AQA GCSE Computer Science PLC

Save this PDF as:

Size: px
Start display at page:

Transcription

1 1 - Fundamentals of Algorithms Useful Websites BBC Bite Size Cambridge GCSE Exam Dates Paper 1 14/05/2018 am Paper 2 17/05/2018 pm AQA GCSE Computer Science PLC Week Beginning Revision Guide (zig zag) Section Topic AQA Learning Objective 1 Understand and explain the term algorithm. 2 Understand and explain the term decomposition. 3 Understand and explain the term abstraction. Representing algorithms Efficiency of algorithms Searching algorithms Sorting algorithms Data types Programming concepts 4 Use a systematic approach to problem solving and algorithm creation representing those algorithms using pseudo-code and flowcharts. 5 Explain simple algorithms in terms of their inputs, processing and outputs. 6 Determine the purpose of simple algorithms 7 Understand that more than one algorithm can be used to solve the same problem. Compare the efficiency of algorithms explaining how some algorithms are more 8 efficient than others in solving the same problem. 9 Understand and explain how the linear search algorithm works. 10 Understand and explain how the binary search algorithm works. 11 Compare and contrast linear and binary search algorithms. 12 Understand and explain how the merge sort algorithm works. 13 Understand and explain how the bubble sort algorithm works. 14 Compare and contrast merge sort and bubble sort algorithms. 15 Understand the concept of a data type Understand and use the following appropriately: integer real Boolean 16 character string. Use, understand and know how the following statement types can be combined in programs: Variable Declaration Constant declaration 17 Assignment Iteration 15/01/ /01/2017 Test 1 Pages Test 2 Pages Test 3

2 2 - Programming Programming concepts Selection Subroutine (procedure / function) Use definite and indefinite iteration, including indefinite iteration with the 18 condition(s) at the start or the end of the iterative structure. 19 Use nested selection and nested iteration structures. 20 Use meaningful identifier names and know why it is important to use them. 29/01/2018 Test 3 Pages Relational operations in a programming language 21 Be familiar with and be able to use: equal to not equal to less than greater than less than or equal to greater than or equal to. Boolean operations in a programming language Data structures Input / output and file handling 22 Be familiar with and be able to use: NOT AND OR. 23 Understand the concept of data structures. 24 Use arrays (or equivalent) in the design of solutions to simple problems. 25 Use records (or equivalent) in the design of solutions to simple problems. 26 Be able to obtain user input from the keyboard 27 Be able to output data and information from a program to the computer display. 28 Be able to read/write from/to a text file String handling operations in a programming language 29 Understand and be able to use: length position substring concatenation convert character to character code convert character code to character string conversion operations. Random number generation in a programming language 30 Be able to use random number generation. 05/02/2018 Test 4 Pages Subroutines (procedures and functions) Structured 31 Understand the concept of subroutines 32 Explain the advantages of using subroutines in programs. 33 Describe the use of parameters to pass data within programs. 34 Use subroutines that return values to the calling routine. 35 Know that subroutines may declare their own variables, called local variables, and that local variables usually: only exist while the subroutine is executing are only accessible within the subroutine. 36 Use local variables and explain why it is good practice to do so 37 Describe the structured approach to programming.

3 ata Representation programming Robust and secure programming Classification of programming languages Number bases 38 Explain the advantages of the structured approach. 39 Be able to write simple data validation routines 40 Be able to write simple authentication routines. 41 Be able to select suitable test data that covers normal (typical), boundary (extreme) and erroneous data. Be able to justify the choice of test data. Know that there are different levels of programming language: low-level 42 language high-level language. Explain the main differences between low-level and high-level languages. 43 Know that machine code and assembly language are considered to be low-level languages and explain the differences between them. 44 Understand the advantages and disadvantages of low-level language programming compared with high-level language programming. 45 Understand the following number bases: decimal (base 10) binary (base 2) hexadecimal (base 16). 46 Understand that computers use binary to represent all data and instructions. 12/02/2018 Test 5 Pages Converting between number bases Units of information Binary arithmetric Character encoding 47 Explain why hexadecimal is often used in computer science. 48 Understand how binary can be used to represent whole numbers. 49 Understand how hexadecimal can be used to represent whole numbers. 50 Be able to convert in both directions between: binary and decimal binary and hexadecimal decimal and hexadecimal. 51 Know that: a bit is the fundamental unit of information a byte is a group of 8 52 bits. Know that quantities of bytes can be described using prefixes. Know the names, symbols and corresponding values for the decimal prefixes: kilo, 1 kb is 1,000 bytes mega, 1 MB is 1,000 kilobytes giga, 1 GB is 1,000 Megabytes tera, 1 TB is 1,000 Gigabytes. 53 Be able to add together up to three binary numbers. 54 Be able to apply a binary shift to a binary number. 55 Describe situations where binary shifts can be used Understand what a character set is and be able to describe the following character encoding methods: 7-bit ASCII Unicode. Understand that character codes are commonly grouped and run in sequence within encoding tables. Describe the purpose of Unicode and the advantages of Unicode over ASCII. Know that Unicode uses the same codes as ASCII up to /02/2018 Test 6 Pages

4 ms 3 - Fundamentals of Da Represenging images 59 Understand what a pixel is and be able to describe how pixels relate to an image and the way images are displayed 60 Describe the following for bitmaps: size in pixels colour depth. 61 Describe how a bitmap represents an image using pixels and colour depth. 62 Describe using examples how the number of pixels and colour depth can affect the file size of a bitmap image. 63 Calculate bitmap image file sizes based on the number of pixels and colour depth. 64 Convert binary data into a black and white image. 65 Convert a black and white image into binary data. 66 Understand that sound is analogue and that it must be converted to a digital form for storage and processing in a computer. 26/02/2018 Test 7 Pages Representing sound 67 Understand that sound waves are sampled to create the digital version of sound. 68 Describe the digital representation of sound in terms of: sampling rate sample resolution. 69 Calculate sound file sizes based on the sampling rate and the sample resolution. Data compression Hardware and software Boolean logic Software classification 70 Explain how data can be compressed using Huffman coding. Be able to interpret Huffman trees. Be able to calculate the number of bits required to store a piece of data 71 compressed using Huffman coding. Be able to calculate the number of bits required to store a piece of uncompressed data in ASCII. 72 Explain how data can be compressed using run length encoding (RLE). 73 Represent data in RLE frequency/data pairs 74 Define the terms hardware and software and understand the relationship between them. 75 Construct truth tables for the following logic gates: NOT AND OR. 76 Construct truth tables for simple logic circuits. Interpret the results of simple truth tables. 77 Create, modify and interpret simple logic circuit diagrams. 78 Explain what is meant by: system software application software. Give examples of both types of software. Understand the need for, and functions of, operating systems (OS) and utility 79 programs. Understand that the OS handles management of the: processor(s) memory I/O devices applications security. 80 Explain the Von Neumann architecture 05/03/2017 Test 8 Pages 76-78

5 5 - Fundamentals of Computer Networks 4 - Computer System Systems architecture Fundamentals of computer networks Explain the role and operation of main memory and the following major 81 components of a central processing unit (CPU): arithmetic logic unit control unit clock bus. 82 Explain the effect of the following on the performance of the CPU: clock speed number of processor cores cache size cache type. 83 Understand and explain the Fetch-Execute cycle. 84 Understand the differences between main memory and secondary storage. Understand the differences between RAM and ROM. 85 Understand why secondary storage is required. 86 Be aware of different types of secondary storage (solid state, optical and magnetic). Explain the operation of solid state, optical and magnetic storage. Discuss the advantages and disadvantages of solid state, optical and magnetic storage. 87 Explain the term 'cloud storage'. 88 Explain the advantages and disadvantages of cloud storage when compared to local storage. 89 Understand the term 'embedded system' and explain how an embedded system differs from a non-embedded system. 90 Define what a computer network is. Discuss the benefits and risks of computer networks. 91 Describe the main types of computer network including: Personal Area Network (PAN) Local Area Network (LAN) Wide Area Network (WAN) 92 Understand that networks can be wired or wireless. Discuss the benefits and risks of wireless networks as opposed to wired networks. 93 Explain the following common network topologies: star bus. 94 Define the term network protocol. 95 Explain the purpose and use of common network protocols including: Ethernet Wi-Fi TCP (Transmission Control Protocol) UDP (User Datagram Protocol) IP (Internet Protocol) HTTP (Hypertext Transfer Protocol) HTTPS (Hypertext Transfer Protocol Secure) FTP (File Transfer Protocol) protocols: SMTP (Simple Mail Transfer Protocol) IMAP (Internet Message Access Protocol). 96 Understand the need for, and importance of, network security. 97 Explain the following methods of network security: authentication encryption firewall MAC address filtering. 98 Describe the 4 layer TCP/IP model: application layer transport layer network layer data link layer 12/03/2017 Test 9 Pages /03/2017 Test 10 Pages 87 and 88 26/03/2017 Test 10 Pages 89 and 90

6 7 - Ethical, Legal and Environment 6 - Fundamentals of Cyber Security Fundamentals of cyber security Cyber security threats Social engineering Malicious code Methods to detect and prevent cyber security threats 99 Understand that the HTTP, HTTPS, SMTP, IMAP and FTP protocols operate at the application layer. 100 Understand that the TCP and UDP protocols operate at the transport layer 101 Understand that the IP protocol operates at the network layer. 102 Be able to define the term cyber security and be able to describe the main 103 purposes of cyber security Understand and be able to explain the following cyber security threats: social engineering techniques malicious code weak and default passwords misconfigured access rights removable media unpatched and/or outdated software. 104 Explain what penetration testing is and what it is used for. 105 Define the term social engineering. 106 Describe what social engineering is and how it can be protected against. 107 Explain the following forms of social engineering: blagging (pretexting) phishing pharming shouldering (or shoulder surfing). 108 Define the term 'malware'. 109 Describe what malware is and how it can be protected against. Describe the following forms of malware: computer virus trojan spyware 110 adware. Understand and be able to explain the following security measures: biometric measures (particularly for mobile devices) password systems CAPTCHA (or 111 similar) using confirmations to confirm a user s identity automatic software updates. 02/04/2017 Test 11 Pages 95 and 96 09/04/2017 Test 11 Pages Ethical, legal and environmental impacts of digital technology on wider society, including issues of privacy 112 Explain the current ethical, legal and environmental impacts and risks of digital technology on society. Where data privacy issues arise these should be considered. 23/04/2017 Test 12 Pages /04/2017 Test 13 Pages /05/2017 Test 13 Pages

GCSE Computer Science for OCR Overview Scheme of Work

GCSE Computer Science for OCR Overview Scheme of Work The following assumes a two-year model. During the course, the final challenges can be used for practice in computational thinking, algorithm design

Edexcel GCSE in Computer Science Microsoft IT Academy Mapping

Edexcel GCSE in Computer Science Microsoft IT Academy Mapping Topic 1: Problem solving Subject Content: 1.1 Algorithms MOAC course and lesson(s) MVA course and module(s) : 1.1.1 Understand what an algorithm

OCR GCSE Computing Learning Grids H/W

COMPUTING GCSE OCR J275 OCR GCSE Computing Learning Grids H/W Unit A451: Computer Systems and Programming This learning grid H/W belongs to: Name: Form: Mr. Ahmed A451 - ATTENTION! Please read! These learning

Learning objectives. Computer principles The characteristics of contemporary processors, input, output and storage devices

Learning objectives Computer principles 1.1. The characteristics of contemporary processors, input, output and storage devices Components of a computer and their uses 1.1.1 Structure and function of the

SAMPLE COURSE OUTLINE COMPUTER SCIENCE GENERAL YEAR 12

SAMPLE COURSE OUTLINE COMPUTER SCIENCE GENERAL YEAR 12 Copyright School Curriculum and Standards Authority, 2015 This document apart from any third party copyright material contained in it may be freely

Systems Architecture. Systems Architecture. Memory. Memory. Memory. Memory. The Purpose and Function. The Purpose and Function

The Purpose and Function of the Central Processing Unit Name three output devices. 1 The Purpose and Function of the Central Processing Unit Output devices include monitors or displays, speakers, devices

CSC 170 Fall 2017 Dr. R. M. Siegfried. Study Guide for Final Exam

CSC 170 Fall 2017 Dr. R. M. Siegfried Study Guide for Final Exam Definitions to know: Lecture #1 1. Data 2. Digitization 3. Bit 4. Byte 5. Binary Numbers 6. How Are Characters Stored? a. ASCII b. Unicode

Southam College Computing & ICT Department. Summer Project

Student Name: contact: sycamore.s@welearn365.com Southam College Computing & ICT Department Summer Project This booklet provides several tasks for you to update your current knowledge and learn new concepts

2c. Content of Computer systems (Component 01)

c. Content of Computer systems (Component 01) This component will introduce learners to the internal workings of the Central Processing Unit (CPU), the exchange of data and will also look at software development,

AQ A G C S E 9-1 C O M P U T E R S C I E N C E R E V I S I O N G U I D E M U R P H Y V I A A M A Z O N

AQ A G C S E 9-1 C O M P U T E R S C I E N C E R E V I S I O N G U I D E M U R P H Y 2 0 1 6 V I A A M A Z O N ABOUT THIS RESOURCE This resource is in no way endorsed by AQA and will not facilitate the

This document contains additional questions; it is not intended to be treated as a complete paper.

1 AS COMPUTER SCIENCE Paper 2 Additional Questions These questions focus primarily on topics that were not covered by the AQA AS and A-level Computing specifications, introduced in 2009. It is hoped that

OHIO ASSESSMENTS FOR EDUCATORS (OAE) FIELD 010: COMPUTER INFORMATION SCIENCE

OHIO ASSESSMENTS FOR EDUCATORS (OAE) FIELD 010: COMPUTER INFORMATION SCIENCE June 2013 Content Domain Range of Competencies Approximate Percentage of Assessment Score I. Computer Use in Educational Environments

Chapter 1 Data Storage 2007 Pearson Addison-Wesley. All rights reserved Chapter 1: Data Storage 1.1 Bits and Their Storage 1.2 Main Memory 1.3 Mass Storage 1.4 Representing Information as Bit Patterns

Information Science 1

Information Science 1 -Basic Concepts of Computers: Opera4on, Architecture, Memory- Week 02 College of Information Science and Engineering Ritsumeikan University Today s lecture outline l Recall the previous

BCS Higher Education Qualifications. Level 4 Certificate in IT. Computer Network Technology Syllabus

BCS Higher Education Qualifications Level 4 Certificate in IT Computer Network Technology Syllabus Version 4.0 December 2016 This is a United Kingdom government regulated qualification which is administered

Dawood Public School Course Outline Computer Science Class XI

Dawood Public School Course Outline 2016-17 Computer Science Class XI Study Guide Text book: IGCSE Computer Science Course book by David Watson and Helen Williams Reference Book: Information Systems by

GCSE Computer Science

GCSE Computer Science 2017 Geraint D. Jones Jen M. Gillies Mark D. Thomas Martin C. Gillies 1 Disclaimer This resource is provided to support the teaching and learning of GCSE Computer Science. The materials

understand the need for input and output devices describe suitable output devices for a wide range of computer controlled situations

Hardware The OCR Specification says that you should be able to: The Central Processing Unit state the purpose of the CPU describe the function of the CPU as fetching and executing instructions stored in

A Level Computing. Course Content Checklist. Name: Tutor Group: Teaching Group: Target Grade: Page 1 of 38

A Level Computing Course Content Checklist Name: Tutor Group: Teaching Group: Target Grade: Page 1 of 38 A Level Computing This paper tests a student's ability to program, as well as their theoretical

IB Computer Science Topic.2-

Topic.2- Computer Organization Designed by: Allan Lawson Sources: Online Materials, thanks for all Topic 2.1.1 Computer Architecture Outline the architecture of a central processing unit (CPU) and the

Lymm High School- KS3 Life after levels - Computing & ICT

Half Term 1 & 2 E- Safety BRONZE SILVER GOLD PLATINUM D and below= GCSE 1,2,3 C= GCSE 4 C/B= GCSE 5,6 A/A*= GCSE 7,8,9 Understand a range of ways Understand a range of Understand a range of Understand

Textbook Charles Petzold, Programming Windows, 5th edition, Microsoft Press. References - other textbooks or materials none

CS351 Systems Programming Last Updated - 03/01/02 Course Manager Dr. Phil Dickens, Assistant Professor 3 credit hours; required for CS & CPE; 100 min. lecture & 100 min. lab each week Current Catalog Description

An Overview of the Computer System. Kafui A. Prebbie 24

An Overview of the Computer System Kafui A. Prebbie -kafui@kafui.com 24 The Parts of a Computer System What is a Computer? Hardware Software Data Users Kafui A. Prebbie -kafui@kafui.com 25 The Parts of

Bits and Bit Patterns

Bits and Bit Patterns Bit: Binary Digit (0 or 1) Bit Patterns are used to represent information. Numbers Text characters Images Sound And others 0-1 Boolean Operations Boolean Operation: An operation that

OCR Level 3 Advanced GCE in Computer Science (H446)

OCR Level 3 Advanced GCE in Computer Science (H446) At its heart lies the notion of computational thinking: a mode of thought that goes well beyond software and hardware, and that provides a framework

Example 1: Denary = 1. Answer: Binary = (1 * 1) = 1. Example 2: Denary = 3. Answer: Binary = (1 * 1) + (2 * 1) = 3

1.1.1 Binary systems In mathematics and digital electronics, a binary number is a number expressed in the binary numeral system, or base-2 numeral system, which represents numeric values using two different

COMPUTER SYSTEM. COMPUTER SYSTEM IB DP Computer science Standard Level ICS3U. COMPUTER SYSTEM IB DP Computer science Standard Level ICS3U

C A N A D I A N I N T E R N A T I O N A L S C H O O L O F H O N G K O N G 5.1 Introduction 5.2 Components of a Computer System Algorithm The Von Neumann architecture is based on the following three characteristics:

COMPONENTS OF DATA COMMUNICATION

COMPONENTS OF DATA COMMUNICATION ANALOG AND DIGITAL TRANSMISSION An analog signal is one that is continuous with respect to time and may take on any value within a given range of values. Eg Human voice.

ก ก Information Technology II

ก ก 202103 Information Technology II ก ก ก ก ก (LAN), ก LAN, ก ก (LAN) ก ก ก LAN ก LAN ก LAN Topology Bus LAN Star LAN Ring LAN Wireless LAN Wireless LAN Wireless ก (LAN) ก ก ก LAN ก LAN WAN ก Random Access

Year 8 Computing New Levels (Progress Pathways) Content and Concepts (depth of understanding and application) Computational Thinking

Year 8 Computing New Levels (Progress s) Progression Computer Systems, etc 7 9 Can explain clearly and in detail; - several laws that apply to computer use, including copyright and the Data Protection

Introduction to Computers. Joslyn A. Smith

Introduction to Computers Joslyn A. Smith March 9, 2010 5/18/2011 1 What is a Computer? An electronic device that has the capability of performing the following tasks: Responds to input. Processes the

The Internet. Session 3 INST 301 Introduction to Information Science

The Internet Session 3 INST 301 Introduction to Information Science Outline The creation story What it is Exploring it Using it Outline The creation story What it is Exploring it Using it Source: Wikipedia

ECDL / ICDL IT Security. Syllabus Version 2.0

ECDL / ICDL IT Security Syllabus Version 2.0 Module Goals Purpose This document details the syllabus for the IT Security module. The syllabus describes, through learning outcomes, the knowledge and skills

Computer Basics 1/6/16. Computer Organization. Computer systems consist of hardware and software.

Hardware and Software Computer Basics TOPICS Computer Organization Data Representation Program Execution Computer Languages Computer systems consist of hardware and software. Hardware includes the tangible

CSC 170 Introduction to Computers and Their Applications. Lecture #1 Digital Basics. Data Representation

CSC 170 Introduction to Computers and Their Applications Lecture #1 Digital Basics Data Representation Data refers to the symbols that represent people, events, things, and ideas. Data can be a name, a

Computer Architecture and Assembly Language. Spring

Computer Architecture and Assembly Language Spring 2014-2015 What is a computer? A computer is a sophisticated electronic calculating machine that: Accepts input information, Processes the information

SECURE USE OF IT Syllabus Version 2.0

ICDL MODULE SECURE USE OF IT Syllabus Version 2.0 Purpose This document details the syllabus for the Secure Use of IT module. The syllabus describes, through learning outcomes, the knowledge and skills

Topics. Hardware and Software. Introduction. Main Memory. The CPU 9/21/2014. Introduction to Computers and Programming

Topics C H A P T E R 1 Introduction to Computers and Programming Introduction Hardware and Software How Computers Store Data Using Python Introduction Computers can be programmed Designed to do any job

Revision of GCSE Specifications. Draft Proposal. Digital Technology

Revision of GCSE Specifications Draft Proposal Digital Technology Draft Proposals for GCSE Consultation 2016 Content Page 30TIntroduction30T A. Specification at a Glance 30T B. Subject Content for each

INFORMATION TECHNOLOGY CONCEPTS (391) OPEN EVENT

INFORMATION TECHNOLOGY CONCEPTS-OPEN- REGIONAL 2017 Page 1 of 10 INFORMATION TECHNOLOGY CONCEPTS (391) OPEN EVENT REGIONAL 2017 DO NOT WRITE ON TEST BOOKLET TOTAL POINTS (100 points) Failure to adhere

SCHOOL OF ACCOUNTING AND BUSINESS BSc. (APPLIED ACCOUNTING) GENERAL / SPECIAL DEGREE PROGRAMME

All Rights Reserved Index No No. of Pages - 07 No of Questions - 04 SCHOOL OF ACCOUNTING AND BUSINESS BSc. (APPLIED ACCOUNTING) GENERAL / SPECIAL DEGREE PROGRAMME YEAR I SEMESTER I (Intake V- Group B)

Computing Science. National 5. Summary Revision Notes

Computing Science National 5 Summary Revision Notes R Ritchie & J Graham Page 1 Contents Data Types and Structures... 3 Expressions... 3 Concatenation... 3 Conditions... 3 Iterative constructs... 3 Selection

Topics. Introduction. Hardware and Software. Main Memory. The CPU. Introduction to Computers and Programming

Topics C H A P T E R 1 Introduction to Computers and Programming Introduction Hardware and Software How Computers Store Data Using Python Introduction Computers can be programmed Designed to do any job

SAMPLE CURRICULUM GUIDE June 2014

SAMPLE CURRICULUM GUIDE June 2014 A Level Computer Science A LEVEL REFORM CONTENTS Introduction Page 3 Year 1 Page 4 Year 2 Page 8 This resource is an exemplar of the types of materials that will be provided

Total Test Questions: 43 Levels: Grades Units of Credit:.50

DESCRIPTION Computer Programming IA introduces students to the fundamentals of computer programming. Students will learn to design, code, and test their own programs while applying mathematical concepts.

E&CE 358: Tutorial 1. Instructor: Sherman (Xuemin) Shen TA: Miao Wang

E&CE 358: Tutorial 1 Instructor: Sherman (Xuemin) Shen TA: Miao Wang Email: m59wang@uwaterloo.ca 1 About Tutorials TA: Miao Wang Office: EIT 3133; Tutorials: Th 4:30 5:20 pm Topics Supplementary knowledge

GCSE Computing. Revision Pack TWO. Data Representation Questions. Name: /113. Attempt One % Attempt Two % Attempt Three %

GCSE Computing Revision Pack TWO Data Representation Questions Name: /113 Attempt One % Attempt Two % Attempt Three % Areas of Strength Areas for Development 1. Explain how ASCII is used to represent text

ASSIGNMENT-1 M.Sc. DEGREE EXAMINATION, MAY 2018 (First Year) INFORMATION TECHNOLOGY Basics of Information Technology

ASSIGNMENT-1 () Basics of Information Technology (DMSIT01) Q1) Discuss in detail about IT support at different organizational levels. Q2) Explain about hierarchy of computers. Q3) Discuss different categories

Lecture Objectives. Introduction to Computing Chapter 0. Topics. Numbering Systems 04/09/2017

Lecture Objectives Introduction to Computing Chapter The AVR microcontroller and embedded systems using assembly and c Students should be able to: Convert between base and. Explain the difference between

BUYING A COMPUTER TERM 2 AIT

BUYING A COMPUTER TERM 2 AIT HARDWARE COMPONENTS AND FUNCTIONS describe the components of a multimedia computer system processing (central processing unit) input devices e.g. mouse, keyboard output devices

1. What is a network protocol and why are protocols needed when two machines communicate? 2 marks

Topic1: Common Network Protocols 1. What is a network protocol and why are protocols needed when two machines communicate? 2. Describe the function of each of the following protocols: a. SMTP b. HTTP c.

Bits, bytes and digital information. Lecture 2 COMPSCI111/111G

Bits, bytes and digital information Lecture 2 COMPSCI111/111G Today s lecture Understand the difference between analogue and digital information Convert between decimal numbers and binary numbers Analogue

HARDWARE. There are a number of factors that effect the speed of the processor. Explain how these factors affect the speed of the computer s CPU.

HARDWARE hardware ˈhɑːdwɛː noun [ mass noun ] the machines, wiring, and other physical components of a computer or other electronic system. select a software package that suits your requirements and buy

Data Storage. Slides derived from those available on the web site of the book: Computer Science: An Overview, 11 th Edition, by J.

Data Storage Slides derived from those available on the web site of the book: Computer Science: An Overview, 11 th Edition, by J. Glenn Brookshear Copyright 2012 Pearson Education, Inc. Data Storage Bits

VEER NARMAD SOUTH GUJARAT UNIVERSITY, SURAT Post Graduate Diploma in Computer Application (Evening) Semester - I Effective from: July

1 Paper No. Paper Title : E101 : Computer Organization & Office Automation 1. Memory, Number System & Basic Computer Architecture 1.1. RAM, ROM, PROM, EPROM, Cache Memory, Virtual Memory 1.2. Secondary

Network Engineering/Cyber Security I & II

Network Engineering/Cyber Security I & II Program Description: The first year course teaches the basic techniques of computer safety and maintenance. Students learn to assemble/disassemble personal computers

Computer Architecture

Computer components CPU - Central Processor Unit (e.g., G3, Pentium III, RISC) RAM - Random Access Memory (generally lost when power cycled) VRAM - Video RAM (amount sets screen size and color depth) ROM

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols

Guide to Networking Essentials, 6 th Edition Chapter 5: Network Protocols Objectives Describe the purpose of a network protocol, the layers in the TCP/IP architecture, and the protocols in each TCP/IP

GCSE (9-1) Computer Science Teacher's Workbook 4th Edition James Franklin

GCSE (9-1) Computer Science Teacher's Workbook for OCR J276 Readings, questions and answers for both theory exams 4th Edition James Franklin Axsied ak seed Axsied ak seed Axsied is producing many new products

REPRESENTING INFORMATION:

REPRESENTING INFORMATION: BINARY, HEX, ASCII CORRESPONDING READING: WELL, NONE IN YOUR TEXT. SO LISTEN CAREFULLY IN LECTURE (BECAUSE IT WILL BE ON THE EXAM(S))! CMSC 150: Fall 2015 Controlling Information

CompTIA A+ Complete Study Guide (Exams / ). Text with CD- ROM for Windows and Macintosh

CompTIA A+ Complete Study Guide (Exams 220-801/220-802). Text with CD- ROM for Windows and Macintosh Docter, Q ISBN-13: 9781118324059 Table of Contents Introduction xxxi Assessment Test liv Part I 220-801

Chapter One. Introduction to Computer System

Principles of Programming-I / 131101 Prepared by: Dr. Bahjat Qazzaz -------------------------------------------------------------------------------------------- Chapter One Introduction to Computer System

Chapter 1 Computer and Programming. By Zerihun Alemayehu

Chapter 1 Computer and Programming By Zerihun Alemayehu What is computer? A device capable of performing computations and making logical decisions at speeds millions (even billions) of times faster than

Explain why data is represented in computer systems in binary form

Explain why data is represented in computer systems in binary form Binary is a number system of two numbers, namely 0 and 1. Each binary number is a bit, and 8 bits make a byte. It is known as the base

5. The result of dividing the 8 bit value by the 8 bit value is:

1. The first generation of electronic computers in the 1950's used memory technology based on a. large scale integrated circuits b. medium scale integrated circuits c. transistors d. vacuum tubes e. toroidal

Developing Algorithms

This scheme gives pupils a practical looking at developing algorithms firstly by looking at abstraction, decomposition and algorithmic thinking. Students then learn about the different techniques used

1.1 Bits and Bit Patterns. Boolean Operations. Figure 2.1 CPU and main memory connected via a bus. CS11102 Introduction to Computer Science

1.1 Bits and Bit Patterns CS11102 Introduction to Computer Science Data Storage 1.1 Bits and Their Storage 1.2 Main Memory 1.3 Mass Storage 1.4 Representation of information as bit patterns Bit: Binary

Operating Systems CS 571

Computer Networks: Overview Operating Systems CS 571 Network types Range Bandwidth (Mbps) Latency (ms) LAN 1-2 kms 10-1000 1-10 WAN worldwide 0.010-600 100-500 MAN 2-50 kms 1-150 10 Wireless LAN 0.15-1.5

Question Bank. Fundamentals Of Computer FYBCA (SEM - I)

Question Bank Fundamentals Of Computer FYBCA (SEM - I) 1) Choose the appropriate option (1 Marks Questions) 1) COBOL is an example of level language. a) low level b) middle level c) high level d) both

Computer Science (New) CLASS-XI Code No. 083 (Optional for the academic year and mandatory for the academic year onwards)

Computer Science (New) CLASS-XI Code No. 083 (Optional for the academic year 2018-19 and mandatory for the academic year 2019-20 onwards) 1. Prerequisites No major prerequisites are required for this course

Computing. Week 9 LBSC 671 Creating Information Infrastructures

Computing Week 9 LBSC 671 Creating Information Infrastructures Muddiest Points BIBFRAME The analog hole Goals for Today Understand what makes stupid computers seem smart Understand how the Internet works

Entry Level Assessment Blueprint Computer Networking Fundamentals

Blueprint Computer Networking Fundamentals Test Code: 4514 / Version: 01 Specific Competencies and Skills Tested in this Assessment: PC Principles Identify physical and equipment safety and maintenance

IBPS Practice Exam 1. One megabyte equals approximately 1) 1,000 bits 2) 1,000 bytes 3) 1 million bytes 4) 1 million bits 5) 2,000 bytes 2.

IBPS Practice Exam 1. One megabyte equals approximately 1) 1,000 bits 2) 1,000 bytes 3) 1 million bytes 4) 1 million bits 5) 2,000 bytes 2. Data going into the computer is called? 1) Output 2) Algorithm

Introduction to Networking

Introduction to Networking Chapters 1 and 2 Outline Computer Network Fundamentals Defining a Network Networks Defined by Geography Networks Defined by Topology Networks Defined by Resource Location OSI

The Programming Process Summer 2010 Margaret Reid-Miller

The Programming Process 15-110 Margaret Reid-Miller Hardware Components Central Processing Unit (CPU) Program control Arithmetic/logical operations Coordinates data movement between memory and registers

COS Computer Systems: Fundamental Concepts. Summary of Textbook Chapters

COS1521 - Computer Systems: Fundamental Concepts Summary of Textbook Chapters Foundations of Computer Science 2 nd ed. - Forouzan & Mosharraf Chapter Page Chapter 1 - Introduction 2 Chapter 2 - Number

Erasable Programmable Read-Only Memory (EPROM) Electrically Erasable Programmable Read-Only Memory (EEPROM) CMOS 2.2.

Day - 1 1. INTRODUCTION 1.1 What is Security? 1.2 What is Cyber Security? 1.3 What is Information Security? 1.4 What are the Layers of Security? 1.5 What are the Classification of Security? 1.6 What are

Year 12 Computer Science Learning Cycle 2 Overview

Year 12 Computer Science Learning Cycle 2 Overview Learning Cycle Overview: Specification Topic Taught Week 1.2.1 abcd Operating System Functions, MM, Interupts & Scheduling 2.2.1 ea Integrated Development

Typical Network Uses

Computer Networks Introduction The next Great Revolution - Computer Networks- computers connected together for exchanging information Our information-oriented society - applications in education, commerce,

Entry Level Assessment Blueprint Computer Technology

Entry Level Assessment Blueprint Computer Technology Test Code: 4122 / Version: 01 Specific Competencies and Skills Tested in this Assessment: Professional Standards, Ethics, and Business Practices Identify

Information Technology Department Glossary of Terms

Information Technology Department Glossary of Terms Access Point (AP) a wireless access point is a networking hardware device that allows a Wi-Fi compliant device to connect to a wired network. Active

Internet protocols and network hardware

Internet protocols and network hardware Protocols are sets of rules or standards that are used for communication. They work together to help devices to communicate. The rules apply to different layers

Computer Networks Question Bank

Computer Networks Question Bank 1. Describe in detail OSI Model ANS: OSI (Open Systems Interconnection) is reference model for how applications can communicate over a network. A reference model is a conceptual

Section 1.1: Networking Overview

Section 1.1: Networking Overview This section provides an introduction to networking. Students will become familiar with the following aspects of a network: Components of a network o Computers o Transmission

Chapter Two. Hardware Basics: Inside the Box

Chapter Two Hardware Basics: Inside the Box After reading this chapter, you should be able to: Explain general terms how computers store and manipulate information. Describe the basic structure of a computer

1. True or False? For tasks like Web surfing, sufficient memory can make up for a slow processor.

Review questions for Chapter 5 Computer Components 1. True or False? For tasks like Web surfing, sufficient memory can make up for a slow processor. 2. True or False? A megabyte of memory space is larger

IT114 NETWORK+ Learning Unit 1 Objectives: 1, 2 Time In-Class Time Out-Of-Class Hours 2-3. Lectures: Course Introduction and Overview

IT114 NETWORK+ Course Objectives Upon successful completion of this course, the student will be able to: 1. Identify the devices and elements of computer networks; 2. Diagram network models using the appropriate

Types of Computers. The System Configuration

Types of Computers 1. Microcomputers These are the smallest family of the computer world. General features are low cost, general usage and high availability. Microcomputers can be further divided as palmtops,

The type of all data used in a C (or C++) program must be specified

The type of all data used in a C (or C++) program must be specified A data type is a description of the data being represented That is, a set of possible values and a set of operations on those values

SAMPLE COURSE OUTLINE APPLIED INFORMATION TECHNOLOGY ATAR YEAR 11

SAMPLE COURSE OUTLINE APPLIED INFORMATION TECHNOLOGY ATAR YEAR 11 Copyright School Curriculum and Standards Authority, 2014 This document apart from any third party copyright material contained in it may

INTRODUCTION TO INFORMATION & COMMUNICATION TECHNOLOGY (ICT) LECTURE 2 : WEEK 2 CSC-111-T

INTRODUCTION TO INFORMATION & COMMUNICATION TECHNOLOGY (ICT) LECTURE 2 : WEEK 2 CSC-111-T Credit : (2 + 1) / Week 2 TEXT AND REF. BOOKS Text Book: Peter Norton (2011), Introduction to Computers, 7 /e,

Web Foundations Series Internet Business Associate

Web Foundations Series Internet Business Associate Internet Business Associate prepares students to work effectively in today's business environment. In this course, you will learn about the tasks involved

Chapter 4 The Components of the System Unit

Chapter 4 The Components of the System Unit The System Unit What is the system unit? Case that contains electronic components of the computer used to process data Sometimes called the chassis p. 184 Fig.

Higher Grade Computing Homework Answers Units & UNIT : COMPUTER SYSTEMS Data Representation Answers and Marking Scheme Q Q Give two reasons why computers use the binary number system Binary arithmetic

CLASS XII INFORMATICS PRACTICES ACADEMIC SESSION FORTNIGHTLY BREAKUP OF SYLLABUS. Main Topic Sub Topics Pds Total Pds

S. No Fortnight 1 19 th March 28 March (Block Teaching) Total no of days CLASS XII INFORMATICS PRACTICES ACADEMIC SESSION 2018-2019 FORTNIGHTLY BREAKUP OF SYLLABUS Main Topic Sub Topics Pds Total Pds 8

Cambridge International Examinations Cambridge International Advanced Subsidiary and Advanced Level *1424651924* COMPUTER SCIENCE 9608/13 Paper 1 Theory Fundamentals May/June 2015 1 hour 30 minutes Candidates

Fundamental principles of computing

SPECIMEN MATERIAL FUNDAMENTAL PRINCIPLES OF COMPUTING AQA Level 3 Technical Level IT Fundamental principles of computing Unit Number: Y/507/6424 Specimen Question Paper Time allowed: 2 hours Instructions