CS Spec 1
CS Spec 1
Computer systems
Oak National Academy
Outwood Home Learning OCR Computer Science Lessons
Isaac Computing
Click School OCR Computer Science E-Book
REMEMBER THESE TOPICS ARE NOT A FOCUS BUT THEY MAY COME UP
Need to Recap
1.1.2 CPU Performance, 1.1.3 Embedded systems, 1.2.3 How data needs to be converted into a binary format to be processed by a
computer & Data cpacity and calculation of data capacity requirements, 1.3.1 Types of Network - LAN & WAN, The different roles of
Confident
computers in a client-server and a peer -to-peer network, Star and Mesh topologies, 1.3.2 The concepts of layers , 1.4.1 Threats to
computer systems and networks - Forms of attack. 1.5.1 Operating systems - The purpose and functionality of perating systems,
Topic Sub topic 1.5.2 Utility software
Architecture of the CPU
I can explain what actions occur at each stage of the fetch-execute cycle
Common CPU components and their function:
I can explain the role/purpose of the (ALU) Arithmetic Logic Unit and what data it stores during the fetch-execute cycle
I can explain the role/purpose of the (CU) Control Unit and what it manages and controls during the fetch-execute cycle
1.1.1 Architecture of the I can explain the role/purpose of the Cache and what data it stores during the fetch-execute cycle
CPU
I can explain the role/purpose of the Registers and what data it stores during the fetch-execute cycle
I can explain the role/purpose of the (PC) Program Counter in the Von Neumann architecture and what data/address it stores during the fetch-execute cycle
I can explain the role/purpose of the Accumulator in the Von Neumann architecture and what data it stores during the fetch-execute cycle
I can explain how the clock speed affects the CPU performance
1.1.2 CPU Performance
I can explain how the cache size affects the CPU performance
I can explain how the number of cores affects the CPU performance
Embedded Systems
1.1.3 Embedded systems I can explain the purpose and characteristics of embedded systems
I can explain tThe difference and key characteristics of RAM and ROM
1.2.1 Primary storage
(Memory) I can explain the purpose of ROM in a computer system
I can explain how virtual memory works and the transfer of data between RAM and the HDD
1.2.2 Secondary storage I understand what solid state storage media is and how it works
I can identify the advantages and disadvantages of solid state storage media
I can compare storage media and devices, identifying the most suitabel for a given senario
I can explain how data needs to be converted into binary format to be processed by a computer
I can identify the different data units bit, nibble (4 bits), byte (8 bits), kilobyte (1,000 bytes or 1KB), megabyte (1,000 KB), Gigabyte (1,000 MB),
Terabyte (1,000 GB), Petabyte (1,000 TB)
1.2.3 Units I can calculate the capacity of devices for different data units
I can calculate the require storage capacity for a given set of files
I can calculate the file sizes for sound files (file size = sample rate x duration(s) x bit depth)
I can calculate the file sizes for images (file size = colour depth x image height(px) x image width(px))
I can calculate the file sizes for text files (file size = bits per character x number of characters)
Numbers
I can convert positive denary whole numbers (0 – 255) to binary numbers (up to and including 8 bits) and vice versa
I can add two binary integers together (up to and including 8 bits) and explain overflow errors which may occur
I can convert positive denary whole numbers into 2-digit hexadecimal numbers and vice versa
I can convert binary integers to their hexadecimal equivalents and vice versa
I can carry out a binary shift and understand the effect (both left and right) on a number
Characters
I can explain the relationship between the number of bits per character, and the number of characters which can be represented, e.g. ASCII and Unicode
I know that the binary representation of ASCII in the exam will use 8 bits
I can explain the differences between and impact of each character set
1.2.4 Data storage I understand how character sets are logically ordered, e.g. the code for ‘B’ will be one more than ‘A’
Images
I can explain how each pixel has a specific colour, represented by a specific code
I can explain the effect on image size and quality when changing colour depth and resolution
I understand what additional information is stored in the metadata (e.g. height, width)
Sound
I understand how analogue sound can be sampled and stored in digital form (binary).
I understand that the sample rate is measured in Hertz (Hz)
I understand that the bit depth refers to the number of bits available to store each sample (e.g. 16-bit)
I understand that the duration refers to the number of seconds of audio the sound file contains.
I can explain the effect of sample rate, duration and bit depth on the playback quality and size of the sound file.
1.2.5 Compression
I can explain the effects on the file for each type of compression.
1.3.1 Networks and
topologies
1.3.1 Network and Topologies
I can explain the difference between a LAN (Local Area Network) and WAN (Wide Area Network)
I understand the different factors that can affect the performance of a network, e.g. the numbers of devices connected and the bandwidth
I can explain the different roles of computers in a client-server and a peer-to-peer network
I can identify the hardware needed to connect stand-alone computers into a Local Area Network including wireless access points, routers, switches, NIC
(Network Interface Controller/Card) and Transmission media.
I can explain the tasks performed by each piece of network hardware.
I understand a Domain Name Service (DNS) is made up of multiple Domain Name Servers
I can explain the role of the DNS (Domain Name Server) in the conversion of a URL to an IP address.
I understand the concept of servers providing services (e.g. Web Server -> Web pages, File Server -> files storage/retrieval)
I understand the concept of Hosting and clients requesting/using services from a server
I understand what is meant by ‘The Cloud’ and remote service provision (e.g. storage, software, processing)
I can explain the advantages and disadvantages of the Star and Mesh topologies
I can compare the benefits and drawbacks of wired (Ethernet) and wireless (Wi-Fi, Bluetooth) connections
I understand IP addressing and the format of an IP address (IPv4 and IPv6) for communication over the Internet
I understand that MAC addresses are assigned to a devices for use within a network
I can explain how standards allow hardware/software to interact across different manufacturers/producers
I can explain the principle of a (communication) protocol as a set of rules for transferring data
1.3.2 Wired and wireless
networks, protocols and I understand that different types of protocols are used for different purposes
layers
I can explain the basic principle of the TCP/IP (Transmission Control Protocol/Internet Protocol) including its purpose and key features
I can explain the basic principle of the HTTP (Hypertext Transfer Protocol) including its purpose and key features
I can explain the basic principle of the HTTPS (Hypertext Transfer Protocol Secure) including its purpose and key features
I can explain the basic principle of the FTP (File Transfer Protocol) including its purpose and key features
I can explain the basic principle of the POP (Post Office Protocol) including its purpose and key features
I can explain the basic principle of the IMAP (Internet Message Access Protocol) including its purpose and key features
I can explain the basic principle of the SMTP (Simple Mail Transfer Protocol) including its purpose and key features
I understand the concept of layers and can explain the benefits of using layers e.g. the 4-layer TCP/IP model
I can explain how Malware is used, its purpose and the threats posed to devices/systems
I can explain how Social engineering (e.g. phishing, people as a ‘weak point’) is used, its purpose and the threats posed to devices/systems
1.4.1 Threats to computer
systems and networks I can explain how a Brute-force attack is used, its purpose and the threats posed to devices/systems
I can explain how a Denial of service attack is used, its purpose and the threats posed to devices/systems
I can explain how a Data interception and theft is used, its purpose and the threats posed to devices/systems
I can explain the concept of how SQL injection is used, its purpose and the threats posed to devices/systems
I understand how to limit/prevent threats posed and remove vulnerabilities through use of Penetration testing
I understand how to limit/prevent threats posed and remove vulnerabilities through use of Anti-malware software
1.4.2 Identifying and I understand how to limit/prevent threats posed and remove vulnerabilities through use of Firewalls
preventing vulnerabilities
I understand how to limit/prevent threats posed and remove vulnerabilities through use of User access levels
I understand how to limit/prevent threats posed and remove vulnerabilities through use of Passwords
I understand how to limit/prevent threats posed and remove vulnerabilities through use of Encryption
I understand how to limit/prevent threats posed and remove vulnerabilities through use of Physical security
o Physical Security
I can explain how the operating system performs memory management, e.g. the transfer of data between memory, and how this allows for multitasking
1.5.1 Operating systems
I understand that data is transferred between devices and the processor, and that this process needs to be managed
I can explain how peripherals are managed and the need for device drivers
I can explain user management functions, e.g. allocation of an account, access rights, security, etc.
I can explain file management, and the key features, e.g. naming, allocating to folders, moving files, saving, etc.
I understand that computers often come with utility software, and how this performs housekeeping tasks
I can discuss, using a variety of digital technology examples, ethical issues and the impact of technology on wider society
I can discuss, using a variety of digital technology examples, privacy issues and the impact of technology on wider society
I can discuss, using a variety of digital technology examples, cultural issues and the impact of technology on wider society
I can discuss, using a variety of digital technology examples, environmental issues and the impact of technology on wider society
I can discuss, using a variety of digital technology examples, legal issues and the impact of technology on wider society
I can explain the purpose of The Data Protection Act 2018 and the specific actions it allows or prohibits
I can explain the purpose of the Computer Misuse Act 1998 and the specific actions it allows or prohibits
I can explain the purpose of the Copyright Designs and Patents Act 1988 and the specific actions it allows or prohibits
I can explain the need to license software and the purpose of a software license