May 2026 - OCR GCSE Computer Science (Full Paper 1)
1:28:20

May 2026 - OCR GCSE Computer Science (Full Paper 1)

CSNewbs

15 chapters8 takeaways36 key terms8 questions

Overview

This video covers the OCR GCSE Computer Science Paper 1 specification, focusing on computer systems. It details the Central Processing Unit (CPU) and its fetch-execute cycle, including components like the ALU, Control Unit, and registers. The summary explains different types of storage (primary, secondary, virtual), secondary storage media (magnetic, optical, solid-state), and data representation in binary, decimal, and hexadecimal. It also delves into image and sound file properties, compression techniques (lossy vs. lossless), network types (LAN, WAN), network performance factors, internet protocols, client-server and peer-to-peer networks, and security measures like encryption and malware protection. Finally, it touches upon IP and MAC addresses, DNS, and cloud computing.

How was this?

Save this permanently with flashcards, quizzes, and AI chat

Chapters

  • The CPU's primary function is to process data and instructions through the fetch-execute cycle.
  • Key CPU components include the Control Unit (directs operations, decodes instructions), Arithmetic Logic Unit (ALU) (performs calculations), and Registers (temporary storage).
  • The fetch-execute cycle involves fetching instructions from RAM, decoding them, and then executing them.
  • Registers like the Program Counter (PC), Memory Address Register (MAR), Memory Data Register (MDR), and Accumulator (ACC) play specific roles in this cycle.
  • Cache memory, located within the CPU, stores frequently accessed data for faster retrieval than RAM.
Understanding the CPU's internal workings and the fetch-execute cycle is fundamental to comprehending how computers process information and execute commands.
The Program Counter stores the address of the next instruction, which is then copied to the Memory Address Register before being fetched from RAM and stored in the Memory Data Register.
  • Clock speed, measured in gigahertz (GHz), determines how many fetch-execute cycles a CPU can perform per second; higher clock speeds lead to faster processing.
  • Cache memory, organized in levels (L1, L2, L3), stores frequently used data closer to the CPU, reducing the need to access slower RAM.
  • CPUs can have multiple cores, with each core capable of executing its own fetch-execute cycle, allowing for parallel processing of instructions.
  • The effectiveness of multi-core CPUs depends on software optimization and whether tasks can be divided efficiently.
These factors directly impact a computer's overall speed and ability to handle demanding tasks, influencing user experience and productivity.
A CPU with a clock speed of 4 GHz can perform 4 billion fetch-execute cycles per second.
  • Primary storage (RAM, ROM) is high-speed memory directly accessible by the CPU.
  • RAM (Random Access Memory) is volatile, storing active data and instructions for running programs, and its contents can be changed.
  • ROM (Read-Only Memory) is non-volatile, storing essential startup instructions (like the BIOS and bootstrap program) and firmware.
  • Secondary storage (HDDs, SSDs) provides long-term, non-volatile storage with much higher capacity than primary storage.
  • Virtual memory uses secondary storage as an extension of RAM when RAM is nearly full, but frequent use slows down the system.
Understanding the different types of storage and their characteristics is crucial for managing data effectively, ensuring performance, and knowing where information is permanently kept.
When your computer runs out of RAM, it might move less-used parts of programs to your hard drive, which is called virtual memory.
  • Secondary storage devices are characterized by portability, capacity, cost per gigabyte, access speed, reliability, and durability.
  • Magnetic storage (e.g., Hard Disk Drives - HDDs) offers high capacity and low cost per gigabyte but has slower access speeds and is less durable than SSDs.
  • Optical storage (CDs, DVDs, Blu-rays) has low capacity and is becoming obsolete due to slower speeds and fragility, though it's cheap for mass production.
  • Solid-state storage (SSDs, USB drives, SD cards) has no moving parts, offering the fastest access speeds, high portability, reliability, and durability, but is typically more expensive per gigabyte than HDDs.
Choosing the right secondary storage impacts cost, performance, and data longevity, affecting everything from device speed to how much data you can store.
A Solid State Drive (SSD) is much faster at accessing data than a traditional Hard Disk Drive (HDD) because it has no moving parts.
  • All data in computers is stored in binary (base-2), using bits (0s and 1s) which represent the two states of electronic switches (off/on).
  • Decimal (base-10) is the number system humans commonly use, with digits 0-9.
  • Hexadecimal (base-16) uses digits 0-9 and letters A-F, representing four bits (a nibble) per hex digit, making it a more concise way to represent binary data.
  • Understanding conversions between these number systems is essential for interpreting data and performing low-level operations.
  • Data storage units include bits, nibbles (4 bits), bytes (8 bits), kilobytes, megabytes, gigabytes, terabytes, and petabytes, with a difference of 1,000 between units (e.g., 1000 bytes = 1 KB).
This is the fundamental language of computers; understanding it allows you to grasp how information is stored, processed, and represented internally.
The binary number 10110110 can be converted to the decimal number 182 by summing the place values where a '1' appears (128 + 32 + 16 + 4 + 2).
  • Binary numbers can be converted to decimal by summing the place values (powers of 2) corresponding to the '1' bits.
  • Decimal numbers can be converted to binary by repeatedly checking if a place value fits into the number, subtracting it if it does, and marking a '1' or '0' accordingly.
  • Binary can be converted to hexadecimal by grouping bits into nibbles (4 bits) and converting each nibble to its hex equivalent.
  • Hexadecimal can be converted to binary by converting each hex digit into its 4-bit binary representation.
  • Binary addition involves rules for adding bits, including carrying over values (e.g., 1 + 1 = 10 in binary, with a carry of 1).
  • Binary shifts (left for multiplication by powers of 2, right for division by powers of 2) are efficient operations.
These conversion and operational skills are vital for manipulating data at a lower level and understanding how computers perform calculations efficiently.
To convert decimal 91 to binary, you'd check if 128 fits (no, 0), then 64 (yes, 1, remainder 27), then 32 (no, 0), then 16 (yes, 1, remainder 11), and so on, resulting in 01011011.
  • Character sets map characters (letters, numbers, symbols) to unique binary codes.
  • ASCII uses 8 bits per character, allowing for 256 characters, suitable for many Western languages but limited for others.
  • Unicode uses 16 bits per character, supporting thousands of characters, making it suitable for virtually all languages and symbols.
  • File size for text is calculated by multiplying bits per character by the number of characters.
  • Conversions between bits, bytes, and kilobytes are necessary for calculating file sizes.
Understanding character sets explains how text is represented digitally and how to calculate the storage space required for text files.
A text file with 250 characters using ASCII (8 bits per character) would have a file size of 2000 bits (250 * 8), which is 250 bytes (2000 / 8).
  • Bitmap images are made of pixels; resolution (width x height) affects quality and file size.
  • Color depth determines the number of bits used per pixel to represent color, impacting the number of possible colors and file size.
  • Metadata provides additional information about an image file (e.g., dimensions, color depth).
  • Digital audio is created by sampling analog sound waves at a specific sample rate (frequency of measurement) and bit depth (bits per sample for amplitude).
  • Higher sample rates and bit depths improve audio quality but increase file size.
These properties dictate the quality, file size, and storage requirements of digital media like images and audio.
An image with a resolution of 120x210 pixels and a color depth of 6 bits has a file size of 151,200 bits (120 * 210 * 6).
  • Compression algorithms reduce file size, saving storage space and speeding up data transfer.
  • Lossy compression permanently removes data (e.g., imperceptible frequencies in audio, subtle color variations in images) to achieve smaller file sizes, suitable for media.
  • Lossless compression reduces file size without losing any data; the original file can be perfectly restored, essential for text and software.
  • Lossy compression results in smaller files but quality loss, while lossless compression preserves quality but results in larger files than lossy.
Compression is vital for efficient storage and transmission of digital data, balancing file size with data integrity and quality.
Removing high-frequency sounds that humans can't hear from an audio file is an example of lossy compression.
  • A network connects devices to share data and resources.
  • A Local Area Network (LAN) connects devices in a small geographical area (e.g., a building), typically privately owned and offering faster speeds.
  • A Wide Area Network (WAN) connects devices over large geographical distances (e.g., the internet), often with shared infrastructure and slower speeds.
  • Network performance can be affected by bandwidth (data capacity per second), latency (delay), interference, data collisions, and server overload.
Understanding network types and performance factors explains how devices communicate and why network speeds and reliability vary.
Your home Wi-Fi network connecting your laptop, phone, and smart TV is a Local Area Network (LAN).
  • The internet uses servers (web, file, email) to provide services to client devices.
  • Web hosting involves storing website files on a web server, and domain names are mapped to IP addresses via the Domain Name System (DNS).
  • Client-server networks have a central server managing resources; they offer centralized security and easier backups but are expensive and vulnerable if the server fails.
  • Peer-to-peer (P2P) networks have no central server; each computer is equal, making them cheaper and more resilient to single point failures, but harder to manage centrally.
This section explains how the internet functions and the different models for organizing computer networks, impacting scalability and management.
When you access Google Drive, you are using a client-server model where your device (client) requests data from Google's powerful servers.
  • Hardware like wireless access points, routers, and switches facilitate network connections and data routing.
  • Protocols are sets of rules that govern communication between devices (e.g., HTTP for web pages, FTP for file transfer, SMTP/POP/IMAP for email).
  • IP addresses (IPv4, IPv6) provide logical addressing for devices on networks, while MAC addresses provide unique physical hardware identification.
  • The Domain Name System (DNS) translates human-readable domain names into IP addresses.
These components and rules are the building blocks that enable devices to communicate reliably and securely across networks.
When you type a website address into your browser, DNS translates that name into an IP address so your computer knows where to send the request.
  • Cloud computing provides services (storage, processing) over the internet, offering scalability, accessibility, and collaboration but requiring a stable internet connection and raising security concerns.
  • Network topology describes the physical or logical layout of a network.
  • A star topology connects all nodes to a central switch, offering reliability and ease of management but failing if the central switch fails.
  • A mesh topology connects nodes to multiple other nodes, providing high reliability and redundancy as data can find alternative routes, but it is expensive and complex to set up.
Understanding cloud services and network layouts helps in choosing appropriate infrastructure for data storage, access, and communication, balancing benefits and drawbacks.
Using services like Google Drive or iCloud to store your files remotely is an example of cloud computing.
  • Wired connections (e.g., Ethernet) offer faster speeds, lower latency, and better security but restrict movement.
  • Wireless connections (e.g., Wi-Fi) offer freedom of movement and ease of setup but typically have slower speeds, higher latency, and are less secure.
  • Encryption scrambles data using a key to protect it from interception, converting plain text to cipher text.
  • IP addresses (logical) and MAC addresses (physical) are crucial for directing data to the correct devices on networks.
  • Protocols like TCP/IP, HTTP, HTTPS, FTP, SMTP, POP, and IMAP define rules for different types of network communication.
This section covers the practical aspects of connecting devices and securing data transmission, highlighting trade-offs between different connection types and security measures.
HTTPS encrypts the data exchanged between your browser and a website, making it secure even if intercepted.
  • Malware is software designed with malicious intent, including viruses, worms, Trojans, spyware, ransomware, rootkits, and adware.
  • Viruses attach to files and spread via user action; worms self-replicate across networks.
  • Trojans disguise themselves as legitimate software; spyware secretly collects information.
  • Ransomware locks files and demands payment; rootkits hide their presence to grant unauthorized access.
  • Adware displays unwanted advertisements.
  • Protection measures include anti-malware software and firewalls.
Understanding malware types and protection strategies is essential for safeguarding personal data and computer systems from cyber threats.
Ransomware encrypts your files and demands money for their decryption, preventing you from accessing your own data.

Key takeaways

  1. 1The CPU's fetch-execute cycle, driven by components like the CU, ALU, and registers, is the core of computer processing.
  2. 2CPU performance is enhanced by factors like clock speed, cache memory, and multiple cores, impacting overall system responsiveness.
  3. 3Understanding the distinctions between volatile RAM and non-volatile ROM, as well as the roles of secondary and virtual memory, is key to data management.
  4. 4Solid-state storage offers significant advantages in speed and durability over magnetic and optical storage, despite a higher cost per gigabyte.
  5. 5Data is fundamentally represented in binary, with decimal and hexadecimal serving as more human-readable formats for representation and conversion.
  6. 6Image and sound file sizes are determined by resolution, color depth, sample rate, and bit depth, with compression techniques used to manage these sizes.
  7. 7Networks are categorized as LANs or WANs, with performance influenced by bandwidth, latency, and other factors, while client-server and P2P architectures offer different approaches to network organization.
  8. 8Protocols and security measures like encryption are vital for reliable and safe data communication across networks, protecting against threats like malware.

Key terms

CPUFetch-Execute CycleRAMROMSecondary StorageSolid State Drive (SSD)BinaryDecimalHexadecimalCharacter SetASCIIUnicodePixelResolutionColor DepthSample RateBit DepthLossy CompressionLossless CompressionLANWANBandwidthLatencyClient-Server NetworkPeer-to-Peer NetworkProtocolIP AddressMAC AddressDNSCloud ComputingNetwork TopologyStar TopologyMesh TopologyEncryptionMalwareFirewall

Test your understanding

  1. 1How do the Control Unit, ALU, and registers work together during the fetch-execute cycle?
  2. 2What are the key differences between RAM and ROM, and why are they both necessary in a computer system?
  3. 3Compare and contrast the characteristics of magnetic, optical, and solid-state secondary storage, and explain which is generally preferred for modern computing and why.
  4. 4Explain the relationship between binary, decimal, and hexadecimal number systems and provide an example of converting a decimal number to binary.
  5. 5How do resolution and color depth affect the file size and quality of a bitmap image?
  6. 6What is the fundamental difference between lossy and lossless compression, and in what scenarios would each be most appropriate?
  7. 7Describe the main differences between a client-server network and a peer-to-peer network, including their advantages and disadvantages.
  8. 8What is the role of protocols like HTTP and HTTPS in internet communication, and how does encryption enhance security?

Turn any lecture into study material

Paste a YouTube URL, PDF, or article. Get flashcards, quizzes, summaries, and AI chat — in seconds.

No credit card required