Course Content
Class Test (MLIS)
0/1
Chapter-1. Computational Modelling
We will discuss Machines and Computational modeling, the Input-process-output model, input-process-output-storage model.
0/3
Chapter-2. Computer Hardware
We will discuss Von Neumann Computational Model, Hardware components of a computer system, cache memory, Fetch-Decode-Execute Model, Fetch-Decode-Execute Cycle, Secondary Storage (Magnetic, Optical, Solid State Drive SSD), Magnetic secondary storage - hard disks, Optical secondary storage – CD, DVDs, Electrical secondary storage - flash drives, Cloud Storage, Embedded systems
0/5
Chapter-3. Computer Logic
We will discuss Logic, logic gates (AND, OR, NOT gates), truth tables, conditional statements.
0/5
Chapter-4. Software
We will discuss software (System software, application software, utility software), Operating system, features of the operating system, File management tool, security tools, Computer Simulation, and modeling.
0/4
Chapter-5. Programing language
we will discuss definitions of Programing language, types of Programing language, Low-Level Programming Language, High-Level Programing Language, machine code or machine language, Assembly language, Advantage & Disadvantages of assembly language, Compiler & Interpreter, Advantage & Disadvantages of Compiler & Interpreter.
0/3
Chapter-6. Networks
We will learn the definition of network, the purpose of using the network, different types of network (LAN, WLAN, WAN, Computer Network Models, The processes of accessing a server for getting services, Network Topologies (BUS, RING, Star, Mesh Topology) Communication media, Advantage and disadvantages of wired, wireless communication media, Network data speed, Definition of protocol and features of the protocol, different types of protocol, email protocols (SMTP, POP3, IMAP), TCP protocol, TCP/IP Protocol, HTTP/ HTTPS Internet protocol. Network security, The Importance of Network Security, Firewall, The use of Firewall, The security and advantages of cloud storage, The Security and disadvantages of cloud storage, NAS (network-attached storage), Cyber-attack (Phishing, Shoulder Surfing, Unpatched software, USB devices, Eavesdropping), Protecting against security weaknesses, Security measures to protect from cyber-attacks, Reviews of network and user policies.
0/14
Chapter-7. The internet and the world wide web
We will Learn Internet, How the internet works, WWW (World Wide Web), Accessing the World Wide Web, How the World Wide Web works
0/3
Chapter-8. Computing and the environment
We will learn Computing and the environment, Advantage & Disadvantage of Computing to the environment, Manufacture, Raw material extraction, Production Most hazardous materials used in the manufacture of computing technology, Usages of Computing technology, Disposal of Computing technology, How computing technology preserving the environment.
0/3
Chapter-9. Computer Privacy
We will learn Privacy, Personal Data, UK Data Protection Act (1998) Big data, How Big Data Works, The Uses of Big Data Surveillance, Advantages of surveillance technology location-based service (LBS), how do location-based services work, Uses of location-based services Privacy Enhancing Technologies (PET), Privacy-enhancing tools Cyber Security, The computer misuse act 1990
0/4
Chapter-10. Digital Inclusion
We will learn about Digital Inclusion, Challenges for Digital Inclusion, Solutions, Impact and Advantage of Digital Inclusion, Moving Toward Digital Inclusion,
0/3
Chapter-11. Professionalism
We will learn about Professionalism, Importance of Professionalism, the professional standards by the British Computer Society (BCS).
0/3
Chapter-12. the Legal Impacts
We will learn about, Intellectual property, Copyright and patents, The Copyright, Designs, and Patents Act (1988), Licensing, The terms of a Software license, Creative Commons license, Open-source and proprietary software Advantage and disadvantages of open-source software
0/4
Chapter-13. Algorithm
We will learn about the definition of Algorithm, Criteria for a successful algorithm, Relationship between algorithm & Program, Flowcharts, The algorithm, for making a cup of coffee, Pseudo-code, Algorithm for adding two numbers, Arithmetic Operators, Variables, Constants, Selection, Iteration, Representation of selection & iteration in a flowchart, Representation of selection & iteration in Pseudo-code, Relational operator is an operator that compares two values, Nested Selection, Nested Selection pseudo-code, Indefinite iteration, Definite iteration, Logical Operators (AND, OR, NOT), NESTED LOOPS, Random Number
0/14
Chapter-18. Programming
0/35
Test Yourself
You can test your current situation on this course.
0/5
Edexcel OLevel Computer Science revision notes
About Lesson

Logic gates:

A computer is essentially an assembly of transistors and powered and unpowered circuits. A logic gate is made up of several transistors that are connected in series to produce one or more outputs, depending on the input or set of inputs that are supplied to it. There are three different gate kinds to think about:

  • AND gate
  • OR gate
  • NOT gate

Every kind of gate has three different representations: an algebraic form, a diagram, or a truth table.

AND gates

An AND gate uses two inputs to generate one output. The output is 1 (true) only if both of the inputs are 1 (true). AND gates are represented diagrammatically as:AND logic gate by arif sir science hub AND gate circuit diagram by arif sir science hub

 

The initial input is represented by A. The second input is denoted by B. Q is the output.

A truth table displays the expected output for each set of inputs. Similar to logic gates, in the table, a 0 denotes FALSE and a 1 TRUE.

The truth table below shows a representation of an AND gate.

Input Output
A B A AND B
0 0 0
0 1 0
1 0 0
1 1 1

OR gates

An OR gate uses two inputs to generate one output. The output is 1 (TRUE) only if either or both of the inputs are 1 (TRUE).

OR gates are represented diagrammatically as:

large 1 or logic gate by arif sir

A represents the first input. B represents the second input. Q represents the output.

An OR gate is represented in the truth table below.

Input Output
A B A OR B
0 0 0
0 1 1
1 0 1
1 1 1

NOT gates

A NOT gate uses just one input to generate one output. A NOT gate inverts the input; the output is 1 (TRUE) if the input is 0 (FALSE), and the output is 0 (FALSE) if the input is 1 (TRUE).

NOT gates are represented diagrammatically as:

NOT gate by arif sir science hub

The NOT gate has what appears to be a nose at the front. When using more complex gates, this nose is added to other gates to show they have been combined with the NOT gate.

A NOT gate is represented in the truth table below.

A Y
0 1
1 0