You are on page 1of 6

-Reflexes are an automatic reaction to a stimulus.

-Receptors in the skin detect a


stimulus. -Electrical impulses are passed through neurones. -These impulses pass
from sensory neurones into the CNS. -To do this, it travels through relay
neurones, to motor neurones. -There are gaps between neurones called synapses
where chemicals diffuse across a gap. -Finally, nerve impulses reach the
effector, eg. a muscle, which would then contract.
PARTS OF A MICROSCOPE: - Stage, - Clip, - Lamp/Mirror, - Lenses (4x,10x,40x), -
Eyepiece, - Coarse Focussing Dial, - Fine Focussing Dial. - METHOD: - Place the
slide onto the stage, - Use clips to keep it in place, - Select the lowest power
lens (4x), - Position the lens so that it almost touches the slide by adjusting the
COARSE focussing dial, - Look at the microscope from the side when adjusting the
lens to avoid damaging the slide, - Now look through the eyepiece, - Slowly turn
the coarse focussing dial (This increases the distance between the objective lens
and the slide), - Now, use the fine focussing dial to bring the cell into clear
focus, - At this point, select a higher magnification eg. 10x, - Adjust the fine
focussing dial to bring the cell into focus, - Once you can see the cell, use a
pencil to make a clear, labelled drawing. - On the drawing should be a clear
magnification scale, - Place a clear plastic ruler over the stage, - Measure
diameter of FOV in mm, - Show this on the drawing using a scale bar + magnification
(eg. 40x) - USING AN OPTICAL MICROSCOPE YOU CAN ONLY SEE: - Nucleus, - Cytoplasm, -
Cell Membrane, Mitochondria, - Vacuole, - Chloroplasts, - NOT: - Ribosomes - HOW TO
CALCULATE TOTAL MAGNIFICATION: Multiply magnification of the eyepiece by that of
the lens (eg. Eyepiece is 10x, and lens is 4x, total is 40x.)
- Agar gel plate (Agar gel + Petri dish), - Must avoid contamination: * Sterilise
Petri dish * Sterilise inoculating loop by passing it through a Bunsen burner flame
* Sterilise surroundings with disinfectant solution (killing bacteria that could
contaminate the culture) * Attach the lid using tape * Place it upside down into an
incubator (stops moisture from lid dripping down) * Bacteria in schools is
incubated at 25 Degrees C, to reduce harmful bacteria grown, * Open the sterile
agar gel plate near a Bunsen burner, killing bacteria in the air. - Use inoculating
loop to spread bacteria over the plate, - Place sterile filter paper discs
containing the antibiotic into the plate, - Incubate at 25 Degrees C. - RESULTS: -
Around the antibiotic discs, there are regions where bacteria hasn't grown called
the zone of inhibition, - To measure the effect of the antibiotic, calculate the
area of the zone of inhibition using Pi x R squared.
- A gene is the smallest section of DNA. DNA makes up genes, which make up
chromosomes. One copy of all your chromosomes is called your genome. The version of
a characteristic shown by an individual is called its phenotype. Organisms that
carry out sexual reproduction are able to combine different forms of genes from two
parents, which increases variation in offspring. DNA is a polymer made from 4
different nucleotides. Each nucleotide consists of alternating sugar and phosphate
sections with one off the 4 different bases attached to that sugar. T is linked to
A, G is linked to C. PROTEIN SYNTHESIS: The DNA code for the protein remains in the
nucleus, although a copy called mRNA moves from the nucleus to the ribosomes, where
proteins are synthesised in the cytoplasm. Carrier molecules bring specific amino
acids to add to the growing protein in the correct order. There are only about 20
different naturally-occurring amino acids, codons including CGA, TGT, AAG etc.. DNA
structure determines the protein synthesised. If this changes a different protein
will be made. A copy of the DNA is made, but is now mRNA. The copy moves to the
ribosome into to the cytoplasm. Amino acids are connected together in a specific
order at the ribosome to create a specific protein molecule. Each protein molecule
has hundreds/thousands of amino acids joined together in a unique sequence. It's
then folded to the correct shape.
The structure of DNA is important in synthesising specific proteins needed in
biological processes. Not all parts of the DNA code for proteins, there is a coding
and non-coding part of DNA, which can switch genes on and off, so variations in
these areas may affect gene expression, and if the correct protein is synthesised
or not. In different cells around the body, genes will be switched on and others
will be switched off. This will vary depending on which cells you examine.
MUTATION is a change in a gene or chromosome. It is a rare, random change in the
genetic material and it can be inherited. Mutation can happen because of ionising
radiation, and chemical mutagens like cigarette smoke. Ionising radiation includes
gamma rays, X rays, and Ultraviolet rays. These mutations may change the activity
of a protein, in coding a part of the DNA, or it might change how the genes are
expressed if the change is in a non-coding section of DNA. These could result in
phenotype changes, or just nothing. Also, they could result in a serious disease
like cystic fibrosis lol. TYPES OF MUTATIONS: Substitution: For example, a C base
could be substituted with a G base. As the bases are read in threes, this may
result in a different amino acid being synthesised, and a different protein.
Insertion: An extra base, like G, may be inserted somewhere between two other
bases. As bases read in threes, this could affect the amino acid produced.
Deletion: A base, like a G base, could be removed between two other bases.
Inversion: In this case, the order of the bases would change, for example the
positions of a C and A base.
Homeostasis is the regulation of the internal conditions of a cell or organism to
maintain optimum conditions for function in response to internal and external
changes. This includes the control of - Blood Glucose Concentration, - Body Temp, -
Water Levels. All of these systems include: - Cells called receptors, which detect
stimuli, - Coordination centres, eg. the brain, that receive and process
information from receptors, - Effectors, muscles, or glands, which bring about
responses which restore optimum levels.
ADVANTAGES OF SEXUAL: - Produces variation in offspring, - If the environment
changes variation gives a survival advantage through natural selection, - Natural
selection can be speeded up by humans through selective breeding to increase food
production. ADVANTAGES OF ASEXUAL: - Only one parent needed, - More time and energy
efficient: do not need to find a mate, - Faster than sexual reproduction, - Many
identical offspring can be produced when conditions are favourable. SOME ORGANISMS
USE BOTH: - Malarial parasites reproduce asexually in the human host, but sexually
in the mosquito. - Many fungi reproduce asexually by spores but also reproduce
sexually to give variation. - Many plants produce seeds sexually, but also
reproduce asexually by runners such as strawberry plants, or bulb division such as
daffodils.
Tissue culture: using small groups of cells from part of a plant to grow identical
new plants. This is important for preserving rare plant species or commercially in
nurseries. CUTTINGS: An older, but simple method used by gardeners to produce many
identical new plants from a parent plant. EMBRYO TRANSPLANTS: Splitting apart cells
from a developing animal embryo before they become specialised, then transplanting
the identical embryos into host mothers. ADULT CELL CLONING: The nucleus is removed
from an unfertilised egg cell. - The nucleus from an adult body cell, such as a
skin cell, is inserted into the egg cell. - These embryo cells contain the same
genetic information as the adult skin cell. When the embryo has developed into a
ball of cells, it is inserted into the womb of an adult female to continue its
development.
Formation: - An antigen is injected into a mouse, - The mouse naturally produces
lymphocytes, which produce antibodies specific to the antigen. - Spleen cells which
produce the lymphocytse are removed during a small operation. - The spleen cells
are fused with human cancerous white blood cells called myeloma cells to form
hybridoma cells, which divide indefinitely. - These hybridoma cells divide and
produce millons of monoclonal antibodies specific to the original antigen
- Effects of Osmosis on Plant Tissue: - Peel the potato (Potato skin can affect
osmosis). - Use a CORK BORER to produce three cylinders of potato. - Using a cork
borer makes all of the cylinders the same diameter. - Use a scalpel to trim the
cylinders to around the same length. - Measure the length of each cylinder using a
ruler, and the mass using a scale. - Now place each cylinder into a test tube. Add
10cm3 of a 0.5 MOLAR sugar solution to the first test tube. Add 10cm3 of 0.25 MOLAR
sugar solution to the second test tube. Add 10cm3 of distilled water to the third
test tube (Contains no dissolved substances, does not affect rate of osmosis).
Leave potato cylinders overnight. Next, remove the cylinders and gently roll them
on a paper towl to remove surface moisture. Measure length and mass again.
Calculate the percentage change in length and mass (change in original value
divided by change in original value * 100)
Follicle Stimulating Hormone (FSH) causes the maturation of an egg in the ovary.
Luteinising Hormone (LH) stimulates the release of the egg. Oestrogen is involved
in repairing and thickening the uterus lining, inhibits release of FSH.
Progesterone maintains lining, inhibits release of both LH and FSH. If a woman is
pregnant, the placenta produces more Progesterone. Contraceptive 'The Pill,'
contains Progesterone and Oestrogen to inhibit LH and FSH, so eggs can't mature.
- Network protocols are sets of rules that govern how computers communicate with
each other. - TCP/IP: Detects the location of a device on the internet, - UDP:
Alternative to TCP/IP, Communication is faster (used for gaming), - FTP: For the
transmission of files, - SMTP: Simple Mail Transfer Protocol; for sending emails
over a network to a mail server, - IMAP: For returning emails, - HTTPS/HTTP: -
Governs communication between a web server and client, HTTPS is secure and
encrypted so that transactions can be made. - MAC: An MAC address is a unique
serial number assigned to each NIC, allowing a network to identify any device. -
NIC: Network Interface Controller, a circuit board installed into a computer so it
can connect to a network. - PAN: (Personal Area Network) is a network spread over a
very small area (a few metres), examples including Bluetooth or Wi-Fi. - LAN:
(Local Area Network) is a network confined to one area or site, usually employed by
a single home or organisation. - WAN: (Wide Area Network) is a network spread over
a wide area. For example, organisations with more than one branch use them. They
are also typically wireless. Examples include the internet itself.
- INTERPRETER: * Can call machine code subroutines to carry out instructions
directly. * Translates code a line at a time, which it then executes. * If a
runtime error is found the interpreter stops. * Easier to debug than a compiler *
Interpreters do not produce any machine code, so the program needs to be translated
each time it's executed. - COMPILER: * Translates an entire program before
execution. * Compiled programs run quickly, since they have already been
translated. * A compiled program can be supplied as an executable file. * Compilers
optimise code; runs quicker, takes up less memory. * Source code will not run on
more than one platform, it must be recompiled. * If a change is made, code must be
compiled again. - ASSEMBLER: * Translates assembly language into machine code. *
Whereas compilers/interpreters create many machine code instructions for one high-
level instruction, assemblers create one machine code instruction for each assembly
instruction.
- Weak/Default passwords: * Examples of these passwords would be 'password',
'12345', or 'qwerty'. These are easy for a hacker to crack, and puts a computer at
risk. There are ways to prevent this, such as having a long password, including
both upper and lowercase letters, including numbers and symbols, and avoid
information which is easy to guess eg. birthdays. - Misconfigured access rights: *
Access rights set up what can and cannot be seen when someone logs into a system.
If these aren't set up correctly in an email system, someone might be able to see
someone else's emails, and could be breaking the law. - Removable media * USB
sticks, CD ROMs, DVDs etc. Removable media can contain malware, which will attempt
to move onto a system when connected to a computer, and other computers on that
network. - Unpatched/Outdated software poses a security risk, as newer versions
protect the computer from new threats.
- Penetration Testing: One way to make sure a system is safe from security threats
is to employ someone to test it using penetration testing. This can reveal if there
are any weaknesses that an attacker could use to get into or harm the system.
Penetration testing uses the same techniques a hacker would try, but the aim is to
identify the weaknesses. - BLACK BOX PENETRATION: Simulates a hacking attempt from
someone external to the company, whereas - WHITE BOX PENETRATION: Simulates a
hacking attempt from someone inside the company, who may have knowledge of how the
computer system is set up.
- Blagging: When someone makes up a story to gain a person's interest and uses this
to encourage them to give away information about themselves, or even send money eg.
Acting as a friend in need, asking them to send money over. - Phishing: A phishing
email will ask a person to send personal details, but pretends to be from a
business. To detect if it's fake, look for spelling errors, and URLs that don't
match the business's website. When a person logs in with one of these links, it
steals their information. - Pharming: A type of cyberattack that redirects a user
from a genuine website to a fake one. The fake website often looks like the genuine
one. When someone logs in, it steals their information. - Shouldering: looking at
someone's information over their shoulder (like looking at someone's PIN while they
are entering it at an ATM)
- Not all computers require secondary storage such as embedded systems eg. Washing
machines. - SOLID STATE: * Solid state storage uses silicon microchips, and
transistors. * It can be written and overwritten like RAM * It's non volatile, so
data is kept after the computer is switched off. * It's used as external secondary
storage, like in USB sticks. * It has no moving parts, so it is * more portable,
and * produces less heat so components last longer. * It is faster than hard disk
drives, because data is stored electronically
MAGNETIC: * Includes hard disk drives, * Tiny sections of a spinning metal disk are
magnetised. * Magnetised represents '1', non-magnetised represents '0'. * Disks can
contain terabytes of data (a lot). * A read/write head moves over the disk's
surface as it spins, (To read, it checks whether each section is magnetised or not.
To write, the head magnetises or demagnetises a section of the disc spinning under
it.) * They are relatively cheap * High durability * High Capacity * Susceptible to
nearby magnetic fields.
OPTICAL: Uses a laser to scan the surface of a spinning disk. * Flat areas are
known as 'lands,' and the holes as 'pits'. * When the laser shines on the land, it
is reflected. * When the laser shines in the pit, it scatters. * Lands = 1, Pits =
0. * A sensor looks for reflected light. * ROM media, R(Read) Media, RW(Read/Write)
Media are optical.
The cycle consists of a few stages: 1. The memory address held in the program
counter (PC) is copied into the MAR. 2. The address in the PC is then incremented
by 1. The PC now holds the address of the next instruction to be fetched. 3 The
processor sends a signal along the address bus to the memory address held in the
MAR. 4. The instruction/data held in that memory address is sent along the data bus
to the MBR. 5. The instruction/data held in the MBR is copied into the CIR. 6. The
instruction/data held in the CIR is decoded and then executed. Results of
processing are stored in the ACC. 7. The cycle returns to step 1.
Data Compression: Modern computers generate files of large sizes, so they need lots
of storage space and are difficult to transmit, which can be overcome by data
compression. There are two types of compression : Lossy, and lossless. With LOSSY
COMPRESSION : Some data is removed and discarded, reducing the amount of data, and
size of the file. An image can be compressed by reducing its colour depth. For
sound, lossy compression can remove sounds outside the range of human hearing, not
decreasing quality, just decreasing file size. LOSSLESS : There are some files we
would not want to lose data from. For example: * Text files, * Spreadsheets *
Emails. With lossless compression, files are reduced in size without the loss of
data. This does not usually achieve the same file size as lossy. There are various
lossless standards, including PDF and PNG. One method of lossless compression is
Run-Length-Encoding (RLE). For example, if red is '11' and white is '00', a stretch
of 3 red, 3 white, and 3 red would be written as '111111000000111111'. With RLE, it
is instead written as '61 60 61', meaning 6 1s, 6 0s, 6 1s. In large files, this
can save a lot of storage.
Huffman coding is a form of lossless compression which makes files smaller by using
the frequency with which characters appear. This works well when characters appear
multiple times in a string, as it can be represented with fewer bits, decreasing
storage size. 1. Calculate how many times the character appears in the string. 2.
Put them in order from least to most frequent. 3. Place the two least common
characters along with their frequency in a binary tree. This is done by combining
these in a new node and adding the individual frequencies of each character
together. 4. Update the table showing the combined characters. 5. Take the next two
frequent characters and repeat steps 3 and 4 using single letters until all
characters are combined. 6. Follow the tree until the bottom is reached (0 for
left, 1 for right) - that creates a unique code for each character. 7. A set of
optimal and unique bit patterns will have been created. It is effective because the
most frequent characters have the shortest bit patterns.
In computers, the CPU receives instructions and data from an input/memory. They are
then processed by the CPU. Results are sent to an output or secondary storage. Key
elements of the von Neumann cycle are: * Data and instructions are stored in
binary. * Data and instructions are both stored in main memory. * Instructions are
fetched from memory one at a time, and in order - serially. * The processor decodes
and executes an instruction, before cycling to the next instruction. * The cycle
continues until no more instructions are available. | A processor based on von
Neumann architecture has 5 special registers (the section of high-speed memory
within the CPU that stores data to be processed) which it uses for processing. * PC
- Program counter - Holds the memory address of the next instruction to be fetched
from main memory. * MAR - Memory Address Register - Holds the memory address of the
current instruction to be fetched from memory, or the address in memory to which
data will be transferred. * Memory Buffer Register (MBR) - Holds the contents found
at the address held in the MAR, or data which is to be transferred to main memory
(Also called MDR) * CIR - Current Instruction Register - Holds the instruction that
is currently being processed and executed. * ACC - Accumulator - Holds the data
being processed and the results of processing.
- Controlling Hardware Components, - Providing a platform for software to run on, -
Providing a user interface, - Managing processes, - Managing the computer's memory,
- Managing I/O devices, - Managing Applications, - Managing Security
SYSTEM SOFTWARE is any software that assists with the running or management of the
computer system eg. operating systems, security software etc. - APPLICATION
SOFTWARE s any software added to the system that allows the user to perform a task.
Multiply the height by the width, by the colour depth. Colour depth can be worked
out through the amount of bits per pixel. eg. a colour depth of 2 means 2 bits per
pixel (00,01,10,11), so 4 colours are possible (But 3 colours would still have a
colour depth of 2.)
Sound is picked up through a microphone, and converted into an anologue signal so
that it can be stored in binary. SAMPLE RATE: Sample rate is the number of samples
recorded per second. The higher the sample rate, the closer the recorded signal is
to the original. Sample rate is measured in hertz. The larger the sample rate, the
larger the file size. BIT DEPTH: Bit depth refers to the number of bits used to
record each sample. The higher the bit depth, the more accurately a sound can be
recorded, but the larger the file size. Typical bit depths are 16 bit and 24 bit.
BIT RATE: Bit rate is a measure of how much data is processed for each second of
sound. It is calculated by multiplying the sample rate by bit depth. Higher bit
rate means better quality.
- It stores instructions while a program is being executed, - It stores data while
a program is being executed, - Each memory location has a unique address, - Data
and instructons are replaced in memory as needed.
APPLICATION LAYER - Applications such as web browsers and email programs operate at
this layer. Protocols such as HTTP, HTTPS, SMTP, IMAP, and FTP operate at this
layer. - TRANSPORT LAYER - This breaks down the message into packets. Each packet's
given a number and the total number of packets. This layer sets up the
communication between hosts. This uses TCP and UDP. - INTERNET LAYER - This adds
the sender's and recipient's IP addresses to the packet, and packages the data,
making it ready for transmission. It also routes packets across the network. LINK
LAYER - The NIC and operating system drivers are at this layer.
VIRUSES - A piece of malware that ifects a computer, and replicates itself to be
passed onto another computer. Anti-virus software holds a large database of
viruses. If a file that is opened appears to be similar to one of these, it will
warn the user. TROJAN - A trojan appears to be a piece of harmless software, that
contains malicious code inside. RANSOMWARE - Ransomware hijacks the data on a
computer by encrypting it, and demanding owners pay money for it to be decrypted.
SPYWARE - Spyware is a type of malware that collects the activity on a computer
system and sends the data it collects to another person without the owner being
aware. ADWARE - Adware is a software that causes popups or windows that will not
close, generally displaying advertisements.
CAPTCHA forms challenge humans to prove that they are human. This is because humans
are better able to understand images. This can include being asked to type words
shown in a picture, or finding all images that contain a certain object, in a
gallery of images. EMAIL CONFIRMATIONS - When a person signs up for a new account,
they often receive an email asking them to confirm they asked for the account to be
created, by clicking a link. This alerts them that their email is being used to
create an account, and allows them to prove their identity. AUTOMATIC SOFTWARE
UPDATES - By regularly updating the software on a computer, users are as protected
as they can possibly be. This means fixes or patches will be installed as soon as
they are available. If this was left to a user to do manually, it is possible they
could forget or ignore updates.
CLOCK SPEED - The number of pulses the CPU's clock generates per second. It is
measured in hertz. CPU clocks can be sped up by users, known as overclocking. The
more pulses per second, the more FDE cycles that can be performed, and more
instructions that are processed in a given time frame. Overclocking can cause long
term damage, as it's working harder, and producing more heat. CACHE SIZE - Cache is
a small amount of high-speed RAM built directly within the processor. It's used to
temporarily hold data and instructions that the processor is likely to reuse.
Bigger the cache, less time a processor has to wait for instructons to be fetched.
NUMBER OF CORES - A processing unit within a CPU is known as a core. Each is
capable of the FDE cycle. The more cores a CPU has, the greater the number of
instructions it can process in a given space of time.
https://www.stcuthberts.com/media/2605/gcse-english-poetry-storm-on-the-island.pdf
https://pmt.physicsandmathstutor.com/download/English-Literature/GCSE/Notes/AQA/
Poetry/Power-and-Conflict-Anthology/The%20Prelude%20-%20William%20Wordsworth%20-
%20Poetry.pdf
https://www.poetryfoundation.org/poems/43673/london-56d222777e969
https://www.poetrybyheart.org.uk/poems/the-emigr-e
https://www.poetryfoundation.org/poems/43768/my-last-duchess

You might also like