Top Banner
The Purpose and Function of the Central Processing Unit The Purpose and Function of the Central Processing Unit Systems Architecture Memory Memory Name three output devices. What does the control unit do? What is clock speed? What does BIOS stand for? What are three advantages of using flash memory? 1 2 3 4 5 The Purpose and Function of the Central Processing Unit The Purpose and Function of the Central Processing Unit Systems Architecture Memory Memory 1 2 3 4 5 Output devices include monitors or displays, speakers, devices that use mechanical movement, printers and lights. The control unit controls the flow of data both in and around the central processing unit. Clock speed is the rate (in gigahertz per second) at which instructions are processed by the CPU. BIOS stands for basic input/ output system. Advantages of flash memory include: it is light, has no moving parts, has fast data access, and is durable, programmable and erasable. OCR GCSE • Computer Science OCR GCSE • Computer Science OCR GCSE • Computer Science OCR GCSE • Computer Science OCR GCSE • Computer Science
8

The Purpose and Function of the Central Processing Unit images... · What are three advantages of ... star, mesh, bus and ring. HTTPS encrypts communication between ... Java, JavaScript,

Mar 28, 2018

Download

Documents

ngothien
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: The Purpose and Function of the Central Processing Unit images... · What are three advantages of ... star, mesh, bus and ring. HTTPS encrypts communication between ... Java, JavaScript,

The

Purp

ose

and

Func

tion

of

the

Cent

ral P

roce

ssin

g U

nit

The

Purp

ose

and

Func

tion

of

the

Cent

ral P

roce

ssin

g U

nit

Syst

ems

Arc

hite

ctur

eM

emor

yM

emor

y

Name three output devices.

What does the control unit do?

What is clock speed?

What does BIOS stand for?

What are three advantages of

using flash memory?

1

2

3

4

5

The

Purp

ose

and

Func

tion

of

the

Cent

ral P

roce

ssin

g U

nit

The

Purp

ose

and

Func

tion

of

the

Cent

ral P

roce

ssin

g U

nit

Syst

ems

Arc

hite

ctur

eM

emor

yM

emor

y

1

2

3

4

5

Output devices include

monitors or displays, speakers,

devices that use mechanical

movement, printers and

lights.

The control unit controls the

flow of data both in and

around the central processing

unit.

Clock speed is the rate

(in gigahertz per second)

at which instructions are

processed by the CPU.

BIOS stands for basic input/

output system.

Advantages of flash memory

include: it is light, has no

moving parts, has fast

data access, and is durable,

programmable and erasable.

OCR GCSE • Computer Science

OCR GCSE • Computer Science

OCR GCSE • Computer Science

OCR GCSE • Computer Science

OCR GCSE • Computer Science

Page 2: The Purpose and Function of the Central Processing Unit images... · What are three advantages of ... star, mesh, bus and ring. HTTPS encrypts communication between ... Java, JavaScript,

Stor

age

Type

s, D

evic

es

and

Char

acte

rist

ics

Com

mon

Sys

tem

Thr

eats

Com

mon

Sys

tem

Thr

eats

Thre

at P

reve

ntio

nTh

reat

Pre

vent

ion

What is secondary storage?

What is ransomware?

What is phishing?

Why would a programmer

use penetration testing on a

system?

What is encryption?

6

7

8

9

10

Stor

age

Type

s, D

evic

es

and

Char

acte

rist

ics

Com

mon

Sys

tem

Thr

eats

Com

mon

Sys

tem

Thr

eats

Thre

at P

reve

ntio

nTh

reat

Pre

vent

ion

6

7

8

9

10

Secondary storage refers

to non-volatile devices and

media used to store programs,

documents and files.

Ransomware is malware

that locks a user out of their

system, and encrypts their

files, until a ransom is paid.

Phishing is impersonating an

organization using emails,

texts or phone calls in order

to persuade users to confirm

or divulge their personal

details.

Penetration testing is the

search for problems and

vulnerabilities in a system that

could be exploited by users

with criminal intentions.

Encryption is the conversion

of important data, using a

public encryption key, into

a form that cannot be read

without a private key.

OCR GCSE • Computer Science

OCR GCSE • Computer Science

OCR GCSE • Computer Science

OCR GCSE • Computer Science

OCR GCSE • Computer Science

Page 3: The Purpose and Function of the Central Processing Unit images... · What are three advantages of ... star, mesh, bus and ring. HTTPS encrypts communication between ... Java, JavaScript,

Syst

em S

oftw

are

Syst

em S

oftw

are

Wir

ed a

nd W

irel

ess

Net

wor

ks 1

Wir

ed a

nd W

irel

ess

Net

wor

ks 2

Wir

ed a

nd W

irel

ess

Net

wor

ks 2

What does defragmentation

software do?

Give three current examples

of an operating system.

What is bandwidth measured

in?

How is a virtual network

created?

What does the Domain Name

Server do?

11

12

13

14

15

Syst

em S

oftw

are

Syst

em S

oftw

are

Wir

ed a

nd W

irel

ess

Net

wor

ks 1

Wir

ed a

nd W

irel

ess

Net

wor

ks 2

Wir

ed a

nd W

irel

ess

Net

wor

ks 2

11

12

13

14

15

Defragmentation software

analyses data and how it

is stored on a disk. It then

rearranges the data into a

more logical sequence for

faster access.

Examples of an operating

system include: Windows 10,

Unix, Chrome OS, macOS,

Linux, Ubuntu and MS-Dos.

Bandwidth is measured in bits

per second.

A virtual network is created

using software instead of

physical devices, often within

a larger network.

The Domain Name Server

links the Internet Protocol

address of a computer on

a network to a text-based

website address that is easier

to remember.

OCR GCSE • Computer Science

OCR GCSE • Computer Science

OCR GCSE • Computer Science

OCR GCSE • Computer Science

OCR GCSE • Computer Science

Page 4: The Purpose and Function of the Central Processing Unit images... · What are three advantages of ... star, mesh, bus and ring. HTTPS encrypts communication between ... Java, JavaScript,

Net

wor

k To

polo

gies

Prot

ocol

s an

d La

yers

Ethi

cal a

nd L

egal

Co

ncer

nsCu

ltur

al a

nd

Envi

ronm

enta

l Con

cern

sCo

mpu

ter S

cien

ce

Legi

slat

ion

Name four types of network

topology.

What does HTTPS do?

What are cookies?

What is the digital divide?

Give three examples of open

source software.

16

17

18

19

20

Net

wor

k To

polo

gies

Prot

ocol

s an

d La

yers

Ethi

cal a

nd L

egal

Co

ncer

nsCu

ltur

al a

nd

Envi

ronm

enta

l Con

cern

sCo

mpu

ter S

cien

ce

Legi

slat

ion

16

17

18

19

20

Four types of topology are

star, mesh, bus and ring.

HTTPS encrypts

communication between

the server and the client

to enable secure online

transactions.

Cookies are small files stored

on computers that contain

Internet browsing data and

can be accessed by web

servers.

The digital divide is the social

and economic gap between

those who have access to

computer technology and

those who do not.

Examples of open source

software include: Linux, GIMP,

Audacity, Apache and Open

Office.

OCR GCSE • Computer Science

OCR GCSE • Computer Science

OCR GCSE • Computer Science

OCR GCSE • Computer Science

OCR GCSE • Computer Science

Page 5: The Purpose and Function of the Central Processing Unit images... · What are three advantages of ... star, mesh, bus and ring. HTTPS encrypts communication between ... Java, JavaScript,

Alg

orit

hms

and

Flow

D

iagr

ams

Alg

orit

hms

and

Flow

D

iagr

ams

Pseu

doco

de 1

Pseu

doco

de 1

Pseu

doco

de 2

Name three common sorting

algorithms.

What are flow diagrams used

for?

Are there any fixed rules for

pseudocode?

Which common pseudocode

keyword is used to create a

loop?

What does the operator MOD

(modulus) do?

21

22

23

24

25

Alg

orit

hms

and

Flow

D

iagr

ams

Alg

orit

hms

and

Flow

D

iagr

ams

Pseu

doco

de 1

Pseu

doco

de 1

Pseu

doco

de 2

21

22

23

24

25

Three sorting algorithms are

bubble sort, merge sort and

insertion sort.

Flow diagrams are used to

visualize an algorithm and show

clearly the flow of information.

There are no fixed rules for

pseudocode. It must just

make sense. Exam boards will

normally provide a dictionary

of common terms they expect

you to know/use.

While is the pseudocode

keyword used to create a

loop.

MOD (modulus) returns the

remainder after a division.

OCR GCSE • Computer Science

OCR GCSE • Computer Science

OCR GCSE • Computer Science

OCR GCSE • Computer Science

OCR GCSE • Computer Science

Page 6: The Purpose and Function of the Central Processing Unit images... · What are three advantages of ... star, mesh, bus and ring. HTTPS encrypts communication between ... Java, JavaScript,

Com

puta

tion

al L

ogic

Com

puta

tion

al L

ogic

Prog

ram

min

g Te

chni

ques

1Pr

ogra

mm

ing

Tech

niqu

es 1

Prog

ram

min

g Te

chni

ques

2

What are truth tables?

What are the three

main operations that

are represented by logic

diagrams?

What is concatenation?

What is a string?

Why are databases useful?

26

27

28

29

30

Com

puta

tion

al L

ogic

Com

puta

tion

al L

ogic

Prog

ram

min

g Te

chni

ques

1Pr

ogra

mm

ing

Tech

niqu

es 1

Prog

ram

min

g Te

chni

ques

2

26

27

28

29

30

Truth tables are the

representation of potential

inputs and outputs (1s and 0s)

in a logic diagram.

The three main operations

represented by logic diagrams

are AND, OR and NOT.

Concatenation is the adding

together of two strings in a

program.

A string is a collection of

alphanumeric data characters

and symbols that is usually

enclosed in quotation marks.

Databases store large

amounts of data, which can be

categorized and structured so

it can be easily accessed.

OCR GCSE • Computer Science

OCR GCSE • Computer Science

OCR GCSE • Computer Science

OCR GCSE • Computer Science

OCR GCSE • Computer Science

Page 7: The Purpose and Function of the Central Processing Unit images... · What are three advantages of ... star, mesh, bus and ring. HTTPS encrypts communication between ... Java, JavaScript,

Prog

ram

min

g Te

chni

ques

3Pr

oduc

ing

Robu

st

Prog

ram

sTr

ansl

ator

s and

Fa

cilit

ator

s of L

angu

ages

Tran

slat

ors a

nd

Faci

litat

ors o

f Lan

guag

esU

nits

and

For

mat

s of

D

ata

31

32

33

34

35

Prog

ram

min

g Te

chni

ques

3Pr

oduc

ing

Robu

st

Prog

ram

sTr

ansl

ator

s and

Fa

cilit

ator

s of L

angu

ages

Tran

slat

ors a

nd

Faci

litat

ors o

f Lan

guag

esU

nits

and

For

mat

s of

D

ata

31

32

33

34

35

Sub-programs, or sub-

routines, save time and avoid

repetitive code.

Extreme (or boundary) data

is data at the limit of what

a program should be able to

handle.

High-level languages include:

Python, Java, JavaScript,

Visual Basic, C++, C Family of

languages, Ruby and BASIC.

A run-time environment

allows a program to be

run and tested within an

integrated development

environment (IDE).

8 bits are in a byte.

Describe two benefits of sub-

programs, or sub-routines.

What is extreme (or

boundary) data?

Give three examples of high-

level languages.

What does a run-time

environment allow?

How many bits are in a byte?

OCR GCSE • Computer Science

OCR GCSE • Computer Science

OCR GCSE • Computer Science

OCR GCSE • Computer Science

OCR GCSE • Computer Science

Page 8: The Purpose and Function of the Central Processing Unit images... · What are three advantages of ... star, mesh, bus and ring. HTTPS encrypts communication between ... Java, JavaScript,

Uni

ts a

nd F

orm

ats

of

Dat

aCo

nver

ting

Dat

a 1

Conv

erti

ng D

ata

2A

udio

/Vis

ual F

orm

ats

and

Com

pres

sion

Aud

io/V

isua

l For

mat

s an

d Co

mpr

essi

on

36

37

38

39

40

Uni

ts a

nd F

orm

ats

of

Dat

aCo

nver

ting

Dat

a 1

Conv

erti

ng D

ata

2A

udio

/Vis

ual F

orm

ats

and

Com

pres

sion

Aud

io/V

isua

l For

mat

s an

d Co

mpr

essi

on

36

37

38

39

40

Unicode was developed to set

worldwide common coding

standards and to represent all

known languages using 16-

and 32-bit binary codes.

Denary (also known as

decimal) is a base 10 number

system with 10 digits.

A check digit system is used to

detect errors in identification

numbers. The check digit is

normally the last digit on the

right.

Three file types that use

lossless compression include:

RAW, WAV, TIFF and BMP.

The bit rate is the number

of bits per second used to

sample an audio file.

Why was Unicode developed?

What is denary?

What is a check digit system

used for?

Name three file types that use

lossless compression.

What is a bit rate?

OCR GCSE • Computer Science

OCR GCSE • Computer Science

OCR GCSE • Computer Science

OCR GCSE • Computer Science

OCR GCSE • Computer Science