Course Content
Introduction
Chapter-1. Computational Modelling
We will discuss Machines and Computational modeling, the Input-process-output model, input-process-output-storage model.
0/3
Chapter-2. Computer Hardware
We will discuss Von Neumann Computational Model, Hardware components of a computer system, cache memory, Fetch-Decode-Execute Model, Fetch-Decode-Execute Cycle, Secondary Storage (Magnetic, Optical, Solid State Drive SSD), Magnetic secondary storage - hard disks, Optical secondary storage – CD, DVDs, Electrical secondary storage - flash drives, Cloud Storage, Embedded systems
0/5
Chapter-3. Computer Logic
We will discuss Logic, logic gates (AND, OR, NOT gates), truth tables, conditional statements.
0/4
Chapter-4. Software
We will discuss software (System software, application software, utility software), Operating system, features of the operating system, File management tool, security tools, Computer Simulation, and modeling.
0/4
Chapter-5. Programing language
we will discuss definitions of Programing language, types of Programing language, Low-Level Programming Language, High-Level Programing Language, machine code or machine language, Assembly language, Advantage & Disadvantages of assembly language, Compiler & Interpreter, Advantage & Disadvantages of Compiler & Interpreter.
0/3
Chapter-6. Networks
We will learn the definition of network, the purpose of using the network, different types of network (LAN, WLAN, WAN, Computer Network Models, The processes of accessing a server for getting services, Network Topologies (BUS, RING, Star, Mesh Topology) Communication media, Advantage and disadvantages of wired, wireless communication media, Network data speed, Definition of protocol and features of the protocol, different types of protocol, email protocols (SMTP, POP3, IMAP), TCP protocol, TCP/IP Protocol, HTTP/ HTTPS Internet protocol. Network security, The Importance of Network Security, Firewall, The use of Firewall, The security and advantages of cloud storage, The Security and disadvantages of cloud storage, NAS (network-attached storage), Cyber-attack (Phishing, Shoulder Surfing, Unpatched software, USB devices, Eavesdropping), Protecting against security weaknesses, Security measures to protect from cyber-attacks, Reviews of network and user policies.
0/14
Chapter-7. The internet and the world wide web
We will Learn Internet, How the internet works, WWW (World Wide Web), Accessing the World Wide Web, How the World Wide Web works
0/3
Chapter-8. Computing and the environment
We will learn Computing and the environment, Advantage & Disadvantage of Computing to the environment, Manufacture, Raw material extraction, Production Most hazardous materials used in the manufacture of computing technology, Usages of Computing technology, Disposal of Computing technology, How computing technology preserving the environment.
0/3
Chapter-9. Computer Privacy
We will learn Privacy, Personal Data, UK Data Protection Act (1998) Big data, How Big Data Works, The Uses of Big Data Surveillance, Advantages of surveillance technology location-based service (LBS), how do location-based services work, Uses of location-based services Privacy Enhancing Technologies (PET), Privacy-enhancing tools Cyber Security, The computer misuse act 1990
0/4
Chapter-10. Digital Inclusion
We will learn about Digital Inclusion, Challenges for Digital Inclusion, Solutions, Impact and Advantage of Digital Inclusion, Moving Toward Digital Inclusion,
0/3
Chapter-11. Professionalism
We will learn about Professionalism, Importance of Professionalism, the professional standards by the British Computer Society (BCS).
0/3
Chapter-12. the Legal Impacts
We will learn about, Intellectual property, Copyright and patents, The Copyright, Designs, and Patents Act (1988), Licensing, The terms of a Software license, Creative Commons license, Open-source and proprietary software Advantage and disadvantages of open-source software
0/4
Chapter-13. Algorithm
We will learn about the definition of Algorithm, Criteria for a successful algorithm, Relationship between algorithm & Program, Flowcharts, The algorithm, for making a cup of coffee, Pseudo-code, Algorithm for adding two numbers, Arithmetic Operators, Variables, Constants, Selection, Iteration, Representation of selection & iteration in a flowchart, Representation of selection & iteration in Pseudo-code, Relational operator is an operator that compares two values, Nested Selection, Nested Selection pseudo-code, Indefinite iteration, Definite iteration, Logical Operators (AND, OR, NOT), NESTED LOOPS, Random Number
0/14
Chapter-18. Programming
0/35
Test Yourself
You can test your current situation on this course.
0/5
Exploring Edexcel OLevel Computer Science Unlocking the Potential of Technology
    About Lesson

    General-purpose computers

    general-purpose computer is a computer that is designed to be able to carry out many different tasks. Desktop computers and laptops are examples of general-purpose computers. Among other things, they can be used to:

    • access the internet

    • browse the world wide web (WWW)

    • use word processing software

    • play games

    • communicate via email and social media

    • design and build web pages

    • store and retrieve data

    • play videos and music

    Each of these tasks is called an application. Any computer that can have many applications, such as those listed, is a general-purpose computer.

    Apart from desktop computers and laptops, the following devices are also general-purpose computers:

    • tablets – like desktop computers, they can run a variety of applications

    • smartphones – today’s smartphones can also run a variety of applications

    • games consoles – as well as games, modern consoles also enable users to watch videos, play music, and browse the internet

    • media systems in cars – allow users to navigate, listen to music and connect to a smartphone

    Hardware and software

    General-purpose computers consist of hardware and software. Hardware is the physical components of the computer, such as the central processing unit (CPU)hard diskmonitor, keyboard, and mouse. Software is the programs that run on a computer.

     

    Hardware is the physical component of a computer. Software is the programs that run on a computer.

    The general-purpose computer model

    All general-purpose computers follow the same basic model.

    This diagram illustrates the flow of data within a desktop computer. Data is input, processed, then either output or sent to secondary storage. It is held in the main memory while it is being processed.

    The CPU receives instructions and data from an input or memory. The instructions and data are processed by the CPU and the results are either sent to output or transferred to secondary storage.

    Input is from an input device such as a keyboard, mouse, camera, or scanner. Output is to an output device, such as a monitor, printer or speaker.

     

    THE CPU processes data/instructions and controls the computer system.

    The purpose of the CPU

    The CPU is the most important hardware component in a computer. It has two main functions:

    • to process data and instructions

    • to control the rest of the computer system

    All programs and data processing is run in the CPU and all hardware components are, to some extent, controlled by it.

    The Input-process-output model:

    A computer is a machine that takes some kind of input from its surroundings, processes the input according to given rules, and provides some kind of output.

    You are probably familiar with a desktop computer. The keyboard provides input and the screen provides output (which depends on what you type). In a similar way, the embedded computer in a washing machine has controls that provide input and a motor and heater as outputs; how fast they spin and how much heat they produce depends on the input setting.

    The clever bit in computer science is the activity that goes on between the inputs and outputs – the processing. Processing means performing a series of actions on the inputs according to a given set of rules.