Course Content
Class Test (MLIS)
0/1
Chapter-1. Computational Modelling
We will discuss Machines and Computational modeling, the Input-process-output model, input-process-output-storage model.
0/3
Chapter-2. Computer Hardware
We will discuss Von Neumann Computational Model, Hardware components of a computer system, cache memory, Fetch-Decode-Execute Model, Fetch-Decode-Execute Cycle, Secondary Storage (Magnetic, Optical, Solid State Drive SSD), Magnetic secondary storage - hard disks, Optical secondary storage – CD, DVDs, Electrical secondary storage - flash drives, Cloud Storage, Embedded systems
0/5
Chapter-3. Computer Logic
We will discuss Logic, logic gates (AND, OR, NOT gates), truth tables, conditional statements.
0/5
Chapter-4. Software
We will discuss software (System software, application software, utility software), Operating system, features of the operating system, File management tool, security tools, Computer Simulation, and modeling.
0/4
Chapter-5. Programing language
we will discuss definitions of Programing language, types of Programing language, Low-Level Programming Language, High-Level Programing Language, machine code or machine language, Assembly language, Advantage & Disadvantages of assembly language, Compiler & Interpreter, Advantage & Disadvantages of Compiler & Interpreter.
0/3
Chapter-6. Networks
We will learn the definition of network, the purpose of using the network, different types of network (LAN, WLAN, WAN, Computer Network Models, The processes of accessing a server for getting services, Network Topologies (BUS, RING, Star, Mesh Topology) Communication media, Advantage and disadvantages of wired, wireless communication media, Network data speed, Definition of protocol and features of the protocol, different types of protocol, email protocols (SMTP, POP3, IMAP), TCP protocol, TCP/IP Protocol, HTTP/ HTTPS Internet protocol. Network security, The Importance of Network Security, Firewall, The use of Firewall, The security and advantages of cloud storage, The Security and disadvantages of cloud storage, NAS (network-attached storage), Cyber-attack (Phishing, Shoulder Surfing, Unpatched software, USB devices, Eavesdropping), Protecting against security weaknesses, Security measures to protect from cyber-attacks, Reviews of network and user policies.
0/14
Chapter-7. The internet and the world wide web
We will Learn Internet, How the internet works, WWW (World Wide Web), Accessing the World Wide Web, How the World Wide Web works
0/3
Chapter-8. Computing and the environment
We will learn Computing and the environment, Advantage & Disadvantage of Computing to the environment, Manufacture, Raw material extraction, Production Most hazardous materials used in the manufacture of computing technology, Usages of Computing technology, Disposal of Computing technology, How computing technology preserving the environment.
0/3
Chapter-9. Computer Privacy
We will learn Privacy, Personal Data, UK Data Protection Act (1998) Big data, How Big Data Works, The Uses of Big Data Surveillance, Advantages of surveillance technology location-based service (LBS), how do location-based services work, Uses of location-based services Privacy Enhancing Technologies (PET), Privacy-enhancing tools Cyber Security, The computer misuse act 1990
0/4
Chapter-10. Digital Inclusion
We will learn about Digital Inclusion, Challenges for Digital Inclusion, Solutions, Impact and Advantage of Digital Inclusion, Moving Toward Digital Inclusion,
0/3
Chapter-11. Professionalism
We will learn about Professionalism, Importance of Professionalism, the professional standards by the British Computer Society (BCS).
0/3
Chapter-12. the Legal Impacts
We will learn about, Intellectual property, Copyright and patents, The Copyright, Designs, and Patents Act (1988), Licensing, The terms of a Software license, Creative Commons license, Open-source and proprietary software Advantage and disadvantages of open-source software
0/4
Chapter-13. Algorithm
We will learn about the definition of Algorithm, Criteria for a successful algorithm, Relationship between algorithm & Program, Flowcharts, The algorithm, for making a cup of coffee, Pseudo-code, Algorithm for adding two numbers, Arithmetic Operators, Variables, Constants, Selection, Iteration, Representation of selection & iteration in a flowchart, Representation of selection & iteration in Pseudo-code, Relational operator is an operator that compares two values, Nested Selection, Nested Selection pseudo-code, Indefinite iteration, Definite iteration, Logical Operators (AND, OR, NOT), NESTED LOOPS, Random Number
0/14
Chapter-18. Programming
0/35
Test Yourself
You can test your current situation on this course.
0/5
Edexcel OLevel Computer Science revision notes
About Lesson

Von Neumann Computational Model:

The first computers, like your calculator, had to be redesigned, or at least rewired, to do a different job. The idea of a general-purpose computer was developed in the 1930s and 1940s through the work of Alan Turing and John von Neumann, who proposed that the instructions for processing could be held in storage with the input data.

A computer in which the processing instructions are stored in memory with the data is called a stored-program computer or a von Neumann architecture computer.

In a von Neumann-architecture computer, the hardware device that does the processing is called the central processing unit (CPU), and the storage is called main memory or random-access memory (RAM). They are connected to the input and output (I/O) devices by a group of connecting wires called a bus.

Von Neumann Architecture.svg 1

When a computer is turned on, the CPU fetches an instruction from the memory, carries out the instruction it receives, and then fetches the next, and so on. This sequence is called the fetch-decode-execute cycle, and it carries on until the power is turned off.

 

RAM: RAM is referred to as random access memory; it is also called main memory. This is a temporary store that the CPU uses for data and instructions.

Writing: When the CPU saves data into memory, this is called writing. The CPU uses the bus to tell the memory what data to save and where in memory to save it.

Reading: When the CPU retrieves data from the memory to process, this is called reading.

Each memory location has a unique memory address, in the same way that your home is identified by an address. The memory addresses are just numbers, starting from zero. RAM is described as volatile, which means that its contents are lost when the power is turned off Because of this,

 

 

ROM: ROM is referred to as read-only Only Memory it is also called non-volatile memory because it stores any programs that must run when the computer is first turned on. Programs permanently stored in ROM are known as firmware. Typically, these programs are small and carry out specific tasks, such as initializing the hardware components and starting the operating system when a computer is switched on.

Writing: When the CPU saves data into memory, this is called writing. The CPU uses the bus to tell the memory what data to save and where in memory to save it.

Reading: When the CPU retrieves data from the memory to process, this is called reading.

 

Some important definitions:

Von Neumann architecture: computer system design in which the program is stored in memory with the data.

The central processing unit (CPU) is a hardware device that carries out the processing in a computer.

Main memory/random-access memory (RAM): a temporary store for data and instructions (programs).

Read-only memory (ROM): memory that cannot be altered and is not lost when the power is turned off.

Bus: a group of connections between devices in a computer.

Fetch-decode-execute cycle: a sequence of steps carried out repeatedly by a CPU.

Writing: when the CPU sends data to memory to be stored at a given address.

Reading: When the CPU retrieves the data stored at a given address.

Memory address: a number that uniquely identifies a (memory) storage location.

Volatile: memory that is erased when the power is turned off.

Non-volatile: memory that is not lost when the power is turned off.

 

 

Cache memory:

Most computers require a third kind of main memory; this is called cache memory (pronounced like ‘cash). Cache memory is a small amount of fast, expensive memory that is used in between two devices that communicate at different speeds, most often the CPU and RAM. In a CPU cache, frequently used code or data is loaded in chunks from the slower RAM into the cache. The CPU accesses the cache memory at its own, faster speed. This means the CPU isn’t slowed down by having to wait for data from RAM.