Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
14 views36 pages

Copy of Computer Science Year 10

The document provides an overview of computer networks, including definitions, types (LAN and WAN), and benefits such as resource sharing and user mobility. It discusses network hardware like switches, routers, and NICs, as well as protocols used in internet communication. Additionally, it covers concepts related to algorithms, data types, and the central processing unit (CPU) in computing.

Uploaded by

mynameiscool044
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views36 pages

Copy of Computer Science Year 10

The document provides an overview of computer networks, including definitions, types (LAN and WAN), and benefits such as resource sharing and user mobility. It discusses network hardware like switches, routers, and NICs, as well as protocols used in internet communication. Additionally, it covers concepts related to algorithms, data types, and the central processing unit (CPU) in computing.

Uploaded by

mynameiscool044
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 36

Notes

Networks Topic/SLR:

Network Two or more computers connected together. Devices are capable


of sharing resources.

Example: an email sent from one person to the other

● Peripherals such as printers can be shared


Benefits of
networks
● internet connection is enabled

● Being able to use the World Wide Web (WWW)

● A user can logon to their resources from another network.

Local Area Network (LAN)


Types of networks
Found within a small geographic area (e.g:
schools ,hospitals)

Larger LANs will include one or more servers

Characteristics of a LAN:

● LANs works with the Computer’s NETWORK


INTERFERENCE CARDS (NIC’s) including wireless
NIC’s. Each NIC has a unique MAC address.

● Cables (or wireless devices) often shared


peripherals

For the devices to connect to the network, you’ll need…


Switch

● Switch:

Connects devices on a LAN

Reads MAC addresses to send data to the


correct device

Reduced data collisions makes the network


faster and safer.

Each device is connected to a separate port.

Modern use: Backbone of networks in homes, schools,


offices.
● Network interference card (NIC)

NICs Each NIC has a unique MAC address — a


permanent ID
assigned to the card.

This MAC address is used by the switch to


identify and send
data to the right device.

A NIC sends and receives data packets over the


network.

● Wireless access point (WAP)

A device that lets wireless devices connect to a


wired
network.

Acts like a Wi-Fi hotspot inside a building.

Connects to a switch or router using a network


cable.

Wide area network (WAN)


consists of computers that are connected but are
geographically separated
Wide area network

Example: internet

A network that covers a large geographical


area.

Connects multiple LANs (Local Area Networks)


together.

Uses external communication systems like (it


relies on):
these are owned by telecom companies

● telephone lines

● fibre optics

● 4G/5G

● leased lines

Millions of devices are connected with an


Internet Service Provider (ISP)
Internet Protocols the internet uses:

● TCP

● IP address

Internet ≠ World wide web

internet: giant road system that connects devices

World wide web


World wide web: shops and restaurants on the streets

World wide web:

● Made of websites and web pages

● A service that runs on the internet

● uses http/https to load pages

● Splits the data to be transmitted into packets (groups of

bits)
● Takes place at the transport layer of the TCP/IP model
Packet switching
● Different packets can be sent at different times

Video Title: Topic/SLR:

AI GENERATED!
Questions Notes
Key Points

What is a network?
Network
A network is a collection of computers and other hardware
interconnected by communication channels that allow sharing of
resources and information. These connections can be wired (like
Ethernet cables) or wireless (such as Wi-Fi).

Examples:

● Sending an email from a laptop to a coworker in another


country using the Internet

● Streaming a video from YouTube, where data is


transmitted from a web server to a user's device

● Turning on smart lights using a mobile app over Wi-Fi or


Zigbee protocol

Benefits of networks

Benefits of ● Share Peripherals: Devices like printers and scanners can be


networks used by multiple users, reducing costs

● Centralized backups: Important files are stored in one


location and backed up regularly

● User mobility: Users can access their files and settings from
any connected device on the network

● Simplifies software updates: Software patches and antivirus


updates can be deployed to all connected devices from a
server

● Enables remote smart-home control: Users can adjust


thermostats, monitor security, and control lighting from
anywhere

Types of Networks

LAN (Local Area Network)


● Used in confined areas like schools, homes, and offices
LAN
● Can be wired, wireless, or a mix

● Typically includes routers, switches, access points

NICs (Network Interface Cards) allow devices to connect to the


network, each with a unique MAC address

● NICs can be wireless or wired and are often built into the
motherboard
NICs
WAN (Wide Area Network)

● Spans large geographical areas using telecom links

● Connects multiple LANs together


WAN
● Internet is the most common example of a WAN

● A corporation with offices in different cities connected via


WAN for secure file access and communications

Network Hardware: Switch, Router, WAP, NIC, Cable

Switch

● Operates in LANs, directing data to the correct device

● Improves efficiency by minimizing data traffic


Hardware
Wireless Access Point (WAP)

● Connects wireless devices to a wired network

● Often integrated with routers in home setups

Router

● Connects different networks together (e.g., LAN to Internet)

● Assigns local IP addresses to devices


Example:

● A home router combines a switch, WAP, and modem to


manage home internet access

Packet Switching & DNS

Packet Switching

● Splits messages into smaller units called packets

● Each packet may take a different path to the destination

● Assembled in order upon arrival using sequence numbers

Packet switching

Example:

● Watching a Netflix movie: packets stream in varied paths


and are reassembled

DNS (Domain Name System)

● Translates website names into IP addresses

● Enables browsers to locate and connect to servers

Example:

● Entering "www.bbc.co.uk" returns the IP address like


212.58.246.79, allowing access to the site

Network Topologies
Star Topology

● Devices connect to a central switch/hub

● Central management and fewer collisions


DNS

Example:

● Schools or businesses where each computer connects to a


main switch

Bus Topology

● Single cable backbone, terminators at ends

● Cheaper but suffers from collision issues

Example:

● Early computer labs, small networks in vehicles

Mesh Topology

● Devices connect directly to many other devices

● High fault tolerance and reliability

Network Topologies
Example:
Star topology
● IoT in cities like Coventry using smart traffic lights and
cameras

Transmission Media & Performance

Wired (Copper, Fibre)

● Copper:
● Cheap,
Bus topology ● easy,
● short distances
● Fibre:
● Expensive
● high-speed,
● long distance,
● immune to interference

Wireless (Wi-Fi, Bluetooth, Zigbee, RFID, NFC)

● Zigbee: Smart homes, low power, mesh

Mesh Topology ● RFID/NFC: Short-range ID, security access, payments

● Wi-Fi: Laptop streaming video

● Bluetooth: Headset connected to phone

● RFID: Inventory tracking in warehouses

● NFC: Contactless payments

Performance Factors

● Bandwidth

● Interference (walls, devices)


Transmission Media
& Performance ● Distance from access points

● Network congestion

Protocols & TCP/IP Model

TCP, IP, HTTP, HTTPS, FTP, SMTP, IMAP, POP3

● TCP: Ensures packets arrive correctly and in order

● IP: Delivers packets to the right address

● HTTP/HTTPS: Access websites (HTTPS is encrypted)


Wireless
● SMTP: Sends email

● IMAP/POP3: Retrieves email from servers


Example:

● Using Outlook: SMTP sends the message, IMAP syncs the


inbox

● Visiting a secure site: HTTPS ensures encryption

Network Security

● Protects confidentiality, integrity, and availability of data


performance factors
Common Threats

● Malware, phishing, eavesdropping, DoS attacks

Defensive Measures:

Firewalls

Encryption

Access Controls
Protocols
Antivirus software

Physical security

Examples:

● School blocks YouTube using a firewall

● HTTPS encrypts credit card info during online purchase

1. Algorithms: Step-by-step instructions to solve problems

An algorithm is a set of step-by-step instructions used to solve

problems. It must be unambiguous, complete, accurate,

consistent, and efficient.


Example: Making toast.

Decomposition :
Network Security

Breaking a problem into smaller parts.

Example: Cleaning teeth broken into mini-steps.

Abstraction:
Defensive Measures
Focus on necessary info, ignore extra details.

Example: Tube maps simplify routes by removing geographic

scale.

Pattern Recognition: Spotting Repeating elements to simplify

solutions.

Example:Sorting shopping list by type of item.

2. Understanding Algorithms
Algorithms

Input-Process-Output (IPO):

Data goes in > Processing > Result comes out.

Example: Thermostat – Input: temp, Output: heater on/off.

Describing Algorithms:
Decomposition
Identify Purpose, inputs, outputs, and processes.

Example: Countdown program or username/password login

loop.

Abstraction

Purpose of Algorithms: Understand what the algorithm achieves.

Example:Guess the random number game.

pattern Recognition
3. Searching Algorithms

Linear Search:

Check items one-by-one. Simple but slow with many items.

Understanding
algorithms

Binary Search:

Split list in half each time (needs sorted list). Faster than linear for

large data.

Example:Guessing a number between 1 and 100 using

higher/lower hints.
describing
algorithms
4. Sorting Algorithm

Bubble Sort: Repeatedly swap adjacent items if in wrong order.

Simple but slow.

Purpose of Merge Sort:


algorithms
Divide the list into halves, sort each half, then merge. More

efficient with large data.

Linear Search

5. Truth Tables and Logic

Truth Tables: Show all possible outcomes of logic statements. Use

Boolean operators (AND, OR, NOT).


Binary search
Logical Operators:

AND: true only if both parts are true.

OR: true if at least one part is true.

NOT: reverses truth value.

Precedence Rules:
Sorting Algorithm
Order of operations in logic.

Example:NOT happens before AND, AND before OR.

6. Trace Tables

Merge sort Track variable values through steps in an algorithm. Help Find

bugs or understand flow.

Example:Calculating powers or looping through arrays.

Truth tables and


Logic

7. Flowcharts

Visual Representation of algorithms. Use standardized shapes:

Oval: Start/End
Precedence Rules
Rectangle: Process
Diamond: Decision

Parallelogram: Input/Output

Trace tables

Examples: Password check loop, countdown, central heating

system.

8. Evaluating Efficiency
Flowcharts
Compare time and space used by algorithms.

Example: Multiple ways to get to a destination on Tube map, but

some faster.
1. Variables

Variables store data that can change. In Python, declare by

assigning a value.

Example: name = "Alice" stores a string. score = 10

stores an integer.

2. Constants

Constants store fixed values. Use uppercase to show they don't

change.

Example: **PI = 3.14159**, **DAYS_IN_WEEK = 7**


3. Assignment

Variables

Use = to assign or reassign values to variables.

Example: **counter = counter + 1** increases

counter by 1.

Constants

4. Input and Output

Use input() to get user input and print() to display output.

Assignments Example: **name = input("Enter your name: ")**,

**print("Hello", name)**+
5. Data Types

Different data types are used for different kinds of information.

Input and Output

String: Text.

Ex: **message = "Hello"**, **postcode = "B72

6PY"**

Data types

Integer: Whole numbers (no decimal).

Ex: **age = 18**, **score = -4**, **year = 2025**

Float (Real): Numbers with decimals.


Ex: **weight = 72.5**, **price = 19.99**

Boolean: True/False values.

Ex: **is_logged_in = True**, **game_over =

False**

6. Casting

Converts one data type into another.

Example: **age = int("18")**,

**cost = float("19.99")**,

**score_str = str(100)**

**bool("text") is **True**, **bool(0) is **False**,

**bool(1) is **True**
7. Arithmetic Operators

Used for calculations.

Follow BIDMAS order.

+ add,

- subtract,

** multiply,

/ divide,

** exponent

// int divide,

% remainder

Example: 10 % 4 returns 2
8. Rounding and Math Functions

Use round(), math.floor(), math.ceil(),

math.sqrt() with import math.

Example: math.floor(3.7) is 3, round(2.678, 1) is 2.7

9. Random Numbers

Use import random.ç

Example: random.randint(1, 6) rolls a dice.

random.random() gives float between 0.0 and 1.0


10. Strings and Slicing

Strings are sequences of characters. Use slicing and

concatenation to manipulate.

text = "Python", **text[0] (first letter) = 'P',

text[1:4](its yth because its start to END so it doesn't include

end)

= 'yth', **len(text) = 6

Join strings with **+: **first + last**


11. ASCII and Character Codes

Convert characters to codes with ord(), and codes to characters

with chr().

Example: **ord('A') = 65, **chr(66) = 'B'**

12. String Formatting

Use .format() or f-strings for aligned and readable output.

Example: **print(f"{name:<10}{score:>5}") aligns

left and right


13. Lists and Arrays

Lists store multiple values: myList = [1, 2, 3], use indexes

to access.

Example: **myList[0] = 1, 2D list: **[[1,2],[3,4]]**

15. Subroutines

Functions (with return) and procedures (may not return). Define

using def.

Example: **def greet(name): return "Hi " +

name**
16. Variable Scope

Global variables are accessible throughout the program, local are

within functions.

Example: **x = 5 (global), inside **def, **x is local

17. Maintainable Code

Use clear variable names, comments, indentation, constants.

Helps understanding and debugging.

Example: **# This adds two numbers**


18. Robust Programming

Prevent crashes using checks: input presence, type, range, etc.

Example: **if name == "": print("Name

required")**

19. Authentication

Ask for username and password, validate match.

Example: **if user == "admin" and pwd ==

"1234": access_granted = True**


20. Errors in Programs

Syntax: typos (e.g., if x = 5). Logic: code runs but wrong

result. Runtime: crash during execution.

Example: **print(score/0) causes runtime error

21. Flow Control

Use Sequence, Selection (if/else), Iteration (for, while).

Example: **for i in range(5): print(i)** repeats 5


times

22. Turtle Module

Use turtle to draw with commands: forward(), right(),

penup(), goto().

Example: **turtle.forward(100) draws a line


1. Central Processing Unit (CPU)

Components:

ALU – Performs arithmetic and logic operations.

Control Unit – Manages execution and controls the CPU.

Clock – Sends timing signals (ticks).

Registers – Store temporary data and instructions.

Bus – Data (bi-directional), Address (uni-directional), Control (bi-

directional).

Von Neumann Architecture:

Stores both data and programs in the same memory (RAM).

Follows a stored program concept meaning the CPU fetches

instructions from memory, decodes them, and then executes

them in a cycle
🔁 Fetch-Execute Cycle

Cycle Steps:

Fetch – Get instruction from memory.

Decode – Interpret the instruction.

Execute – Carry out the instruction.

Registers Involved: PC, MAR, MDR, CIR, ACC.

2. Main Memory (RAM)

RAM:

Volatile memory (data lost when power off).

Stores OS, programs, and data in use.

Random access – any location accessed directly.

Much faster than secondary storage.


3. Secondary Storage

Magnetic – HDDs, tapes: cheap, large, slower, fragile. store data

on spinning magnetic disks

Solid-state – SSDs, USBs: fast, durable, expensive per MB.use

flash memory chips

Optical – CDs, DVDs, BDs: good for distribution, not very durable.

Considerations:

Capacity, Speed, Portability, Durability, Cost.

4. Embedded Systems

Definition: Computers built into other devices for specific tasks.

Examples: Microwave, traffic lights, smart TVs, remote-control

cars.

IoT: Embedded systems connected to networks.

E.g. smart thermostats, baby cams.

Firmware: Software stored in ROM, not user-editable.

Security Risks: Easy to hack if weak passwords/default settings


.

5. Operating Systems

Roles:

Interface (GUI/CLI), multitasking, memory, file, and peripheral

management.

Security: users, permissions, passwords, biometrics.

Manages CPU time (scheduling) and virtual memory.

Scheduling: Round-robin, priority queues, first-come-first-served.

Virtual Memory: Used when RAM is full – slower than RAM.

6. Utility Software

Helps maintain the system:

File repair – Fixes corrupted files.

Backup – Full/incremental copies.

Defragmentation – Reorganizes file storage on disk.

Compression – Reduces file size.

Anti-malware – Detects/removes threats.

7. Programming Languages
High-Level Languages: Python, Java – easy to read, portable.

Low-Level Languages:

Assembly – Close to machine code.

Machine Code – Binary instructions.

Translators:

Compiler – All at once.

Interpreter – Line by line.

8. Robust Software Design

Defensive Design:

Preventing crashes: file/printer errors, division by 0.

Input validation, error handling, and secure login systems.

Identifying Vulnerabilities:

Audit trails, code reviews, penetration testing

Key Terms

You might also like