Please enable JavaScript.
Coggle requires JavaScript to display documents.
Computer Science Master - Coggle Diagram
Computer Science Master
-
Unit 1
-
1.2
Memory
RAM
RAM stands for Random Access Memory which stores a copy of all the programs that the computer is using. This allows the CPU to access them quickly so is called IAS or Immediate Access Store. RAM is a lot quicker than the Hardrive
It is called Volatile Memory because when RAM loses power all the data is lost and cannot be retrieved
IAS
It uses DRAM which is slower the SRAM and constantly needs to be refreshed however it is cheaper and requires less transistors and capacitors. It is the more common type so you have more in a computer
Cache
It uses SRAM which is faster the DRAM and does not constantly need to be refreshed however it is more expensive and requires 6 times transistors and capacitors. It is the less type so you have less in a computer
-
Virtual Memory
It is when the RAM gets to full so allocates a part of the Hardrive to be used like RAM. The Computer however has to swap in and out programs when they need to be used.
Because the RAM is faster than the Hardrive their is delay between the swapping. If the computer has to swap out to much, it will slow down and could crash all together. This is called Disk Thrashing
Flash Memory
Flash Memory also known Solid State Devices. This is because they do not have any moving parts. They are completely electronic
These include SD cards, ROM Chips, Pen Drives
-
-
-
1.3
Storage
Secondary Storage
Secondary Storage is crucial if you want to access something later. Some examples it saves the Operating System or your contacts, photos and videos.
-
Types of Storage
Optical -- A lazer burns a pattern into the surface of the disk. Another lazer skims over the disk, if the dot is reflected differently if there is or ins't a dot there. That's how the data is read
-
-
-
-
-
-
Magnetic - When the tape is magnetised it kept there magnetism. The tape is divided into million of tiny segments. Being magnetised and being demagnetised represents binary
-
-
-
-
-
-
Solid State -- They use a electrical circuits where semi-conductor material where a pattern of on/off switchs
-
-
-
-
Reliability
It has a limited number of read and write cycles which limits its useful time, However the SS are usually very reliable.
-
-
1.4
-
Wireless
A Modem works by taking the digital signals from a computer and turn them into analogue signals. These are passed down a phone line where another modem picks them up and turns them back into digital.
A Broadband router combines a switch and a modem. The router allows many computers to connect to the broadband network. It also has a admin area
File Compression
That means that the raw sound or movie file has a maths formula applied to it (called a 'codec', short for coder / decoder) so that the raw file gets squashed or 'compressed'. The file then becomes much smaller in size so it can be downloaded and streamed more quickly.
Security
Encryption
Encrypting data scrambles the data with a maths formula or "key" which turns the data into seemingly unrelated characters. Encrypted data is called Cipher text and un-encrypted is called plain text
The different types are WAP, WAP2 and WEP however this should not be used as it is weak
Access Levels
User access levels control parts of network different groups can access. High authority have higher access levels allowing them to see more sensitive data. They also have the ability to change people's access levels.
Passwords
Password are the most common way to prove your identity. They should be strong with a range of characters and should be changed regularly
Forms of Network
-
Peer-to-Peer Network
-
-
Each computer on the network needs to be ,maintained separately
-
-
-
-
-
DNS
A DNS is a server that when a domain name is searched in the URl it looks up that domain name on its database and finds the matching IP Address and forwards the request on using that IP address
A Network policy is a set of rules or expectations that explain how a person should act and behave on a device. It may also describe responses to certain situations
1.5
Topologies, protocals & layers
Ethernet
-
Medium - Type of cable, CAT 5 or fibre optic
-
-
-
-
Topologies
Star
-
-
-
Disadvantages
-
If hub/switch goes down, so does the network
-
-
Mesh
Is where all the nodes are connected to each other or most of them. Usually the node they exchange the most data
-
-
-
-
Network Protocols
-
-
Transmission Control Protocol is the other part of the Internet protocol suite which deals with the order of the transferred data as well as controlling traffic on the internet. Opens the link between nodes
IP or the Internet Protocol and is part of the Internet protocol suite for relaying data packets through different networks. Finds routes
-
IMAP
Is about receiving messages, however it saves a temporary copy of the message onto the node, stores the message on sever and synchronises across devices
-
Tethering
Tethering allows a phone with data access to setup a Wi-Fi hotspot for devices that can only use Wi-Fi. It has a name and password and they can gain access.
-
Packet Switching
The email is split into equal sizes of data packets and sent across the internet in this case. Each package takes its own route to allow for the most efficient use of the bandwidth; finding the best path for itself, going from network to network.
Each packet has: the address of the sender, destination address, packet number, packet reassembling information and a check sum for error detection.
When a packet is received, a confirmation message is sent back to tell the computer to stop trying to send the message
-
1.6 :
-
Password Policy
-
-
-
-
-
Security
-
Mix of numbers, upper and lower case, symbols
Don't use names, dictionary words, dates or common passwords
-
-
-
-
Man, in the Middle – Form of data interception.
SQL Injections – Attacking a database by typing special code into the log in box to access confidential info and delete, change, or add users
-
1.8
Ethical. legal. moral, cultural & environmental issues
-
Computer Misuse Act 1990
-
-
-
Making, supplying or obtaining anything which can be used in computer misuse offences
Copyright, Designs and Patents Act (1988)
-
-
-