
May 2026 - OCR GCSE Computer Science (Full Paper 1)
CSNewbs
Overview
This video covers the OCR GCSE Computer Science Paper 1 specification, focusing on computer systems. It details the Central Processing Unit (CPU) and its fetch-execute cycle, including components like the ALU, Control Unit, and registers. The summary explains different types of storage (primary, secondary, virtual), secondary storage media (magnetic, optical, solid-state), and data representation in binary, decimal, and hexadecimal. It also delves into image and sound file properties, compression techniques (lossy vs. lossless), network types (LAN, WAN), network performance factors, internet protocols, client-server and peer-to-peer networks, and security measures like encryption and malware protection. Finally, it touches upon IP and MAC addresses, DNS, and cloud computing.
Save this permanently with flashcards, quizzes, and AI chat
Chapters
- The CPU's primary function is to process data and instructions through the fetch-execute cycle.
- Key CPU components include the Control Unit (directs operations, decodes instructions), Arithmetic Logic Unit (ALU) (performs calculations), and Registers (temporary storage).
- The fetch-execute cycle involves fetching instructions from RAM, decoding them, and then executing them.
- Registers like the Program Counter (PC), Memory Address Register (MAR), Memory Data Register (MDR), and Accumulator (ACC) play specific roles in this cycle.
- Cache memory, located within the CPU, stores frequently accessed data for faster retrieval than RAM.
- Clock speed, measured in gigahertz (GHz), determines how many fetch-execute cycles a CPU can perform per second; higher clock speeds lead to faster processing.
- Cache memory, organized in levels (L1, L2, L3), stores frequently used data closer to the CPU, reducing the need to access slower RAM.
- CPUs can have multiple cores, with each core capable of executing its own fetch-execute cycle, allowing for parallel processing of instructions.
- The effectiveness of multi-core CPUs depends on software optimization and whether tasks can be divided efficiently.
- Primary storage (RAM, ROM) is high-speed memory directly accessible by the CPU.
- RAM (Random Access Memory) is volatile, storing active data and instructions for running programs, and its contents can be changed.
- ROM (Read-Only Memory) is non-volatile, storing essential startup instructions (like the BIOS and bootstrap program) and firmware.
- Secondary storage (HDDs, SSDs) provides long-term, non-volatile storage with much higher capacity than primary storage.
- Virtual memory uses secondary storage as an extension of RAM when RAM is nearly full, but frequent use slows down the system.
- Secondary storage devices are characterized by portability, capacity, cost per gigabyte, access speed, reliability, and durability.
- Magnetic storage (e.g., Hard Disk Drives - HDDs) offers high capacity and low cost per gigabyte but has slower access speeds and is less durable than SSDs.
- Optical storage (CDs, DVDs, Blu-rays) has low capacity and is becoming obsolete due to slower speeds and fragility, though it's cheap for mass production.
- Solid-state storage (SSDs, USB drives, SD cards) has no moving parts, offering the fastest access speeds, high portability, reliability, and durability, but is typically more expensive per gigabyte than HDDs.
- All data in computers is stored in binary (base-2), using bits (0s and 1s) which represent the two states of electronic switches (off/on).
- Decimal (base-10) is the number system humans commonly use, with digits 0-9.
- Hexadecimal (base-16) uses digits 0-9 and letters A-F, representing four bits (a nibble) per hex digit, making it a more concise way to represent binary data.
- Understanding conversions between these number systems is essential for interpreting data and performing low-level operations.
- Data storage units include bits, nibbles (4 bits), bytes (8 bits), kilobytes, megabytes, gigabytes, terabytes, and petabytes, with a difference of 1,000 between units (e.g., 1000 bytes = 1 KB).
- Binary numbers can be converted to decimal by summing the place values (powers of 2) corresponding to the '1' bits.
- Decimal numbers can be converted to binary by repeatedly checking if a place value fits into the number, subtracting it if it does, and marking a '1' or '0' accordingly.
- Binary can be converted to hexadecimal by grouping bits into nibbles (4 bits) and converting each nibble to its hex equivalent.
- Hexadecimal can be converted to binary by converting each hex digit into its 4-bit binary representation.
- Binary addition involves rules for adding bits, including carrying over values (e.g., 1 + 1 = 10 in binary, with a carry of 1).
- Binary shifts (left for multiplication by powers of 2, right for division by powers of 2) are efficient operations.
- Character sets map characters (letters, numbers, symbols) to unique binary codes.
- ASCII uses 8 bits per character, allowing for 256 characters, suitable for many Western languages but limited for others.
- Unicode uses 16 bits per character, supporting thousands of characters, making it suitable for virtually all languages and symbols.
- File size for text is calculated by multiplying bits per character by the number of characters.
- Conversions between bits, bytes, and kilobytes are necessary for calculating file sizes.
- Bitmap images are made of pixels; resolution (width x height) affects quality and file size.
- Color depth determines the number of bits used per pixel to represent color, impacting the number of possible colors and file size.
- Metadata provides additional information about an image file (e.g., dimensions, color depth).
- Digital audio is created by sampling analog sound waves at a specific sample rate (frequency of measurement) and bit depth (bits per sample for amplitude).
- Higher sample rates and bit depths improve audio quality but increase file size.
- Compression algorithms reduce file size, saving storage space and speeding up data transfer.
- Lossy compression permanently removes data (e.g., imperceptible frequencies in audio, subtle color variations in images) to achieve smaller file sizes, suitable for media.
- Lossless compression reduces file size without losing any data; the original file can be perfectly restored, essential for text and software.
- Lossy compression results in smaller files but quality loss, while lossless compression preserves quality but results in larger files than lossy.
- A network connects devices to share data and resources.
- A Local Area Network (LAN) connects devices in a small geographical area (e.g., a building), typically privately owned and offering faster speeds.
- A Wide Area Network (WAN) connects devices over large geographical distances (e.g., the internet), often with shared infrastructure and slower speeds.
- Network performance can be affected by bandwidth (data capacity per second), latency (delay), interference, data collisions, and server overload.
- The internet uses servers (web, file, email) to provide services to client devices.
- Web hosting involves storing website files on a web server, and domain names are mapped to IP addresses via the Domain Name System (DNS).
- Client-server networks have a central server managing resources; they offer centralized security and easier backups but are expensive and vulnerable if the server fails.
- Peer-to-peer (P2P) networks have no central server; each computer is equal, making them cheaper and more resilient to single point failures, but harder to manage centrally.
- Hardware like wireless access points, routers, and switches facilitate network connections and data routing.
- Protocols are sets of rules that govern communication between devices (e.g., HTTP for web pages, FTP for file transfer, SMTP/POP/IMAP for email).
- IP addresses (IPv4, IPv6) provide logical addressing for devices on networks, while MAC addresses provide unique physical hardware identification.
- The Domain Name System (DNS) translates human-readable domain names into IP addresses.
- Cloud computing provides services (storage, processing) over the internet, offering scalability, accessibility, and collaboration but requiring a stable internet connection and raising security concerns.
- Network topology describes the physical or logical layout of a network.
- A star topology connects all nodes to a central switch, offering reliability and ease of management but failing if the central switch fails.
- A mesh topology connects nodes to multiple other nodes, providing high reliability and redundancy as data can find alternative routes, but it is expensive and complex to set up.
- Wired connections (e.g., Ethernet) offer faster speeds, lower latency, and better security but restrict movement.
- Wireless connections (e.g., Wi-Fi) offer freedom of movement and ease of setup but typically have slower speeds, higher latency, and are less secure.
- Encryption scrambles data using a key to protect it from interception, converting plain text to cipher text.
- IP addresses (logical) and MAC addresses (physical) are crucial for directing data to the correct devices on networks.
- Protocols like TCP/IP, HTTP, HTTPS, FTP, SMTP, POP, and IMAP define rules for different types of network communication.
- Malware is software designed with malicious intent, including viruses, worms, Trojans, spyware, ransomware, rootkits, and adware.
- Viruses attach to files and spread via user action; worms self-replicate across networks.
- Trojans disguise themselves as legitimate software; spyware secretly collects information.
- Ransomware locks files and demands payment; rootkits hide their presence to grant unauthorized access.
- Adware displays unwanted advertisements.
- Protection measures include anti-malware software and firewalls.
Key takeaways
- The CPU's fetch-execute cycle, driven by components like the CU, ALU, and registers, is the core of computer processing.
- CPU performance is enhanced by factors like clock speed, cache memory, and multiple cores, impacting overall system responsiveness.
- Understanding the distinctions between volatile RAM and non-volatile ROM, as well as the roles of secondary and virtual memory, is key to data management.
- Solid-state storage offers significant advantages in speed and durability over magnetic and optical storage, despite a higher cost per gigabyte.
- Data is fundamentally represented in binary, with decimal and hexadecimal serving as more human-readable formats for representation and conversion.
- Image and sound file sizes are determined by resolution, color depth, sample rate, and bit depth, with compression techniques used to manage these sizes.
- Networks are categorized as LANs or WANs, with performance influenced by bandwidth, latency, and other factors, while client-server and P2P architectures offer different approaches to network organization.
- Protocols and security measures like encryption are vital for reliable and safe data communication across networks, protecting against threats like malware.
Key terms
Test your understanding
- How do the Control Unit, ALU, and registers work together during the fetch-execute cycle?
- What are the key differences between RAM and ROM, and why are they both necessary in a computer system?
- Compare and contrast the characteristics of magnetic, optical, and solid-state secondary storage, and explain which is generally preferred for modern computing and why.
- Explain the relationship between binary, decimal, and hexadecimal number systems and provide an example of converting a decimal number to binary.
- How do resolution and color depth affect the file size and quality of a bitmap image?
- What is the fundamental difference between lossy and lossless compression, and in what scenarios would each be most appropriate?
- Describe the main differences between a client-server network and a peer-to-peer network, including their advantages and disadvantages.
- What is the role of protocols like HTTP and HTTPS in internet communication, and how does encryption enhance security?