Page 1
The
Purp
ose
and
Func
tion
of
the
Cent
ral P
roce
ssin
g U
nit
The
Purp
ose
and
Func
tion
of
the
Cent
ral P
roce
ssin
g U
nit
Syst
ems
Arc
hite
ctur
eM
emor
yM
emor
y
Name three output devices.
What does the control unit do?
What is clock speed?
What does BIOS stand for?
What are three advantages of
using flash memory?
1
2
3
4
5
The
Purp
ose
and
Func
tion
of
the
Cent
ral P
roce
ssin
g U
nit
The
Purp
ose
and
Func
tion
of
the
Cent
ral P
roce
ssin
g U
nit
Syst
ems
Arc
hite
ctur
eM
emor
yM
emor
y
1
2
3
4
5
Output devices include
monitors or displays, speakers,
devices that use mechanical
movement, printers and
lights.
The control unit controls the
flow of data both in and
around the central processing
unit.
Clock speed is the rate
(in gigahertz per second)
at which instructions are
processed by the CPU.
BIOS stands for basic input/
output system.
Advantages of flash memory
include: it is light, has no
moving parts, has fast
data access, and is durable,
programmable and erasable.
OCR GCSE • Computer Science
OCR GCSE • Computer Science
OCR GCSE • Computer Science
OCR GCSE • Computer Science
OCR GCSE • Computer Science
Page 2
Stor
age
Type
s, D
evic
es
and
Char
acte
rist
ics
Com
mon
Sys
tem
Thr
eats
Com
mon
Sys
tem
Thr
eats
Thre
at P
reve
ntio
nTh
reat
Pre
vent
ion
What is secondary storage?
What is ransomware?
What is phishing?
Why would a programmer
use penetration testing on a
system?
What is encryption?
6
7
8
9
10
Stor
age
Type
s, D
evic
es
and
Char
acte
rist
ics
Com
mon
Sys
tem
Thr
eats
Com
mon
Sys
tem
Thr
eats
Thre
at P
reve
ntio
nTh
reat
Pre
vent
ion
6
7
8
9
10
Secondary storage refers
to non-volatile devices and
media used to store programs,
documents and files.
Ransomware is malware
that locks a user out of their
system, and encrypts their
files, until a ransom is paid.
Phishing is impersonating an
organization using emails,
texts or phone calls in order
to persuade users to confirm
or divulge their personal
details.
Penetration testing is the
search for problems and
vulnerabilities in a system that
could be exploited by users
with criminal intentions.
Encryption is the conversion
of important data, using a
public encryption key, into
a form that cannot be read
without a private key.
OCR GCSE • Computer Science
OCR GCSE • Computer Science
OCR GCSE • Computer Science
OCR GCSE • Computer Science
OCR GCSE • Computer Science
Page 3
Syst
em S
oftw
are
Syst
em S
oftw
are
Wir
ed a
nd W
irel
ess
Net
wor
ks 1
Wir
ed a
nd W
irel
ess
Net
wor
ks 2
Wir
ed a
nd W
irel
ess
Net
wor
ks 2
What does defragmentation
software do?
Give three current examples
of an operating system.
What is bandwidth measured
in?
How is a virtual network
created?
What does the Domain Name
Server do?
11
12
13
14
15
Syst
em S
oftw
are
Syst
em S
oftw
are
Wir
ed a
nd W
irel
ess
Net
wor
ks 1
Wir
ed a
nd W
irel
ess
Net
wor
ks 2
Wir
ed a
nd W
irel
ess
Net
wor
ks 2
11
12
13
14
15
Defragmentation software
analyses data and how it
is stored on a disk. It then
rearranges the data into a
more logical sequence for
faster access.
Examples of an operating
system include: Windows 10,
Unix, Chrome OS, macOS,
Linux, Ubuntu and MS-Dos.
Bandwidth is measured in bits
per second.
A virtual network is created
using software instead of
physical devices, often within
a larger network.
The Domain Name Server
links the Internet Protocol
address of a computer on
a network to a text-based
website address that is easier
to remember.
OCR GCSE • Computer Science
OCR GCSE • Computer Science
OCR GCSE • Computer Science
OCR GCSE • Computer Science
OCR GCSE • Computer Science
Page 4
Net
wor
k To
polo
gies
Prot
ocol
s an
d La
yers
Ethi
cal a
nd L
egal
Co
ncer
nsCu
ltur
al a
nd
Envi
ronm
enta
l Con
cern
sCo
mpu
ter S
cien
ce
Legi
slat
ion
Name four types of network
topology.
What does HTTPS do?
What are cookies?
What is the digital divide?
Give three examples of open
source software.
16
17
18
19
20
Net
wor
k To
polo
gies
Prot
ocol
s an
d La
yers
Ethi
cal a
nd L
egal
Co
ncer
nsCu
ltur
al a
nd
Envi
ronm
enta
l Con
cern
sCo
mpu
ter S
cien
ce
Legi
slat
ion
16
17
18
19
20
Four types of topology are
star, mesh, bus and ring.
HTTPS encrypts
communication between
the server and the client
to enable secure online
transactions.
Cookies are small files stored
on computers that contain
Internet browsing data and
can be accessed by web
servers.
The digital divide is the social
and economic gap between
those who have access to
computer technology and
those who do not.
Examples of open source
software include: Linux, GIMP,
Audacity, Apache and Open
Office.
OCR GCSE • Computer Science
OCR GCSE • Computer Science
OCR GCSE • Computer Science
OCR GCSE • Computer Science
OCR GCSE • Computer Science
Page 5
Alg
orit
hms
and
Flow
D
iagr
ams
Alg
orit
hms
and
Flow
D
iagr
ams
Pseu
doco
de 1
Pseu
doco
de 1
Pseu
doco
de 2
Name three common sorting
algorithms.
What are flow diagrams used
for?
Are there any fixed rules for
pseudocode?
Which common pseudocode
keyword is used to create a
loop?
What does the operator MOD
(modulus) do?
21
22
23
24
25
Alg
orit
hms
and
Flow
D
iagr
ams
Alg
orit
hms
and
Flow
D
iagr
ams
Pseu
doco
de 1
Pseu
doco
de 1
Pseu
doco
de 2
21
22
23
24
25
Three sorting algorithms are
bubble sort, merge sort and
insertion sort.
Flow diagrams are used to
visualize an algorithm and show
clearly the flow of information.
There are no fixed rules for
pseudocode. It must just
make sense. Exam boards will
normally provide a dictionary
of common terms they expect
you to know/use.
While is the pseudocode
keyword used to create a
loop.
MOD (modulus) returns the
remainder after a division.
OCR GCSE • Computer Science
OCR GCSE • Computer Science
OCR GCSE • Computer Science
OCR GCSE • Computer Science
OCR GCSE • Computer Science
Page 6
Com
puta
tion
al L
ogic
Com
puta
tion
al L
ogic
Prog
ram
min
g Te
chni
ques
1Pr
ogra
mm
ing
Tech
niqu
es 1
Prog
ram
min
g Te
chni
ques
2
What are truth tables?
What are the three
main operations that
are represented by logic
diagrams?
What is concatenation?
What is a string?
Why are databases useful?
26
27
28
29
30
Com
puta
tion
al L
ogic
Com
puta
tion
al L
ogic
Prog
ram
min
g Te
chni
ques
1Pr
ogra
mm
ing
Tech
niqu
es 1
Prog
ram
min
g Te
chni
ques
2
26
27
28
29
30
Truth tables are the
representation of potential
inputs and outputs (1s and 0s)
in a logic diagram.
The three main operations
represented by logic diagrams
are AND, OR and NOT.
Concatenation is the adding
together of two strings in a
program.
A string is a collection of
alphanumeric data characters
and symbols that is usually
enclosed in quotation marks.
Databases store large
amounts of data, which can be
categorized and structured so
it can be easily accessed.
OCR GCSE • Computer Science
OCR GCSE • Computer Science
OCR GCSE • Computer Science
OCR GCSE • Computer Science
OCR GCSE • Computer Science
Page 7
Prog
ram
min
g Te
chni
ques
3Pr
oduc
ing
Robu
st
Prog
ram
sTr
ansl
ator
s and
Fa
cilit
ator
s of L
angu
ages
Tran
slat
ors a
nd
Faci
litat
ors o
f Lan
guag
esU
nits
and
For
mat
s of
D
ata
31
32
33
34
35
Prog
ram
min
g Te
chni
ques
3Pr
oduc
ing
Robu
st
Prog
ram
sTr
ansl
ator
s and
Fa
cilit
ator
s of L
angu
ages
Tran
slat
ors a
nd
Faci
litat
ors o
f Lan
guag
esU
nits
and
For
mat
s of
D
ata
31
32
33
34
35
Sub-programs, or sub-
routines, save time and avoid
repetitive code.
Extreme (or boundary) data
is data at the limit of what
a program should be able to
handle.
High-level languages include:
Python, Java, JavaScript,
Visual Basic, C++, C Family of
languages, Ruby and BASIC.
A run-time environment
allows a program to be
run and tested within an
integrated development
environment (IDE).
8 bits are in a byte.
Describe two benefits of sub-
programs, or sub-routines.
What is extreme (or
boundary) data?
Give three examples of high-
level languages.
What does a run-time
environment allow?
How many bits are in a byte?
OCR GCSE • Computer Science
OCR GCSE • Computer Science
OCR GCSE • Computer Science
OCR GCSE • Computer Science
OCR GCSE • Computer Science
Page 8
Uni
ts a
nd F
orm
ats
of
Dat
aCo
nver
ting
Dat
a 1
Conv
erti
ng D
ata
2A
udio
/Vis
ual F
orm
ats
and
Com
pres
sion
Aud
io/V
isua
l For
mat
s an
d Co
mpr
essi
on
36
37
38
39
40
Uni
ts a
nd F
orm
ats
of
Dat
aCo
nver
ting
Dat
a 1
Conv
erti
ng D
ata
2A
udio
/Vis
ual F
orm
ats
and
Com
pres
sion
Aud
io/V
isua
l For
mat
s an
d Co
mpr
essi
on
36
37
38
39
40
Unicode was developed to set
worldwide common coding
standards and to represent all
known languages using 16-
and 32-bit binary codes.
Denary (also known as
decimal) is a base 10 number
system with 10 digits.
A check digit system is used to
detect errors in identification
numbers. The check digit is
normally the last digit on the
right.
Three file types that use
lossless compression include:
RAW, WAV, TIFF and BMP.
The bit rate is the number
of bits per second used to
sample an audio file.
Why was Unicode developed?
What is denary?
What is a check digit system
used for?
Name three file types that use
lossless compression.
What is a bit rate?
OCR GCSE • Computer Science
OCR GCSE • Computer Science
OCR GCSE • Computer Science
OCR GCSE • Computer Science
OCR GCSE • Computer Science