Knowledge Map
Knowledge Map
The ROM is an internal hardware component A computer needs both RAM and ROM to The RAM is another internal hardware component
which is part of the computer’s main memory. function correctly. However, the ROM in a which is part of the computer’s main memory.
computer is difficult to upgrade or change, RAM is used to store any running applications
ROM is used to store the BIOS (basic input output
whereas the RAM can be easily upgraded and while the computer is ON
system) – instructions needed to turn the
changed to hold more data
computer ON or the “bootup” sequence
The RAM is volatile memory meaning the data in
(bootloader) RAM holds a lot more data than the ROM the RAM is deleted/erased when the power turns
ROM is non-volatile memory which means the data Typical RAM is 4GB and typical ROM is 4MB. off.
is saved/kept by the computer when the power
turns off.
How it works: CPU move data from RAM into the Examples of flash memory can be found in:
secondary storage, known as a “paging file”, so the CPU
can continue with its execution of instructions from - USB drives
RAM. This is copied back into the RAM when it is needed - SD cards
- Solid State Drives (SSDs)
The virtual memory is slower than the RAM but allows
the computer to continue functioning by using part of
the HDD or SSD to store some data from the RAM.
Secondary Storage - Purpose Secondary Storage – Magnetic
Secondary storage is needed to save data and programs that are needed after Magnetic memory is a type of secondary storage which is typically found in Hard
the computer is turned off. It is a form of non-volatile memory. Disk Drives (HDDs). Data is stored using magnetic dots which have a magnetic
polarisation, on areas of the disk called sectors which are found within circular
Secondary storage can hold much greater capacity of memory than main
tracks. The data will have a positive or negative polarity, which is read by the
memory, but is slower to access as it is not directly accessible by the CPU.
read/write head on a moving arm. The disk spins at a fast rate to ensure all the
Factors to consider when considering choice of secondary storage devices: data is read (e.g. 5400 or 7200rpm)
Optical memory is a type of secondary storage which uses lasers to read and Solid State memory is a type of secondary storage which uses electricity and flash
write data. Examples of optical memory include CDs, DVDs and Blu-ray disks. memory to store data. There are no moving parts in a solid state device, and the
data is stored using electrical switches – open switch represents a 1 (keeps charge)
Data can be read by using a laser which reads a series of pits and lands. The laser
and a closed switch represents a 0.
is shone onto the disk surface which is reflected, and this represents 0s and 1s.
Advantages: very cheap to produce (good for program distribution), much more
lightweight and portable than magnetic disks, unaffected by shocks and water Advantages: fastest type of storage (reading and writing), much more lightweight
and less prone to damage than magnetic disks (no moving parts)
Disadvantages: limited storage capacity (CDs hold around 700MB and DVDs
upto 4.8GB), can also be damaged by scratches or by excessive use over a long Disadvantages: most expensive form of storage (per GB of data)
period of time
Binary, Denary and Hexadecimal conversion Units of Data Binary Arithmetic
Binary Denary OR Denary Binary There are 4 main rules when adding numbers using
binary:
Write out the binary number under the following
headings:
128 64 32 16 8 4 2 1
Files are stored individually on machines and Files and software are stored on the server,
then share with others instead of individual client machines
P2P is common when sharing files online, LANs allow sharing of files and hardware (e.g. printers) across all Clients send requests for data to the server,
especially when video streaming e.g. Skype connected devices and the server processes this and responds
(client-server relationship)
Install and update software on all connected computers in one
go, instead of one-by-one Much more common than P2P networks
Wireless A device that creates a Bandwidth – higher bandwidth means The internet is a worldwide (largest) collection of
Access wireless LAN which other better network performance as more data computer networks.
Point devices can connect to can be transferred at any given time. More
(WAP) The World Wide Web (WWW) is a collection of websites
users sharing bandwidth can slow down
Router A device which transmits the hosted on web servers, which we can access using the
performance.
data between multiple HTTP protocol. Each website contains a URL (uniform
networks (at least 2 Connection type – wired connections are resource locator) which we can access using a Domain
networks) – allows more reliable/faster than wireless, but are Name System (DNS – contains multiple Domain Name
connection from a LAN to not as portable and require more cabling Servers).
the internet to connect more devices
Switch A device which connects The DNS translates a website’s domain name into its IP
other devices on a LAN – Number of devices – the more devices address, so we don’t need to remember IP addresses.
they receive data from one connected, the slower the network may When the domain name is valid, and successfully
device and transmit to perform translates to the correct IP address, we can then access
another device, with the the resources/data on that website.
Network
correct MAC address
An internal component that
1.3 Wired and Wireless
Interface allows a device to connect to Networks – Part 2
Controller/ a network
Card (NIC)
The Cloud
Twisted Made up of 4 pairs of
A Cloud host stores the data of another
Pair twisted copper wires -
organisation, using its own servers, storage
cabling mainly used to physically
(Ethernet) connect devices on a LAN and software, accessible only via the
internet. Wired vs Wireless Networks comparison (Ethernet vs
(examples are CAT 5e/CAT 6)
Coaxial Made up of a single copper Similar concept of client-server network WiFi and Bluetooth)
cabling wire surrounded by a plastic where the server is the ‘cloud’ company.
Wired: much more reliable, faster and stable connection
layer (insulation) and metal (not affected by interference) and also less like to be
Benefits: access data from any connected
mesh (shielding) – mainly
device, easy to increase storage, no need affected by hacking. However, wired connections affect
used by phone companies
to pay extra for IT staff, provides auto portability/movement and are cost more to add
and internet providers
Fibre Optic Made up of a glass core updates and back-ups additional devices.
cabling which refracts light as data Drawbacks: MUST need internet to access, Wireless: easier to connect more devices, can move
travels, over long distances – around and costs less vs wired. However, more devices
dependency on the cloud host for security
used for high speed internet
and back-ups, often subscription based so means affected by interference, it is not as fast or stable
and cable TV services
more expensive as a wired (Ethernet) connection and is more prone to be
affected by hacking.
Star Network Topology WiFi (Frequency/Channels & Encryption) Mesh Network Topology
A topology is just a name used to describe how a network Main standard used for wireless connections In a Mesh topology, there is no central location as each
has been set up (layout of the network). – two main radio frequency bands (2.4GHz device is directly or indirectly connected to another
which has longer coverage but slower device. Data is sent across the fastest route from one
Star topology – all the devices are connected to a central transmission speeds or 5GHz which gives less device to another.
switch or server that controls the network. coverage but faster transmission speed.)
Network Layers – small sections (divisions) of network Network Protocols – sets of rules used by devices for Packet Switching – used by routers to direct data packets
functionality communication across a network across networks
Layers are SELF CONTAINED, so developers can work on TCP/IP (transmission control protocol/internet protocol) – How it works?
one aspect of the network without affecting the split data into packets and then reassemble into correct order 1 – data is split into packets (given headers which contain
remaining layers. (check for errors). IP is responsible for packet switching source and destination IP address) and a number to show
HTTP/HTTPS (hyper-text transfer protocol (secure)) – used by order
Also allows companies to have a set/consistent standard, web browsers to access websites 2 – Routers direct the packets through the best/fastest
so developed hardware and software will work in the FTP (file transfer protocol) – move files between a network route depending on amount of traffic. Each packet can take
same way, even if made by different companies. POP (post office protocol) – retrieve emails from a server. a different route.
Email is held until downloaded, then it is deleted 3 – As they arrive, the packets are rearranged into correct
IMAP (internet message access protocol) – similar to POP but order.
only deleted when you choose to do so. 4 – If any packets were lost during sending, sends signal
SMTP (simple mail transfer protocol) – send emails between back to resend the packet and then sends receipt
servers confirmation when all the packets have arrived.
Network security threats Forms of Network attacks Identifying and Preventing vulnerabilities
Malware – malicious software which causes damage Passive Attack – monitoring data across network and Penetration testing – testing the vulnerability of a
(e.g. Editing/deleting files) when it is run intercepting any sensitive information they find network by paying authorised users (internal or
(through the use of network monitoring hardware and external) to try and find weaknesses to exploit, and then
Phishing – luring people into giving personal data
software. fixing these to improve network security.
through email/SMS messages sent from source that
looks legitimate Physical security – having physical restrictions, such as
Active Attack – attacking a network with malware or
ID cards, locks and keys to ensure sensitive data cannot
Pharming – redirects network traffic to a fake website other planned attacks
be leaked/stolen
which is intended to collect persona;/sensitive data
Insider Attack – an insider who exploits their network Network policies – having thorough sets of rules in place
Social Engineering – the art of manipulating people into to steal/expose information to reduce the chances of employees giving accidental or
giving up their personal/sensitive data
deliberate access to data
Brute Force Attack – trying to gain access by using
Data interception and theft – data sent to another many password combinations (using automated Anti-malware software – downloading an active
device is intercepted by a 3rd party (unauthorised user)
software) program which protects data from malware by blocking
malware from entering a system/network or finding and
Denial of Service (DoS) Attack – stopping users from deleting/quarantining the malware to reduce impact
accessing part of a network by flooding the network
with many requests.
Poor Network Policy – limited/no security rules to Firewalls – monitors incoming and outgoing network
follow so easier for unauthorised users to gain access to traffic to protect against unauthorised connections
data (e.g. no access rights, no back up of data etc) to/from the internet
Weak passwords – passwords that do not consist of User access levels – granting different levels of access
upper/lower case characters, minimum length based on role in company to prevent access to
requirement, symbols and are not updated regularly sensitive/personal data
Out of date software – software prone/not protected Passwords – string of characters used to verify the
from the latest threats and malware identity of a person trying to gain access to a
system/data (preventing unauthorised access)
Ransomware – prevents access to files and data unless a
ransom is paid to the hacker/3rd party Encryption – using algorithms to change the form of
data sent across a network to make it difficult for
unauthorised users to access or recognise, and can only
access using the encryption key
Operating System What is system software? Utility Software
The operating system (OS) is a system software that System software is software which is designed to Utility software is software designed to maintain and
allows the hardware and software to communicate help a computer run and communicate. It optimise the running of a computer system, to
with each other and run other software (programs) controls the hardware, software and any increase/enhance performance.
connected peripheral devices by providing a user
It provides a user interface which allows the user to The main examples of utility software:
interface where all these can interact with each
interact with the computer system (examples include
other. 1 – Encryption software: software designed to use
Apple iOS, MAC OS, Android OS, Windows 10…)
cryptography (keys) to prevent unauthorised access
The OS is responsible for: to data
Environmental concerns
countries usage.
1 – Are people influenced into getting latest technology even 1 – ILLEGAL to access data stored on a computer unless
when not needed? permission is granted (hacking)
2 – How has technology affected our social interaction with 2 – ILLEGAL to access data when that material will be used to
each other and mental wellbeing? commit further illegal activity e.g. blackmail and fraud
3 – Can everyone afford the same technology (digital divide)? 3 – ILLEGAL to make changes to any data stored on a
computer, unless permission is granted. Also ILLEGAL to install
Environmental issues – how technology has a positive or malware/programs which can automatically cause this change
negative impact on the environment around us to happen
1 – increasing power consumption has negative impact on
technology (fossil fuels)… Copyright Designs and Patents Act 1988
2 – disposing of devices causes e-waste (sent to Asia and Africa Current copyright law which gives the creators of work the
to cut costs) right to control how their material is used (owns the right to
3 – Are there ways in which our consumption or usage can be the work/material) and cannot be used by anyone unless
reduced? permission is granted. So people are NOT able to make copies,
publish/sell it without permission, distribute it or sell copies to
Proprietary – software that is developed by other people unless license is granted.
Privacy issues – how “protected” is our data by
companies/individuals companies/individuals (referred to as “off the shelf”)
1 – is all the information we have online “safe” and “secure”? which is copyrighted so can only be used by obtaining Software Licences (Open source and Proprietary)
2 – what can our data be used for? Documentation which provides legally binding guidelines for
permission (buying a license)
the use of and distribution of software. Allows users with the
Topics include (smartphones, software/games, locations, Help is provided by the actual individual or company who rights to use/edit/change software without violating
wireless technologies, wearable devices, cloud storage…) (breaking) copyright laws.
created it, and often free of bugs/glitches and when these
REMEMBER to ALWAYS link points made back to the
do occur they are fixed for free. EXAM: You need to be able to recommend a license for a
QUESTION e.g. Having GPS always kept active on a
smartphone can cause ethical issues because… given scenario in the given, including any advantages or
However, it is costly to purchase/subscribe to and cannot disadvantages
be adapted to meet individual needs. Cannot be
redistributed to other users.
Searching Algorithms An Algorithm is a sequence of instructions Sorting Algorithms
used to solve a problem/complete a task
Linear search – searches for the target value on ANY list Bubble sort – sorts the values by comparing two values at a
(ordered/unordered) in a sequence starting from the first Algorithms can be represented using two time and swapping them if they are not in order. Repeat
value and going through the list until it finds the target main methods: process until you have gone through the values (this is called
(returns true) or the list is complete (returns false). a pass). When the required value is at the end, start back
1 – Flowcharts from the beginning. Only stops when a pass returns 0 swaps.
Linear search is easier to understand than binary and works
Bubble sort is easier to understand that merge sort, but very
on any list, but is much more inefficient when searching 2 – Pseudocode inefficient when sorting longer lists/datasets
longer lists compared with binary search.
Decomposition – breaking a large problem
down into smaller more manageable sub-
problems
When displaying something - print() SQL is used to query a database to search for data. We can use Data Structures – an organised and structured set of
SQL commands to retrieve data from a database table by using data, which can easily be edited and changed
When user is asked to enter value/entering a value – the following format:
input() Data structures are mainly created using the [ ] set of
SELECT fields brackets so 1 set of [ ] = 1 dimensional and 2 sets of
When repeating a set of instructions a fixed number FROM tableName [ ][ ] = 2 dimensional OR [x,y] where x and y would
of times - for x in range(0,10): WHERE condition represent the index of the row and column in a 2D data
(if you want to repeat 10 times) Using the * wildcard will return ALL the records for a given structure (1D = 1 loop needed and 2D = 2 loops needed)
condition
When repeating a set of instructions until a condition colours = [“red”, “blue”, “green”]
becomes false/as long as condition is true –
Data structures indexing position starts at 0 (left to right)
while number <= 0: and -1 (right to left)
(if you are looking for numbers greater than 0)
e.g. colours[2] would give you “green” and so
Variable assignment = changing the value of a would colours[-1]
variable
E.g. if you write To iterate through a list of values, you MUST use a loop (for
Initialisation – assigning a variable with its first value SELECT StudentName from Students WHERE or while) in the exam, but for loop is preferred as it will
Points < 0; know how many values there are in the list e.g.
Variable – a temporary memory location which holds [Link] would give you the integer 3
This will give you “Kirstie” and “Marian” as your returned results
a value that can change (during program execution)
Sub-programs – a predefined block of code with a unique
Constant - a temporary memory location which holds
a value that stays the same (during program
2.2 Programming Fundamentals I name, that can be called at any time by writing its name
Comments – annotating the code to make it 1 - Normal test data: selecting valid/expected values to
easier to understand and read see if the program accepts these without causing errors
Indentation – spacing the code appropriately, so e.g. if the valid numbers are 1-10 then choose a
it is easily to follow different sections of the number within this range
program and what they do
Meaningful identifier names – using 2 – Invalid/Erroneous test data: selecting data which
appropriate names for identifiers (variables, the program should not accept such as entering “six”
constants etc.) linked to the purpose so it does as string instead of 6 as integer so it should be rejected
not cause confusion
Use of sub-programs – allows programmer to 3 – Boundary test data: selecting values which lie on the
structure code so parts can be developed and boundary of the accepted range of values e.g. if 1-10 are
changed independently without affecting the valid values then entering 0,1,10,11 are boundary
rest of the program data
Logic Gates and Truth tables Computing Related Mathematics Interpreting and Drawing Logic Gate Diagrams
Systems and circuits consist of different inputs that can MOD = remainder division Below is the logic diagram for the following expression:
give varying outputs. DIV = integer division
* = Multiply Z = (A AND B) OR (NOT C) which can also be written as
¬ = NOT ∧ = AND ∨ = OR ^ = exponent/power of
Z = (A ∧ B) ∨ (¬C)
/ = divide
The 3 main logic gates used within circuits:
NOTE: use a = 5 and b = 2 below
NOT gate (inverts the input value)
a + b = 7
Can be written as Z = NOT A but also Z = ¬A a – b = 3
a / b = 2.5
a * b = 10
a ^ b = 25
a MOD b OR a % b = 1
a DIV b OR a // b = 2
2.4 Computational Logic If completing the truth table for this circuit/diagram, I
added a letter for each output to make it easier….
Disadvantages:
2.5 Translators and Facilities solutions
Low Level Languages (LLLs) – programs written related to 1 – Compiler (HLL) - translates all the code
specific computer hardware and architecture, so less into machine code in one go, producing an
translation needed to convert into machine code executable file which can be run.
Examples include: Assembly language, machine code Much faster to run than an interpreter, but
not as effective to debug for errors
Advantages: 3 – Run Time Environment (enables the program to be
run straight after you have written it, to check for run
assembly language uses English like statements time errors). Also allows testing of the program
translated programs require less memory 2 – Interpreter (HLL) - translates the code
one line at a time, into machine code
Disadvantages: during program execution.
4 – Translators (built in translators to convert the high
machine code is difficult to understand and takes Much more effective to debug for level code into machine code, allowing the code to be
longer time to write programs individual errors, but interpreter code is executed/run).
code is machine dependant (not portable) far less slow than compiled code.