Uploaded by Andrew Holt

9.1-Computer-Science Knowledge Organisers

advertisement
Year 9.1 Knowledge Organiser
E-safety
Identity Theft:
Crime stealing someone’s
identity and impersonating them
It is illegal and could cause distress to
someone
Social Engineering and Phishing:
Tricking someone into giving away their
personal details. Phishing is done over
an email
Digital Footprint:
The trail of data you create when
online visiting websites
Central Processing Unit (CPU)
Is used for processing data
(the brains of the computer)
Control Unit (CU)
Controls and monitors the hardware
attached to the system
Arithmetic Logic Unit (ALU)
Carries out the arithmetic and logical
operations
Instructions will be
fetched, decoded,
then executed
Memory
Random Access Memory (RAM):
➢ Temporary Memory
➢ Volatile – needs power to retain memory
➢ Stores the programs and data that is
currently in use
Logic Gates
Computer Science
Department
Binary (Base 2)
128-64-32-16-8-4-2-1
0
0
1
1
1011 = 8+0+2+1= 11
2
2
Hex
Base 16
3
3
Read Only Memory (ROM):
➢ Non Volatile – does not need power to retain
memory
➢ Tells the computer how to start
Virtual Memory:
➢ When the RAM is full
➢ Secondary storage is used as temporary RAM
➢ Data is moved to VM and back to RAM when
needed
Networks
Two or more computers connected together to
share resources
Topology:
The arrangement of a network
AF
A
F
4
4
10
15
5
5
1010
1111
6
6
7
7
8
8
9
9
10101111
Database:
Table:
Collection of related data held in a
structured format
Little Man Computer
(LMC)
CPU Simulator
*peterhigginson.co.uk/LMC
A 10
Query:
Ask your database a question
B 11
Report:
Displaying the results of your queries
D 13
Structured Query Language (SQL):
Manipulating a database
C
ADD
INP
DAT
SUB
OUT
BRZ
Sound Representation
Sound is stored in binary
Sample rate - the number of audio samples captured
every second
Bit depth - the number of bits available for each clip
Bit rate - the number of bits used per second of audio
STA
BRP
BRA
LDA
HLT
12
E
14
F
15
Download