Computer Science KO
Computer Science KO
Mesh: Where some or all of the Layer 3: Control the flow of data
workstations or other devices are Transport TCP
connected directly to each of other. Most
Direct data packets between networks
are usually connected to the node that Layer 2: Network IP
they exchange the most data with.
Layer 1: Data Sending data over a physical network
Link Ethernet
PROTOCOLS
Network protocols are a set of rules or conventions which PACKET SWITCHING
control the communication between devices on a network Data is split into packets and numbered in order.
Every device has a MAC address so that it can be identified Each packet is sent by the current fastest route
EXAM QUESTIONS
1. Explain why protocols are used
2. Describe how packet switching works
3. Evaluate the benefits and drawbacks of a mesh
network.
4. Draw topologies for bus, ring and star networks.
5. Explain the difference between HTTP and HTTPS
6. Explain the difference between POP3 and IMAP
1.6 SYSTEM SECURITY
TYPES OF ATTACK NETWORK SECURITY KEY TERMS
Malware: malicious software intended to cause harm.
Attack How it works How to prevent it Penetration Testing: Organisations employ
Passive Network traffic is Encryption so that professionals to try and hack their network so that
monitored and then data intercepted data they can find areas of weakness.
is intercepted cannot be understood User Access Levels: Different users have different
Active Someone deliberately A firewall and levels of access to programs, websites and data.
attacks a network with antivirus software Encryption: the process of encoding data in such a
malware (eg: a virus) way that only authorized parties can access it and
Insider Someone with network User access levels to those who are not authorized cannot. It can only be
access abuses this to control how much data decrypted with a key.
steal information people can access. Network Forensics: Data packets are captured as they
Brute Force Trial an error until a Making passwords enter the network and analysed to find out the cause
password is attacked difficult to guess. of a network attack.
Locking accounts after
failed attempts. Virus - attach themselves to files and
lware
Denial of The network is flooded This attack is hard to copy themselves when the user copies
Service with useless data so it prevent but a firewall or opens a file.
EXAM QUESTIONS
1. Describe what is meant by “Malware”
2. Describe how a brute force attack works and how to
prevent it.
F 3. Explain how to keep a network secure.
4. Evaluate the benefits and drawbacks of a business
using penetration testing
Operating Systems: manages the Defragmentation: As files on HDDs are deleted gaps form and new files
hardware and applications, provides are saved in the gaps and become fragmented. Defragmentation software
interfaces. joins fragmented files back together. Disk reads & writes go quicker.
Device Drivers: communicate with the Back Up Utilities: Schedules and manages back-ups.
peripherals and internal hardware. Full back ups = all data is backed up.
Incremental = only files since the last back up are copied.
User Interface: allows the user to
interact with the device. This can Compression: reduces the size of large files so that they take up less
be a Graphical User Interface (GUI) space. Files then need to be extracted before they are used.
which are visual and easy for
someone to use or a command line Encryption: scrambles the data to protect it so that if someone else
interface where the user needs to gets hold of it they cannot access it.
Open Source and Proprietary Software
Open Source Proprietary
Allows users access to the code to Usually has to be paid for.
edit/change themselves. Only the compiled code is
Usually free to download. released so it cannot be edited.
Frequently programs do 1 task well May be bigger, with more features
Often online support communities. Can give good customer support.
EXAM QUESTIONS
1. Evaluate the benefits and drawbacks of releasing a piece of software
as open source rather than proprietary.
2. Explain three functions of the operating system in a computer
3. Evaluate the difference between doing an incremental back up and a
1.8 ETHICAL, LEGAL, CULTURAL & ENVIRONMENTAL CONCERNS
full back up.
Ethical Legal
Ethics is about what is considered right and wrong by Data Protection Act: controls how personal data is
society. used. e.g. it has to be accurate and up to date, kept
If a company does not behave in an ethical way it secure, should not be kept longer than needed.
might make their customers lose trust in them. Freedom of information Act: gives the public the right
Issues such as cyberbullying, trolling and the use of to see information about public organisations.
social media can raise ethical issues. Computer Misuse Act: makes it illegal to hack a
Privacy: Users trust companies to keep their data network or create a virus.
private so companies need to take care of it Copyright, Designs & Patents Act: protects things you
Censorship: is when a country or organisation have created from being used without permission
controls what people can access on the internet. Creative Commons Licence: lets people release their
Surveillance: surveillance is when someone is work to be used and shared legally and sometimes
monitored using technology. modified.
Stakeholders:
2.1 ALGORITHMS
COMPUTATIONAL THINKING FLOWCHART PSEUDOCODE
IF the Decision = TRUE
Focussing on just the important details THEN:
Abstraction
Abstraction
Focussing on just the important details
of a problem
of a problem Perform Process 1
ELSE
Breaking a problem down into smaller Perform Process 2
Decomposition parts
Breaking
so athat
problem down
it is into to
easier smaller
solve
Decomposition parts so that it is easier to solve ENDIF
These condition controlled loops would IF/ELSE AND SWITCH/CASE FOR SELECTION
check if a password’s correct:
Selection can be shown using IF/ELSE or SWITCH/CASE
while answer != “letmein123” IF ELSE SWITCH/CASE
answer=input(“Enter password”) if choice == “a” then switch entry:
endwhile print(“You chose A”) case “A”:
elseif choice==“b” then print(“You chose A”)
print(“You chose B”) case “B”:
do else print(“You chose B”)
answer=input(“Enter password”) print(“Unrecognised choice”) default:
until answer==“letmein123” print(“Unrecognised choice”)
2.2 PROGRAMMING TECHNIQUES CONTINUED
SUB PROGRAMS RECORDS
Procedures are a set of instructions stored under a name so that you
Records are a data structure used to store
can call the procedure to run the whole set of instructions.
a collection of data. They can store
A function is a sub program that returns a value to the program.
information of different data types.
Parameters are variables passed into a function or procedure. An
Field = each item in a record is a field.
Argument is the name given to the values passed as parameters.
Each field has a name and data type.
A procedure with parameters A procedure without parameters
procedure intro (name) procedure intro () A record can be created like this:
print(“Hello ” + name) print(“Hello”)
print(“Welcome to the game”) print(“Welcome to the game”) record students
endprocedure endprocedure int student_number
A function with parameters A function without parameters string student_name
function double(number) function getTime() bool passed_test
return number*3 return time from hardware endrecord
endfunction endfunction
Data can be assigned using variables:
Assemblers – turn assembly language into machine code Editors – the area which the code is written in.
Includes line numbers and colour coding for different
Compilers – Translate all of the code in one go to create features of the code (variables, comments etc)
an executable file. A compiler can take a long time but
the final code runs quickly. Compilers can give a list of Run Time Environment – Lets the programmer run the code
errors for the entire program if it can’t compile. quickly to test it for errors
Interpreters – Translates the code one instruction at a Error Diagnostics – includes diagnostic tools to help
time as the program is running. This means the program find and solve errors
will run more slowly. No executable file is created so
the code will need to be translated every time it runs. A Translator – to translate the code into machine code
The interpreter will stop after each error which is
helpful when debugging. Breakpoints – Stop the program on certain lines so that
information up to that point can be gathered.
2.6 DATA REPRESENTATION
DENARY BINARY ADDITION
Denary is the decimal number system that we are used to. It
1 0 0 1 0 1 0 1 This binary addition
uses the numbers 0-9 and the column headings go up in powers
of 10. + 1 1 0 1 1 0 1 1 gives an overflow error
1 0 1 1 1 0 0 0 0 as the total does not fit
100 (Hundreds) 10 (Tens) 1 (Units) in 8 bits (a byte).
2 3 8 1 1 1 1 1 1
2 lots of 100 3 lots of 10 8 lots of 1
BINARY SHIFT
BINARY
A binary shift to the left multiplies the number by
Binary uses the numbers 0 and 2. The column headings go up in 2. A binary shift to the right divides it by 2.
power of 2: Below is an 8 bit binary number which has been
128 64 32 16 8 4 2 1 shifted 2 places to the right.
Original number 1 1 0 0 1 1 0 1
0 1 0 0 0 1 1 1
Shifted number 0 0 1 1 0 0 1 1
64 + 4 + 2 + 1 = 71
CHARACTERS
HEXADECIMAL
Character sets = the characters and the numbers that
Hexadecimal uses 0- F (A=10, B=11, C=12, D=13, E=14, F=15).
represent them.
The headings go up in powers of 16.
16 1 ASCII = Each character is represented by a 7 bit
3 D number (often with a 0 in front to make a byte).
3 lots of 16 D (13) lots of 1
Extended ASCII = Each character is represented by an
To convert a binary number to Hexadecimal, split into 2: 8 bit binary number. This gives 256 different
128 64 32 16 possibilities.
1 1 0 0 3* 16 = 48
D (13) * 1 = 13 Unicode = Each letter is represented by a 16-bit or
48+13=61 32-bit binary number. This gives at least twice as
8 4 2 1
many character options as ASCII and allows the
1 1 0 0 character set to represent characters and symbols
= C = 7 from all languages.
2.6 DATA REPRESENTATION CONTINUED
IMAGES SOUND
Bitmap Images are made up of pixels (Picture Elements/dots) When sound is recorded it is an analogue signal
The colour of each pixel is represented by a binary number (waves). It has to be converted to a digital signal so
If an image uses 1 bit to represent each colour then it will that it can be stored by a computer. This is done by
only have 2 colours: sampling