Arrangements – Computer Systems

Data representation

  • Representation of positive numbers in binary  including place values and range up to and including 32 bits
  • Conversion from binary  to  decimal and vice versa
  • Description of the representation of negative numbers  using two’s complement using examples  of up to 8 bit  numbers
  • Description of the relationship between the number of bits assigned to the mantissa/exponent and the range and  precision of floating point  numbers
  • Conversion to  and from  bit, byte, Kilobyte, Megabyte, Gigabyte, Terabyte. (Kb, Mb, Gb,  T b )
  • Description of  Unicode and its advantages over ASCII
  • Description of the bit map  method of graphic representation using  examples of colour/grey scale bit maps
  • Description of  the relationship of  bit depth to  the number of colours using exam ples up to and including  24 bit depth  (true colour)
  • Description of the vector graphics  method of graphic representation
  • Description of  the relative advantages and disadvantages of bit mapped and  vector graphics
  • Description of  the relationship between the bit depth  and file size
  • Explanation of  the need for data compression using  the storage of bitmap graphic files, as examples

Computer structure

  • Detailed description of the purpose of the ALU and control unit
  • Description of the purposes of registers:
    • to hold data being processed
    • instructions being executed
    • addresses to be accessed
  • Description of the function of the data bus and the address bus
  • Description of the read, write and timing functions of the control lines
  • Identification of other control lines, including reset and interrupt lines
  • Simple description, referring to the appropriate buses and control lines, of the steps in the fetch-execute cycle
  • Description of the following elements of computer memory : registers, cache, main  memory, backing storage
  • Distinction between the above elements of memory according to function and speed of access
  • The concept of addressability
  • Description and evaluation of the following measures  of performance:
    • clock speed
    • MIPS
    • FLOPS
    • application based tests
  • Description of the effect the following factors have on system performance:
    • data bus width
    • use of cache memory
    • rate of data transfer to and from peripherals
  • Description of current trends in computer hardware, including
    • increasing clock speeds
    • increasing memory
    • backing storage capacity

Peripherals

  • Description of  the use and advantages of buffers and spooling
  • Description of a suitable selection of hardware,  including peripherals, to support typical tasks including
    • production  of a  multimedia catalogue
    • setting up a LAN in a school
    • development of a school website
  • Justification of the hardware selected in terms of  appropriate characteristics including
    • resolution
    • capacity
    • speed
    • cost
    • compatibility
  • Description of the features,  uses and advantages  of solid state storage devices including flash cards
  • Description of the development trends in backing storage devices
  • Description of the following functions of an interface:
    • buffering
    • data format conversion (serial to parallel)
    • data format conversion (analogue to  digital)
    • voltage  conversion
    • protocol  conversion
    • handling of status signals
  • Distinction between parallel and serial interfaces
  • Description and explanation of the current trends towards increasing  interface speeds and wireless communication between peripherals and CPU

Networking

  • Comparison of LANs, WANs, Intranet and Internet  work in terms  of
    • transmission media
    • bandwidth
    • geographical spread
    • functions
  • Distinction between a  main frame with terminals and  a network of computers
  • Descriptive comparison of peer-to-peer networks and client server  networks
  • Description of  the functions of file, print and web servers
  • Description of  a node and  a channel
  • Description of  bus, star, ring  and mesh topologies using the terms node and channel
  • Description of the consequences for each of the above topologies of node and channel failure
  • Simple description  of the functions  and  uses of a hub, switch and router
  • Identification of the need for a network interface card (NIC)
  • Description and explanation of the trends towards higher bandwidth and wireless communications
  • Description of the following technical reasons  for the increasingly  widespread use of networks:
    • advances in computer hardware
    • including processors
    • main memory  capacity
    • backing  storage
    • data transfer rates
    • improved network related software, including
      • browsers
      • network operating systems
  • Description of the misuse of networks for the following illegal purposes:
    • breaching copyright
    • hacking
    • planting viruses
  • Description of  the application of the following to the misuse of networks
    • the Computer Misuse Act
    • the Copy right  Designs and Patents Act
    • the Data Protection Act

Computer software

  • Description of the function of a bootstrap loader
  • Description and exemplification of the main functions of a single user operating system :
    • interpreting users commands,
    • file management,
    • memory  management,
    • input/output management,
    • resource allocation,
    • managing processes
  • Definition of a utility  program
  • Description of utility  programs including:
    • virus checker
    • disk editor
    • defragmenter
  • Description of the standard file formats for graphics files:
    • jpeg
    • gif
    • TIFF
  • Description of  a suitable selection of software to support typical tasks including:
    • production of  a multimedia catalogue
    • setting up a LAN in a school
    • development of a school website
  • Description and exemplification of software compatibility  issues
    • including memory and storage requirements
    • OS compatibility
  • Classification of viruses by type of file infected:
    • file virus
    • boot  sector virus
    • macro virus
  • Description of  the following  virus code actions :
    • replication
    • camouflage
    • watching
    • delivery
  • Distinction between
    • a virus
    • a worm
    • a Trojan horse
  • Description of anti-virus software detection techniques:
    • use of checksum
    • searching for virus signature
    • heuristic detection
    • memory  resident monitoring

Leave a Reply

Your email address will not be published. Required fields are marked *

Coltness High School

Report a Glow concern
Cookie policy  Privacy policy

Glow Blogs uses cookies to enhance your experience on our service. By using this service or closing this message you consent to our use of those cookies. Please read our Cookie Policy.