Computer Science Mini Test Review - IGCSE
Computer Science Mini Test Review - IGCSE
Computer Systems
What is a computer system?
Computer systems are made of 4 key components
- Fire sprinkler
- Automatic doors
- Elevator
- Fuel gauge
- Security camera
- Thermometer
- Traffic Lights
- Washing Machine
- Fuel Gauge
Storage Devices: Hard drives (HDD) and Solid-State Drives (SSD) store data permanently.
Input Devices: Devices like keyboards, mouse, and scanners are used to input data into a
computer.
Output Devices: Devices like monitors, printers, and speakers are used to output data from a
computer.
The CPU
→CONTAINS A CORE OR CORES
- The instructions usually consist of receiving data, performing calculations, and returning
the results.
Define ALU
- Arithmetic Logic Unit
- A component of the CPU that performs arithmetic and logic calculations.
Define registers
- The section of high-speed memory within the CPU that stores data to be processed.
- storage space for units of memory that are used to transfer data for immediate use by
the CPU (Central Processing Unit) for data processing.
Define core
- A core is an individual processing unit within a CPU
Define buses
- The wires through which data travels from one part of a computer to another on the
motherboard.
- There are 3 types of buses
Define clock(SUPERVISOR)
- The clock ensures that the various circuits inside a computer work together at the same
time
2. The address in the program counter is incremented (increased) by one. The program
counter now holds the address of the next instruction to be fetched.
3. The processor sends a signal along the address bus to the memory address held in the
MAR.
4. The instruction or data held in that memory address is sent along the data bus to the
memory data register (MDR).
5. The instruction or data held in the MDR is copied into the current instruction register
(CIR).
6. The instruction or data held in the CIR is decoded and then executed. The results of
processing are stored in the accumulator (ACC).
- The faster the clock speed, the faster the computer is able to run fetch-decode-execute
cycles.
- The larger the cache size, the less time a processor has to wait for instructions to be
fetched. This improves performance.
● number of cores→ A processing unit within a CPU. CPUs can have multiple cores.
- A CPU with more cores can process more instructions in a given time. Each core is
capable of fetching, decoding, and executing its own instructions. (INSIDE CPU)
Fetch:
Decode:
- Once the instruction is fetched, the CPU figures out ("decodes") what it means and what needs to
be done.
- The CPU breaks it down into parts so it knows how to act on it.
Execute:
VOLATILE→a computer storage that temporarily holds data being used or processed.
NON VOLATILE→ computer storage that FOREVER holds data being used or processed.
Primary Memory
- RAM: Random access memory, Loses its data when the computer is turned off. (Volatile)
- ROM: Read-only memory, the data stored in ROM stays intact even when the computer
is turned off. (Non-volatile)
Secondary Storage
Permanent storage: Data remains even when the computer is off.
Types:
- HDD (Hard Disk Drive): Uses spinning disks to read and write data. Slower but cheaper.
- SSD (Solid-State Drive): Uses flash memory, faster than HDD but more expensive.
Magnetic Storage
- stores data in form of tiny magnetized dots
- Lots of moving parts, very cheap
- Very large storage capacity → good for desktop PC’s and servers
Optical Storage
- any storage type in which data is written and read with a laser.
- Uses laser beams and light to store data into the surface of disks
Solid State
- Has no mechanical moving parts
- Very durables
- Very good for mobile devices
Flash Memory
- is a type of nonvolatile memory that erases data in units called blocks and rewrites data
at the byte level
- e.g USB pen drive, Solid State Drive
Offline storage
- Any storage device which is kept in a data-library. Cannot be accessed from any
computer until it has been mounted on that computer
- DVD / CD
- Blu-ray disk
- USB / flash memory
- Removable hard drive
Computer Architecture
Definition: The design and structure of a computer's components and how they interact.
- The number of cores
- The Cache size
- The clock speed (hertz)
- The processor type (CISC or RISC)
Difference between RISC and CISC.
RISC
- Simple instructions
- A small number of instructions
- Instruction takes 1 cycle
- The software handles the processing load
- Heavy use of RAM
CISC
- Complex instructions
- Many instructions
- Instructions can take multiple cycles
- Hardware circuits handle the processing load
- Efficient use of RAM
Cache
Definition: Cache is a small, high-speed memory located close to or inside the CPU. It stores
frequently used data and instructions.
Purpose: To speed up the processing by providing the CPU with quicker access to data than it
would get from RAM.
Types of Cache:
- L1 Cache: The smallest and fastest cache, located inside the CPU. Stores critical data
for the CPU.
- L2 Cache: Slightly larger and slower than L1, still within or close to the CPU.
- L3 Cache: Larger but slower than L1 and L2, shared among multiple cores in multi-core
processors.
Importance: By reducing the time it takes for the CPU to access data, the cache improves
overall performance.
Cores
Definition: A core is an individual processing unit within a CPU. Each core can handle its own
tasks and run instructions independently.
Single-Core vs Multi-Core:
- Single-Core: Early processors had only one core, meaning they could process one
instruction at a time.
- Multi-Core: Modern processors have multiple cores (e.g., dual-core, quad-core, etc.),
allowing them to handle several tasks simultaneously (multitasking).
Benefits of Multi-Core:
- Improved Performance: More cores allow a computer to process more instructions at the
same time, making it faster and more efficient, especially with multi-threaded programs.
- Better Multitasking: Multiple cores allow the computer to run several applications or
processes smoothly without slowing down.
- Example :
Hexadecimal
- Base-16 system uses digits 0-9 and letters A - F (for values 10-15)
- Commonly used to represent large binary numbers in a compact form.
- Example:
Image Compression:
- JPEG: A lossy compression format commonly used for photographs. It reduces file size
by removing non-essential data.
- PNG: A lossless format often used for images with fewer colors or transparency.
→ White hat hacker – ‘ethical’ hackers looking to find potential security issues, directly
employed by a business to find flaws
Black hat hacker – illegal hacking for personal gain / criminal intent
Grey Hat Hacker – hackers that search for security flaws and then contact companies for
payment to repair it
- A brute force attack is a hacking method that uses trial and error to crack passwords,
login credentials, and encryption keys.
- A dictionary attack is a method of breaking into a password-protected computer,
network or other IT resource by systematically entering every word in a dictionary, or
word list, as a password.
- A virus is a standalone piece of malware that doesn’t need a host program
- Trojan Horse scams are self-replicating piece of malware that look like a harmless file
- Phishing scams are when emails, text messages or other notifications are received that
look like they are from a genuine site e.g. a message from Barclays bank saying to click
on the link to update your password
- Pharming is a type of malware that redirects you to a bogus website when you type in
the correct web address. This fake site then requests you to type in sensitive data such
as passwords
- A Denial of Service attack uses a collection of hacked computers (called a botnet) to
flood a site with server requests, preventing normal users from being able to access it
Online Security - Prevention Methods
▪ Regular anti virus updates
▪ Regular software updates
▪ Firewalls (barrier between your network & external internet)
▪ Proxy servers (an intermediary between you and the internet)
▪ VPNs (Virtual Private Network encrypts personal data, masks your IP address)
▪ DNS (DNS-layer protection stops malware hackers may try to send)
▪ Data masking (confidential online data replaced with fictitious data)
▪ Encryption
What is encryption?
- Encryption is used to protect data in case it has been hacked. It won’t prevent the
data from being stolen but it makes it meaningless to the hackers, unless they
have the key to decrypt it
MAC Address (Media Access Control Address): A unique physical address assigned to
a network interface card.
URL (Uniform Resource Locator): A unique address used to identify online resources,
such as web pages.
DNS (Domain Name Server): A server that translates domain names into IP addresses.
Packet Switching: A method of dividing data into packets and transmitting them over
multiple paths.
TTL (Time To Live): The maximum number of hops a packet can travel before it is
deleted from the network.
Hop: The number of routers a packet passes through as it travels from its source to its
destination.
WAN (Wide Area Network): A network that connects multiple networks over a large
area.
LAN (Local Area Network): A network that connects computers and devices within a
limited area.
PAN (Personal Area Network): A small network that connects devices used by
individuals.
NIC (Network Interface Card): Hardware used to connect a computer to a network.
Modem: A device that converts digital signals to analog signals and vice versa.
Client-Server Model: A network model in which clients request services from a server
and the server provides those services.
VPN (Virtual Private Network): An encrypted connection used to securely transmit data
over a public network.
Proxy Server: A server that acts as an intermediary between a client and the Internet.
Firewall: A security system that blocks unauthorized access from outside to protect the
network.
Net neutrality: The principle that all Internet traffic should be treated equally.