{"id":1972,"date":"2018-05-24T11:22:50","date_gmt":"2018-05-24T11:22:50","guid":{"rendered":"https:\/\/blogs.glowscotland.org.uk\/nl\/ColtnessHS-ComputingScience\/?page_id=1972"},"modified":"2018-09-20T19:22:28","modified_gmt":"2018-09-20T18:22:28","slug":"computer-systems","status":"publish","type":"page","link":"https:\/\/blogs.glowscotland.org.uk\/nl\/ColtnessHS-ComputingScience\/higher\/computer-systems\/","title":{"rendered":"Computer Systems"},"content":{"rendered":"<table>\n<thead>\n<tr>\n<td width=\"110\">\n<h2>Topic<\/h2>\n<\/td>\n<td width=\"295\">\n<h2>Computer Systems (CS) &#8211; Higher (v2.1)<\/h2>\n<\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td width=\"110\">\n<h3>Data representation<\/h3>\n<\/td>\n<td width=\"295\">Describe and exemplify the use of binary to represent positive and negative integers using two\u2019s complement, including the range of numbers that can be represented using a fixed number of bits.<\/p>\n<p>Conversion of two\u2019s complement numbers from binary to denary and vice versa.<\/p>\n<p>Describe and exemplify floating-point representation of positive and negative real numbers, using the terms mantissa and exponent.<\/p>\n<p>Describe the relationship between the number of bits assigned to the mantissa\/exponent, and the range and precision of floating-point numbers.<\/p>\n<p>Describe Unicode used to represent characters and its advantage over extended ASCII code (8-bit) in terms of numbers of characters.<\/p>\n<p>Describe the relative advantages and disadvantages of bit-mapped graphics versus vector graphics.<\/td>\n<\/tr>\n<tr>\n<td width=\"110\">\n<h3>Computer structure<\/h3>\n<\/td>\n<td width=\"295\">Describe the concept of the fetch-execute cycle.<\/p>\n<p>Describe the factors affecting computer system performance:<\/p>\n<ul>\n<li>number of processors (cores)<\/li>\n<li>width of data bus<\/li>\n<li>cache memory<\/li>\n<li>clock speed<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"110\">\n<h3>Environmental impact<\/h3>\n<\/td>\n<td width=\"295\">Describe the environmental impact of intelligent systems:<\/p>\n<ul>\n<li>heating systems<\/li>\n<li>traffic control<\/li>\n<li>car management systems<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"110\">\n<h3>Security risks and precautions<\/h3>\n<\/td>\n<td width=\"295\">Describe and identify the implications for individuals and businesses of the Computer Misuse Act 1990:<\/p>\n<ul>\n<li>unauthorised access to computer material<\/li>\n<li>unauthorised access with intent to commit a further offence<\/li>\n<li>unauthorised modification of programs or data on a computer<\/li>\n<\/ul>\n<p>Describe and identify the security risks of:<\/p>\n<ul>\n<li>tracking cookies<\/li>\n<li>DOS (Denial of Service) attacks:\n<ul>\n<li>symptoms\n<ul>\n<li>slow performance, inability to access<\/li>\n<\/ul>\n<\/li>\n<li>effects\n<ul>\n<li>disruption to users and businesses<\/li>\n<\/ul>\n<\/li>\n<li>costs\n<ul>\n<li>lost revenue, labour in rectifying fault<\/li>\n<\/ul>\n<\/li>\n<li>type of fault\n<ul>\n<li>bandwidth consumption, resource starvation, Domain Name Service (DNS)<\/li>\n<\/ul>\n<\/li>\n<li>reasons\n<ul>\n<li>financial, political, personal<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>Describe how encryption is used to secure transmission of data:<\/p>\n<ul>\n<li>use of public and private keys<\/li>\n<li>digital certificates<\/li>\n<li>digital signatures<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Topic Computer Systems (CS) &#8211; Higher (v2.1) Data representation Describe and exemplify the use of binary to represent positive and negative integers using two\u2019s complement, including the range of numbers that can be represented using a fixed number of bits. Conversion of two\u2019s complement numbers from binary to denary and vice versa. Describe and exemplify &hellip;<\/p>\n","protected":false},"author":32,"featured_media":1386,"parent":763,"menu_order":4,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1972","page","type-page","status-publish","has-post-thumbnail","hentry"],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blogs.glowscotland.org.uk\/nl\/ColtnessHS-ComputingScience\/wp-json\/wp\/v2\/pages\/1972","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.glowscotland.org.uk\/nl\/ColtnessHS-ComputingScience\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/blogs.glowscotland.org.uk\/nl\/ColtnessHS-ComputingScience\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.glowscotland.org.uk\/nl\/ColtnessHS-ComputingScience\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.glowscotland.org.uk\/nl\/ColtnessHS-ComputingScience\/wp-json\/wp\/v2\/comments?post=1972"}],"version-history":[{"count":4,"href":"https:\/\/blogs.glowscotland.org.uk\/nl\/ColtnessHS-ComputingScience\/wp-json\/wp\/v2\/pages\/1972\/revisions"}],"predecessor-version":[{"id":2108,"href":"https:\/\/blogs.glowscotland.org.uk\/nl\/ColtnessHS-ComputingScience\/wp-json\/wp\/v2\/pages\/1972\/revisions\/2108"}],"up":[{"embeddable":true,"href":"https:\/\/blogs.glowscotland.org.uk\/nl\/ColtnessHS-ComputingScience\/wp-json\/wp\/v2\/pages\/763"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blogs.glowscotland.org.uk\/nl\/ColtnessHS-ComputingScience\/wp-json\/wp\/v2\/media\/1386"}],"wp:attachment":[{"href":"https:\/\/blogs.glowscotland.org.uk\/nl\/ColtnessHS-ComputingScience\/wp-json\/wp\/v2\/media?parent=1972"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}