Business and Computer Science

Revision Tools - 1.1.1 Architecture of the CPU

Fetch-execute Cycle
Instructions are fetched one by one from main memory, decoded, and then executed by the processor. This cycle repeats until the program is complete.
CPU (Central Processing Unit)
A chip within the computer which controls the operation of all parts of the computer and decodes then executes program instructions.
ALU (Arithmetic Logic Unit)
The part of the CPU responsible for arithmetic and logical operations.
Processor Cache
High speed memory built into the CPU. Instructions are copied to cache memory allowing them to be accessed more quickly and therefore increasing the speed of the CPU.
Register
A small area of memory within the CPU where data is stored temporarily to avoid the delay in copying to and from main memory,
Von Neumann Architecture
The design on which most computers are based. It defines several registers along with the fetch-execute cycle and how the CPU interacts with main memory.
MAR (Memory Address Register)
A register. It contains the address of the instruction currently being read from or written to main memory.
MDR (Memory Data Register)
A register. It contains the instruction which has just been copied from main memory.
Program Counter
A register. It contains the address of the next instruction to be fetched from memory. It is updated each time a new instruction is fetched to contain the address of the next needed instruction.
Accumulator
A register. Stores the result of the last operation.
Control Unit
Manages all of the components of the CPU. Decodes the instructions from the MDR.

Back to Top

Revision Tools - 1.1.2 CPU Performance

Clock Speed
How many instruction cycles the CPU can deal with in a second. Measured in MHz or GHz. Faster is better.
Cache Size
The larger the amount of cache the CPU has the more instructions it can store without having to transfer to main memory and therefore the faster it will perform.
Cores
Some CPUs have more than one core, each containing its own ALU and registers and therefore capable of carrying out instructions independently. The more cores, the more instructions the CPU can process at once and therefore the faster it performs.

Back to Top

Revision Tools - 1.1.3 Embedded Systems

Embedded System
Specialist hardware and software build into a device with a single specific purpose. They are usually found within appliances such as washing machines.

Back to Top

Revision Tools - 1.2.1 - Primary Storage (Memory)

Primary Storage
Also known as memory. Holds the data, programs and instructions currently in use.
RAM
Random Access Memory. Stores programs and data before they are processed by the CPU. Read/write memory, meaning the contents can be changed. The contents are lost when the computer is turned off.
ROM
Read Only Memory. Data can be retrieved but not changed and the contents are not lost when the computer is turned off. Used to store programs for embedded system.
Volatile Memory
Data stored in volatile memory is lost when the computer is turned off.
No-Volatile Memory
Data stored in non-volatile memory is not lost when the computer is turned off.
Virtual Memory
Space on the computer's hard drive used as main memory (RAM). Virtual memory is slower than main memory.

Back to Top

Revision Tools - 1.2.2 Secondary Storage

Optical Storage
A type of secondary storage which stores data on a spinning plastic or metal disk. Data is read from and written to the disk using a laser.
Magnetic Storage
A type of secondary storage which uses magnetic fields to store data. A read/write head reads and writes data from the media.
Solid State Storage
A type of secondary storage which uses flash memory to store data. They have no moving parts and are much faster than optical or magnetic storage.
HDD (Hard Disk Drive)
A magnetic storage drive which can store large amounts of data and is often the main method of secondary storage in personal computers. The drive contains a number of internal disks and a read/write head used to read and write data.
DVD (Digital Versatile Disk)
A high capacity optical storage disk commonly used for video storage. A range of capacities are available up to 17GB.
CD (Compact Disk)
An optical storage disk often used to store music. Capacity is usually around 800mb.
SSD (Solid State Drive)
A solid state storage drive which carries out the function of a traditional HDD. They are much faster than HDDs and less easy to damage as they have no moving parts. They are also more expensive and usually lower capacity.

Back to Top

Revision Tools - 1.2.3 Units

Bit
The smallest unit of storage, containing a binary 1 or 0.
Nibble
4 bits (half a byte)
Byte
8 bits
Kilobyte (KB)
1000 bytes
Megabyte (MB)
1000 KB
Gigabyte (GB)
1000 MB
Terabyte (TB)
1000 GB
Petabyte (PB)
1000 TB
Binary
A number system used by computers. It contains only two symbols, 0 and 1 and is also known as base 2.

Back to Top

Revision Tools - 1.2.4 Data Storage

Denary
The number system most often used by people. It uses the digits 0 to 9 and is also known as base 10 decimal.
Integer
A whole number with no decimal point or fraction. E.g. 1, 100 or 88122
Overflow Error
This happens when not enough space has been allocated to store the results of a calculation. For example, if one byte has been allocated but the result is 9 bits long.
Hexadecimal
A number system used by computers. It contains only two symbols, 0 and 1 and is also known as base 2.
Binary Shift
A process used to perform maths on binary numbers. It involves moving all the digits to the left or right.
Most Significant Bit
The furthest left digit in a string of binary numbers, its position means it has the highest value.
Least Significant Bit
The furthest right digit in a string of binary numbers, its position means it has the lowest value.
Character
A single symbol, for example a letter, number or punctuation mark.
Character Set
A system for representing characters in binary, each character is assigned a unique binary number.
ASCII
American Standard Code for Information Interchange. A 7 bit character set used to represent characters.
Unicode
A much larger character set created to overcome the limited number of characters available in ASCII. It includes symbols from different language characters as well as symbols such as emoji.
Pixel
Short for Picture Element. Pictures on a computer are divided into a grid, with each square in the grid being one pixel which can be a single colour.
Metadata
Additional data about a file such as when it was created or who created it. Commonly used with photos to store things like the make of camera or location the photo was taken.
Colour Depth
The amount of bits available for colours in an image. The higher the colour depth the more colours available and therefore the more realistic the image will appear.
Resolution
The number of pixels an image is divided into. The higher the resolution the more pixels in the image and the clearer it will be.
Sample Rate
The number of samples taken in one second. This is measured in hertz (Hz), 1Hz is one sample per second. The higher the sample rate the more samples per second and therefore the higher the quality of the file.
Bit Depth
The number of bits available for each sample. The higher the bit depth, the more bits available and therefore the better the quality.

Back to Top

Revision Tools - 1.2.5 Compression

Compression
A way of reducing the size of a file. It is often used with photos, music and video files.
Lossy Compression
A compression method which reduces the file size by removing certain data. The original file cannot be restored from the compressed version but the file is reduced by more than with lossless compression.
Lossless Compression
A compression method which reduces the file size without losing any data. The original file can be restored from the compressed version, but the file size is not reduced by as much.

Back to Top

Revision Tools - 1.3.1 Networks and topologies

Network
Two or more computers connected together for the purposes of sharing data or resources.
LAN (Local Area Network)
A network which covers a small geographic area such as a single building. Equipment owned by a single company.
WAN (Wide Area Network)
A network which covers a large geographic area. Connections between site owned by third party.
Client – Server
A network setup where resources or processing are carried out by a central computer (called a server) with other devices (called clients) accessing resources via the network.
Peer to Peer
A network setup where all computers have an equal status and function as both client and server.
Wireless Access Point
Uses a wireless network to allow devices to connect wirelessly to an existing network.
Router
A device which connects two or more different networks together allowing them to communicate with one another. Uses IP Address.
Switch
A device which provides computers and other devices with a wired connection to a network. Uses MAC address.
NIC (Network Interface Card)
A component within a computer or other device which allows it to connect to a network. The card provides the physical connection to the network. Provides MAC address.
Transmission Media
The physical connection which carries data between network devices. This could be a cable (Ethernet) or wireless signals (Wi-Fi or Bluetooth) depending on the network.
DNS (Domain Name System)
A system which links a URL or other human readable name with an IP address.
Hosting
The storing of files or other data on a server. The server storing the data is called the host.
The Cloud
A term for accessing storage or other resources remotely across the Internet.
Web Server
A server which hosts websites and pages for users to access, usually via the Internet.
Network Topology
The way in which computers and other network devices are connected together.
Star Network
A network topology where all devices connect back to a single central point. All communications travel via the central point.
Mesh Network
A network topology where all devices are connected to each other rather than a central point.
Bandwidth
The amount of data which can be transferred via a network in any given time. More bandwidth allows more data to travel across the network at the same time resulting in faster transfer speeds.
The Internet
A global network connecting millions of computers and other devices.
URL (Uniform Resource Locator)
A human readable name given to websites and other Internet resources. DNS is used to translate the URL into the IP of the web server.
Client
A computer or other device which accesses data from a central server.

Back to Top

Revision Tools - 1.3.2 Wired and Wireless Networks, Protocols and Layers

Ethernet
A physical copper cable used to connect devices on a network. The term also refers to the protocols and standards used to control how data is sent and received on the cable.
Wi-Fi
A technology which uses wireless signals to connect network devices.
Bluetooth
A short-range wireless networking technology. It has relatively low range and speeds and is most often used for peripheral devices such as mice or headsets.
Encryption
The process of converting data so that it cannot be easily read or understood without first being decrypted. It is often used to keep important data secure when sharing it over a network.
IP Address
Stands for Internet Protocol Address. A unique address assigned to every computer on a network.
IPv4
Answer
IPv6
Internet Protocol Version 4. Devices are assigned addresses made up of four numbers separated by dots (e.g. 232.12.11.1), each number can be between 0 and 255.
Question
Internet Protocol Version 6. Designed in response to the limited number of addresses in IPv4. Devices are assigned an address made up of eight groups of hexadecimal characters.
MAC Address
Media Access Control Address. A 12-digit hexadecimal number assigned to a network interface card. Each card has its own unique MAC address which is assigned when the card is made.
Standard
An agreed way of doing something allowing different people and organisations to make products and services which work together.
Protocol
An agreed set of rules for how network communications should take place.
TCP/IP
Transfer Control Protocol / Internet Protocol. A group of standards which control how data is sent and received over networks including the Internet.
HTTP
Hypertext Transfer Protocol. A standard for transferring web pages between a client and web server. It is based around the idea that clients send a request which the server responds to.
HTTPS
Hypertext Transfer Protocol Secure. A version of HTTP with security added. Commonly used for accessing secure websites such as online banking.
FTP
File Transfer Protocol. A standard for file transfer over networks.
POP
Post Office Protocol. A standard used by email clients to retrieve emails from an email server.
IMAP
Internet Message Access Protocol. A standard used by email clients to access emails stored on an email server. It allows emails to be stored and organised on the mail server.
SMTP
Simple Message Transfer Protocol. A standard used for the sending of emails over networks and the Internet.

Back to Top

Revision Tools - 1.4 Network Security

Malware
A term for any software which is designed with malicious intent. Malware may damage the computer, monitor user activity and files, or delete or damage data. There are many different types of malware which behave in different ways.
Social Engineering
Attempting to gain access to computer systems by targeting the people using the system instead of using technical measures to attack the system itself. People are often the weakest security point. Examples include watching someone enter their password or pretending to be their boss to trick them into acting.
Phishing
Attempting to trick someone into revealing information such as passwords or financial details by pretending to be someone else. Phishing usually takes place by email and involves messages pretending to come from trusted organisations.
Brute-force Attack
Attempting to guess a code or password by trying every possible solution until the correct one is found. This may involve using common passwords, dictionary words, or systematic combinations.
Denial of Service Attack (DoS)
Attempting to send more traffic or data to a computer system than it can handle. If successful, parts of the system or the whole system may become slow or fail.
Data Interception
Attempting to access data while it is being transferred between devices, usually over a network. Attackers may steal usernames, passwords, or files without the user knowing.
SQL Injection
Entering SQL code into a data input field on a website or application. If the system is not properly coded, the code may run on the database, allowing attackers to access, change, or delete data.
Penetration Testing
An authorised hacking attempt where a person or company attempts to hack into a system and reports their findings. This allows security weaknesses to be identified and fixed.
Anti-Malware Software
Software designed to detect, prevent, and remove malware from a computer system. Anti-virus software is a common example.
Firewall
A network security device which checks traffic passing through it against a set of rules. Only permitted traffic is allowed through.
User Access Level
Controlling which parts of a system or network users can access. This prevents unauthorised access and reduces accidental damage.
Password
Answer
Encryption
The process of converting data so that it cannot be easily read without being decrypted. Used to protect data during storage or transmission.

Back to Top

Revision Tools - 1.5.1 Systems Software

Operating System (OS)
Controls the operation of all aspects of the computer and provides an interface by which a user can interact with the computer.
User Interface
A part of the operating system or other software which allows a user to interact with and control it. Usually includes graphical elements and methods such as typing commands, clicking, or touching the screen.
Memory Management
A function of the operating system which manages the computer’s memory, controlling how memory is used and which applications can access it.
Multitasking
The ability of an operating system to run more than one task or application at the same time.
Peripheral Management
The ability of an operating system to control and manage hardware devices such as printers, mice, or speakers connected to the computer.
Device Driver
Computer code which provides instructions for how the operating system should interact with a specific piece of hardware. Drivers are specific to the operating system and hardware device.
User Management
A function of the operating system which manages user accounts. Multiple users may have separate usernames, passwords, and access rights.
File Management
A function of the operating system which manages files and folders stored on internal or external storage devices.
Access Rights
A function of the operating system which controls the access different users and applications have to various parts of the system.

Back to Top

Revision Tools - 1.5.2 Utility Software

Encryption
The process of converting data so that it cannot be easily read or understood without first being decrypted. It is often used to keep important data secure when sharing it over a network.
Defragmentation
Software which reorders files stored on a hard disk so that they run in a sensible order to improve performance and efficiency.
Data Compression
Software which compresses data so that it takes up less storage space.

Back to Top

Revision Tools - 1.6 Ethical, Legal, Cultural and Environmental Impacts of Digital Technology

Ethical
The idea of right and wrong by which people should behave. This is not the same as what is legal or illegal, but the idea of always doing the right thing.
Legal
A set of rules which lay out what people are not allowed to do and the punishments for breaking these rules. Laws vary from country to country.
Cultural
A set of behaviours and expectations which people accept as normal within daily life. These are not enforced by law but influence how people expect things to work.
Environmental
Matters relating to the natural world around us and making sure we take care of things like animals, the atmosphere, and the planet.
Privacy
The expectation that certain information is kept secret, usually relating to personal information people would not want shared.
The Data Protection Act (2018)
A UK law governing how organisations process personal data. It outlines requirements for handling data and the rights of individuals.
Computer Misuse Act (1990)
A UK law which makes misuse of computer systems illegal under defined criteria.
Copyright, Designs and Patents Act (1998)
A UK law providing legal protection for creative works and materials. It explains available protections and registration requirements.
Software License
The legal right for a user or organisation to use software. It is an agreement outlining rules, restrictions, and possible fees.
Open Source Software
Software where the source code is publicly available for anyone to view, modify, and use. Often free to use.
Proprietary Software
Software where the source code is owned and not available to the public.

Back to Top

Revision Tools - 2.1 Computational Thinking

Computational Thinking
The process of thinking about a problem using computational means in order to create a solution which a computer can implement.
Abstraction
The process of removing irrelevant or unnecessary information from a problem in order to better understand the basic parts of it.
Decomposition
The process of breaking a problem down into smaller parts to make it easier to solve.
Algorithmic Thinking
The process of working out the individual steps needed to solve a problem in order to produce an algorithmic solution.

Back to Top

Revision Tools - 2.1.2 Designing, Creating and Refining Algorithms

Algorithm
A sequence of logical instructions to carry out a particular task.
Structure Diagram
A diagram which shows in graphical format the steps needed to solve a problem. There are several different types of structure diagram and a flow chart is one example.
Pseudocode
A way of writing out algorithms or computer programs in a way that sits between full sentences and computer code.
Flowchart
A way of using pictures and shapes to represent the steps needed to solve a problem or that a program will take.
Programming Language
A language which can be understood by computers to produce computer software.
Error
Something wrong in computer code which causes it either not to run at all or to produce an incorrect output.
Trace Table
A table which records the values stored in each of a program’s variables at each stage of the program. It is a useful tool for finding errors in code.

Back to Top

Revision Tools - 2.1.3 Searching and Sorting Algorithms

Search
Finding a value or piece of information within a set of data.
Binary Search
A method of searching an ordered list by checking the middle item, then repeatedly searching either the upper or lower half depending on whether the target value is higher or lower, until found.
Linear Search
A method of searching through a list by checking each item one at a time until the required value is found.
Sort
A method of arranging information into a specific order, such as alphabetical or numerical order.
Bubble Sort
A sorting method that compares items in a list two at a time and swaps them if they are in the wrong order. The process repeats until the list is sorted.
Merge Sort
A sorting method that divides a list into smaller parts until individual items remain, then merges them back together in the correct order.
Insertion Sort
A sorting method that builds a sorted list one item at a time by placing each item into its correct position.

Back to Top

Revision Tools - 2.2.1 Programming Fundamentals

Variable
A named value in which data can be stored by a computer program. The data can be changed as the program runs.
Constant
A named value which is accessed by a computer program but is fixed and cannot be changed.
Operator
Symbols or words that compare or modify values in computer code, such as +, <, or NOT.
Input
Data or information that is put into a program, either by a user or from a device such as a sensor.
Output
Data or information that a program produces. It may be displayed on a screen, printed, or saved to a file.
Assignment
The process of placing a value into a variable. Uses the single equal sign.
Sequence
Executing a set of steps in a specific order.
Selection
Choosing different paths through code depending on a condition.
Iteration
Repeating a set of steps multiple times
Count Controlled Loop
A loop that repeats a set number of times using a counter. A for loop.
Condition Controlled Loop
A loop that repeats until a specified condition is met.
Arithmetic Operator
An operator that performs mathematical calculations, such as +, -, *, or /.
Boolean Operator
An operator that uses logical conditions to compare values, such as <, AND, OR, or NOT.

Back to Top

Revision Tools - 2.2.2 Data Types

Integer
A whole number without a decimal point or fraction, e.g. 1,100 or 88122.
Real
A number which may include a decimal point, such as 11.2.
Boolean
A value which can only be TRUE or FALSE.
Character
A single symbol, for example a letter, number or punctuation mark.
String
A sequence of characters joined together, usually forming a word or sentence.
Casting
The process of converting a value into a different data type, for example storing a telephone number as a string instead of an integer.

Back to Top

Revision Tools - 2.2.3 Additional Programming Techniques

String Manipulation
A broad term for the different ways of changing or modifying strings.
Concatenation
The process of joining two or more strings together.
Slicing
The process of splitting a string into two or more parts.
File Handling
Methods that allow computer code to interact with files on storage devices, such as opening, reading, or writing data.
Record
A single row of related information in a database table.
Table
A collection of records and fields stored together in a database.
Field
A specific piece of information within a record, such as a name or address.
SQL
Structured Query Language. A programming language used to manage and query databases.
Array
A collection of data items stored under one name and accessed by a program.
Subprogram
A smaller section of a program designed to perform a specific task.
Function
A type of subprogram that performs a task and always returns a value when called.
Procedure
A type of subprogram that performs a task but does not necessarily return a value.
Random Number
A number generated by a computer unpredictably.

Back to Top

Revision Tools - 2.3.1 Defensive Design

Defensive Design
Designing and building computer code with security, robustness, and ease of maintenance as priorities.
Authentication
A security method that requires a password, code, fingerprint, or another factor to gain access to a system.
Input Validation
The process of checking data entered into a program against rules to ensure it is valid and will not cause errors or damage.
Maintainability
The ability to keep code updated, fix bugs, and add new features easily.
Naming Conventions
Agreed rules for naming variables or subprograms so they are clear and easy to understand. Camel- and snake-case
Indentation
Answer
Question
Adding spaces at the start of lines of code to group statements and improve readability.
Comment
Notes within code that are not executed but explain how the code works.

Back to Top

Revision Tools - 2.3.2 Testing

Testing
The process of trialling a program to ensure it performs as expected.
Iterative Testing
Testing carried out during development while the program is being created.
Final Testing
Testing carried out at the end of development just before the program is released.
Syntax Error
An error that breaks the rules of the programming language and prevents the code from running.
Logic Error
An error that causes the program to produce an incorrect or unexpected output even though it still runs.
Normal Data
Data that the program should accept and process without error.
Boundary Data
Data at the extreme limits of what the program should accept without error.
Invalid Data
Data of the correct type but not suitable for the program and should be rejected.
Erroneous Data
Data of the wrong type which should be rejected.

Back to Top

Revision Tools - 2.4 Boolean Logic

AND
A logic gate with two inputs that outputs 1 only if both inputs are 1.
OR
A logic gate with two inputs that outputs 1 if at least one input is 1.
NOT
A logic gate with a single input that outputs the opposite value of the input.
Truth Tables
A table showing all possible input combinations and their corresponding outputs for a logic gate.
Logic Gate
An electronic component or operator such as AND, OR, or NOT that performs a logical function on input values.
Logic Diagram
A diagram that shows how one or more logic gates are connected together.

Back to Top

Revision Tools - 2.5 Programming Languages and Integrated Development Environments

Programming Language
A language that can be understood by computers to create software.
High Level Language
A programming language that uses English-like commands, making it easier to learn and understand.
Low Level Language
A programming language closer to machine code, using fewer English-like commands and harder to understand.
Translator
Software that converts programming language into machine code so the computer can execute it.
Compiler
A translator that converts the entire program into machine code in one go.
Interpreter
A translator that converts and runs code line by line.
Integrated Development Environment (IDE)
Software used to write and develop code, often including features such as translators and syntax highlighting.
Editor
Software used to write computer code.
Error Diagnostics
Tools that help locate and fix errors in code.
Runtime Environment
Software that allows programs to run on systems they were not originally designed for.

Back to Top