Вы находитесь на странице: 1из 17

Computer Science

IGCSE

Revision

Computer Science

IGCSE

Revision

Computer Science Revision


Binary Systems and Hexadecimal:
Name of Memory Size
1 kilobyte (1 KB)
1 megabyte (1 MB)
1 gigabyte (1 GB)
1 terabyte (1 TB)
1 petabyte (1 PB)

Number of Bits
210
220
230
240
250

Equivalent Denary Value


1 024 bytes
1 048 576 bytes
1 073 741 824 bytes
1 099 577 627 776 bytes
1 125 899 906 842 624 bytes

Turning Binary to Hexadecimal:


1. Split the binary into 4 bits, for E.G. (010001011010) (0100 0101 1010)
Binary Value
0000
0001
0010
0011
0100
0101
0110
0111
1000
1001
1010
1011
1100
1101
1110
1111
2.

Hexadecimal Value
0
1
2
3
4
5
6
7
8
9
A
B
C
D
E
F

Denary Value
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15

Computer Science

IGCSE

Revision

The Uses of Hexadecimal:

Memory Dumps
o Because using hexadecimal makes it much easier to work with, a developer
can easily look at hexadecimal code and find the errors.
o It is a powerful fault-tracing tool.
Hypertext Mark-up Language (HTML)
o HTML is used when writing and developing web pages.
It isnt a programming language; it is a mark-up language.
A mark-up language is used in the processing, definition and
presentation of text E.G. (specifying the colour of text)
o Hexadecimal is used in HTML when you need to determine a colour.
Media Access Control (MAC)
o A MAC address uniquely identifies a device on the internet.
It is usually made of 48bits.
It refers to the Network Interface Card (NIC)
o Types of MAC Address:
Universally Administered MAC Address (UAA)
Most common type of MAC address set by the manufacturer
at the factory.
Locally Administered MAC Address (LAA)
Web addresses

Computer Science
o

IGCSE

Revision

Each character on the keyboard is known as an ASCII (American Standard

Code for Information Interchange).


It is represented by a hexadecimal value.
o % signs are used to denote that hexadecimal is being used.
Assembly code and machine code

Memory and Storage


Memory can be split into three different categories:

Primary memory
Secondary storage
Off-line storage
Primary Memory
RAMROM

Secondary storage
HDDSSD

Off-line storage
DVD/CDDVD-RAM
Blu-ray disk
USB memory stick/ flash memo
Removable hard drive

Computer Science

IGCSE

Revision

Primary memory
o Random Access Memory(RAM)
It is volatile/temporary memory
Used to store:
Data
Files
Part of an operating system that is currently being used.
It can be written and read and the memory in it can be changed.
In general, the larger the RAM the faster the computer.
As the RAM starts to get full the computer starts to slow
down because the processor has to continually access the hard

drive to overwrite old data on RAM with new data.


Buffers use RAM, this is because they need to be a fast memory and
the data is only held temporarily.
There are two types of RAM technology:
Dynamic ram (DRAM)
o Consists of a number of transistors and capacitors
Capacitor holds bits of information (1 or 0)
Transistor acts as a switch, allows the chip
control circuitry to read the capacitor or change
o

the capacitors value.


The ram needs to be constantly refreshed
If it wasnt refreshed then the capacitors
charge would leak away very quickly leaving all

the capacitors value at 0.


o Advantages compared to an SRAM:
Much less expensive.
Consume less power.
Have a higher storage capacity.
Static ram (SRAM)
o Makes use of flip flops, this holds each bit of
o

memory.
Advantages compared to a DRAM:
Much more faster (access time is 25

o
5

Read Only Memory (ROM)

nanoseconds than 60 nanoseconds)


Memory cache is the high speed portion of the
memory.

Computer Science

IGCSE

Revision

Non-volatile memory/ permanent memory.


Used to store the start-up instructions when the computer is first

switched on (BIOS)
Data on the chip can only be read not changed.
Secondary storage
o Hard Disk Drive (HDD)
Most common way of storing data on a computer.
Data stored in digital format on the magnetic surfaces of the

platters.
The hard disk has many platters which spin 7000 times a second.
There are a number of read-write heads which can access all the

surfaces in the disk drive.


A sector on a given track will have a fixed number of bytes.
Hard disk drives have a very slow data access compared to something

like RAM.
Many applications require the read-write heads to constantly seek for
the correct blocks of data; this requires large number of head
movements.
The effects of latency become significant.
o Latency is the time it takes for a specific block of data
on a data track to rotate around to the read-write
o

head.
Latency can be seen when the computer responds with

please wait or not responding.


Solid State Drives (SSD)
SSDs remove the problem of latency by not having any moving parts,

and any data retrieved is done at the same rate.


SSDs also dont rely on magnetic properties.
The most commonly used type of SSD stores data by controlling
movement of electrons within the NAND chip.
The data is stored as 0s and 1s in millions of tiny transistors

within the chip.


o This produces a non-volatile rewritable memory.
Advantage of using SSD instead of an HDD:
More reliable (no moving parts)
Lighter (more efficient when making a laptop)
Dont need time to get up to speed.
Very thin.
Data access is considerably faster.

Computer Science

IGCSE

Revision

Off-line Storage

Disk type

Laser colour

Wavelength of laser

Disk construction

light

Track pitch
(Distance between
tracks)

CD

Red

780nm

Single 1.2mm

1.6m

polycarbonate layer

DVD

Red

650nm

Two 0.6mm

0.74m

polycarbonate

Blu-ray

blue

405nm

layers
Single 1.1mm

0.30m

polycarbonate layer

All optical storage media are used as back-up systems (photos, music and multimedia files).
Cds and DVDs can also be used to transfer files from one computer to another. The most
common use for DVDs and Blu-ray disks are to supply movies and games, CDs arent used
as they lack in memory capacity.
o

CD/DVD disks
These are optical storage devices
A red laser light is used to read and write data on the surface of the

disk.
Both CDs and DVDs use a thin layer of metal alloy or light sensitive

organic dye to store the data.


Both the disks use a single, spiral track which runs from the centre

of the disk to the edge.


The data is stored in the pits and bumps on the spiral track.
DVDs are slightly different to CDs:
DVDs have dual-layering which increases the storage capacity

of the disk.
Pit sizes are smaller on the DVDs.

DVD-RAM
Have a number of concentric tracks.

Computer Science

IGCSE

Revision

Having concentric tracks means that you can simultaneously read and

write.
It allows for numerous read and write operations and has a great

longevity which makes it good for archiving.


Blu-ray disk
Optical storage medium.
Differences between DVD and Blu-ray disk:
A blue laser is used instead of a red laser; a blue laser has a
shorter wave length.
o With a shorter wave length it means the pits and bumps

will be smaller, so Blu-ray disks are able to store more.


Blu-ray disks use a single polycarbonate disk instead of a
sandwich of two disks.
o When using sandwich layers it can cause birefringence
(light refracted into two separate beams causing read
errors). Since Blu-ray disks dont use this type of disk

they avoid birefringence.


Blu-ray disks come automatically with secure encryption
system which helps to prevent privacy and copyright

infringement.
USB flash memories
Uses solid-state technology.
Connects to the computer through the USB port.
Advantages:
Very small and light, makes them suitable for transferring
files between computers.
Can be used for small backup for files such as music
Removable hard disk drives
Are essential HDD.
Can be connected through the USB port.
They can be used as a back-up device or as another way to transfer

files.
Estimating the size of a file
o Each character equals 1 byte.
o The size of a picture is basically the area of it in pixels.

Communication and internet technologies


8

Computer Science

IGCSE

Revision

Data transmission
Data transmission can be both of short and long distance. There are three factors that
are taken to consideration when transmitting data:

Direction of the transmission.


Method of transmission.
Method of synchronisation.

Simplex, half-duplex and full-duplex

Simplex data transmission is in one direction only (i.e. from sender to receiver), e.g.

computer sending a file to be printed from a printer.


Half-duplex transmission is in both directions however not at the same time (i.e.
data can be sent from A to B or from B to A along the same line, but not at the
same time). E.g. a phone conversation between two people, usually only one person

speaks at a time.
Full-duplex transmission is in both directions simultaneously (i.e. data can be sent
from A to B and data can be sent from B to A on the same line at the same time)
e.g. Broad band connection on a phone line.

Serial and parallel data transmission

Serial data transmission is when data is sent one bit at a time over a single wire or
channel.
1 bit at a time down the wire

Sender

o
o
o

Receiver

This method works well over long distances.


However data is transferred slower than parallel data transmission.
E.G. sending data from a computer to a modem for transmission over a
Telephone line.

Parallel data transmission is when several bits of data are sent down wires or
channels at the same time
o One wire is used to transmit each bit.

Sender

Receiver

9
8 bits at a time sent down 8 wires/channels

Computer Science

IGCSE

Revision

It doesnt work well with long distance data transfers as the bits can

o
o
o

become unsynchronised.
Its a faster method compared to serial data transmissions.
E.G. sending data to a printer from a computer using a ribbon connector.
Parallel data transmission is mainly used in the internal electronics of the

computer system.
Integrated circuits use parallel data transmission due to the need for high
speed data transfers, using 8bit, 16 bit, 32 bit and 64 bit buses allow for
much faster data transfers.

Asynchronous and synchronous data transmission


Asynchronous data transmission refers to data being transmitted in an agreed bit
pattern
o The receiver of the data knows when the data starts and ends.
It prevents the data from being mixed up, without the controlled bits
it would be impossible to separate groups of data as it arrives.
Synchronous data transmission is a continuous stream of data.
o The data is accompanied by timing signals generated by an internal clock.
It ensures that the sender and receiver are synchronised with each
o

other.
The receiver counts how many bits were sent and then reassembles them
into bytes of data.
The timings must be very accurate as there is no control bits sent in

this type of data transmission.


It is faster than asynchronous data transmission and is used when there is
an important issue.

USB (Universal Serial Bus)

USB is an asynchronous serial data transmission method.


It is one of the most standard ways of transferring small files from one computer
to another.
USB cables consists of:
o Four-wire shielded cable
Two wires are used for power the other two are the earth
Two wires are used in the data transmission.
10

Computer Science

Revision

The computer automatically detects a USB.


o This is due to a change in the voltage level on the data signal wires in the
o

IGCSE

cable.
When it gets recognised the appropriate device driver is loaded up so the

computer and USB can communicate effectively.


If a new device is to be detected the computer will look for the device driver.

Benefits

Drawbacks

The devices that are plugged in are

automatically detected, and then the drivers


are also automatically downloaded.
The connector fits only one way, therefore it

Maximum cable length is only 5 metres.

prevents incorrect connections made.


It is industry standard so it has considerable

support to its users.


Several data transmission rates are

Present transmission rate is limited to less

supported.

than 500 megabits per second.

Newer USB standards are backward

Older USB standard may not be supported in

compatible with older USB standards.

the near future.

Error-checking methods

When this type of transmission is used there is a risk that the data will be
corrupted or changed.
o This problem can when transmitting over long and short distances.
A computer will make no sense of small mistakes.
o This is why error checking is important.
Parity checking
o Method used to check whether data has been changed or corrupted during
o

the transmission.
A byte of data is allocated a parity bit, this allocation happens before
transmission happens

11

Computer Science

Revision

o Systems of which use an even parity have an even number of 1-bits.


o Systems of which use an odd parity have an odd number of 1-bits.
Automatic Repeat Request (ARQ)
o It is another method to check whether the data has been sent correctly.
o It uses an acknowledgement and timeout.
Acknowledgement message sent by the receiver indicating that data

IGCSE

is sent properly.
Timeout time allowed to elapse before and acknowledgement.
If acknowledgement isnt sent back to the sender before the timeout

occurs, then the message is automatically sent.


Checksum
o The data is sent in blocks and an additional value for the checksum is sent
at the end of the block of data.
Divide the sum, X, of the bytes by 256
Round answer down to the nearest whole number, Y. Z = Y * 256

Calculate the difference X-Y


This value found is the checksum.

Echo check
o The data is sent back to the sender and the sender will check if there are
o

will do a side by side comparison to check if the data was correctly sent.
However the downside is that if the data comes back wrong the sender
doesnt know if the data was incorrectly sent or received.

Internet technologies

Computers that are connected to the internet can communicate with each other
providing a number of rules and protocols are adhered to.
Internet Service Provider (ISP)
o An ISP is a company that provides people with an internet connection.
Internet Protocol (IP)
o Each device has a unique IP address.
o 32-bit number e.g.: 109.108.158.1
o A home computer is given an IP depending on what the ISP assigned.
o An IP address can be used instead of a URL.
12

Computer Science
o

Revision

Difference between IP address and MAC address:


A MAC address identifies a device connected to the internet

uniquely.
An IP address gives the location of a device on the internet.
Hypertext transfer protocol (http)
o Set of rules that must be obeyed when transferring files across the
internet.
o When a form of security is involved the http becomes an https.
The s stands for secure.
Web browsers
o Allows a user to display a webpage on the users screen.
o Web browsers translate the HTML code from websites and show the results

o
o
o

of the translations.
It can be in the form of video, images or sound.
Web browsers share the following features:
A HOME page
Ability to store users favourite websites/pages
Keeps a history of the websites visited by the user
Give the ability to go backward and forward to websites opened.
Using URL users can enter the sites they want to visit.
http://www.hoddereducation.co.uk/igcse_computer_science
protocol, web servers name and file name

Hardware and software

IGCSE

Logic gates and logic circuits


o

13

Computer Science

IGCSE

Revision

Operating

o
o
o
o

14

Software running in the background of a computer system.


It manages basic functions.
Without an operating system the computer isnt user friendly.
Features of an operating system:
Human Computer Interface (HCI)
Multitasking
Multiprogramming
Batch Processing
Error Handling
Loading and running of applications/software
Management of user accounts
File utilities (e.g. copy, save, sort, delete)
Processor management
Memory management

systems

Computer Science

IGCSE

Revision

Real-time processing
Interrupt handling routines
Security (manages log on, password)
Input and output control
Most Common operating system is windows, others include:
Linux
Android
UNIX
DOS
Windows is an example if of a single-user multitasking operating system.
This means that only one user can use it at a time but can have a
number of applications open at any given time.
When a computer is first powered up all the initiating programs are loaded
from the ROM chip.
The programs are there to run checking procedures, it makes sure
that the hardware, processor, internal memory and bio (basic input-

output system) are all functioning correctly.


Interrupts and buffers
o An interrupt is a signal that causes the processor to temporarily stop what
its doing and service the interrupt. Interrupts can occur when:
a disk drive is ready to receive more data
an error has occurred, such as a paper jam in a printer
the user has pressed a key to interrupt the current process e.g.

<CTRL><ALT><BREAK> keys pressed simultaneously.


A software error couldve occurred.
Once an interrupt signal is received the processor either carries on doing
what it was doing or stops to service the device/program that generated the

interrupt.
Buffers are used in computers as a temporary memory area.
Buffers are essential as processors are much faster than hardware

devices.
If there werent buffers most of the processors time would be spent

idling waiting for the hardware devices to complete their operations.


Buffers are used for e.g. to load up videos.
Computer Architecture
Earlier computers were fed data whilst they were actually running.
They couldnt store programs consequently they needed human
intervention to run.

15

Computer Science

IGCSE

Revision

In 1945 John von Neumann developed the idea of a stored program


computer, often referred to as the von Neumann architecture
concept.

Processor
(includes
the control
unit)

Memory
unit

Input and
output

Address bus

I/O device

Data bus
I/O device

Control bus
Type of bus
Address bus

Description of bus
Carries signals associated

Data/signal direction
Unidirectional

with the address between


the processor and the
Data bus

memory.
Sends data between the

Bi-directional

processor, the memory unit


and the input/output
Control bus

16

devices.
Carries signals relating to

Unidirectional and bi-

the control and coordination

directional due to the

of all activities within the

internal connections within

computer.

the computer architecture.

Computer Science

IGCSE

Revision

An Address is the location where data can be found in a computer memory.


o Each address in the memory is unique.
Memory unit
o A computer memory unit is made out of many partitions.
Each partition contains an address and its contents
The address will uniquely identify every location in the memory and
o

the contents will be the binary value stored in each location.


Examples of registers:
MAR memory address register
MDR memory data register
ALU arithmetic and logic unit
PC program counter
CIR current instruction register
The processor contains arithmetic and logic unit (ALU).
The ALU allows arithmetic (+, - etc.) and logic (AND, OR, NOT etc.)
operations to be carried out.

17

Вам также может понравиться