Organized
Organized
Organized
Revision Guide
Paper 1
Contents:
Pages
“I’m your guide to revision! I’ll be pointing out key things to remember across
different parts of each topic. Look out for me!”
All technical terms and definitions can be found at the start of each topic. All
technical terms within each topic are in red
It’s your Look out for opportunities to answer exam style questions on specific aspects of
turn! each topic
2
1.1 Systems Architecture
In this section you will revise the following:
3
Technical Terms
Technical Term Definition
Computer Architecture This is the internal, logical structure and organization
of the computer hardware. It is how all the different
pieces of the computer fit together and work together
efficiently
Von Neumann Architecture The Von Neumann Architecture explains how all
devices follow a general rule when processing
information. All data and programs are stored in the
computer’s memory and are stored as binary digits
(0s and 1s).
5
Program Counter This stores the address of the next instruction to be
processed, which then goes onto the MAR
Accumulator This temporarily stores data whilst calculations are
being processed by the ALU
Embedded System Performs a single task within a larger piece of
equipment. It is a small processor that is inside a large
piece of equipment, dedicated to a single task
6
The CPU
The CPU (Central Processing Unit) is the most important element of any computer system, we
often think of it as the brain of the computer.
The CPU is responsible for processing all instructions that are given to the computer by the
user. It processes each of these instructions individually. In order to process these
instructions, it follows a specific cycle. This is known as the Fetch, Decode, Execute Cycle:
As this is a cycle, once an instruction has been executed, the cycle begins again. A new
instruction is fetched, and the process happens again.
7
For this cycle to work however, it requires different parts of the CPU to all work together.
These are the CU (Control Unit), ALU (Arithmetic Logic Unit), PC (Program Counter), MDR
(Memory Data Register), MAR (Memory Address Register), and Accumulator.
If we now break the Fetch, Decode, Execute cycle down again, we can see where these
different parts of the CPU undertake their role:
Fetch:
In order to fetch the correct instruction, the processor looks to the PC (Program Counter). This
register records the address of the next instruction to fetch. Once fetched, the data is stored
in the MDR (Memory Data Register), which holds the data of the current instruction being
fetched. As well as this, the address of the data being fetched is also stored, in the MAR
(Memory Address Register).
Decode:
8
Execute:
Once the instruction has been decoded, the instruction is ready to be executed. The ALU
(Arithmetic Logic Unit) may now be required, to perform any arithmetic (addition, subtraction
etc.) or logical (greater than, less than, equal to etc.) operations on the data. Whilst the
Arithmetic Logic Unit performs these operations, the Accumulator will store any data
necessary whilst these operations are completed.
“Remember, a register is a small amount of memory within the CPU. There are many registers
that all do different jobs!”
A Computer Architecture is the internal, logical structure and organization of the computer
hardware. It is how all the different pieces of the computer fit together and work together
efficiently
John Von Neumann explained his architecture as how all devices follow a general rule when
processing information. All data and programs are stored in the computer’s memory and are
stored as binary digits (0s and 1s).
Memory Unit – Data is transferred between the CPU and the computer’s memory
Output Device – Here data is outputted by the computer via an output device e.g. Screen,
Speakers, Printer etc.
9
Describe four stages in the Fetch-Decode-Execute Cycle [4]
It’s your
turn!
1. ______________________________________________________
________________________________________________________
2. ______________________________________________________
________________________________________________________
3. ______________________________________________________
4. ______________________________________________________
________________________________________________________
________________________________________________________
________________________________________________________
________________________________________________________
________________________________________________________
10
Factors that affect the performance of the CPU
There are certain factors that can affect how efficiently the CPU can perform. These factors can
all affect how fast the CPU can process all the instructions given to it by the user. There are
three factors we need to be aware of. These are Clock Speed, Number of Cores, and Cache
Memory.
Clock Speed:
The Clock Speed is the number of Fetch, Decode, Execute cycles that can be completed every
second, and is measured in Hertz (Hz). For example, a CPU with a 2GHz Clock Speed will be
able to perform 2,000,000,000 (2 billion) Fetch, Decode, Execute cycles every second.
Number of Cores:
A core is a processor within the CPU. The more processors we have in the CPU, the more
instructions that can be carried out at once. Imagine we had 20 maths problems to solve. On
the first team there were five students. On the second team there was only one student. Who
would complete the maths problems first?
The first team would of course. This is because they could split up the tasks and complete
multiple problems at the same time, compared to the second team who would only complete
one problem at a time.
This is the same for the CPU. The more cores we have, the more instructions that can be
carried out at once. CPUs could be single core (1 processor), dual core (2 processors), or quad
core (4 processors). The more cores we have, the better our CPU can perform.
Cache Memory:
Cache Memory is a small amount of memory located on the CPU, that acts as memory between
the CPU and RAM (Random Access Memory). Frequently used instructions are stored here. It is
quicker to access the instructions stored in Cache Memory as it is closer to the CPU than RAM.
However, it is only small. The bigger our Cache Memory is, the more instructions can be
stored in here, improving the performance of the CPU.
11
It’s your
turn! Look at the table below:
Computer A Computer B
Quad Core Processor Dual Core Processor
2.4 GHz Processor 2.2 GHz Processor
256 KB Cache Memory 256 KB Cache Memory
________________________________________________________
________________________________________________________
________________________________________________________
________________________________________________________
________________________________________________________
12
Embedded Systems
An Embedded System is a computer system with a dedicated function within a larger computer
system. An Embedded System is dedicated to a single task
➢ Washing Machines
➢ Dishwashers
➢ DVD Players
➢ MP3 Players
➢ Mobile Phones
➢ Games Consoles
“Often, in the exam, they will ask you to give a brief description of what an embedded system
is, and then ask you to provide examples of embedded systems. Make sure you remember
some of the above as examples!”
13
Past Exam Questions
Answer the questions below, to help you revise what has been covered in 1.1 Systems
Architecture.
1. John is buying a new computer. He has been told the CPU is an integral part of a computer
system.
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
14
c. When John is looking at computers, he notices that Computer A is dual core, and Computer
B is quad core.
___________________________________________________
___________________________________________________
ii. Explain which computer would be better for John to buy based on the number of
cores [2]
___________________________________________________
___________________________________________________
___________________________________________________
2. Look at the table below. Tick one box in each row to show whether each statement is True
or False [5]
15
3. Describe four stages that occur in the Fetch, Decode, Execute Cycle [4]
1. ___________________________________________________
___________________________________________________
2. ___________________________________________________
___________________________________________________
3. ___________________________________________________
___________________________________________________
___________________________________________________
4. Describe the role of the Memory Address Register and Memory Data Register when
processing instructions [2]
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
5. Identify two components, other than the CPU, that can be upgraded in order to improve
the performance of a computer [2]
1. ___________________________________________________
2. ___________________________________________________
16
6. John buys a new washing machine. He is told it is an embedded system.
______________________________________________________
______________________________________________________
ii. Other than the example given above, identify two examples of embedded systems [2]
1. ___________________________________________________
17
1.2 Memory and Storage
In this section you will revise the following:
18
1.2.3 Units
➢ Numbers:
o How to convert positive denary whole numbers to binary
numbers (up to and including 8 bits) and vice versa
o How to add two binary integers together (up to and including 8
bits) and explain overflow errors which may occur
o How to convert positive denary whole numbers into 2-digit
hexadecimal numbers and vice versa
o How to convert binary integers to their hexadecimal
equivalents and vice versa
o Binary shifts
➢ Characters
o The use of binary codes to represent characters
o The term ‘character set’
19
o The relationship between the number of bits per character in a
character set, and the number of characters which can be
represented, e.g.:
▪ ASCII
▪ UNICODE
➢ Images:
o How an image is represented as a series of pixels, represented
in binary
o Metadata
o The effects of colour depth and resolution on:
▪ The quality of the image
▪ The size of an image file
➢ Sound:
o How sound can be sampled and stored in digital form
o The effect of sample rate, duration, and bit depth on:
▪ The playback quality
▪ The size of a sound file
1.2.5 Compression
20
Technical Terms
Technical Term Definition
Main Memory This is the main storage within a computer, which the
CPU has direct access to. This is RAM (Random Access
Memory)
RAM (Random Access Memory) This is also known as the Main Memory within a
computer system. RAM stores all the open programs
and files. When a program/file is loaded, it is
opened from Secondary Storage, and stored in the
RAM. This is so the CPU can access the program/file
and its data quickly
ROM (Read Only Memory) This is the memory within a computer system that
stores the program for booting up the computer
system.
22
the portability, the easier it is to move the device from
one place to another.
Durability This refers to how robust the media is, how likely it is
to break when shaken or dropped. The better the
durability, the less likely the device is to break or lose
data if dropped or shaken.
Reliability This refers to how likely it is to be able to be used
repeatedly, without failing. The better the reliability,
the less likely the media is to fail over time.
Cost This refers to how expensive the media is to buy. The
better the cost, the cheaper the media is to buy.
Unit Used as a measurement of storage. The order is as
follows:
23
character set is dependent on the number of bits
being used per character.
ASCII Has a character set of 128 characters, as it only uses
7 bits per character.
Extended ASCII Has a character set of 256 characters, as it uses 8 bits
per character.
24
Compression The process of reducing the size of a file by changing
its attributes. There are two types of compression,
lossy and lossless.
Lossy Compression A type of compression. This reduces the size of the file
by removing data. Lossy compression can be used on
files such as images with little to no difference from
the original (depending on the level of compression).
Lossless Compression A type of compression. This reduces the size of the file
by rewriting the data in a more efficient way. No
data is lost or deleted when lossless compression is
used. Lossless compression can be used on files such as
spreadsheets or text documents where data cannot be
erased/removed.
25
RAM and ROM
Just like we discussed in the previous topic about the CPU, both RAM (Random Access Memory)
and ROM (Read Only Memory) play important roles in a computer system.
However, they both do different jobs. There are also some differences between RAM and ROM,
other than their job roles, that we need to know.
RAM:
The job role of RAM is to store all the computers open programs and
files. When a program/file is loaded up, it is opened from Secondary
Storage (we will cover this in a later topic) and stored in the RAM. This
is so the CPU can access the program/file and its data quicker.
“You can see on your computer which programs and files are stored in your RAM. It is all the
programs and files that are open at the bottom of your screen. As soon as you open a
program or file it goes straight into your RAM. As soon as you close it, it is removed from the
RAM and stored back in Secondary Storage, freeing up space for a new program or file!”
26
ROM:
ROM stands for Read Only Memory. It is called Read Only because it is not rewritable,
therefore it can only be read (it cannot be changed).
The job role of ROM is to store the program required for booting
up (loading up) the computer system. This program is called the
BIOS (Basic Input/Output System).
The BIOS stores all the instructions for the computer system to
boot up and work. For example, the BIOS would contain the instructions necessary for any
input or output devices to work. The most important part of this program is the Operating
System. This allows the user to interact and use the device. An example of an Operating
It’s your
turn! Describe the roles of RAM and ROM in a computer system [4]
___________________________________________________
___________________________________________________
___________________________________________________
___________________________________________________
___________________________________________________
Hint: The question is worth 4 marks. You need to state what both RAM
and ROM stand for, and then describe both their job roles to get full
marks
27
RAM and ROM: The Differences
There are some key differences between RAM and ROM that must be remembered for the
exam.
RAM ROM
RAM is volatile. This means when the device is ROM is not volatile. This means when the
turned off (there is a loss of power) all the device is turned off (there is a loss of power)
contents of RAM get deleted. all the contents of ROM remain.
This means next time you turn on the device, This is important because it means every
This means we can open and close different This is important because it prevents a user
programs and files. If RAM was not accidentally changing or deleting the BIOS
rewritable, we would never be able to open which would then lead to the computer not
or close different programs or files. being able to boot up correctly, or at all.
RAM is usually measured in Gigabytes (GB). ROM is usually measured in Megabytes (MB)
or Kilobytes (KB).
This is so that the device has a large amount
of storage in RAM, therefore more programs This is because ROM only contains the BIOS
and files can be open at once without the RAM and therefore does not need to be any
quickly filling up. bigger.
“Remembering these differences is important for the exam. There is usually a question on
this. Just remember that RAM is bigger than ROM, is volatile, and can be changed, and ROM is
the opposite to all of those!”
28
Virtual Memory
Sometimes, when a user has a large number of programs or files open at once, the RAM can
become full. Rather than the computer simply stopping anymore programs or files being
opened, the computer makes use of virtual memory.
Virtual memory is used when the RAM becomes full. When this happens, part of the internal
Hard Drive is partitioned (sectioned off) and acts as additional RAM. This allows further
programs and files to be opened and allows the computer to continue to function.
Let us look at an example of this to better understand how virtual memory works:
In the example above our user has a number of programs open. As Microsoft Excel and
Internet Explorer are not actively being used by the user, they are currently stored in the
virtual memory. However, the user now wants to use Microsoft Excel again! Therefore, it
needs to be moved into the RAM. That means something else needs to be moved out.
29
In this case Microsoft PowerPoint is not actively being used, so it can be swapped out into the
virtual memory, making room for Microsoft Excel to be stored and accessed in the RAM:
We can avoid using virtual memory by upgrading our RAM so it is bigger. This would mean it
would take longer for the RAM to become full, and therefore virtual memory is less likely to
be used.
30
Secondary Storage
Secondary Storage is where we store for longer than just whilst the computer is turned on. It
is not volatile, and therefore data remains even after the power has been turned off. This
means we can save our programs and files on Secondary Storage, turn off our device, and the
next time we turn our device back on, we won’t have lost them.
This is why we need Secondary Storage. It allows us to store programs and files when they
are not in use, as well as whilst the power has been turned off.
“Remember, because Secondary Storage is not volatile, its contents remain even after the
power is turned off. If we saved our programs and files in the RAM (which is volatile), we
It’s your Describe why Secondary Storage is important in a computer system [2]
turn!
___________________________________________________
___________________________________________________
___________________________________________________
___________________________________________________
31
Secondary Storage: The different types
There are three main types (also called technologies) of Secondary Storage. These are Optical,
Magnetic, and Solid State. Each one has its advantages and disadvantages, and it is important
to be able to compare each of them against each other.
Optical:
Magnetic:
Solid State:
“A common mistake is students writing ‘an example of a Solid-State storage is a USB’. A USB is
not correct! Make sure you call it a Memory Stick, or a USB Memory Stick”
32
Characteristics of Secondary Storage
Now we know the three main types of Secondary Storage, we need to be able to compare
them against each other. Once we know what the advantages and disadvantages are for each
storage type, we can then start to apply them to given scenarios.
Below is a table which outlines all the different characteristics. For each Secondary Storage
type, there is a description as to how it performs in that characteristic. Each Secondary
Storage type has then been graded based on how it performs against the other types:
Bronze – This means the Secondary Storage type performs worst on this characteristic out of
the three
Silver – This means the Secondary Storage type is in the middle on this characteristic out of
Magnetic – Advantages: Large capacity, fast data transfer speed, relatively cheap per unit
of storage
Disadvantages: Not durable, not portable
Solid State – Advantages: Durable, reliable, easily portable, fast transfer speed
Disadvantages: Price can vary depending on the media you choose
It’s your Describe one advantage and one disadvantage to using Solid State
turn!
storage [4]
___________________________________________________
___________________________________________________
___________________________________________________
34
Now we know the advantages and disadvantages to each, we can start to apply them to given
scenarios. Let’s look at the scenarios below, and identify which type of Secondary Storage
would be best to use:
Scenario 1:
Scenario 2:
A BMX stunt rider wants to attach a camera to his helmet and record
the stunts he performs.
“You might have been tempted to say Optical storage for the scenario above with the BMX
rider. However, you have to think about it logically. Would you realistically put a disk (such as
a DVD) in a camera to record something? No! It would mean the camera would need to be
large, and therefore would not fit on the rider’s helmet. Hence, Solid State is better for this
scenario”
35
Scenario 3:
For example, if the scenario mentioned a tablet computer and large amount of data, despite
magnetic seeming the best option, you wouldn’t put an internal hard drive into a tablet
computer. It would make it bulky, heavy, and no longer portable.
36
Units of measurement
Data is stored in the computer as binary digits (1s and 0s). Each digit is a bit of data.
There are 4 bits in a nibble, and 8 bits in 1 byte. Now, you may have heard the word byte in
terms such as megabyte, gigabyte etc.
What you need to know for your exam is how to order different units from smallest to largest.
X2 X1024 X1024
KB = Kilobyte
MB = Megabyte
GB = Gigabyte
TB = Terabyte
PB = Petabyte
We can also work out from the above how many megabytes for example are in a terabyte (we
did this in paper 1). We firstly calculate how many steps it is between megabyte and terabyte,
37
which is 2. We then do 1024^n where n is the number of steps. In this case it is 1024^2 which
is 1,048,576. Therefore, there are 1,048,576 megabytes in a terabyte.
Now, in the exam you are not allowed to use a calculator, which means you don’t have to be
so specific and use 1024 bytes. You can use 1000. This approximation is fine for GCSE.
So, doing the same calculation as above for how many megabytes in a terabyte, we could do
1000^2 which is 1,000,000. Therefore, there are approximately 1,000,000 megabytes in a
terabyte. This is fine for your exam.
In the coming sections we are going to look at how numbers, letters, images, and sounds are
all converted to binary so that the computer can understand them.
38
Data Capacity and Requirements
In order to select the best Secondary Storage type, it is good to be able to calculate the
required capacity in a situation.
For example, how many word documents could fit on a 2GB USB Memory Stick, compared to a
256GB Internal Hard Disk?
In order to be able to calculate capacities and requirements, we are going to use the below
examples of each Secondary Storage type, and the below files. Please note – these are only
examples. Both the Secondary Storage types and the files can vary in sizes. It is highly
unlikely you will get these exact sizes in the exam, but the process on how we calculate the
capacities remains the same.
Step 1:
First thing we need to do is ensure both units are the same. We will convert both to MB
(Megabytes)
Note how we are converting these roughly. They do not need to be exactly accurate but need
to be close enough.
Step 2:
2,000,000MB
______ = 10,000,000
0.2MB
This means we can store 10,000,000 246KB documents on our 2TB Hard Disk.
“You are allowed a calculator in the exam, so don’t panic about doing these in your head! Just
remember those two simple steps. Convert both to the same unit, then divide the media by
the file”
40
Another example:
Q. How many documents can you fit on an 8GB USB Memory Stick?
Step 1:
First thing we need to do is ensure both units are the same. We will convert both to MB
(Megabytes)
8000MB
______ = 40,000
0.2MB
This means we can store 40,000 246KB documents on our 8GB USB Memory Stick.
41
Let’s do another example, but with a different file type now:
Q. How many video files can you fit on a 2TB Hard Disk?
Step 1:
First thing we need to do is ensure both units are the same. We will convert both to MB
(Megabytes)
2,000,000MB
______ = 31,796
62.9MB
This means we can store 31,796 62,896KB video files on our 2TB Hard Disk.
It’s your How many 8485KB music files could you fit on a 2TB Hard Disk? [1]
turn!
___________________________________________________
How many 4342KB image files could you fit on an 8GB USB Memory
Stick? [1]
___________________________________________________
42
Representing numbers in binary
As we already know, binary only uses two numbers (1 and 0). It is therefore called a base 2
system.
We often refer to binary numbers as being 8-bit. All these means is there are 8 individual 1s
and 0s which form a binary number. Please keep this in mind as the exam will often ask you
to convert to or from an 8-bit binary number!
How to convert positive denary whole numbers (0-255) into 8-bit binary numbers and vice
versa
When we refer to a denary number, we are referring to our number system we use as
It is straightforward to convert between denary and binary. Let’s convert denary numbers to
binary first.
Q: Convert the denary number 56 to an 8-bit binary number. You must show your working.
128 64 32 16 8 4 2 1
The reason we have used the numbers we have is because we only use two numbers in binary
(0 and 1). You will notice we start at 1 and multiply by 2 each time, up to 128 which gives us 8
empty boxes for numbers in total (8 bits).
Now, to convert 56 into binary, all we do is look at the numbers along the top of the table and
think about which ones we can use to make 56. In this case we can add together 32, 16, and 8.
Because we have used these numbers, we put a 1 underneath them.
128 64 32 16 8 4 2 1
1 1 1
43
Now, under the rest of the numbers, we put a 0. There must be a number in each column so
we must fill the rest in with 0’s!
128 64 32 16 8 4 2 1
0 0 1 1 1 0 0 0
That’s it! The denary number 56 converted into an 8-bit binary number is 00111000.
Let’s do another.
Q: Convert the denary number 151 to an 8-bit binary number. You must show your working.
Now, to convert 151 into binary, all we do is look at the numbers along the top of the table
and think about which ones we can use to make 151. In this case we can add together 128, 16,
4, 2, and 1. Because we have used these numbers, we put a 1 underneath them.
128 64 32 16 8 4 2 1
1 1 1 1 1
Now, under the rest of the numbers, we put a 0. There must be a number in each column so
we must fill the rest in with 0’s!
128 64 32 16 8 4 2 1
1 0 0 1 0 1 1 1
That’s it! The denary number 151 converted into an 8-bit binary number is 10010111.
“It is very important to note here, as with the rest of the conversion and addition topics in this
section, you must show your working! It is just like when we learnt about the searching
and sorting algorithms, you must show the examiner how you are calculating the answer!
44
Now, let’s have a go at converting from binary to denary.
Q: Convert the 8-bit binary number 00110010 to denary. You must show your working.
128 64 32 16 8 4 2 1
Now, we write out binary number into the table. If you are ever given a binary number that is
not 8-bits, you always add an extra 0 to the left of the number!
128 64 32 16 8 4 2 1
We now need to calculate what this binary number is in denary. Wherever there is a 0, you
can ignore, we are not interested in it. Wherever there is a 1, we look at the main number at
the top of the table and add these together.
Therefore, in this case, we are adding together 32, 16, and 2. This gives us 50.
Let’s do another.
Q: Convert the 8-bit binary number 01101011 to denary. You must show your working.
128 64 32 16 8 4 2 1
45
Now, we write out binary number into the table.
128 64 32 16 8 4 2 1
0 1 1 0 1 0 1 1
We now need to calculate what this binary number is in denary. Wherever there is a 0, you
can ignore, we are not interested in it. Wherever there is a 1, we look at the main number at
the top of the table and add these together.
Therefore, in this case, we are adding together 64, 32, 8, 2, and 1. That gives us 107.
46
Binary Addition and Overflow Errors
Another skill we need to know is how to take two binary numbers and add them together,
understanding what happens if the final answer exceeds 8-bits.
When adding two binary numbers together, it is important to note you cannot convert the
two numbers back to denary, add them together, then convert the answer back to binary. This
is not answering the question and will achieve you no marks in the exam. You must add the
two binary numbers together, understanding how to add 1s and 0s together.
Let’s have a look at some examples to help us understand how to apply these rules.
Q: Add the binary numbers 10010001 and 00101100. You must show your working.
Firstly, we are going to write out our numbers in the form of a column addition.
10010001
00101100
47
Now, when adding binary numbers, we always start from the right-hand side, just like you
would do in maths when using column addition. This means we’re looking at the 1 and 0 first.
Adding a 1 and a 0 together gives us a 1 (using our rules to help us), so we write that
underneath.
10010001
00101100
1
10010001
00101100
01
Now, we simply continue down the line moving from right to left filling in the answers to the
addition. In this case we have no carries so it’s nice and simple!
10010001
00101100
10111101
That’s it! The answer to adding together the binary numbers 10010001 and 00101100 is
10111101.
48
Let’s do another, but this time include a situation where we need to carry.
Q: Add the binary numbers 00100010 and 00011010. You must show your working.
Firstly, we are going to write out our numbers in the form of a column addition.
00100010
00011010
00100010
00011010
0
Now, the next numbers are a 1 and a 1. We know from our rules that adding a 1 and a 1 gives
us a 0, and we need to carry the 1. This is the same as in maths when you add together two
numbers (say 7 and 5) and the answer goes above the units in that part of the addition. In the
7 and 5 case you would write 3 and carry the 1. In our binary case we are going to write 0,
and carry our 1.
1
00100010
00011010
00
49
Now, to make our life easier, we are only going to add up two numbers at any one time.
Therefore, we are going to draw in a little addition line to show we are only adding up two
numbers (this doesn’t get us any extra marks or lose us marks, it is simply for our benefit).
1
00100010
00011010
00
00100110
00011010
00
Now, we do the second part of the addition just like we normally would, adding together a 1
and a 0 which gives us a 1.
00100110
00011010
100
50
Now, we can complete the rest of the addition as we know there are no more carries. We can
also change that 1 we just changed in the question back to a 0 now (in the exam you might
have crossed out the 0 and put a 1, you wouldn’t lose marks if you left it like this as you’ve
shown the examiner you had to carry a 1. We’re going to change it back now just so we don’t
get confused what the original question was asking us to answer).
00100010
00011010
00111101
Let’s do one more, but this time include more than one carry.
Q: Add the binary numbers 00100110 and 01000111. You must show your working.
00100110
01000111
51
Let’s complete the first addition. A 0 and a 1 gives us a 1.
00100110
01000111
1
Now, let’s do the next addition. As we know, a 1 and a 1 added together gives us a 0, and we
carry the 1.
1
00100110
01000111
01
52
Now, in this case we have a 1 and a 1. We know from our rules this results in a 0 and we carry
the 1. Just because we are adding together a carried 1 does not mean the rule is any
different. Therefore, in this case, we change the big 1 to a 0, and carry a 1 across to the next
column.
1
00100010
01000111
01
1
00100010
01000111
101
Moving onto the next column, we can now draw our line again.
1
00100010
01000111
101
53
Adding together the carried 1 and the first 0 gives us a 1, so we can change the 0 to a 1 now.
00101010
01000111
101
Now we have a 1 and a 0, which gives us a 1.
00100110
01000111
01101101
That’s it. Adding together 00100110 and 01000111 gives us the answer 01101101!
54
But what happens when you end up with an addition that leaves you with 9-bits rather than 8?
Let’s have a look.
Q: Add the binary numbers 10010011 and 11101100. You must show your working.
10010011
11101100
10010011
11101100
1111111
Now, in our final addition we are left with a 1 and a 1. We know this means the answer is 0,
and we carry the 1. But where will we carry the 1, we’re at the end of our addition. Simple, we
carry it just like we normally would, over into an imaginary 9th column!
1
10010011
11101100
01111111
55
Now, we can’t leave that 1 floating around, it needs to go somewhere! Therefore, we fill the
remaining space underneath it with 0’s.
1
010010011
011101100
01111111
010010011
011101100
101111111
However, we have a problem! You will notice now we have been left with 9 bits at the bottom
rather than 8. In this case (and for GCSE) we are only allowed 8 bits, anymore and we have an
error!
An overflow error occurs when we add together two 8-bit binary numbers, and the result
leaves us with a 9th bit. This bit cannot be stored and therefore is deleted. This means the
result is of course in correct. In the case above we were adding together 147 and 236, which is
383. However, the largest number we can represent in 8-bit binary is 255. Due to this 9th bit
being lost, the answer we get out of this addition is actually 127, which we know is incorrect.
56
Hexadecimal Conversion
This section is going to cover two elements of this unit. This is because in converting between
hexadecimal and denary we are going to use binary, so we can cover both of these points
together to save us some revision time!
Hexadecimal is a base 16 system. This is because it uses 16 digits and characters in total.
These are 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E, F.
You will notice after 9 we suddenly stop using numbers are change to letters. Each of the
letters below represents the following number:
A = 10
The maximum number we can make with 2 hexadecimal digits is 255, the same as using an 8
bit binary number. However, computer scientists prefer to represent data in hexadecimal
form rather than binary as it is quicker to right down 2 digits rather than 8 binary digits. You
are also less likely to make a mistake when writing down the hexadecimal form with it being
2 digits, compared to 8 binary digits.
For the exam you need to be able to convert between binary, denary, and hexadecimal. First
we will look at how you convert a denary and binary number to hexadecimal.
57
Q: Convert the denary number 65 to hexadecimal. You must show your working.
To answer this question, we are going to follow these three simple steps:
Step 1 – Convert the denary number to binary (if in the exam you were given a binary
number then this step won’t be necessary).
Step 3 – Calculate the worth of each table and convert any numbers between 10 and 15 to
their equivalent letter.
128 64 32 16 8 4 2 1
0 1 0 0 0 0 0 1
Now we split this table into two separate nibbles, and simply move each bit down into the
new tables. As you can see the red numbers have dropped into the first table, and the blue
numbers have dropped into the second table.
8 4 2 1 8 4 2 1
0 1 0 0 0 0 0 1
You will also notice we have not used 128, 64, 32, and 16 as the numbers at the top of each
column in the first table. This is because the largest single digit we can have in hexadecimal is
15 (or F). Is we used these numbers it would put us way over 15. However, using 8, 4, 2, and 1
means the largest we can have is 15 (8 + 4 + 2 + 1 = 15).
58
Finally, we calculate how much each table is worth. To do this we ignore all the 0’s, and add
up the numbers at the top of the table wherever there is a 1.
8 4 2 1 8 4 2 1
0 1 0 0 0 0 0 1
The red table is worth 4. The blue table is worth 1.
That’s it! All we do now is simply put those two answers together. Therefore, 65 in
hexadecimal is 41. We say it as four one, not forty one.
128 64 32 16 8 4 2 1
0 0 0 1 1 1 0 1
Now we split this table into two separate nibbles, and simply move each bit down into the
new tables. As you can see the red numbers have dropped into the first table, and the blue
numbers have dropped into the second table.
8 4 2 1 8 4 2 1
0 0 0 1 1 1 0 1
59
Finally, we calculate how much each table is worth. To do this we ignore all the 0’s, and add
up the numbers at the top of the table wherever there is a 1.
8 4 2 1 8 4 2 1
0 0 0 1 1 1 0 1
The red table is worth 1. The blue table is worth 13.
Now, remember we can’t have any numbers bigger than 9, and if we do, we have to swap
them to their correct letter? We have 13 from the blue table! Therefore, we swap 13 to its
letter which is D.
That’s it! Once again, we put our two answers together and get the answer 1D. Therefore, the
Q: Convert the hexadecimal number 74 to denary. You must show your working.
For this question we need to change the hexadecimal number 74 back to denary. To do this we
will follow these three simple steps:
Step 2 – Multiply the first number by 16, and the second number by 1.
For this question, we can skip step 1 as we have no letters, as we’ve been asked to convert 74
back to denary, so we don’t need this step.
For step 2, we need to do some multiplication. Let’s put a little table in to help us.
16 1
7 4
60
The reason we have used the numbers 16 and 1 is because in hexadecimal there are 16 digits
and characters in total. Remember when we did binary, we started at 1 and multiplied by 2
each time? This is the same in hexadecimal, except we start at 1 and multiply by 16 each time.
We don’t need a third column as this would take us over the maximum 255, we can make with
2 hexadecimal digits.
16 x 7 = 112
1x4=4
Q: Convert the hexadecimal number D3 to binary. You must show your working
In this question we now have two differences. First is we have a letter we’re going to need to
convert back to a number, and the question wants our final answer in binary. No problem!
Firstly, let’s convert that D back to a number. D is 13. Keep that in your head!
Now let’s do our multiplication. Let’s get our table back in.
16 1
13 3
16 x 13 = 208
1x3=3
61
Finally, we add the two together.
208 + 3 = 211
So, we know the hexadecimal number D3 in denary is 211! However, the question wants the
answer in binary. Simple! All we will do now is convert 211 into binary!
128 64 32 16 8 4 2 1
1 1 0 1 0 0 1 1
62
Binary Shifts
A binary shift is the process of shifting (moving) each bit a certain number of places to the left
or right.
A binary shift to the right effectively halves the number. A binary shift to the left effectively
doubles the number.
Q: Perform a one place binary shift to the left on the 8-bit binary number 01101101. You must
show your working.
128 64 32 16 8 4 2 1
0 1 1 0 1 1 0 1
In this question we need to perform a left shift, meaning we are going to move each bit to the
left. It says it needs to be a one place binary shift also, meaning each bit is going to move
only once. Once again, we are going to start at the far right, and work our way across to the
left. Let’s shift the first bit one place to the left.
128 64 32 16 8 4 2 1
0 1 1 0 1 1 0 1
1
All we have done is simply shift the bit one place to the left. Now let’s do the next bit.
128 64 32 16 8 4 2 1
0 1 1 0 1 1 0 1
0 1
Now let’s do the next five bits in one go. Same process!
128 64 32 16 8 4 2 1
0 1 1 0 1 1 0 1
1 1 0 1 1 0 1
63
Now, we get to the final bit in the 128 column. As with our column addition, we can’t be left
with more than 8-bits, therefore this bit simply ‘falls’ out of our table and is lost!
Finally, we have an empty space at the start of our shifted number. We can’t have any empty
spaces, so we simply fill this space with a 0.
128 64 32 16 8 4 2 1
0 1 1 0 1 1 0 1
1 1 0 1 1 0 1 0
That’s it! We’ve performed a one place binary shift to the left on the 8-bit binary number
01101101 and have been left with 11011010.
Q: Perform a two-place binary shift to the right on the 8-bit binary number 11010010. You
must show your working.
As normal, let’s draw our binary table and fill in the table with our binary number.
128 64 32 16 8 4 2 1
1 1 0 1 0 0 1 0
Firstly, let’s perform our first shift on all the bits. Simply move all the bits one place to the
right. As with the last question, the bit in the 1 column (which is a 0) will ‘fall’ out of the table.
128 64 32 16 8 4 2 1
1 1 0 1 0 0 1 0
1 1 0 1 0 0 1
Now let’s fill in our empty space in the 128 column with a 0, as we can’t have any empty
spaces!
128 64 32 16 8 4 2 1
1 1 0 1 0 0 1 0
0 1 1 0 1 0 0 1
64
Now let’s perform our second shift. Once again the bit inside the 1 column (this time it’s a 1)
‘falls’ out of the table.
128 64 32 16 8 4 2 1
1 1 0 1 0 0 1 0
0 1 1 0 1 0 0 1
0 1 1 0 1 0 0
128 64 32 16 8 4 2 1
1 1 0 1 0 0 1 0
0 1 1 0 1 0 0 1
That’s it! We’ve performed a two-place binary shift to the right on the 8-bit binary number
11010010 and have been left with 00110100.
“As mentioned before, you must show your working with these questions! You will notice as
well with the above example, we effectively halved the original number each time we
performed a right shift. We started with 210 (11010010) and ended up with 52 (00110100).
It’s your Perform a three-place binary shift to the left on the 8-bit binary number
turn!
00010110. [3]
State what happens when a binary shift to the left takes place. [1]
___________________________________________________
___________________________________________________
65
Characters
When we talk about how letters, numbers, and symbols are represented in computer systems,
we talk about characters and character sets.
A character set refers to all the characters that are defined and recognised by the computer
hardware and software. The size of the character set is dependent on the number of bits being
used per character. The more bits per character used, the more characters that can be
represented.
For example, ASCII is a character encoding standard for computer systems. Here characters
are given a code within the system. In the original version of ASCII, a total of 127 characters
were covered. This was because the system used a 7-bit encoding system, meaning the
Below you can see the characters covered in the original version of ASCII:
As you can see, each character is given a code to represent it. For example, 70 represents the
capital letter F. Capital and lowercase letters need separate codes as they are different
characters!
66
Now, as we know the computer uses binary to process data. Therefore, these codes must be
converted to binary for the computer to be able to process the data and display and store
these characters.
So, referring back to our example above of 70 for the capital letter F, the computer would
store this as 01000110.
As we said above, the more bits per character we have, the more characters we can have
within our character set. ASCII used 7-bits, meaning a maximum of 127 characters, extended
ASCII used 8-bits, meaning a maximum of 255 characters. UNICODE however uses up to 32 bits
per character, meaning there are over 1.1 million characters that are in UNICODEs character
set.
67
Images
We often talk about the resolution of an image when thinking about quality. Resolution refers
to the number of pixels an image has. The more pixels an image has, the better the quality.
However, this of course means a bigger file size which takes up more storage space when
saved.
We also refer to the colour depth of an image. The colour depth of an image is effectively the
number of different colours that can be represented in an image. This is calculated by the
number of bits per pixel. The higher the number of bits per pixel, the more colours that can be
As you can see in the above example, the image is a simple black and white image. However,
when displayed in binary to show how the computer would store each pixel, we can see each
white square is represented as a 0, and each black square is represented as a 1.
In this image the resolution would be low as we only have a small number of pixels in the
image (100 pixels). The colour depth is also small too. We are using 1 bit per pixel (each pixel
is being represented using just a single bit (a single number), either 1 or 0. This means the
maximum number of colours we could have using this number of bits per pixel is 2.
68
We calculated this by doing the following:
2 ^ 1 = 2 possible colours.
Now let’s have a look at an image that has a greater colour depth:
69
This means we would be using 3 bits per pixel. As you can see, the greater the number of bits
per pixel the greater the colour depth, however it does mean the greater the file size. In this
case, if we were using 3 bits per pixel, the maximum number of colours we could have would
be 8:
2 ^ 3 = 8 possible colours
As well as storing the data for the image itself, there is also some additional data stored with
the image that allows the device to rebuild the image, as well as provides some useful
information to the user. We call this metadata.
We can calculate the file size of an image by multiplying its height in pixels by its width in
pixels, and then multiplying this by the bits per pixel used in the image.
So, for example, for the Mario image above it would be:
19 x 15 x 3 = 855 bits
We would then also add an additional 10% on to account for the metadata being stored with
the image.
70
Sound
As with images (and everything else) sound must also be converted to and stored in binary.
A sound is transmitted through the air as an analogue wave. This analogue wave must be
converted to a digital wave so it can be stored within the computer as binary.
In this process we take measurements of the frequency of the wave at regular intervals.
In the image below we have our analogue wave in the background. What our device does is,
at intervals, takes a measurement of the frequency of the wave. These measurements are
In the above example, the intervals where the sound is sampled is represented using the grey
lines. This means this sound is sampled 6 times a second. The average sound for a CD is
sampled over 44,000 times a second. The more samples we do a second the better the quality
of the sound, but the more information we are storing per second and therefore the file size
increases.
71
Below we can now see the points of each sample, represented with the black dots:
In this example our bit depth is 2. The numbers up the side of the graph are in denary for
convenience, however we know these would be binary for the computer system. That means
the numbers would be 00 (for 0), 01 (for 1), 10 (for 2), and 11 (for 3) giving us a bit depth of 2.
72
1.2 Memory and Storage
In the above image you can see the effect of increasing our bit depth from 2 to 4 (e.g. 15
being represented in binary as 1111). As you can see the digital wave is a much closer
representation of the original analogue wave and allows for a greater quality of sound.
When converting a sound to binary we want to use a high sample rate and a high bit depth,
therefore giving us a better quality of sound as we are taking more samples per second and
storing more data per sample. However, the higher these two things are, the larger the file
size will be.
73
Compression
Compression is when the size of a file is reduced by changing some of the files attributes e.g.
its file type, dimensions etc. For example, we may compress a WAV sound file (which has a
high audio quality but a large file size) down to an MP3 sound file
(which has a lower sound quality but a much lower file size). This would
then allow us to store more sound files on a device such as an iPod, due
to the file sizes being smaller.
▪ Lossy Compression – This is when the size of the file is reduced, however the quality
of the file also reduces (meaning the quality gets worse)
▪ Lossless Compression – This is when the size of the file is reduced, however the
quality of the file remains the same
Looking at the above you might now be thinking “why don’t we just always use lossless
compression then? It reduces the files size, but we don’t lose quality, surely that’s best!”.
Well, unfortunately lossless compression won’t always reduce the size of the file enough, and
therefore isn’t always suitable. Therefore, sometimes we will have to use lossy compression
to ensure the file is compressed enough to meet our needs.
74
Past Exam Questions
Answer the questions below, to help you revise what has been covered in 1.2 Memory and
Storage.
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
3. Look at the table below. Tick one box in each row to show whether each statement is
about RAM, or ROM [5]
75
4. Mina’s computer has 4GB of RAM.
i. Describe how the size of the RAM affects the performance of a computer [2]
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
Describe how this will now affect the performance of her computer [2]
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
76
ii. State why Virtual Memory is needed [1]
______________________________________________________
______________________________________________________
i. Explain one reason why a secondary storage device is needed in a computer system [2]
______________________________________________________
______________________________________________________
______________________________________________________
ii. Describe why RAM cannot be used as permanent, long term storage [2]
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
1. ___________________________________________________
2. ___________________________________________________
3. ___________________________________________________
77
8. Apu is looking to buy a new e-book reader. He is told it contains Secondary Storage, to
store his downloaded books on.
i. State which type of storage is most suitable for storing the electronic books inside the e-
book reader [1]
______________________________________________________
ii. Explain one reason why this type of storage is most suitable [2]
______________________________________________________
______________________________________________________
______________________________________________________
iii. Describe why magnetic storage would not be a suitable storage for the electronic
books stored on the e-book reader [4]
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
78
9. Sally receives a free trial for a piece of software through the post on a CD-ROM.
______________________________________________________
ii. Give two reasons why a CD-ROM is suitable in this case [2]
1. _________________________________________________
_________________________________________________
2. _________________________________________________
10. A water sports club want to invest in cameras their customers can wear whilst taking part
in their activities. The cameras are in waterproof cases, and not exposed to water.
Describe whether magnetic, optical, or solid-state storage would be the most appropriate
for the water sports club to use, and why [2]
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
79
11. A secondary school is upgrading their computer equipment.
i. Complete the table below to show whether magnetic, optical, or solid-state storage is
most appropriate for each of the following uses. Give a reason for each case.
80
12. Some secondary storage devices are magnetic, and others are solid state.
The quality of your written communication will be assessed in your answer to this
question [6]
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
81
13. Different secondary storage devices have different capacities and can hold different
amounts of data.
Troy has downloaded a music file, which has a file size of 8485KB.
i. How many music files could Troy fit on a 4GB USB Memory Stick? [1]
______________________________________________________
ii. How many music files could Troy fit on a 3TB Hard Disk? [1]
______________________________________________________
______________________________________________________
i. Why is capacity important when purchasing a new secondary storage device? [1]
______________________________________________________
______________________________________________________
1. _________________________________________________
2. _________________________________________________
3. _________________________________________________
82
15. Convert the denary number 173 to binary. You must show your working. [2]
16. Convert the binary number 00111110 to denary. You must show your working. [2]
18. Convert the hexadecimal number BE to binary. You must show your working. [3]
83
19. Perform a one place left shift on the binary number 11110011. You must show your
working. [1]
20. Perform a two-place right shift on the binary number 11110011. You must show your
working. [2]
______________________________________________________
______________________________________________________
______________________________________________________
22. Describe the effect using a larger number of bits per character has on a character set.
Refer to ASCII and Extended ASCII in your answer. [4]
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
84
23. In an image the colour red is represented using the binary code 1111.
a. Identify the number of bits per pixel used in this image. [1]
___________________________________________________
b. Identify the total number of possible colours this image could have. [1]
___________________________________________________
c. Describe how the number of bits per pixel effects the colour depth and file size of an
image. [2]
___________________________________________________
___________________________________________________
___________________________________________________
___________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
85
25. Explain how the sample rate and bit depth effects the quality of a sound when it is
converted to a digital wave. [4]
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
26. James is told the higher the sample rate the lower the file size of the sound.
Identify if James has been told the correct information or not and why. [3]
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
86
1.3 Computer Networks, Connections and Protocols
➢ Types of networks:
o LAN (Local Area Network)
o WAN (Wide Area Network)
➢ Factors that affect the performance of networks
➢ The different roles of computers in a client-server and peer-to-peer
network
➢ The hardware needed to connect stand-alone computers into a Local
Area Network:
o Wireless Access Points
o Routers
o Switches
o NIC (Network Interface Controller/Card)
o Transmission Media
➢ The Internet as a worldwide collection of computer networks:
o DNS (Domain Name Server)
o Hosting
o The Cloud
o Web servers and clients
➢ Star and Mesh technologies
➢ Modes of connection:
o Wired
▪ Ethernet
o Wireless
▪ Wi-Fi
▪ Bluetooth
87
➢ Encryption
➢ IP addressing and MAC addressing
➢ Standards
➢ Common protocols including:
o TCP/IP (Transmission Control Protocol/Internet Protocol)
o HTTP (Hypertext Transfer Protocol)
o HTTPS (Hypertext Transfer Protocol Secure)
o FTP (File Transfer Protocol)
o POP (Post Office Protocol)
o IMAP (Internet Message Access Protocol)
o SMTP (Simple Mail Transfer Protocol)
➢ The concept of layers
88
Technical Terms
Technical Term Definition
Network This is where two or more devices are connected
together to communicate.
89
Peer-to-Peer Network This is a type of network where all the devices are
responsible for being servers on the network. This
means whenever data is requested from a server, all
devices are responsible for searching for and sending
the requested data, and devices manage the network.
Wireless Access Points This is used to allow devices to connect to a network
wirelessly, without the need of any cables.
Switch/Hub
91
Mesh Topology This is a type of LAN.
95
Networks
A network is two or more devices that are connected so that they can communicate with each
other.
To have a network, you must have at least two devices connected to each other. A device that
Advantages:
✓ Users can share files with each other, and therefore work
collaboratively
✓ Users can share peripherals on the network, such as
printers
✓ Users can share an internet connection, saving the need to create and
pay for multiple connections
✓ Users can access files and data from any device on the
network
✓ Users can communicate with each other over the network
e.g. emails
✓ Software updates can be rolled out all in one go across all the devices on the network,
saving time
Disadvantages:
There are multiple different types of networks: LAN, MAN, WAN, PAN, VPN, VLAN.
The two we are focusing on in this section are LAN (Local Area Network) and WAN (Wide Area
Network).
A LAN is a network that covers a small geographical area, such as one building or two
buildings close together. Some examples of LANs are:
▪ A school
▪ A house
▪ A corner shop
A WAN is a network that covers a large geographical area, such as a city, country, or the
world. They are a series of LANs all connected. Some examples of WANs are:
▪ The internet
▪ An international bank
▪ ATMs (Automated Teller Machines) that dispense money
“If asked to give examples of either a LAN or WAN, be specific. For example, if you are saying
a police station is an example of a LAN, make sure you say, ‘one individual police station’.
Likewise, if you are saying a police station is an example of a WAN, make sure you say,
‘multiple police stations spread across the country’. Simply saying ‘police station’ is
confusing!”
97
Factors that affect the performance of a network
There are multiple factors that can affect the performance of a network. Don’t forget, this
could be positive or negative!
This is the amount of data that can be sent and received successfully in a given time.
Bandwidth is measured in bits per second e.g. a 32Mbps bandwidth would mean 32 Megabytes
of data can be transferred over a network every second.
“It is important to remember that bandwidth is not a measure of how fast the data travels,
but how much data can be sent at once. Although we often think of bandwidth as the speed of
the network, it isn’t directly the speed. However, it does impact upon it”
Number of Users:
The number of users on the network will impact upon the performance of the network. Too
many users on the network will mean more of the bandwidth is being spread out to try and
meet all the users’ needs. When there is not enough bandwidth to manage all the users on the
network, the network will slow down.
Transmission Media:
The media you choose to use in your network will impact upon how well it can perform. A
wired network for example has a higher bandwidth compared to a wireless network, due to
less interference. Using fibre optic cabling rather than copper cabling will have a higher
bandwidth, due to less interference again.
98
Error Rate:
This refers to the number of errors that occur when data is transferred. The higher the error
rate, the more frequently data has to be resent before arriving safely and correctly.
For example, the error rate on a wireless network is likely to be higher than the error rate on
Latency:
This is the delay from transmitting data to receiving it. This can be increased by not having
the correct network hardware to direct traffic around the network appropriately, causing
‘traffic jams’ and therefore slowing data down.
It’s your The number of users on a network is one factor that can affect the
turn!
performance of a network.
Describe two factors, other than the number of users, that can affect the
performance of a network [4]
___________________________________________________
___________________________________________________
___________________________________________________
___________________________________________________
___________________________________________________
Hint: The question is worth four marks. You will get one mark for naming
a factor, and one mark for describing it. You need to name and describe
two different factors. You cannot use ‘Number of Users’ though!
99
Client-Server vs Peer-to-Peer
When creating a computer network, there are different types of network we can create.
Client-Server:
In this model the relationship between client and server is that the client makes a service
request to the server. The server then sends the
requested information to the client. For example, a
user sends a request to the server for a website using
a web browser. The server processes the request and
sends back all the appropriate information for that
website.
There is a central dedicated server (or group of central dedicated servers in larger
businesses), and all clients request information from them.
Peer-to-Peer:
In this model there is no central dedicated server. Instead, all the devices on the network
take on the responsibility of being a server, storing files and
handling service requests. Each device has an equal
responsibility for providing data when requested.
100
Both networks have their advantages and disadvantages. We can see these in the table
below:
Client-Server Peer-to-Peer
Security The server controls security All devices are responsible
of the network, and this is for security of the network
101
Hardware required to create a LAN
There are many different pieces of hardware required to create a LAN, all of which do a
specific job in order to allow devices on the LAN to communicate with each other.
These pieces of hardware are the NIC (Network Interface Controller/Card), Wireless Access
Switch:
Hub:
A Hub is used to also send data around a network. A hub however sends
data to all devices on a network, rather than just the correct device. This
is therefore not good for security, as it allows any device on the network
to intercept a data packet and potentially steal its contents.
102
Router:
An IP Address is unique to each device connected to the internet. IP Addresses are used to
allow data to be directed around the internet from senders to the correct receivers.
Cabling:
If you choose to have a wired connection, then you will require cabling. Cables are used to
create a wired connection in a network. There are two main types of cabling used today:
Fibre Optic Cables – Use light to transmit data. They can cover a
much large range compared to Copper Cables and have a much higher
bandwidth due to less interference. Fibre Optical cabling still remains
expensive and is therefore still emerging. However, it is now starting
to be more widely used.
Therefore, if you are thinking of having a wired connection, it is better to go for Fibre Optic
rather than Copper Wire, despite the cost!
“This topic is one of the more difficult ones in the course, so don’t be worried if you are
struggling to remember all of these different pieces of network hardware and their roles! Try
to remember the names of each device first, then their job role”
103
Wired or Wireless Network?
There are advantages and disadvantages to having both a wired or a wireless network.
Remember, a wired network requires the user to plug an ethernet cable into their device in
order to access the network. A wireless network however allows the user to connect to a
The internet is one of the most powerful creations to date. More than 3 billion people now use
the internet, compared to 738 million in 2000, and this growth shows no signs of slowing
down.
The internet is a collection of LANs all connected. It allows data to be transferred from one
LAN to another. The internet is the physical part of the WAN, containing all the hardware
required to share data across a large area.
The WWW (World Wide Web) is a service used on the internet, to allow users to interact with
the internet. It allows users to share data and files across the internet in a user-friendly way.
In order to access the internet, a user must be connected to an ISP (Internet Service Provider).
Examples of ISPs are Sky, Virgin, and BT.
DNS (Doman Name Servers) are special servers on the internet. Their job is to convert URLs
the user types in into IP Addresses, so the locations of web pages associated with a website
can be found.
For example, if we wanted to access the BBC website, we would type into our web browser
www.bbc.co.uk. This is easy for us to remember. However, if we needed to remember the IP
Address instead, we would need to remember 151.101.64.81. Imagine having to remember
that type of IP Address for all your favourite websites! It wouldn’t be possible.
This is where the DNS comes in. When we search for a website using a URL, the DNS searches a
database to find the IP Address for the website, which then directs us to the correct server
containing all the information for that website. If the first DNS does not have the required
information, it will pass us on to another DNS, which will check, and so on.
105
Hosting:
In order for a website to be available on the internet for users to access, it must be hosted.
Hosting is when websites are stored on dedicated servers. Hosts often provide 24/7 access to
the website, access for multiple users, and greater security, compared to hosting your own
website. However, should the host server go down, your website will go down also. This could
Data for websites is stored on a web server. These are special, dedicated servers responsible
for managing requests from clients and sending data so websites can be viewed and accessed.
A client is a device that is requesting this data. When loading up a website the client will send
a request to the web server for the relevant websites data; the web server will process this
request (here a process called packet switching takes place) and then send the requested data
to the client.
106
The Cloud:
Cloud Computing is becoming more and more popular, as our lives become busier and busier.
Cloud Computing is when your applications and data are stored and accessed via the internet,
rather than locally (on your device).
Advantages:
Disadvantages:
___________________________________________________
___________________________________________________
___________________________________________________
___________________________________________________
Hint: The question is worth four marks. You will get one mark for naming
a relevant advantage, and one mark for describing it. You need to name
and describe two different advantages. Note – It must be a relevant
benefit for Julie! Think about her travelling time, loss of working hours,
how she would only have access to her handheld devices etc.
108
Network Topologies
A topology is a type or shape of a LAN. Each topology has its advantages and disadvantages.
We are going to look at the bus, ring, star, and mesh topologies. For each topology, you need
to be able to draw it, describe it, and provide advantages and disadvantages.
Star Topology:
In a star topology, all devices are connected together via a central switch/hub. Each device is
connected via its own cable to the switch/hub, and therefore is independent to other devices
on the network.
“Remember, a switch sends data to only the correct device because it can read the data
packet, compared to a hub which sends it to all devices. We would therefore be better using a
switch in a star network”
Data in a star topology is sent via the central switch/hub. The data is sent from the sender,
the switch/hub then distributes the data. Again, each device in a star network is called a node.
We draw a star topology like this:
Switch/Hub
109
The advantages to the star topology are:
✓ Limited data collisions due to the switch/hub managing data flow, reducing the error
rate of the network
✓ Easy to add additional devices to, and also to add additional switches/hubs to, which
allows you to expand the network
Mesh Topology:
In a mesh topology, all devices are connected to as many other devices as possible. This
creates multiple connections between devices.
In a mesh topology, data flows in multiple directions around the network. As there are
multiple connections, data can flow via the quickest route if there is a build-up of traffic on the
network. Again, each device on the network is called a node. We draw a mesh topology like
this:
✓ If one connection fails, the network can still continue to work. Data will simply just be
routed via a different connection in order to reach its destination
✓ Data transfer can be quick. This is due to having multiple connections. If data traffic
builds up in one area of the network, then alternative routes can be used to ease
congestion and reduce latency
110
The disadvantages to the mesh topology are:
Wi-fi is a common standard used for wireless networks. It is often what we refer to when
connecting to a wireless network.
In order for data to be sent via Wi-fi, frequencies and channels are used.
2.417GHz – Channel 1
2.427GHz – Channel 2
2.437GHz – Channel 3
In order for devices to connect via Wi-fi, the channels must be set to the same. For example, if
your router is set to channel 2, but your computer is set to channel 3, the devices will not be
able to connect to each other. The channel is set by the NIC (Network Interface
Controller/Card) but this can be changed by the user. As long as two devices on the network
are set to the same channel, they can communicate with each other.
This is where interference can also affect your network too. If other devices are set to the
same channel, they can interfere with the signals being sent between your device and the
router. This can then slow your connection down.
However, if data is being sent wirelessly, it is easier to intercept and steal. Data therefore
must be encrypted, in order to protect it whilst being transmitted.
111
Encryption:
Encryption involves scrambling data before being transmitted, into a secret code. In order to
decrypt the code, you must have a ‘master’ key. Only the device sending and the device
receiving the data has this key. This is because prior to the data being a sent, a ‘handshake
Ethernet
Ethernet is a standard for networking technologies, used for communication on a wired LAN
(Local Area Network).
Twisted Pair Cables are commonly used now for creating ethernet connections. This is because
it allows data to be both sent and received at the same time, due to different wires being
used for both. Previously, a special protocol called CSMA/CD (Carrier Sense Multiple
Access/Collision Detection) was used to detect when data was being transmitted over a wired
network. It would detect communication on the network to avoid transmitting data at the
same time, therefore avoiding data collisions. Due to Twisted Pair Cables having separate
cables for sending and receiving, this is no longer necessary.
112
IP Addresses, MAC Addresses, and Protocols
In order for data to be transmitted over and between networks, IP Addresses and MAC
Addresses are required.
Look at the table below, which identifies the differences between IP Addresses and MAC
Addresses:
113
Network protocols are also required, in order for devices to be able to communicate over a
network.
A network protocol is a rule (or set of rules) or standard devices must follow when
communicating over a network. Without protocols, communication on a network would not be
possible.
This protocol sets out the rules devices must follow when communicating with each other over
a network. It also plays an important role in packet switching (TCP), and routing of packets on
a Wide Area Network (IP).
This protocol is used to transfer web pages from web servers to clients.
This protocol is a more secure version of HTTP. Data sent using this protocol is encrypted and
therefore is more secure. This protocol would be used when transferring secure web pages
such as when users log into their online banking accounts.
This protocol is used to transfer large files over a network, and to organise files for websites
on a web server.
114
POP (Post Office Protocol):
This protocol is used to access emails from an email server for the client to read. The email is
downloaded onto the user current device and therefore removed from the web server when
accessed.
This protocol is used to access emails from an email server for the client to read. However,
this protocol allows the user to access the email directly from the email server, therefore
removing the need to download or remove it. It is more advanced than POP.
“These protocols are best remembered in groups. Both HTTP and HTTPS are responsible for
web pages. SMTP, IMAP, and POP are all responsible for emails. Then TCP/IP and FTP are on
their own”
It’s your Describe the difference between HTTP and HTTPS [4]
turn!
___________________________________________________
___________________________________________________
___________________________________________________
___________________________________________________
___________________________________________________
___________________________________________________
115
Network Layering
As you can see from all the content above, networking is a complex job! Network layers
however allow us to make the problem more manageable. Networking is broken down into
multiple layers. Each layer addresses its own problem, but all layers work together overall.
User
Application Layer – This layer makes sure the data being produced and sent is in a format the application being used
can understand
Presentation Layer – This layer deals with how the data should be presented e.g. does it need to be encrypted? Does
it need to be compressed? Etc.
Transport Layer – This layer establishes a connection with the network, and agrees protocols, size of packets, speed
of transfer etc. with the receiving device
Network Layer – This layer transmits data across the network. It identifies the destination IP address and the
quickest route
Data Link Layer – This layer connects/links to devices on the network. It also decides whose turn it is to communicate,
and converts all data into digital signals for sending
Physical Layer – This layer is the physical part of the network we can see and touch e.g. cabling, switches, routers etc.
Each layer links to the previous and next layer, allowing communication over a network to be
made simpler. Each network works independently to the other layers so can be modified
without disrupting the other layers
116
Past Exam Questions
Answer the questions below, to help you revise what has been covered in 1.3 Computer
Networks, Connections and Protocols.
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
ii. Explain one advantage and one disadvantage to using a computer network [4]
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
117
iii. Identify three examples of a LAN [3]
1. _________________________________________________
2. _________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
118
ii. A friend of Bens has told him a Client-Server network exists also.
______________________________________________________
______________________________________________________
iii. Explain two differences between a Peer-to-Peer network and a Client-Server network
[4]
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
5. In order to set up a network in her home, Julie needs to purchase some network
hardware.
______________________________________________________
______________________________________________________
119
ii. Julie wants a wireless connection.
Describe what piece of hardware Julie will require in order to have a wireless
connection [2]
______________________________________________________
______________________________________________________
ii. Julie is told that if she wants a wired connection, she should use fibre optic cabling.
Describe why Julie should use fibre optical cabling instead of copper wire cabling [2]
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
120
6. Mr Singh wants to set up a network for his business. He does not know whether to use a
wired or wireless connection.
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
121
7. Mr Singh searches for a website on his computer at home.
Describe the process of how the relevant information is retrieved for Mr Singh [4]
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
8. Describe one advantage and one disadvantage to using The Cloud [4]
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
122
9. The following diagram shows how the computers in a school are connected together to
form a LAN:
______________________________________________________
______________________________________________________
______________________________________________________
iii. Describe why a CSMA/CD protocol may be used in the above LAN [2]
______________________________________________________
______________________________________________________
______________________________________________________
123
10. The school has been advised that a star network may be better.
Explain what a star network is. You may draw a diagram to help explain your answer [4]
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
124
12. Some businesses choose to use bus networks, and some businesses choose to use star
networks.
The quality of your written communication will be assessed in your answer to this
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
125
13. Sally has noticed her laptop is not connecting to her router. Her ISP has told her it may be
something to do with the channels her laptop and router are using.
Explain, with reference to channels, why Sally’s laptop and router cannot connect [2]
______________________________________________________
______________________________________________________
______________________________________________________
14. Describe how data can be secured when being transmitted over a wireless network [3]
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
126
15. Devices connected to a network have an IP Address and a MAC Address.
______________________________________________________
______________________________________________________
______________________________________________________
iii. Describe two differences between IP Addresses and MAC Addresses [4]
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
127
16. Protocols are used in network communication.
______________________________________________________
1. _________________________________________________
2. _________________________________________________
3. _________________________________________________
iii. Describe why HTTPS is likely to be used instead of HTTP when transmitting sensitive
and confidential information over the internet [2]
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
1. _________________________________________________
2. _________________________________________________
128
18. When data is transmitted over the internet, packet switching is involved.
Explain how data is transmitted over the internet using packet switching [5]
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
129
1.4 Network Security
In this section you will revise the following:
➢ Forms of attack:
o Malware
o Social Engineering e.g. phishing, people as the ‘weak point’
o Brute-force attacks
o Data interception and theft
o The concept of SQL injection
130
Technical Terms
Technical Term Definition
Threat This is something that poses possible damage to either
your network of your business e.g. loss of customers
and revenue.
Malware This is software that aims to damage and corrupt a
computer system, by spreading around the system as
quickly as possible. Examples include viruses, worms,
and spyware.
Phishing This is when an individual pretends to be someone you
can trust, in order to gain confidential and important
information from someone e.g. bank details.
Weak People Weak people are people who work within the
business but are careless and therefore open up
opportunities for threats to access the network. Some
131
Network Forensics This is the monitoring and recording of activity on the
network. This then allows network managers to locate
potential misuses of the network, as well as trace back
threats to find where they first entered the network.
Anti-Malware Software This software is used to prevent and remove malware.
It scans devices and alerts users to potential threats
found on their device, so they can be removed.
Firewalls This is used to control what goes in and what goes out
of the network. It prevents unauthorised access by only
allowing authorised access to the network.
User Access Levels User Access Levels provide different levels of access
to the network depending on who the user is. For
example, a network manager would need to be able
to access all the different elements of the network. An
admin assistant however wouldn’t need such high level
of access, so won’t be able to access as much.
Passwords These allow users to access the network using a
132
Reasons for Attack
Before we go into detail on the various ways someone can attack or protect a network, it is
important to understand some reasons why people may want to attack a network.
Most businesses and individuals heavily rely now on access to a network, in order to keep a
constant flow of data. Therefore, if someone wants to damage a business or individual in a
way, they may be able to get away with it, then bringing down a network is where they may
look to.
There are multiple reasons why someone might want to bring down a network:
▪ To gain a competitive advantage over the business or individual (customers may lose
trust in the company that has gone down, and look to its rivals for more security)
Despite some of the above seeming to be unjustified reasons to bring down a whole network,
they still happen. Key examples are the recent shutdowns of PlayStation Network and the
NHS, both of which were shut down for days for different reasons.
133
Threats to a network
There are various threats to a network, all of which could cause considerable damage to a
network.
These are Malware, Phishing, Weak People, Brute Force Attacks, DDOS Attacks (Distributed
Denial of Service), Data Interception and Theft, SQL Injection, and Weak Network Policies.
Malware:
Phishing:
Phishing Scams have been around for long periods of time. However,
now we all do everything on the internet, they have become much
more popular on there. The purpose of a Phishing Scam is to try and
entice confidential and important information out of someone by
pretending to be someone they can trust.
For example, a phisher pretending to be your bank may email you claiming you have won a
prize for being a loyal customer. They make the email seem genuine, so it looks just like an
email from your bank would. They ask you to click on a link they provide and log in to your
account to claim your prize. Again, the website you are taken to looks genuine and real.
However, once you attempt to log in, your log in fails, and your details are sent directly to the
phisher.
134
Weak People:
Data Interception and Theft is when data is intercepted (stolen) from the
network, either directly from the network or during transmission. It may
be usernames and passwords to access the network, or other crucial
information such as customer information.
SQL Injection:
SQL (Structured Query Language) is the language used for managing and maintaining
databases. Databases are used in businesses to store vital and confidential information such
as customer details and business accounts.
Exposure of customer details can cause customers to lose faith in the businesses ability to
keep their information private and safe. This could cause them to leave and cost the business
in lost revenue.
136
Preventing Threats
Due to the fact there are multiple threats to a network, there has
to be multiple ways we can prevent each threat. Some prevention
methods specifically target an individual threat, whilst others can
be used to prevent more than one threat.
Penetration Testing:
This then helps to prevent ‘Black Hat Hackers’ from gaining access to the network and causing
damage.
Anti-Malware Software:
This may more commonly be called Anti-Virus Software. However, Anti-Malware Software
prevents more than just viruses. Anti-Malware Software is used to
prevent and remove malware. It scans devices and alerts users to
potential threats found on their device, so they can be removed.
Anti-Malware Software can be both free as well as have a cost. It depends what features you
are looking for and the size of your business network as to what Anti-Malware Software you
install.
137
Firewalls:
A firewall is used to control what goes in and what goes out of the network. It prevents
unauthorised access by only allowing authorised access to the network.
Sometimes threats can slip past firewalls through ‘back doors’ in a server, which then need to
be protected as well.
Another example would be a school. A student doesn’t need to access anything other than the
basics on the network, so is given minimal access. A teacher then would need to access more
areas of the network such as shared staff files, so would have more access than the student.
Then the network manager would need to be able to access all areas of the network, so would
have full access to the network. The network manager would also then be able to set
permissions for other users and change whole network settings.
138
Passwords:
A password allows users to access the network using a combination of letters, numbers, and
characters only they know. They are used with a username and should be kept private. Only
you should know your password.
Encryption:
139
Physical Security:
As we all as protecting a network digitally, we must also protect it physically. This means
preventing someone accessing or damaging the actual hardware used to operate the network.
There are multiple ways we could physically secure a network such as:
▪ Lock the door to the server room and only allow approved personnel in there
▪ Mount servers into cases that are lockable
▪ Monitor and track personnel who enter and leave the server room or access any of the
network hardware
Malware – Protect against this using Anti-Malware Software, Firewalls, and training staff on
the dangers of email attachments etc.
Phishing – Protect against this using strong network policies, and training staff on how to
spot a phisher
Weak People – Protect against this by training staff on how to be safe when using the
network, as well as using Network Forensics to identify staff who pose a danger to the
network
Brute Force Attacks – Protect against this by ensuring passwords are strong and changed
regularly, and a Firewall is installed
DDOS Attacks – Protect against this by ensuring a Firewall is installed
Data Interception and Theft – Protect against this by Encrypting any data that is sent around
and out of the network, as well as ensuring all staff use strong passwords to prevent easy
access to the network
SQL Injection – Protect against this by ensuring Access Levels are placed on databases only
allowing authorised individuals in, and Penetration Testing takes place to identify
weaknesses
As you can see, different threats can be protected against by using multiple prevention
methods!”
140
Past Exam Questions
Answer the questions below, to help you revise what has been covered in 1.4 Network
Security.
1. Ben has been alerted by his anti-malware software that he may have malware on his
computer.
______________________________________________________
______________________________________________________
ii. Describe how anti-malware software will help prevent or remove malware [2]
______________________________________________________
______________________________________________________
______________________________________________________
iii. Identify three other security measures Ben could put in place to protect his home
network: [3]
1. _________________________________________________
2. _________________________________________________
3. _________________________________________________
141
2. A company has installed a firewall to help protect its network.
______________________________________________________
______________________________________________________
______________________________________________________
3. Ben also has two stand-alone computers. He has found both of those have been infected
with malware also.
______________________________________________________
______________________________________________________
______________________________________________________
4. Identify three ways people within a business could put the network at risk [3]
1. ___________________________________________________
___________________________________________________
2. ___________________________________________________
___________________________________________________
3. ___________________________________________________
___________________________________________________
142
5. A company is worried about the potential threats to their network.
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
143
8. A local doctors surgery wants to protect against its staff potentially causing accidental
damage to their network.
With reference to the staff at the surgery, explain three different security measures that
can be put in place to protect the network from the surgery staff causing damage [6]
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
144
1.5 Systems Software
In this section you will revise the following:
145
Technical Terms
Technical Term Definition
Systems Software This runs the computer’s hardware and applications. It
allows the user to interact with the hardware and
application software. It consists of two parts, the
Operating System, and Utility System Software.
OS (Operating System) This is the core software required for the computer to
work. It controls the computer, and manages the
hardware, user interface, and other software running
on the computer.
User Interface This is when the OS provides a way for the user to
interact with and control the computer. It can be
graphical, or text based.
GUI (Graphical User Interface) This is a type of User Interface.
146
Driver This is a piece of software that is installed to allow a
peripheral device to work correctly on a computer. It
contains the instructions that allow the device to
connect and then send data back and forth to the
computer.
User Management This provides the opportunity for different users to be
able to log onto the same computer. The OS will
retain individual settings for each account such as
desktop backgrounds, permissions to access files and
programs etc.
File Management This provides the user with a logical structure for
storage of data. It provides the user files to store
data in, and the ability to create folder structures to
organise files.
Utility System Software Utilities help the user manage the computer. They help
the user maintain, configure, and optimise the
147
Systems Software: What is it?
As discussed in 1.1 Systems Architecture and 1.2 Memory, the internal and external hardware
for a computer system is a necessity. Without the hardware, the computer simply cannot
work!
However, the user cannot use the computer with just the hardware alone. Users cannot
directly interact with the hardware. For example, a user cannot tell the computer to open up
Google Chrome without something in the middle to pass the request on to the hardware.
This is where the role of Systems Software comes in. Systems Software runs the computer
hardware and applications. It allows the user to interact with the hardware and applications
and allows the user to actually use the computer.
▪ Operating System
▪ Utility System Software (Utilities for short)
148
Operating System
An OS (Operating System) is the backbone and core software of any computer system. It
controls the computer and manages the hardware, user interface, and other software running
on the computer.
There are:
1. Memory Management
2. User Interface
3. Multitasking
4. Peripheral Management
5. User Management
6. File Management
This is when the OS manages the transfer of data between memory units (RAM, CPU,
and storage (e.g. hard drive)).
As programs are loaded up, they are taken from the hard drive and
stored in the RAM (Random Access Memory), as we have already
previously discussed. The Operating System will manage this process,
as well as manage where in the RAM the programs are stored once
loaded.
149
User Interface:
This is when the OS provides a way for the user to interact with and control the computer. It
can be graphical, or text based. Without a User Interface, we wouldn’t be able to control or
use the computer!
▪ GUI (Graphical User Interface) – This is when the user has menus,
icons, and lists to select from in order to navigate their way
around the computers features and applications. Windows is an
example of a GUI.
150
Each User Interface has its advantages and disadvantages:
▪ GUI (Graphical User Interface) – Easy to use as the user can click on icons, menus, and
buttons, and doesn’t need to have any experience of the User Interface prior to using
it; Takes up a large amount of storage space due to the large amount of icons, menus,
and buttons that are all offered and used
▪ Command Line – Takes up the least amount of storage space due to how simple it is
and the fact it uses no icons, menus, or buttons; By far the hardest User Interface to
use, as specific commands have to be used. If a command is typed incorrectly, then it
will not be executed. Needs training and practice in order to use
▪ Voice Control – Allows users to control the computer without the need of additional
peripherals such as a mouse, keyboard etc. Also allows people with disabilities to
Multitasking:
This is when the OS allows for more than one program to be running at once. This is done by
allocating processing time to each open program.
This means you can have your music program such as iTunes
open, at the same time as having your web browser such as
Google Chrome open, and your program used for work such as
Microsoft Word.
151
Peripheral Management:
This is when the OS manages the input and output devices connected to the computer e.g.
keyboard, mouse etc.
User Management:
This is when the OS provides the opportunity for different users to be able to log onto the
same computer. The OS will retain individual settings for each
account such as desktop backgrounds, permissions to access
files and programs etc.
If connected to a network, a fixed profile may be imposed on a user, and manage log in
requests, rather than the User Management. For example, when you log into a computer in
school, you are automatically given a set background and list of desktop icons. These cannot
be changed and are therefore fixed.
152
File Management:
This is when the OS provides the user with a logical structure for storage of data. It provides
the user files to store data in, and the ability to create folder
structures to organise files.
___________________________________________________
___________________________________________________
___________________________________________________
___________________________________________________
___________________________________________________
___________________________________________________
___________________________________________________
___________________________________________________
___________________________________________________
___________________________________________________
Hint: This question is worth five marks. You will get one mark for the
definition of what an Operating System is. Then two marks for naming
and describing one job role of the Operating System, and two more marks
for naming and describing another job role of the Operating System
153
Utility System Software
Utility System Software, or Utilities for short, help the user manage the computer. They help
the user maintain, configure, and optimise the computer. This means the user gets the most
out of the hardware and applications.
Although a computer system doesn’t necessarily need Utilities in order to function, it needs
Utilities in order to function efficiently. Without Utilities, the computer will begin to slow
down, which will cause stress and problems for the user.
▪ Encryption Software
▪ Defragmentation Software
As well as those listed above, Utilities can also support in the following areas:
▪ Software Updates – The Utility Software will check regularly for updates for
applications on the computer, and alert the user when an update is available
▪ System Clean-up – The Utility Software will perform a clean-up of the system, deleting
old and unused files from the storage that may cause it to slow down. Examples of
these files may be old installation files. Once a piece of software has been installed,
we often forget to delete the files that installed the software that we no longer need.
Utility Software will identify these and remove them, optimising our storage
▪ Data Backup – When we backup data, we take a copy of the data and store it in
another location (e.g. on an external hard drive) so we can restore the original data
should it be lost or damaged. It is always important to backup data onto a separate
storage media, so that if the computer system or media it is originally stored on is
damaged, the data can still be retrieved.
154
Encryption Software:
We’ve now covered encryption across three different topics, so hopefully you now remember
what encryption is! As a reminder, encryption is when data is scrambled into a secret code,
which can only be decrypted using a master ‘key’. Only the sender and receiver have this key,
which therefore prevents the data being hacked/intercepted, and understood.
Prior to encrypted data being sent, both devices check with each other to ensure they have
the correct master key.
Encryption Software can be part of the Utility Software, as well as software that is run
independently. This provides a level of security for the user.
In order to understand what Defragmentation Software does, we must first understand what
fragmentation is.
Imagine the below is a small portion of the hard drive in a computer system. As you can see,
we have different files stored on the hard drive, all with their own place:
My Report on
Cats.pptx (2Mb) Art.pptx (4Mb)
Cats.docx (2Mb)
Each file has a different file size. We decide to delete some old files on our computer we no
longer need. One of these is the file ‘My Report on Cats.docx’. This now leaves a space on the
hard drive. Remember, the ‘My Report on Cats.docx’ file was only 2Mb.
155
We then save a new file, now called ‘I Now Hate Cats.docx’ which has a file size of 3Mb. When
we save the file, it will be stored on the hard drive in the first available places, even if that
means it needs to be split up.
This now means, the first 2Mb of the file is stored in the gap left when we deleted the
previous file, and the other 1Mb is stored in the next available place.
Defragmentation is when the data stored on the hard drive is reorganised, so space is
optimised and made best use of. Data that is linked to the same file will be reorganised, so it
is located together, making access quicker and easier. So, using the same example above for
the ‘I Now Hate Cats.docx’ file which has been fragmented, defragmentation software would
now reorganise the hard drive so both parts of the file are located together.
‘It is important to defragment your computer regularly, otherwise you will find your computer
slow down. It is also important to note defragmentation is a question they like to ask on the
exam. However, it isn’t always as straight forward as asking what it is. Look at the ‘It’s your
turn!’ question below”
156
It’s your A restaurant has noticed its computer system has started to slow down.
turn!
Explain how the restaurants system has become fragmented, and how
they could fix the problem of fragmentation [4]
___________________________________________________
___________________________________________________
___________________________________________________
___________________________________________________
___________________________________________________
___________________________________________________
___________________________________________________
___________________________________________________
___________________________________________________
Hint: Think about what the restaurant will be using their system for, to
take orders. Think about how some orders are smaller/bigger than other
orders, and once an order is deleted off the system it leaves spaces on
the hard drive for other orders, which may not be the same size.
To get full marks you’ll need to explain what fragmentation is, explain
how the restaurants system has become fragmented, then explain how
they can solve the problem using defragmentation
157
Data Compression:
Compression is when the size of a file is reduced by changing some of the files attributes e.g.
its file type, dimensions etc. For example, we may compress a WAV sound file (which has a
high audio quality but a large file size) down to an MP3 sound file
(which has a lower sound quality but a much lower file size). This would
then allow us to store more sound files on a device such as an iPod, due
to the file sizes being smaller.
▪ Lossy Compression – This is when the size of the file is reduced, however the quality
of the file also reduces (meaning the quality gets worse)
▪ Lossless Compression – This is when the size of the file is reduced, however the
quality of the file remains the same
158
Past Exam Questions
Answer the questions below, to help you revise what has been covered in 1.5 Systems
Software.
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
ii. Amy is informed that one job role of the operating system is to multitask.
______________________________________________________
______________________________________________________
______________________________________________________
159
3. Multitasking is only one job role of the operating system.
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
4. Look at the table below. Tick one box in each row to show whether the job role is
associated with the operating system or utility software [5]
______________________________________________________
______________________________________________________
______________________________________________________
160
6. After three weeks of using her new computer system, Amy finds out her computers
storage has become fragmented.
______________________________________________________
______________________________________________________
______________________________________________________
ii. Identify the utility software that could overcome this problem [1]
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
161
7. Amy wants to send a picture of her new computer system to a friend. When she goes to
send the picture, she is told the picture is too large to email. She is told by a friend to
compress the file.
______________________________________________________
______________________________________________________
2. _________________________________________________
162
1.6 Ethical, Legal, Cultural and Environmental Impacts of Digital Technology
“When talking about Ethical, Legal, Cultural and Environmental Concerns, the examiners like
to put this as one of the extended writing questions. Therefore, when you come to the past
exam questions at the end, you will see a lot of these!”
163
Technical Terms
165
1.6 Ethical, Legal, Cultural and Environmental Impacts of Digital Technolog
Legislation relevant to Computer Science
Legislation refers to the laws that everyone must follow. These laws are passed by the
government of a country.
Due to the quick advancement of technology, legislation is now active that is specifically
designed to monitor and prosecute against criminal activity when using Computer Science
related concepts or devices.
There are three pieces of legislation you need to be familiar with for the exam. These are:
The Data Protection Act 2018 is a piece of legislation that refers to how data should be
gathered, stored, and destroyed correctly. It refers to eight key principles, and all must be
met. These eight key principles are:
All companies who hold data about anyone must follow all eight principles listed above, or can
face prosecution (fines etc.)
The law was updated in 2018 to include GDPR (General Data Protection Regulation). In short,
GDPR covers how data is gathered and managed on any citizen in the EU, regardless of where
that data is stored. It effectively tightens up the security of data protection!
166
1.6 Ethical, Legal, Cultural and Environmental Impacts of Digital Technology
Computer Misuse Act 1990:
The Computer Misuse Act 1990 is a piece of legislation that refers to how computers may be
used to potentially cause damage or incite crime. It makes it illegal to make unauthorised
access to data. There are three levels to the Computer Misuse Act:
This act makes hacking and the creation and spreading of viruses illegal. The consequences of
breaking the Computer Misuse Act 1990 can range from a £1000 fine up to an unlimited fine
and time in prison.
The Copyright Designs and Patents Act 1988 is a piece of legislation that is designed to protect
an individual or companies’ idea or creation. Individuals or companies apply to patent their
idea or product, and once granted it prevents other people taking their idea or product and
passing it off as their own. For example, music artists will patent their songs before releasing
them. This therefore means that you cannot download the song without their permission, and
their permission to download it would mean you paying for it. This therefore means
downloading the song without paying for it would be breaking the law.
Creative Commons Licensing falls into the bracket of the Copyright Designs and Patents Act
1988. This is a standardised way to grant copyright permission to create work. It allows the
author to retain copyright, whilst allowing others to copy, distribute, and make uses of their
work.
“There are some other ways work that has been copyrighted can be used without breaking
the law, such as only using a small portion and changing it, using it for educational purposes,
paying for it, giving credit to the original owner etc.”
167
1.6 Ethical, Legal, Cultural and Environmental Impacts of Digital Technology
It’s your A farmer has a small farm selling fresh produce to local customers. He
turn!
wants to create a website advertising his produce and allow customers to
sign up for weekly delivery to their home.
___________________________________________________
___________________________________________________
___________________________________________________
___________________________________________________
___________________________________________________
___________________________________________________
___________________________________________________
___________________________________________________
___________________________________________________
___________________________________________________
Hint: Think about the fact will be storing customer data, and how he
must follow the Data Protection Acts eight principles
168
1.6 Ethical, Legal, Cultural and Environmental Impacts of Digital Technology
Environmental and Cultural Implications of Computer Science
Due to the rapid growth of Computer Science technologies across the world in the last 20
years, the impacts of this technology have also grown.
In this section, we will look at some Environmental Impacts and some Cultural Implications
Computer Science is having.
Environmental Impacts:
Computer Science has had both positive and negative impacts on the environment, despite us
maybe only thinking immediately about the negative!
Some of the negative of impacts Computer Science has on the environment are:
▪ Use of natural resources to create digital devices such as silicone are in limited supply.
As demand for digital devices grows, so does the use of resources such as silicone.
Once the resource is gone, it’s gone!
▪ Production of digital devices as well as powering them uses large amounts of energy,
which is often created through the burning of fossil fuels. This is harmful to the
environment contributing to global warming and air pollution
▪ We often throw our old devices away. However, these devices contain harmful
chemicals such as the mercury used in the batteries. When thrown away these devices
break down and these chemicals are released into the environment. This could be the
food or water supply for animals, which then contaminates the meat or kills the
animals
169
1.6 Ethical, Legal, Cultural and Environmental Impacts of Digital Technology
However, there are positive impacts:
▪ The development of Computer Science has led to a reduction in paper usage, meaning
less trees are now being cut down
“As you can see above, there are some positive impacts Computer Science has had on the
environment. However, it is likely the negatives outweigh the positives”
170
1.6 Ethical, Legal, Cultural and Environmental Impacts of Digital Technology
Cultural Implications:
A cultural issue relates to whether something could have a positive or negative impact on a
person, or group of peoples, culture. Culture can be seen as the way in which we live our
lives. Again, a cultural issue is not necessarily illegal, but could be seen as being wrong to do.
There are both positive and negative implications Computer Science has on culture.
▪ The development of Computer Science has widened the ‘digital divide’. The digital
divide refers to the gap between people who have access to technology and the
internet, and those who do not. As technology has developed it has become more
frequently available and affordable in some parts of the world, and less so in other
parts. For example, in the UK we now have fibre optic broadband, allowing us to
access internet speeds of above 100Mbps. However, poorer countries in the world such
as Uganda won’t even have access to the internet yet. This means people in poorer
countries are being unfairly left behind
▪ The development of Computer Science has put extra strain on our lives. Cyberbullying
has increased as technology has become easier to access, causing stress to people
which can result in self harm or suicide. Also, being able to access work from home
means more people are taking work home with them to continue with in the evening
and at weekends, putting additional stress on them that they would not have had prior
to technology becoming so developed
▪ Some countries are so concerned about their image and the potential for unrest that
they limit the internet access to the public. This may be done to prevent criticism of a
ruler or government, to prevent people breaking the law, or to prevent ‘hate speech’.
Countries such as North Korea are known to have heavily restricted internet access.
171
1.6 Ethical, Legal, Cultural and Environmental Impacts of Digital Technology
Some of the positive implications of Computer Science on culture are:
▪ The development of Computer Science has led to people being able to communicate,
connect, and share with people all across the world. This means people can stay in
touch with family who live long distances away, and share experiences with them
▪ Developments in areas such as gaming has allowed whole new opportunities for
people to open up. With gaming, there is now the development of e-sports, meaning
people can test themselves and excel in something completely different to the normal
fields of sport or academia
▪ As Computer Science develops, people in the poorest and most remote parts of the
world are being able to access some type of digital device. This means hospitals,
schools etc. are able to access information that is shared across the world, widening
their knowledge, and helping them learn more
172
1.6 Ethical, Legal, Cultural and Environmental Impacts of Digital Technology
Investigating and Discussing Computer Science Technologies
In the exam you are often given an extended writing question, where not only the quality of
your answer but its structure and articulacy is assessed. These questions will give you a
scenario and ask you to discuss the impacts or implications it may have on four key areas.
These four key areas could be:
▪ Stakeholders
▪ Ethical Issues
▪ Legal Issues
▪ Technology
▪ Privacy
▪ Cultural Issues/Implications
In this section we are going to look at some different examples of questions and break down
possible groups of people for each section. However, before we do that, let’s just make sure
we know what is meant by the four areas above:
173
1.6 Ethical, Legal, Cultural and Environmental Impacts of Digital Technology
Scenario 1:
A school is looking to upgrade its technology in school and is thinking about giving all new
Year 7 students an iPad.
You may want to consider the following areas in your answer: [8]
▪ Stakeholders
▪ Ethical Issues
▪ Technology
▪ Legal Issues
The above question is an example of the type of question you could be asked in the exam. We
would need to write four paragraphs in total, one paragraph for each of those areas. Even
though it says, ‘you may want to …’, you need to! In order to access all the marks, you have
to cover each area.
Let’s think about some different groups of people for each area.
Stakeholders:
So, for this question, a stakeholder could be a teacher. It is likely the teacher will be involved
in the Year 7’s having iPads and using them in lessons, therefore they will have an interest in
this.
We could also have parents. Parents will have an interest in whether their child is given an
iPad or not, maybe to ensure internet access at home can be limited to ensure they only
access websites they should do on the iPad, or to ensure they don’t spend long amounts of
time on it.
The companies who manufacture or sell the iPads will also have an interest in this decision, as
they will be given an opportunity to sell a large amount iPads and potentially other
supporting accessories such as cases in one go.
174
1.6 Ethical, Legal, Cultural and Environmental Impacts of Digital Technology
Ethical Issues:
Remember, an ethical issue is an issue that may arise that could affect the way someone feels
or thinks. As mentioned before, it is not illegal, but some people may think it is wrong to do.
So, for this question, one ethical issue may be that giving students an iPad could lead to an
increase in cyberbullying if the iPads are not used appropriately. This could lead to students
feeling upset or depressed, and lead to more students feeling isolated.
Another ethical issue could be that the school are providing an access to a device some
students would not be able to afford normally. The school is therefore closing their own digital
divide in school and helping make all students feel and look equal. This is obviously a
positive, you can cover positives too!
A third ethical issue could be that the students could develop health problems through using
the devices too much, such as eyesight issues or headaches. This could cause lifelong issues.
Technology:
Remember, this is a potential consequence (either positive or negative) for technology that
may come about. This one can be a bit trickier to cover sometimes and will require you to
think a bit harder for examples.
One impact on technology this could have is that more devices could be paired with the iPad,
creating a link between different devices. Devices could share information between each
other. For example, students could complete work on a computer, share it with the iPad, and
continue it outside of the lesson.
Another impact on technology could be that the increase of traffic on the network due to all
the iPads connecting to it could cause the network to slow down. This could affect the
performance of the network and therefore result in the network needing to be upgraded,
which would be expensive to do.
175
1.6 Ethical, Legal, Cultural and Environmental Impacts of Digital Technology
Legal Issues:
Remember, a legal issue is an issue that may arise involving the law. Always be thinking here
about those different pieces of legislation we covered (Data Protection Act, Computer Misuse
Act, Copyright Designs and Patents Act).
So, in this question an example of a legal issue could be the threat of students misusing the
iPads in order to potentially damage the school network or other networks or devices. This
would therefore be breaking the Computer Misuse Act. Some students may use the iPads to
create and spread viruses, which would therefore be breaking the law.
Another example of a legal issue could be that the students could use the iPads to download
illegal content such as illegal music or movies. This would therefore be breaking the Copyright
Designs and Patents Act.
As you can see above in the two examples, we have also named the legislation that would be
broken. This is important to do! When you think of an issue, make sure you think about which
piece of legislation would be broken by it, and name it in your answer.
Now you have thought about different examples for each of the four key areas, pick one from
each that you feel most comfortable in being able to explain properly, and put your answer
into four paragraphs:
One stakeholder in this situation would be … They would have an interest in this because
…
One ethical issue in this situation would be … This would be an issue because …
One impact on technology would be … This would impact upon technology because …
One legal issue in this situation would be … This would be an issue because …
176
1.6 Ethical, Legal, Cultural and Environmental Impacts of Digital Technology
Scenario 2:
An outreach program has been set up to provide a small aboriginal tribe access to a digital
device and the internet for the first ever time.
You may want to consider the following areas in your answer: [8]
▪ Stakeholders
▪ Ethical Issues
▪ Technology
▪ Legal Issues
Here is another example of a question you could get in the exam. Just like in scenario one,
let’s get some examples of groups of people for each area.
Stakeholders:
One stakeholder could be the people who are part of the tribe. They will be the ones given
access to a digital device and the internet, and therefore will have a major interest in the
situation above, especially considering they have never accessed this technology before.
Another stakeholder could be the company who are going to actually provide the technology.
They will have an interest as they will need to be able to work out how to provide the
opportunity for these people to access and use the device, as well as access the internet in
what could be a very remote area.
Another stakeholder would be the outreach team who are offering this opportunity. They will
have an interest as they will need to know how to monitor how the tribe use the devices and
also what information they are trying to gather from this program. They will also need to
monitor the success of the program and think about how they could potentially roll it out to
more people should it be successful.
177
1.6 Ethical, Legal, Cultural and Environmental Impacts of Digital Technology
Ethical Issues:
One ethical issue could be that these people have never accessed the internet before, and
there is a risk they could expose themselves to dangerous material. It will need to be
considered what affect this could have on the people e.g. they could become emotionally
destressed if they see harmful images or videos.
Another ethical issue could be that this program could disrupt the lives of the aboriginal tribe.
These people may have lived a certain way for a very long time, and the sudden change in
their lifestyles via access to the internet could harm their natural way of life.
Technology:
One impact this program could have on technology is the advancement in how groups of
people who live in remote areas gain access to technology. This program could provide the
infrastructure for other local people or tribes to access technology, such as a basic access to
the internet.
Another impact on technology could be that new ideas for future developments of technology
or how to train new people to use technology could be identified as part of the program. As
the tribe has never accessed a digital device or the internet before, it is a great opportunity to
find out what features they would find most useful, or what they think is the best way to learn
about how to use the technology.
Legal Issues:
One legal issue that could arise in this situation is that data will need to be collected about the
tribe. Therefore, the Data Protection Act will need to be considered. The staff working on the
outreach program will need to ensure that all the Data Protection Acts key principles are met.
For example, the staff will need to ensure they have the permission of the tribe to hold data
about them, and they only collect data that is necessary.
Another legal issue could be that the tribe try to access and spread harmful content over the
internet, breaking the Computer Misuse Act. They would likely do this without knowing,
however the consequences would still be the same. The outreach team will therefore need to
think about how to avoid the tribe misusing the technology.
178
1.6 Ethical, Legal, Cultural and Environmental Impacts of Digital Technology
“Each of these 8-mark questions are worth 10% of the exam paper. Therefore, you want to
make sure you get as many marks as possible! Make sure you think about each of the four
areas carefully, and make sure you give an answer for each one! You can only get two marks
for each section, so if you write two paragraphs on stakeholders for example you won’t get
any extra marks”
When accessing software, it is categorised into being either Open Source or Proprietary (also
known as ‘off the shelf’).
Open Source Software is when software is released and the programming code (source code)
is accessible to all users to edit. It is often free, and users can modify and distribute the
software legally.
Proprietary Software is when software is released and the programming code (source code) is
not accessible to all users to edit. It often has a cost and users cannot modify and distribute
the software legally. This type of software is often owned and sold by a company.
Look at the table below, which outlines some advantages and disadvantages to each:
179
1.6 Ethical, Legal, Cultural and Environmental Impacts of Digital Technology
Past Exam Questions
Answer the questions below, to help you revise what has been covered in 1.6 Ethical, Legal,
Cultural and Environmental impacts of Digital Technology.
1. Troy wants a new word processing software. He does not know whether to use open
source software or proprietary software.
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
ii. Identify and explain two differences between open source and proprietary software [4]
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
180
1.6 Ethical, Legal, Cultural and Environmental Impacts of Digital Technology
2. A company wants to provide all its staff with laptops that will allow them to connect to the
company network at home.
You may want to consider the following areas in your answer: [8]
▪ Privacy
▪ Ethical Issues
▪ Technology
▪ Legal Issues
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
181
1.8 Ethical, Legal, Culturala1.6 Ethical, Legal, Cultural and Environmental Impac
3. Virtual Reality (VR) is an emerging technology. More and more companies and people are
now buying and using Virtual Reality.
You may want to consider the following areas in your answer: [8]
▪ Cultural Implications
▪ Ethical Issues
▪ Technology
▪ Legal Issues
______________________________________________________
______________________________________________________
Digital Technology
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
182
1.6 Ethical, Legal, Cultural and Environmental Impacts of Digital Technology
4. A research team wants to analyse how technology usage changes as people grow up. They
want to start with 5-year olds and monitor how they use technology until they turn 16.
You may want to consider the following areas in your answer: [8]
▪ Privacy Issues
▪ Ethical Issues
▪ Technology
▪ Legal Issues
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
183
Additional Resources
Exam Command Words:
The command words below will be used consistently in all assessment material and resources.
Add: Join something to something else so as to increase the size, number, or amount.
Analyse: Break down in order to bring out the essential elements or structure. To identify
parts and relationships, and to interpret information to reach conclusions.
Annotate: Add brief notes to a diagram or graph.
Calculate: Obtain a numerical answer showing the relevant stages in the working.
Compare: Give an account of the similarities and differences between two (or more) items
or situations, referring to both (all) of them throughout.
Complete: Provide all the necessary or appropriate parts.
Convert: Change the form, character, or function of something.
Define: Give the precise meaning of a word, phrase, concept or physical quantity.
Describe: Give a detailed account or picture of a situation, event, pattern or process
Design: Produce a plan, simulation or model.
Discuss: Offer a considered and balanced review that includes a range of arguments,
factors or hypotheses. Opinions or conclusions should be presented clearly and supported
by appropriate evidence.
Draw: Produce (a picture or diagram) by making lines and marks on paper with a pencil,
pen, etc.
Evaluate: Assess the implications and limitations; to make judgements about the ideas,
works, solutions or methods in relation to selected criteria.
Explain: Give a detailed account including reasons or causes.
Give: Present information which determines the importance of an event or issue. Quite
often used to show causation.
How: In what way or manner; by what means.
Identify: Provide an answer from a number of possibilities. Recognise and state briefly a
distinguishing factor or feature.
Justify: Give valid reasons or evidence to support an answer or conclusion.
Label: Add title, labels or brief explanation(s) to a diagram or graph.
List: Give a sequence of brief answers with no explanation.
Order: Put the responses into a logical sequence.
Outline: Give a brief account or summary.
Refine: Make more efficient, improve, modify or edit.
Show: Give steps in a derivation or calculation.
Solve: Obtain the answer(s) using algebraic and/or numerical and/or graphical methods.
State: Give a specific name, value or other brief answer without explanation or calculation.
184
Tick: Mark (an item) with a tick or select (a box) on a form, questionnaire etc. to indicate
that something has been chosen.
What: Asking for information specifying something.
Write/Rewrite: Mark (letters, words, or other symbols) on a surface, typically paper, with
a pen, pencil, or similar implement/Write (something) again so as to alter or improve it.
185
Extended Writing Support
Use the below support to help you answer the extended writing questions.
Remember, you must give four paragraphs and cover each of the four areas given to you.
Also remember: Make your point, Explain your point, Link back to the question
186
Extended Writing Mark Scheme
The below structure shows you how the examiners will mark your answers to the extended
writing questions. This is the same across all extended writing questions, however your
answers must be relevant to the question asked.
187
Mark Band 1-Low Level (1-2 marks):
The candidate demonstrates a basic knowledge of considerations with limited understanding
shown; the material is basic and contains some inaccuracies.
The candidate makes a limited attempt to apply acquired knowledge and understanding to the
context provided.
The candidate provides nothing more than an unsupported assertion. The information is basic
and communicated in an unstructured way. The information is supported by limited evidence
and the relationship to the evidence may not be clear.
0 marks:
No attempt to answer the question or response is not worthy of credit
188