,
JPEG files, MP3 and MP4 files
o show understanding of the principles of data compression (lossless and lossy) applied to
music/video, photos and text files
•Text is represented by character sets such as ASCII (American Standard Code for Information
Interchange) or Unicode.
•A character set is a list of characters that have been defined by computer hardware and
software. The character set is
•ASCII code is a character set for all the characters on a standard keyboard and control codes
•The standard ASCII code character set consists of 7-bit codes that represent the letters,
numbers and characters found on a standard keyboard, together with 32 control codes.
•Extended ASCII uses 8-bit codes. This gives another 128 codes to allow for characters in non-
English alphabets and for some graphical characters to be included.
•One coding system which developed is Unicode. Unicode can represent all languages of the
world, thus supporting many operating systems, search engines and internet browsers used
globally and can support more characters in total than ASCII.
•ASCII uses one byte to represent a character, whereas Unicode supports up to four bytes per
character.
•When working with numbers using spreadsheets or databases, numbers can be stored in a
number of different formats:
•It is important that the correct format is chosen when processing numbers, otherwise wrong
operations may be performed and inaccurate results returned.
•If number files undergo any form of file compression, then it tends to be lossless because it is
very important that none of the information/data is lost.
REPRESENTATION OF SOUND
•Soundwaves are vibrations in the air which the human ear senses and interprets as sound.
•Each sound wave has a frequency, wavelength and amplitude. The amplitude specifies the
loudness of the sound.
•Sound waves vary continuously. This means that sound is analogue. Computers cannot work
with analogue data, so sound waves need to be sampled in order to be stored in a computer.
•Sampling means measuring the amplitude of the sound wave. This is done using an analogue
to digital converter (ADC).
•To convert the analogue data to digital, the sound waves are sampled at regular time intervals.
•The amplitude of the sound cannot be measured precisely, so approximate values are stored.
•The number of bits per sample is known as the sampling resolution (or bit depth).
•Sampling rate is the number of sound samples taken per second. This is measured in hertz
(Hz), where 1 Hz means ‘one sample per second’.
o the amplitude of the sound wave is first determined at set time intervals (the sampling
rate)
o this gives an approximate representation of the sound wave
o each sample of the sound wave is then encoded as a series of binary digits.
•Using a higher sampling rate or larger resolution will result in a more faithful representation of
the original sound source.
•However, the higher the sampling rate and/or sampling resolution, the greater the file size.
•The benefits and drawbacks of using a larger sampling resolution when recording sound:
THE MIDI FILE FORMAT
•The MIDI (Musical Instrument Digital Interface) file format is always associated with the storage
of music files.
•However, MIDI files are not music and don't contain any sounds; instead, MIDI files consist of
lists of commands that instruct a device how to produce a sound or musical note.
•Each MIDI command has a specific sequence of bytes. The first byte is the status byte - this
informs the MIDI device what function to perform.
•Encoded in the status byte is the MIDI channel. MIDI operates on 16 different channels, which
are numbered 0 to 15.
o note on/off: this indicates that an instrument key has been pressed/released to
produce/stop producing a musical note
o key pressure: this indicates how hard the key has been pressed.
o a pitch byte, which tells the MIDI device which note to play
o a velocity byte, which tells the device how loud to play the note.
•When music or sound is recorded on a computer system, these MIDI messages are saved in a
file with the extension .mid.
•If this .mid file is played back through a musical instrument the music will be played back in an
identical way to the original.
•The whole piece of music will have been stored as a series of commands but no actual musical
notes.
•This makes it a very versatile file structure, since the same file could be fed back through a
different electronic instrument with different effects to the original.
•However, to play back through an instrument such as a guitar would need the use of sequencer
software, since the MIDI files wouldn't be recognised in their ‘raw’ form.
•MP3 files are used for playing music on computers or mobile phones.
•This compression technology reduces the size of a normal music file by about 90%.
•To reduce file size while maintaining quality, the algorithm removes sounds that the human ear
can’t hear properly. For example:
•The MP4 file format allows the storage of multimedia files rather than just sound – videos,
photos and animation.
•MP4 is a lossy file compression format, but it still retains an acceptable quality of sound and
video.
•Bitmap images are made up of pixels (picture elements); an image is made up of a two-
dimensional matrix of pixels.
•Each pixel can be represented as a binary number, and so a bitmap image is stored in a
computer as a series of binary
numbers, so that:
o a black and white image only requires 1 bit per pixel – this means that each pixel can be
one of two colours, corresponding to either 1 or 0
o if each pixel is represented by 2 bits, then each pixel can be one of four colours (),
corresponding to 00, 01, 10, or 11
o if each pixel is represented by 3 bits, then each pixel can be one of eight colours (),
corresponding to 000, 001, 010, 011, 100, 101, 110, 111.
•The number of bits used to represent each colour is called the colour depth.
o Increasing colour depth also increases the size of the file when storing an image.
o For example, an image could contain 4096 × 3072 pixels (12 582 912 pixels in total).
•Photographs with a lower resolution have less detail than those with a higher resolution.
•The drawback of using high resolution images is the increase in file size as the number of pixels
increases.
•A certain amount of reduction in resolution of an image is possible before the loss of quality
becomes noticeable.
JPEG
•JPEG is a lossy file compression algorithm used for bitmap images.
o human eyes don’t detect differences in colour shades as well as they detect differences in
image brightness
o by separating pixel colour from brightness, images can be split into blocks of pixels which
then allows certain information to be discarded from the image without causing any real
noticeable deterioration in quality.
o For a stereo sound file, you would then multiply the result by two. 1
•The size of an ASCII text file, in bytes, is roughly to the number of characters contained in that
file.
DATA COMPRESSION
•Sound and image files can be very large. It is therefore necessary to reduce (or compress) the
size of a file in order to:
o to save storage space on devices such as the hard disk drive/solid state drive
o to reduce the time taken to stream a music or video file
o to reduce the time taken to upload, download or transfer a file across a network
o the download/upload process uses up network bandwidth – the maximum rate of
transfer of data across a network, measured in bits per second. Compressed files contain
fewer bits of data than uncompressed files and therefore use less bandwidth, which
results in a faster data transfer rate.
o reduced file size also reduces costs. For example, when using cloud storage, the cost is
based on the size of the files stored. Also, an internet service provider (ISP) may charge a
user based on the amount of data downloaded.
•With this technique, the file compression algorithm eliminates unnecessary data from the file.
This means the original file cannot be reconstructed once it has been compressed.
•Lossy file compression results in some loss of detail when compared to the original file. The
algorithms used in the lossy technique have to decide which parts of the file need to be retained
and which parts can be discarded.
•Lossy files are smaller than lossless files which is of great benefit when considering storage and
data transfer rate requirements. Common lossy file compression algorithms are:
•With this technique, all the data from the original uncompressed file can be reconstructed. This
is important for files where any loss of data would be undesirable.
•Lossless file compression is designed so that none of the original detail from the file is lost.
•Run-length encoding (RLE) can be used for lossless compression of a number of different file
formats:
•the first value represents the number of identical data items (e.g. characters) in the run
•the second value represents the code of the data item (such as ASCII code if it is a keyboard
character)
TRANSMISSION OF DATA
•Data transmission is the transfer of data as a stream of bits over a communication channel
from one device to another.
•Data transmission can be either over a short distance or over longer distances.
•Three factors need to be considered when transmitting data (each factor has to be agreed by
both sender and receiver for this to work without error):
•Asynchronous data transmission refers to data being transmitted in an agreed bit pattern.
o Data bits (1s and 0s) are grouped together and sent with control bits.
o This means that the receiver of the data knows when the data starts and when it ends.
o This prevents data getting mixed up; without control bits, it would be impossible to
separate groups of data as they arrived.
o The data is accompanied by timing signals generated by an internal clock. This ensures
that the sender and receiver are synchronised with each other.
o The receiver counts how many bits (1s and 0s) were sent and then reassembles them into
bytes of data.
o The timing must be very accurate here since there are no control bits sent in this type of
data transmission.
o However, it is a faster data transfer method than asynchronous and is used where
transmission speed is important.
•Serial data transmission occurs when data is sent ONE BIT AT A TIME over a SINGLE
WIRE/CHANNEL. Bits are sent one after
WIRES all at the same time. Each channel/wire transmits one bit:
•The universal serial bus (USB) is an asynchronous form of serial data transmission.
•The USB cable consists of a four-wired shielded cable, with two wires for power (red and black)
and two wires (white and green) for data transmission.
•When a device is plugged into a computer using one of the USB ports:
o the computer automatically detects that a device is present (this is due to a small change
in the voltage on the data signal wires in the USB cable)
o the device is automatically recognised, and the appropriate device driver software is
loaded up so that the computer and device can communicate effectively
o if a new device is detected, the computer will look for the device driver that matches the
device; if this is not available, the user is prompted to download the appropriate driver
software (some systems do this automatically and the user will see a notice asking for
permission to connect to the device website).
•Simplex data transmission describes when data can be sent in ONE DIRECTION ONLY.
•Half-duplex data transmission describes when data can be sent in BOTH DIRECTIONS but NOT
AT THE SAME TIME.
•Full-duplex data transmission describes when data can be sent in BOTH DIRECTIONS AT THE
SAME TIME
•When data is transmitted, there is always a risk that it may be corrupted, lost or even gained.
o interference (all types of cable can suffer from electrical interference, which can cause
data to be corrupted or lost)
o data skewing (occurs during parallel data transmission and can cause data corruption if
the bits arrive unsynchronised).
•Checking for errors is important because computers are unable to understand data the way
humans do. Computers can’t make the same assumptions as humans or fill in the gaps as a
human would.
o parity checks
o automatic repeat request (ARQ)
o checksum
o echo check
PARITY CHECKING
•Parity checking is a method used to check if data has been transmitted correctly.
•One of the bits in the byte (usually the left-most bit) is reserved for a parity bit. The parity bit is
set according to whether the parity being used is even or odd.
•Before data is transferred, an agreement is made between sender and receiver regarding which
type of parity is being used.
•If even or odd parity is used and there are an odd or even number of bits an error is flagged.
•Parity checking fails to detect any errors if parity is maintained, even if the data was changed.
•If an error is flagged using parity checking, it is impossible to tell where the error occurred.
•Using parity checking blocks, a block of data is sent and a parity check is done in both
horizontal and vertical directions.
•This method can both identify that an error occurred and where it is located, thereby allowing
the error to be corrected automatically or request the data block to be re-transmitted.
•An Automatic Repeat Request (ARQ) is a method used to check if data has been transmitted
correctly.
•The ARQ process:
o ARQ uses positive and negative acknowledgements (messages sent to the receiver
indicating that data has/has not been received correctly) and timeout (the time interval
allowed to elapse before an acknowledgement is received).
o the receiving device receives an error detection code as part of the data transmission;
this is used to detect whether the received data contains any transmission errors.
o if no error is detected, a positive acknowledgement is sent back to the sending device.
o however, if an error is detected, the receiving device now sends a negative
acknowledgement to the sending device and requests re-transmission of the data.
o a time-out is used by the sending device by waiting a pre-determined amount of time.
o if no acknowledgement of any type has been received by the sending device within this
time limit, it automatically re-sends the data until a positive acknowledgement is received
or until a pre-determined number of re-transmissions has taken place
CHECKSUM
•Data is sent in blocks and an additional value, called the checksum, is sent at the end of the
block of data.
o when a block of data is about to be transmitted, the checksum is calculated from the
block of data
o the calculation is done using an agreed algorithm (this algorithm has been agreed by
sender and receiver)
o the checksum is then transmitted with the block of data
o at the receiving end, the checksum is recalculated by the computer using the block of
data
o the re-calculated checksum is then compared to the checksum sent with the data block
o if the two checksums are the same, then no transmission errors have occurred;
otherwise, a request is made to re-send the block of data
ECHO CHECK
•With echo check, when data is sent to another device, this data is sent back to the sender. The
sender’s computer compares the two sets of data to check if any errors occurred during the
transmission process.
•This method isn’t very reliable because if the two sets of data are different, it isn’t known
whether the error occurred when sending the data in the first place, or if the error occurred
when sending the data back for checking.
•However, if no errors occurred, then it is another way to check that the data was transmitted
correctly.
•The echo check process:
CHECK DIGITS
•Check digits are used for barcodes on products, such as International Standard Book Numbers
(ISBN) and Vehicle Identification Numbers (VIN).
•Check digits are used to identify errors in data entry caused by mis-typing or mis-scanning a
barcode.
SECURITY ASPECTS
o show understanding of the security aspects of using the Internet and understand what
methods are available to help minimise the risks
o show understanding of the Internet risks associated with malware, including viruses,
spyware and hacking
o explain how anti-virus and other protection software helps to protect the user from
security risks
o Users shouldn’t share personal information such as passwords or real-life details such as
addresses or phone numbers.
o Users who are aware of malware and hacking and know how to avoid them are less likely
to fall victim.
VIRUSES
•Viruses are programs or program code that can self-replicate with the intention of deleting or
corrupting files, or cause the computer to malfunction.
o Can cause the computer to crash, stop functioning normally or become unresponsive
o Can delete files/data
o Can corrupt files/data
o Can use a user’s computer to carry out unwanted actions
•Backing up files won’t guard against viruses since the virus may have already attached itself to
the backed-up files; using the back-up may actually reinstall the virus
SPYWARE
•Spyware is software that gathers information by monitoring key presses on the user’s
keyboard; the information is then sent back to the person who sent the software
•Possible effects:
o Gives the originator access to all data entered using a keyboard on the user’s computer
o The software is able to install other spyware, read cookie data and also change a user’s
default web browser
HACKING
o Firewalls
o Use of strong passwords and user ids
o Use of anti-hacking software
PROTECTION SOFTWARE
•Software that can protect against the various internet risks includes:
o Anti-virus software
o Internet filters
o Email filters
•Email filters filter out unwanted emails which can potentially contain viruses or attempts at
obtaining personal details.
o Firewalls
•A firewall is software designed to screen all data that comes from the Internet and only allows
data through if it satisfies a set of preprogramed rules.
•A firewall can prevent malware, hackers getting onto the computer system and it can block
unsuitable content.
•All computers attached to the internet can communicate with each other as long as they
adhere to communication protocols: rules which describe how to transmit data, especially
across a network.
•ISPs are companies that provide the user with access to the internet. A monthly fee is usually
charged for this service.
•Each device on the internet is given a unique address known as the Internet Protocol (IP)
Address.
•This is assigned by the ISP and is unique for that particular internet session.
•The only IP addresses that remain fairly unchanged are web servers.
•An IP address can be used instead of typing in the full URL For example:
•A Media Access Control (MAC) Address is a unique number that identifies a device connected to
the internet.
o It takes the form: NN-NN-NN-DD-DD-DD, where NN-NN-NN is the manufacturer code and DD-
DD-DD is the device code.
•The difference between an IP address and a MAC address is that the IP address gives the
location of a device on the internet, whereas the MAC address identifies the device connected to
the internet.
•Hypertext Mark-up Language (HTML) is used when writing and developing web pages.
•There is a difference between the structure of an HTML document and its presentation.
•These two features must be kept separate throughout the designing of a web page.
o At the end of the design process, the author should have an HTML document (containing
the structure and the actual content) and a separate .css (Cascading Style Sheet) file.
o The .css file will contain everything to control the actual presentation of the web page.
•Hypertext transfer protocol (http) is a set of rules that must be obeyed when transferring files
across the internet.
•When some form of security (e.g., SSL or TLS) is used, then http changes to https (often with a
padlock in the status bar as well). The ‘s’ stands for secure, and indicates a more secure way of
sending and receiving data across a network.
•It is slower to use https than http; https is usually only adopted where sensitive or private data
is being transferred.
WEB BROWSERS
•Web browsers are software that allow users to access and display web pages on their device
screens.
•Browsers interpret (translate) the HTML from websites and show the result of the translation;
videos, images/text, audio.
•Uniform resource locators (URLs) are text addresses used to access websites. A URL is typed
into a browser address bar using the format:
o protocol://website address/path/file name
o The protocol is usually either http or https.
o The website address is:
o The path is the web page, but is often omitted and it then becomes the root directory of
the website.
o The file name is the item on the web page.
•The web browser translates the website address into an IP address which is part of the URL
•The HTML code is returned and is shown as a correctly formatted page on the computer
screen.
HARDWARE AND SOFTWARE
LOGIC GATES
o produce a logic circuit to solve a given problem or to implement a given written logic
statement;
TRUTH TABLES
•Truth tables are used to trace the output from a logic gate or logic circuit.
•When constructing truth tables, all possible combinations of 1s and 0s which can be input are
considered.
•The number of possible combinations of inputs for a logic circuit or gate with number of inputs
is equal to:
The function of the six logic gates
COMPUTER ARCHITECTURE AND THE FETCH-EXECUTE
CYCLE
•Candidates should be able to:
o show understanding of the basic Von Neumann model for a computer system and the
stored program concept (program instructions and data are stored in main memory and
instructions are fetched and executed one after another)
o describe the stages of the fetch-execute cycle, including the use of registers and buses
•Early computers were fed data while they were running. They weren't able to store programs
which meant they weren't able to run without human intervention.
•John von Neumann developed the idea of a stored program computer, also called Von
Neumann computer architecture.
•In the stored program model, program instructions and data are stored as binary in main
memory and instructions are fetched and executed one after another.
•Data is stored temporarily in main memory and is moved between the processor, memory unit,
and input/output devices.
•This data is transferred between components using busses and stored in registers as it is
worked with.
THE PROCESSOR
•The processor is at the centre of the computer system.
THE CPU
The ALU
•In the ALU the binary electrical signals that represent data are passed through logic circuits
which transform the data.
o Its signals tell the ALU to read data from main memory, process it, and write the results
back to main memory.
o It also tells peripherals to transfer data to and from the main memory.
o It has a timer called the system clock which sends timing signals that synchronises the
hardware components
•The system clock speed, measured in hertz, indicates the number of fetch- execute cycles per
second
MAIN MEMORY
•Main memory is AKA main store, primary memory/store, random access memory (RAM) or
immediate access store (IAS).
•The instructions that tell the processor how to process data are numbers. So, they can also be
stored in main memory.
•The CPU can only work on data stored in main memory. Similarly, it can only follow instructions
stored in the main memory.
REGISTERS
•As the computer runs, the numbers in its registers constantly change.
•Some registers are just used as fast memory, to hold partial results during a calculation. These
are called general registers, or accumulators.
o The program counter (PC) holds the address of the next instruction to fetch.
•The PC increments while in use to point to the address of the next instruction to be fetched.
o The memory address register (MAR) holds an address to read from or write to.
•this register stores the address of the memory location currently being read from or written to
o The current instruction register (CIR) holds the instruction currently being executed.
•this register stores the current instruction being decoded and executed
o The memory data register (MDR) holds data just read from memory, or about to be
written to memory.
•this register stores data which has just been read from memory or data which is about to be
written to memory
BUSES
•The different registers and components in the processor are connected by short wire
connections called buses.
•Buses move data around the computer and send out control signals to make sure everything is
properly synchronised.
•All the time that the computer is switched on, the CPU repeats a set of actions called the fetch-
execute cycle.
1. The control unit fetches an instruction from main memory. The instructions are coded as
binary numbers.
2. The control unit decodes the instruction so it knows what action to carry out.
3. The ALU carries out the action, which is referred to as executing the instruction.
•The fetch-execute is carried out over and over again while the computer is working.
1. The Program Counter (PC) contains the address of the memory location of the next instruction
which has to be fetched
2. This address is then copied from the PC to the memory address register (MAR) using the
address bus
3. The instruction at the address contained in the MAR are then copied temporarily into the
memory data register (MDR)
4. The instruction in the MDR is then copied and placed into the Current Instruction Register
(CIR)
5. The value in the PC is then incremented by 1 so that it now points to the next instruction
which has to be fetched
6. The instruction is finally decoded and then executed by sending out signals (via the control
bus) to the appropriate components of the computer system (ALU or peripherals).
INPUT DEVICES
•Candidates should be able to:
o describe the principles of operation (how each device works) of these input devices:
•2D and 3D scanners, barcode readers, Quick Response (QR) code readers, digital cameras,
keyboards, mice, touch screens, interactive whiteboards, microphones
o describe how these principles are applied to real-life scenarios, for example: scanning of
passports at airports, barcode readers at supermarket checkouts, and touch screens on
mobile devices
o describe how a range of sensors can be used to input data into a computer system,
including light, temperature, magnetic field, gas, pressure, moisture, humidity, pH and
motion
o describe how these sensors are used in real-life scenarios, for example: street lights,
security devices, pollution control, games, and household and industrial applications
Two-Dimensional Scanners
•The image is converted into an electronic form which can be stored in a computer.
o Flat-bed scanners which scan documents that are placed face-down on a glass panel.
o Roller scanners which have documents fed into them
o Hand-held scanners which are moved or rolled across a document
•Optical Character Recognition (OCR) software allows scanned text from documents to be
converted into editable text files.
•Optical Mark Recognition (OMR) software detects marks on documents such as surveys or
multiple-choice exams.
•If the original document was a photograph or image, then the scanned image forms an image
file such as JPEG.
Three-Dimensional Scanners
•Since solid objects have x, y and z coordinates, so 3D scanners take images at several points
along these three coordinates.
•There are numerous technologies used in 3D scanners — lasers, magnetic resonance, white
light, etc.
Barcode Readers
•When the image from the passport and the image taken by the camera are compared, these
key positions on the face determine whether or not the two images represent the same face.
•Computed Tomographic (CT) scanners are used to create a 3D image of a solid object.
•This is based on tomography technology which builds up an image of the solid object through a
series of very thin slices.
•Each slice is built up by use of X-rays, radio frequencies, gamma imaging, etc.
•The whole of the solid object is represented digitally in the computer memory.
•Depending on how the image is formed, the type of tomographic scanner can have different
names. For example:
Application Of Microphones
•Voice recognition systems are security systems which use the user’s voice as key. How voice
recognition works:
o A few words are spoken into a microphone and a digital wave pattern is produced.
o Software compares this wave pattern to wave patterns stored in memory to see if they
match.
o If they match, then the person has been correctly identified.
o Only certain words can be used since the system is designed to recognise only a few key
phrases.
•Speech recognition is technology which converts speech to text that can be manipulated. How
speech recognition works:
o The user speaks into a microphone and a digital wave pattern is produced.
o The speech recognition software takes the digital form of the sound and breaks it down
into phonemes.
o These phonemes are compared with words in a built-in dictionary and the most suitable
match is returned.
EPOS (ELECTRONIC POINT OF SALE) TERMINAL
•Barcode readers are most commonly found at the checkout in supermarkets. There are several
other input and output devices at the checkout:
o the barcode number is looked up in the stock database (the barcode is known as the key
field in the stock item record); this key field uniquely identifies each stock item
o when the barcode number is found, the stock item record is looked up
o the price and other stock item details are sent back to the checkout (or point of sale
terminal (POS))
o the number of stock items in the record is reduced by 1 each time the barcode is read
o this new value for amount of stock is written back to the stock item record
o the number of stock items is compared to the re-order level; if it is less than or equal to
this value, more stock items are automatically ordered
o once an order for more stock items is generated, a flag is added to the record to stop re-
ordering every time the stock item barcode is read
o when new stock items arrive, the stock levels are updated in the database.
•no need to price every stock item on the shelves (this reduces time and cost to the
management)
•possible to check customer buying habits more easily by linking barcodes to, for example,
customer loyalty cards.
•Sensors are devices which read or measure physical properties such as temperature, pressure,
acidity, etc.
•Real data is analogue — this means it is constantly changing and doesn't have a discrete value
which is finite and countable.
•However, computers cannot understand physical quantities and the data needs to be
converted into a digital format.
•This is achieved by an analogue to digital converter (ADC), a device that converts physical values
into discrete digital values.
o Actuators are technically output devices, but are an integral part of the control system.
•Sensors are used in both monitoring and control applications. There is a difference between
how these two methods work:
•If new data is outside the acceptable range, a warning message is sent to a screen or an alarm
is activated
•The microprocessor/computer has no effect on what is being monitored – it just ‘watches’ the
process
o If it is a control system:
•If new data is outside the acceptable range, the computer/microprocessor sends signals to
control actuators.
•The output from the system affects the next set of inputs
o monitoring a patient in a hospital for vital signs such as heart rate, temperature, etc.
o monitoring of intruders in a burglar alarm system
o checking the temperature levels in a car engine
o monitoring pollution levels in a river.
o turning street lights on at night and turning them off again during daylight
o regulating the temperature in a central heating/air conditioning system
o changing the traffic lights at a road junction
o operating anti-lock brakes on a car when necessary
o regulating the environment in a greenhouse.
MONITORING APPLICATIONS
o temperature
o heart rate
o breathing rate, etc.
•The range of acceptable values for each parameter is keyed in to the computer.
•The computer compares the values from the sensors with those values keyed in.
•If anything is out of the acceptable range, a signal is sent by the computer to sound an alarm.
•If data from the sensors is within range, the values are shown in either graphical form on a
screen and/or a digital read out.
•Monitoring continues until the sensors are disconnected from the patient.
CONTROL APPLICATIONS
•The lamp is fitted with a light sensor which constantly sends data to the microprocessor.
•The data value from the sensor changes according to whether it is sunny, cloudy, raining or it is
night time etc.
o The lamp stays switched on for 30 minutes before the sensor readings are sampled again
(this prevents flickering).
o If the data from the sensor is greater than or equal to the value stored in memory:
o The lamp stays switched off for 30 minutes before sensor readings are sampled again
(this prevents flickering).
o When one of the car wheels rotates too slowly (it is locking up), a magnetic field sensor
sends data to a microprocessor.
o The microprocessor checks the rotation speed of the other three wheels.
o If they are different (i.e. rotating faster), the microprocessor sends a signal to the braking
system:
•the wheel's rotational speed is then increased to match the other wheels.
o If one of the wheels is rotating too quickly, braking pressure is increased to that wheel
until it matches the other three.
INPUT DEVICES
•Candidates should be able to:
o describe the principles of operation of the following output devices: inkjet, laser and 3D
printers; 2D and 3D cutters;
speakers and headphones; actuators; flat-panel display screens, such as Liquid Crystal
Display (LCD) and Light-Emitting
Diodes (LED) display; LCD projectors and Digital Light Projectors (DLP)
o describe how these principles are applied to real-life scenarios, for example: printing
single items on demand or in large volumes; use of small screens on mobile devices
INKJET PRINTERS
o a print head consisting of nozzles which spray droplets of ink on to the paper to form
characters
o an ink cartridge or cartridges; either a group of cartridges for each colour (blue, yellow
and magenta) and a black cartridge or one single cartridge containing all three colours +
black (Note: some systems use six colours.)
o a stepper motor and belt which moves the print head assembly across the page from
side to side
o a paper feed which automatically feeds the printer with pages as they are required.
•The ink droplets are produced currently using two different technologies.
o Thermal bubble:
•Tiny resistors create localised heat which makes the ink vaporise.
•This causes the ink to form a bubble; as the bubble expands, ink is ejected from the print head
onto the paper.
•When the bubble collapses, a small vacuum is created which allows fresh ink to be drawn into
the print head.
o Piezoelectric:
•A crystal is located at the back of the ink reservoir for each nozzle.
•This vibration forces ink to be ejected onto the paper; at the same time more ink is drawn in for
further printing.
2 The printer driver ensures that the data is in a format that the printer can understand
4 The data is then sent to the printer and it is stored in a temporary memory known as a printer
buffer
5 A sheet of paper is then fed into the main body of the printer; a sensor detects whether paper
is available in the paper feed tray — if there isn’t (or the paper is jammed) then an error
message is sent back to the computer
6 As the sheet of paper is fed through the printer, the print head moves from side-to-side across
the paper printing the text or image; the four ink colours are sprayed in exact amounts to
produce the final colour
7 At the end of each full pass of the print head, the paper is advanced to allow the next line to be
printed, until the whole page has been printed
8 If there is more data in the printer buffer, stage 5 to 7 is repeated until the buffer is empty
9 Once the printer buffer is empty, the printer sends an interrupt to the computer’s processor;
this is a request for more data to be sent to the printer; the whole process continues until the
whole of the document has been printed
LASER PRINTERS
•Laser printers use dry powder ink rather than liquid ink as well as static electricity to produce
text and images.
•Unlike inkjet printers, laser printers print the whole page in one go.
•Laser printers can carry out large print jobs very quickly and they don't run out of ink halfway
through.
2 The printer driver ensures that the data is in a format that the printer can understand
4 The data is then sent to the printer and it is stored in a temporary memory known as a printer
buffer
5 The printing drum is given a positive charge; as the drum rotates, a laser beam is scanned
across it removing the positive charge in certain areas leaving negatively charged areas which
match the text/images of the page to be printed
6 The drum is then coated with positively charged toner (powdered ink); since the toner is
positively charged, it only sticks to the negatively charged parts of the drum
8 The toner on the drum row sticks to the paper to produce an exact copy of the page sent to
the printer
9 To prevent the paper sticking to the drum, the electric charge on the paper is removed after
one rotation of the drum
10 The paper then goes through a fuser which is a set of heated rollers; the heat melts the ink,
fusing it to the paper
11 At the end, a discharge lamp removes all the electric charge from the drum making it ready to
print the next page
•The choice of whether to use an inkjet printer or laser printer depends on a few factors:
o Inkjet printers are best for one-off photos or where only a few pages of good quality,
colour printing is required.
•The small ink cartridges or small paper trays would not be an issue with such applications.
•Inkjet printers themselves are relatively inexpensive but refilling the ink when it runs out can be
very expensive.
o Laser printers are preferable for applications that need high-volume printing (in colour or
monochrome)
•Laser printers produce high quality printouts and are very fast when making multiple copies of
a document.
•Laser printers have large toner cartridges and large paper trays.
3D PRINTERS
•The solid object is built up layer by layer using materials such as powdered resin, powdered
metal, paper or ceramic
•3D printers are primarily used in computer-aided design (CAD) applications.
•Features of 3D printing:
o Various types of 3D printers exist; they range from the size of a microwave oven up to the
size of a small car.
o 3D printers use additive manufacturing (the object is built up layer by layer); this is in
contrast to the more traditional method of subtractive manufacturing (removal of
material to make the object) Similarly, CNC machining removes metal to form an object;
3D printing would produce the same item by building up the object from layers of
powdered metal.
o Direct 3D printing uses inkjet technology; a print head can move left to right as in a
normal printer. However, the print head can also move up and down to build up the
layers of an object.
o Binder 3D printing is similar to direct 3D printing. However, this method uses two passes
for each of the layers; the first pass sprays dry powder and then on the second pass a
binder (a type of glue) is sprayed to form a solid layer.
•There are a number of steps in the process of producing an object using these 3D printers.
•This can take several hours, depending on the layers’ thickness, the material used and the size
of the final object
•Some printers use a jelly-like support which needs to be washed away by immersion in water
•In many cases, the object has to be left to cure for a few hours
APPLICATIONS OF 3D PRINTING
2D AND 3D CUTTERS
•Cutters are machines which use various methods to cut matter away from material to produce
an object or pattern.
•A three-dimensional (3D) laser cutter works in a similar way to a two-dimensional (2D) cutter.
o The main difference is that the 3D cutter can recognise an object in the x-y-z direction
rather than just x-y.
o glass
o polymer
o crystal
o wood
o metal
•Very complex designs can be cut since the cutters are controlled by computers and very
sophisticated software.
•3D cutters can work with far more materials than 3D printers which makes them preferable in
many cases.
•However, 3D cutters use high temperatures and produce dust, shards or gas which makes
them dangerous to work with.
LOUDSPEAKERS/HEADPHONES
•Sound is produced from a computer by passing the digital data through a digital to analogue
converter (DAC) and then
•Sound is produced by voltage differences vibrating a cone in the speaker housing at different
frequencies and amplitudes.
•The rate at which the DAC can translate the digital output into analogue voltages is known as
the sampling rate.
o If the DAC is a 16-bit device, then it can accept numbers between +32767 (216 - 1) and -32
768 (216); 00000 is ignored.
o The speed at which these values can be converted is the sampling rate.
•By varying the electric current sent to each LED, its brightness can be controlled, producing a
vast range of colours.
•LED screen tends to be used for large outdoor displays due to the brilliance of the colours
produced.
•LEDs use less power and emits less heat than an ordinary light bulb, but are much more
expensive.
•LCD screens are made up of tiny liquid crystal diodes; these are grouped together in threes or
fours which form pixels.
•LCDs don’t produce any light which means they have to be back-lit.
•Before the use of LEDs, LCD screens used cold cathode fluorescent lamp (CCFL) as the back-
light method.
•CCFL uses two fluorescent tubes behind the LCD screen which supply the light source.
•When LEDs are used, a matrix of tiny blue-white LEDs is used behind the LCD screen.
o LEDs reach their maximum brightness almost immediately (there is no need to ‘warm up’)
o LEDs give a whiter light that sharpens the image and makes the colours more vivid; CCFL
had a slightly yellowish tint
o LEDs produce a brighter light that improves the colour definition
o Monitors using LED technology are much thinner than monitors using CCFL technology
o LEDs last indefinitely; this makes it more reliable and makes for a more consistent
product
o LEDs consume very little power which means they produce less heat as well as using less
energy
•Newer LED technology is making use of organic light emitting diodes (OLEDs).
•This means that no form of backlighting is required. This allows for very thin screens.
•It also means that there is no longer a need to use LCD technology, since OLED is a self-
contained system.
•OLED screens can be made very thin because of the lack of a backlight.
•Due to their thinness and flexibility, OLED screens can be made to bend to any shape.
•Advantages of using OLED compared with existing LEDs and LCDs include:
o the plastic layers of an OLED are thinner, lighter and more flexible than the crystal
structures used in LEDs or LCDs
o OLED layers can be made from plastic rather than the glass used in LED and LCD screens
o OLEDs give a brighter light than LEDs
o OLEDs do not require backlighting like LCD screens — OLEDs generate their own light
o since OLEDs require no backlighting, they use much less power than LCD screens (perfect
for mobile devices)
o since OLEDs are essentially plastics, they can be made into large, thin sheets
o OLEDs have a very large field of view which makes them ideal for use in television sets
and for advertising screens
LIGHT PROJECTORS
•Projectors are used to project computer output onto larger screens or interactive whiteboards.
•A digital light projector (DLP) basically works by shining a light onto a grid of thousands of tiny
o A bright white light source passes through a colour filter on its way to the DLP chip wh.
o The white light is split into the primary colours.
o The ON and OFF states of each micro mirror are linked with colours from the filter to
produce the coloured image.
LCD PROJECTORS
•LCD projectors basically work by firing a high-intensity beam of light through an LCD display
and then onto a screen.
o A powerful beam of white light is generated from a bulb or LED inside the projector body.
o This beam of light is sent to a group of chromatic coated mirrors; these reflect the light
back at different wavelengths.
o When the white light hits these mirrors, the reflected light has wavelengths
corresponding to red, green and blue.
o These three light components pass through three LCD screens.
o When the coloured light passes through the LCD screens, a red, green and blue version of
the grey image emerges.
o These images are then combined using a special prism to produce a full colour image
o Finally, the image passes through the projector lens onto a screen.
ACTUATORS
•An actuator is an electromechanical device that is responsible for moving and controlling a
mechanism or system.
•Actuators are an integral part of control processes where they work in conjunction with
sensors.
•When the computer is used to control actuators, it is often necessary to use a digital to
analogue converter (DAC) since these devices need analogue data to operate in many cases.
o For example, many actuators require an electric current rather than a simple digital signal
direct from the computer.
However, digital actuators don’t require a DAC; in digital actuators, part of the device is
connected to a computer which opens and closes a circuit.
MEMORY, STORAGE DEVICES AND
MEDIA
•Candidates should be able to:
o show understanding of the difference between: primary, secondary and off-line storage
and provide examples of each, such as:
•primary: Read Only Memory (ROM) and Random Access Memory (RAM)
•secondary: hard disk drive (HDD) and Solid State Drive (SSD)
•off-line: Digital Versatile Disc (DVD), Compact Disc (CD), Blu-ray disc, USB flash memory and
removable HDD
o describe the principles of operation of a range of types of storage device and media
including magnetic, optical and solid state
o describe how these principles are applied to currently available storage solutions, such as
SSDs, HDDs, USB flash memory, DVDs, CDs and Blu-ray discs
o calculate the storage requirement of a file
o primary memory
o secondary storage
o off-line storage.
PRIMARY MEMORY:
RANDOM ACCESS MEMORY (RAM)
o it is volatile/temporary memory (the contents of the memory are lost when the power to
the RAM is turned off)
o it is used to store:
•data,
•files, or
o it can be written to or read from and the contents of the memory can be changed.
•In general, the larger the size of RAM the faster the computer will operate.
o In reality, RAM never runs out of memory; it continues to operate but just gets slower and
slower.
o As RAM becomes full, the processor has to continually access the storage to overwrite old
data on RAM with new data.
o By increasing RAM size, the number of times this operation is carried out is reduced,
making the computer run faster.
•RAM is much faster to write to or read from than other types of memory; but its main drawback
is its volatility.
•Buffers often use RAM since they need to be a fast memory and the data only needs to be held
temporarily. Buffers allow the processor to do other tasks while slower peripheral devices send
data to and receive data from the computer.
•Each Dynamic RAM (DRAM) chip consists of a number of transistors and capacitors. The
function of each part is:
•Unlike DRAM, SRAM doesn't need to be refreshed because it makes use of 'flip flops' to hold
each bit of memory.
•SRAM is much faster than DRAM when it comes to data access (SRAM is 25 nanoseconds and
DRAM is 60 nanoseconds).
o For example, the processor's memory cache is the high-speed portion of the memory; it
is effective because most programs access the same data or instructions many times.
o By keeping as much of this information as possible in SRAM, the computer avoids having
to access the slower DRAM.
o they are non-volatile/permanent memories (the contents of the memory remain even
when the power is turned off)
o they are often used to store the start-up instructions when the computer is first switched
on (for example, ROM might store the basic input/output system (BIOS))
o the data or contents of a ROM chip can only be read; they cannot be changed.
•Hard Disk Drives (HDD) store data in a digital format on the magnetic surfaces of disks (or
platters).
o Data is stored on the surface of magnetic disks in tracks (rings going around the centre)
and sectors (slices of the disks).
•Normally, each disk has two surfaces which can be used to store the data.
o When data has to read or written, the disks spin and read-write heads pass over the
sector where the data is.
o The disks have to spin because the read-write heads can only move in a straight line from
the centre outwards.
o Read-write heads are then able to access any parts of the platter surfaces as they spin.
•HDDs have slow data access when compared to RAM or SSD because of the physical distance
read-write heads must travel.
•Many applications require the read-write heads to constantly seek for t blocks of data resulting
in many head movements.
o Latency is the time it takes for a specific block of data on a data track to rotate around to
the read-write head.
•Users will sometimes notice the effect of latency when they see messages such as ‘please wait’
or ‘not responding’.
•Solid-State Drives (SSD) store data as 0s and 1s in transistors within chips in the SSD.
o SSD devices store data by controlling the movement of electrons within NAND or NOR
chips.
o The data is stored as 0s and 1s in millions of tiny transistors within the chips.
•The main drawbacks of SSDs are that they have a shorter lifespan than HDDs and are more
expensive.
o If they are removed from a device before being made safe, data on the memory card or
stick can be corrupted. In extreme cases, the memory card or stick become totally
unusable.
OFF-LINE: DIGITAL VERSATILE DISC (DVD), COMPACT DISC (CD), BLU-RAY DISC, USB FLASH
MEMORY AND REMOVABLE HDD
CD/DVD DISKS
o A red laser is used to read and write the data to and from the surface of either type of
disk.
o Both use a thin layer of metal alloy or light-sensitive organic dye to store the data.
o Both use a single, spiral track which runs from the centre of the disk to the edge.
o Data is stored in pits and lands on the spiral track.
•CDs and DVDs can be designated ‘R’ (write once only) or ‘RW’ (can be written to or read from
many times).
o DVD uses dual-layering, which increases the storage capacity by layering two separate
recording layers.
o DVDs have a larger storage capacity than CDs because the pit size and track width are
both smaller.
o DVDs use lasers with a shorter wavelength than CDs’. The shorter the wavelength, the
greater the storage capacity.
DVD-RAM
•DVD-RAM uses a very different technology to CDs and DVDs. They have the following features:
BLU-RAY DISCS
•This also means that CDs and DVDs can be used to transfer files between computers.
Manufacturers often supply their software using CDs and DVDs.
o The most common use of DVD and Blu-ray is the supply of movies or games.
•They are small, lightweight devices, which makes them suitable for transferring files between
computers.
•Use cases:
•The dongle contains additional files which are needed to run the software.
•It therefore prevents illegal or unauthorised use of the software, and also prevents copying of
the software.
o Many printers and computers also have card slots allowing the device to read the
memory card directly.
•Removable hard disk drives are essentially HDD but can be connected to the computer using
one of the USB ports.
•In this way, they can be used as a back-up device or as another way of transferring files
between computers.
•Some materials such as iron oxide are easy to magnetise by bringing a magnet near them.
•The magnetised spot of material is itself a magnet, with a north pole and a south pole.
•The direction the magnetised spot faces can represent one bit of binary data: one direction
means 1 and the other means 0.
•A magnetic storage device converts data from the computer into spots of magnetism.
•The storage device does this using an electric current in a coil of wire.
•The spot stays magnetised after the electric current is taken away.
•That means the data remains even after electricity is switched off.
•If a file is deleted, the spots can be remagnetised, so they can be used for new files.
•On an optical disc, the binary data is represented by microscopic pits or marks made in a
pattern on a thin reflective layer.
•To read the data, an optical drive spins the disc and focuses a laser's light onto its surface.
•When the light hits a pit or mark, its reflection from the disc is dimmer than from the unmarked
background.
•The memory device can detect the stuck electrons, so they represent data: a location with stuck
electrons represents a 0 bit, and if it has none, it represents a 1.
•Once the electrons have been put in place, they stay there even when the computer is switched
off.
•A flash of electricity in the reverse direction will drain any trapped electrons and erase the data.
•This type of storage is called solid state because the storage happens inside the solid structure
of matter.
•It is called flash because of the flash of electricity that sets the electrons in place.
OPERATING SYSTEMS
•Candidates should be able to:
•Candidates will be required to understand the purpose and function of an operating system
and why it is needed.
OPERATING SYSTEMS
•In modern computers, most of the system software that the CPU needs is collected together
into one big software file called the operating system (OS).
•When the computer is turned on, the first action of the CPU is to load the operating system into
RAM.
•The operating system stays in RAM all the time the computer is switched on.
•It operates in the background managing the computer’s basic functions and also providing a
user-friendly experience.
BOOTING UP
•When you switch a computer on, the first action is to load the operating system from storage
into RAM from ROM.
•The first instructions that the computer needs are stored in read-only memory (ROM).
•ROM is non-volatile so these instructions are retained when the computer is unpowered.
•These start-up instructions are called the BIOS, which stands for "basic input/output system".
•They start to control the computer's peripherals, and look in secondary storage for the
operating system.
•Once the OS has been loaded into RAM, the computer can start to work.
•The OS stays in RAM carrying out important functions until the computer is switched off.
•Operating systems can perform a wide range of functions but the core functionality includes:
•The operating system lets the CPU communicate with and control hardware.
•The OS also allows the CPU to send data to and from peripherals which lets the user work with
the computer.
•The interface is what you experience when you use the computer as well as how you can
interact with it.
•The interface turns the digital data inside the computer into a form you can see and
understand.
•Most computers have a graphical user interface (GUI) with icons and other graphical items.
•It is the job of the operating system to cope with problems and breakages.
•It will typically identify the error, interrupt the current application, and display an error message
on the screen.
INTERRUPTS
•An interrupt is a signal sent from a device or software to the processor which causes the
processor to temporarily stop what it is doing.
•Once the interrupt signal is received, the processor either carries on with what it was doing or
stops to service the interrupt.
•Whenever an interrupt is serviced, the status of the current task being run is saved.
•This is done using an interrupt handler and once the interrupt has been serviced, the status of
the interrupted task is reinstated and it continues from the point prior to the interrupt being
sent.
o Hardware interrupts:
•When you use an item of hardware, such as clicking a mouse button, this can interrupt what
the computer is doing.
•A signal from the hardware interrupts the software sequence and swaps to a new set of
instructions.
o Software interrupts:
•These usually deal with problems, for example an interrupt saying that a web page is taking too
long to load.
o Another use of interrupts is to let the CPU swap between different programs. This allows
the computer to ‘multi-task’.
•The operating system is constantly scanning the signals received from hardware and software.
If an interrupt is received, the CPU interrupts the current program
BUFFERS
•Buffers are essential in modern computers because hardware devices operate at much slower
speeds than the processor.
o If it wasn't for buffers, processors would spend the majority of their time idle, waiting for
the hardware device to complete its operation.
•Buffers are filled from the processor or memory unit and whilst these are emptied to the
hardware device, the processor carries on with other tasks.
HIGH- AND LOW-LEVEL LANGUAGES AND THEIR
TRANSLATORS
•Candidates should be able to:
o show understanding of the need for both high-level and low-level languages
o show understanding of the need for compilers when translating programs written in a
high-level language
o show understanding of the use of interpreters with high-level language programs
o show understanding of the need for assemblers when translating programs written in
assembly language
WHAT IS A PROGRAM?
•A computer program is a list of instructions that enable a computer to perform a specific task.
HIGH-LEVEL LANGUAGES
LOW-LEVEL LANGUAGES
ASSEMBLY LANGUAGES
•An assembly language is a low-level programming language but programs written in assembly
languages need to be translated into machine code before they are executed.
MACHINE CODE
•Machine code refers to the binary instructions that a computer understands. This means that
programs written in machine code can be loaded and executed without translation
•Programmers don’t usually write in machine code as it is difficult to understand and it can be
complicated to manage data manipulation and storage.
TRANSLATORS
•A program must be translated into binary before a computer can use it; this is done by a utility
program called a translator.
•As programs are written by humans, they may contain errors. There are two major types of
error:
o A syntax error is where a program statement doesn't obey the rules of the programming
language. A program cannot be translated if it contains syntax errors.
o A logic error is where the program doesn't do what the programmer wanted it to do.
Logic errors are found when a program is run. These can be found by tracing what the
program does and using test data with expected results
SECURITY
DATA VALUE AND SECURITY THREATS
•Candidates should be able to:
o show understanding of the need to keep data safe from accidental damage, including
corruption and human errors
o show understanding of the need to keep data safe from malicious actions, including
unauthorised viewing, deleting, copying and corruption
•All data is valuable to some extent, but data is particularly valuable to businesses for two
reasons:
o The business will have had to invest time and money into collecting and processing data.
o Data can be used to create value for a business: data is a business asset.
•Like any business asset, data must be protected from loss or damage.
•Data security means protecting data from loss, corruption or unauthorised access.
LOSS
o For example, portable storage such as a USB flash drive could be mislaid, or a file could
be deleted by mistake.
o For example, a business may have compiled a list of its customers' bank details. If this
data is lost, the business will not be able to get money from its customers.
CORRUPTION
•Data corruption means the data has been damaged or changed. Changes mean the data is no
longer accurate, or has the wrong format.
o For example, if customer bank details are altered, money might be taken from the wrong
bank account.
•If data corruption is severe, the data will no longer make sense and the computer will no longer
be able to read it.
UNAUTHORISED ACCESS
•Some people have permission to see or alter data. Typically, they work for the organisation that
owns the data.
•When people who don’t have permission look at data, copy it or make changes this is called
unauthorised access.
o Privacy means data is only seen or copied by people who have permission.
•If data privacy isn’t secured then both personal privacy and business profits can be threatened.
•It can be hard to tell that privacy has been breached because data is not changed.
SECURITY THREATS
•Security threats are issues that can threaten data security and privacy.
Non-Malicious Threats
•Internal threats to data security are issues within a company that can cause problems.
Hardware Faults
•Faults in storage devices and storage media can result in data loss. Reasons for hardware fault
can be:
SOFTWARE FAULTS
•Software is the instructions that control the computer. If software incorrectly carries out some
operation on data, it may
HUMAN ERROR
o They might enter incorrect data or make mistakes when they are using software
o They might work in a way that risks damaging hardware
o People may be careless with equipment
o They may be careless with storage media and misplace it
MALPRACTICE
o leaving the computer logged on when you go out of the room, so that someone else can
access your files.
o telling someone else your password, so that the computer system is no longer secure.
o downloading software from the Internet or opening a damaging email, which can put
malware onto the computer.
o using work computers for personal business, which wastes work time and increases the
risk of malware.
CRIME
•Computer crimes are illegal, malicious acts which can cause a lot of damage. For example:
o taking a copy of music, games, movies, etc., without permission, sometimes called piracy
o hacking - hackers find out passwords or bypass security systems
o creating and distributing malware
o identity theft, which is stealing someone else's personal details, and pretending to be that
person, typically to take money out of the person's bank account
o deliberately damaging or stealing computer hardware and storage media
METHODS OF DATA PROTECTION
•Candidates should be able to:
o show understanding of how data are kept safe when stored and transmitted, including:
•use of security protocols such as Secure Socket Layer (SSL) and Transport Layer Security (TLS)
•use of symmetric encryption (plain text, cypher text and use of a key) showing understanding
that increasing the length of a key increases the strength of the encryption
SECURITY PROTECTION
PROOF OF IDENTITY
•The main methods used for proof of identity are passwords and biometrics.
PASSWORDS
• A password is a string of characters which only the user knows that they use to verify their
identity.
• This is important because it prevents unauthorized users from using software to brute-force
guess the password.
• If a user’s password for one account is leaked, then the security of the user’s other accounts
won’t be threatened.
BIOMETRIC CHECK
•Checking physical features needs special equipment and software. For example:
o a palm reader
o an iris scanner
o a facial recognition system.
FIREWALLS
•A firewall can be either software or hardware that sits between a computer/internal network
and an external network and
filters data that enters or exits the internal network (referred to as traffic).
•Types of firewalls:
o Hardware firewalls are hardware interfaces located between an internal network and its
internet connection. Often referred to as gateways.
o Software firewalls can be software installed on a computer; in some cases, part of the
operating system.
o examining the traffic between the user's computer (or internal network) and a public
network (e.g. the internet)
o checking whether incoming or outgoing data meets a given set of criteria
•if the data fails the criteria, the firewall will block the traffic and give the user (or network
manager) a warning that there may be a security issue
o logging all incoming and outgoing traffic to allow later interrogation by the user (or
network manager)
o preventing access to certain undesirable sites according to criteria; the firewall can keep a
list of IP addresses
o helping to prevent viruses or hackers entering the user's computer (or internal network)
o warning a user if software on their system tries to access an external data source
•However, there are circumstances where the firewall can't prevent potential harmful traffic:
o it cannot prevent individuals, on internal networks, using their own modems to bypass
the firewall
o employee misconduct or carelessness cannot be controlled by firewalls (e.g., control of
passwords or use of accounts)
o users on stand-alone computers can chose to disable the firewall, leaving it open to
harmful ‘traffic’ from the internet.
•All of these issues require management control or personal control to ensure that the firewall is
allowed to do its job.
PROXY SERVER
•Proxy servers act as an intermediary between the user and a web server:
o allowing the internet traffic to be filtered; they can block access to a website if necessary
o by using the feature known as a cache, they can speed up access to information from a
website:
•when the website is first visited, the pages visited are stored on the proxy server
•when the user next visits the website, it now goes through the proxy server cache instead,
which is much faster
SECURITY PROTOCOLS
•A protocol a set of rules used by computers to communicate with each other across a network.
•Secure Sockets Layer (SSL) is a type of protocol which allows data to be sent and received
securely over the internet.
•When a user logs onto a website, SSL encrypts the data - only the user's computer and the web
server can decrypt it.
•A user will know if SSL is being applied when they see https in the URL or a padlock in the
browser’s status bar.
•The process of accessing a secured website and transferring data (all together referred to as
the handshake protocol):
1. The user’s web browser sends a message so that it can connect with the required website
which is secured by SSL.
2. The web browser then requests that the web server identifies itself.
3. The web server responds by sending a copy of its SSL certificate to the user’s web browser.
4. If the browser can authenticate the certificate, it sends a message to the web server to allow
communication to begin.
5. Once this message is received, the server acknowledges the browser and the SSL-encrypted
two-way data transfer
begins.
•Transport Layer Security (TLS) is similar to SSL but is a more recent security system.
•TLS is a form of protocol that ensures the security and privacy of data between devices and
users when communicating over the internet.
•TLS is designed to provide encryption, authentication and data integrity in a more effective way
than SSL.
•TLS is designed to prevent a third-party hacking into communication over the internet between
a website and client (user).
o record protocol: this part of the communication can be used with or without encryption
(it contains the data being transferred over the internet).
o handshake protocol: this permits the website and the client (user) to:
•When opening a TLS session, it requires a lot of computer time (due to the complex encryption
keys being used).
•The use of session caching can avoid the need to utilise so much computer time for each
connection.
•TLS can either establish a new session or attempt to resume an existing session; resuming
sessions boosts system performance.
o TLS separates the handshaking process from the record protocol (layer) which holds all
the data.
ENCRYPTION
•Encryption won't prevent hacking but it will make the data meaningless unless the recipient can
decrypt it.
•There are two terms used to refer to data in the context of encryption:
•In order to encrypt a message, an encryption algorithm and encryption key is used.
o Symmetric
o Asymmetric or public key.
SYMMETRIC ENCRYPTION
•In symmetric encryption the encryption key is kept secret; only the sender and receiver know it.
•The sender uses it to encrypt a message and the receiver uses the same key to decrypt it.
•The drawback of symmetric encryption is that the key has to be sent over the internet before
encryption can begin.
•This reduces security because a third-party could potentially intercept the key.
ASYMMETRIC ENCRYPTION
•In asymmetric encryption there are two keys: a public key and a private key. The two are
mathematically linked.
•A message encrypted with one key can only be decrypted with the other key.
o Public key
•This key is shared with any computer that needs to send a message.
•Computers that want to send messages can use the public key to encrypt the messages before
sending them.
o Private key
•The user’s computer can use it to decrypt the messages that are sent to it.
2. The symmetric key is then encrypted using the public key known to both A and B
4. User B decrypts the symmetric key by applying their own private key
5. The decoded symmetric key is now used to decrypt the message sent by user A
•The computer generates the keys automatically, stores them securely, and takes care of
encryption and decryption.
SECURITY ATTACKS
•Candidates should be able to:
oshow understanding of the need to keep online systems safe from attacks including denial of
service attacks, phishing, pharming
•A Denial-of-Service Attack (DoS) is an attempt at preventing users from using part of a network,
mainly internet servers.
•DoS attacks are usually temporary but may be a very damaging act or a big breach of security.
•They don’t just affect networks; DoS attacks can be targeted at individuals. Attackers may be
able to prevent users from:
o oaccessing their emails
o oaccessing websites/web pages
o oaccessing online services (such as banking).
o oWhen a user’s browser tries to access a webpage, the browser sends a request to the
internet server which contains it.
o oThe server can only handle a finite number of requests.
o oSo, if it becomes overloaded by an attacker sending requests, it will be unable to service
a user's legitimate request.
•An individual user or a website can guard against these attacks to some degree by:
•Signs that a user can look out for to see if they are a victim of one of these attacks include:
•A Distributed Denial of Service (DDoS) uses multiple machines or automated software to flood a
network with useless traffic from different IP addresses.
IDENTITY THEFT
•Identity theft is when a criminal has someone’s personal details and uses that information to
impersonate them online.
o oPersonal details can be details such as bank account information, passwords and
personal ID.
•Identity theft can enable criminals to steal a lot of money and commit fraud.
•Criminals can obtain personal details in many ways, but two important examples are phishing
and pharming.
PHISHING
•Phishing is the act of sending out legitimate-looking emails which trick recipients into clicking
on a link in the email or attachment, which then sends the user to a fake website where they will
be tricked into giving up personal data.
PHARMING
•Pharming is the act of installing malicious code on a user’s hard drive or a web server which
then redirects the user to a fake
website without their knowledge where they will be tricked into giving up personal data.
o Some anti-spyware software can identify and remove pharming code from the hard drive
o The user should always be alert and look out for clues that they are being redirected to
another website
o The user should look out for clues that show a secure website, such as https or a padlock
sign next to a website URL.
odescribe how the knowledge from 1.4.1, 1.4.2 and 1.4.3 can be applied to real-life scenarios
including, for example, online banking, shopping
ETHICS
•Candidates should be able to:
COMPUTER ETHICS
•Computer ethics is a set of principles set out to regulate the use of computers.
o intellectual property rights — for example, copying of software without the owner’s
permission i.e., plagiarism and copyright infringement.
o privacy issues — for example, hacking or any illegal access to another person's personal
data
o effect of computers on society — this covers factors such as job losses, social impacts
and so on.
•Copyright is a type of intellectual property right which grants a creator the exclusive right to
reproduce and modify their work and authorise others to do the same.
•Plagiarism is when a person takes another person's idea/work and claims it as their own and
doesn’t acknowledge the original author.
o free software
o freeware
o shareware.
FREE SOFTWARE
•Free software is software which gives users the freedom to run, copy, change or adapt it.
•Users of free software are allowed to do all of this because free software isn’t protected by
copyright restrictions.
•However, there are still rules that need to be obeyed. The user:
o cannot add source code from another piece of software unless it is also free software
o cannot produce software which copies existing software subject to copyright laws
o cannot adapt the software in such a way that it infringes copyright laws protecting other
software
o may not use the source code to produce software which breaks any other laws
FREEWARE
•Freeware is software a user can download from the internet free of charge.
o Once downloaded, there are no fees associated with using the software.
•Freeware is subject to copyright laws and users are often requested to tick a box to say they
understand and agree to the terms and conditions governing the use of the software.
•This means that a user is not allowed to access or modify the source code in any way.
SHAREWARE
•Shareware is software which users are allowed to try out free of charge for a trial period.
o At the end of the trial period, the author of the software will request that you pay a fee if
you like it.
o Once paid, a user is registered with the software’s originator and free updates and help
are then provided.
o Often the trial version of the software lacks features found in the full version, which only
become available when the fee is paid.
•Shareware is protected by copyright laws and users aren’t allowed to use the source code in
any of their own software.