Computer studies.
- Created by: AlexMassey
- Created on: 18-04-18 09:42
View mindmap
- Computer science.
- Networks.
- LAN's and WAN's.
- LAN is a local area network, it covers a small geographical area. They are owned by an organisation such as a busines.
- WAN is a wide area network, they cover large geographical areas such as over sea. Example is the internet.
- Factors that affect network performance.
- Band width is the amount of data that can be transferred in a given time.
- Wired connections are usually faster and are more reliable.
- The type of cable and network topology used.
- Hardware.
- Network interface controller.
- Routers.
- Cabels
- CAT 5
- CAT 6
- Fibre optic.
- LAN's and WAN's.
- Components of a computer system.
- The CPU which is then central processing unit.
- The CPU had three main components, the control unit (CU). The arithmetic logic unit (ALU). The cache.
- The CU is the overall control unit of the CPU. It executes the program instruction.
- The ALU does all of the calculations, also preforms all of the logic operations.
- The cache is a very fast from of CPU memory, it is even faster than the RAM.
- Fetch-Decode-Execute cycle.
- Fetch: Copy memory address.
- Decode: The instructions are decoded by the CU.
- Execute: The instruction is preformed.
- Algorithms
- Pseudocode
- This is not an actual programming language
- It is also not a real human language.
- It is a mid point between them so that it is almost code but it is readable to other people.
- Flow diagrams
- These show the sequence in which something should be solved in.
- Pseudocode
- Issues.
- Legal issues are about what's actually right and wrong in the eyes of the law.
- Cultural issues are about how how groups of people with particular, beliefs, practices or languages may be affected.
- Environmental issues are about how we impact the natural world.
- Stake holder are individuals or groups that have an interest in a particular scenario such as a new technology.
- E-waste is the name given to the desposal of technology such as mobile phones and computers.
- Data protection act.
- Data must only be used in a fair and lawful way.
- Data must only be used for the specified purpose.
- Data should be adequate, relevant and not excessive for the specified use.
- Data must be accurate and kept up to date.
- Data should be kept no longer than is necessary.
- The rights of the data subject must be observed.
- Data should be kept safe and secure.
- Data should not be transferred abroad without adequate protection.
- Networks.
- Topologies.
- Star topology all devices are connected to a central switch.
- Bus topology all devices are connected to a backbone cable with terminators at the end.
- Ring topology all the data in the network goes around in a loop.
- Full mesh every devices has a connection to another device, they are all joined together.
- Partial mesh nearly all of the devices are connected to another,
- Search algorithms.
- Binary search looks at the middle number of a sorted list and removes the half that is going to be either to high or to low.
- Linear search looks through every item until the correct number is found.
- Sorting algorithms.
- Bubble sort picks the first two numbers and switches them when in the correct order small to high.
Similar Computing resources:
Teacher recommended
Comments
Report
Report