Paper 1 - Summary Revision Notes - OL CS
Paper 1 - Summary Revision Notes - OL CS
Paper 1 –
Theory –
Summary
Revision
Notes
Gamal Orphy
OL CS Gamal Orphy
Table of Contents
Section 1: Data Representation ...................................................................... - 2 -
Section 2: Communication and Internet Technologies ............................... - 4 -
Section 3: Logic Gates and Logic Circuits ................................................... - 11 -
Section 4: Operating Systems and Computer Architecture ..................... - 15 -
Section 5: Input and Output devices ........................................................... - 21 -
Section 6: Memory and Data Storage.......................................................... - 32 -
Section 7: High and Low-Level Languages ................................................. - 40 -
Section 8: Security and Ethics ....................................................................... - 43 -
-1-
Paper 1 Theory Summary
OL CS Gamal Orphy
-2-
Paper 1 Theory Summary
OL CS Gamal Orphy
NN:NN:NN:DD:DD:DD
¨ where the first half (NN – NN – NN) is the identity number of the manufacturer of the
device and the second half (DD – DD – DD) is the serial number of the device.
-3-
Paper 1 Theory Summary
OL CS Gamal Orphy
-4-
Paper 1 Theory Summary
OL CS Gamal Orphy
-5-
Paper 1 Theory Summary
OL CS Gamal Orphy
Error-checking methods
Parity checking
¨ Can be either odd or even
¨ Sender counts number of 1s and sets parity bit
¨ Systems that use EVEN PARITY have an even number of 1- bits; systems that use ODD
PARITY have an odd number of 1-bits.
¨ Checked after transmission to make sure parity is correct, if incorrect then error is
detected
Echo check
¨ when data is sent to another device
¨ data is sent back again to the sender.
¨ The sender compares the two sets of data to check if it matches.
¨ If it doesn’t match then error is detected
¨ this isn’t very reliable.
o If the two sets of data are different, it isn’t known whether the error occurred
when sending the data in the first place, or if the error occurred when sending the
data back for checking!
-6-
Paper 1 Theory Summary
OL CS Gamal Orphy
Checksum
¨ The checksum for the bytes is calculated
¨ this value is transmitted with the block of data
¨ at the receiving end, the check sum is recalculated from the block of data received
¨ the calculated value is then compared with the checksum received
¨ if they are the same value then the data is transmitted correctly
¨ if the values are different then an error has occurred, and a request is sent for the data to
be transmitted
Check Digit
¨ A digit that is calculated from the data
¨ It is appended / added to the data
¨ Digit is recalculated when data is entered
¨ Digits are compared to check for error
Internet technologies
Internet Service Provider (ISP)
Description of the role of the ISP:
¨ Provide access to the internet / dial up / broadband
¨ Usually charge a monthly fee
¨ Monitor usage of user
¨ Give users an IP address
¨ Determine bandwidth
¨ Provide security services
¨ Provide web hosting facilities and supports domain names (for websites)
¨ Provide access to Email / Mailbox
¨ Provides online data storage.
-7-
Paper 1 Theory Summary
OL CS Gamal Orphy
MAC Address:
¨ Media Access Control
¨ This is a unique number that identifies a device connected to the internet.
¨ address is 48 bits
¨ first 6 digits is the manufacturer code of the device
¨ last 6 digits is the serial number of the device
What is the difference between an IP address and a MAC address?
¨ The IP address gives the location of a device on the internet, whereas the MAC address
identifies the device connected to the internet.
Structure:
¨ instructs how the layout of the content is displayed
¨ example: images and text
Presentation:
¨ instructs how the content will be formatted
¨ is the style of the document; example: colour of the font
-8-
Paper 1 Theory Summary
OL CS Gamal Orphy
Web browsers
¨ is software which allows a user to display a web page on their computer screen.
¨ translates the HTML document
¨ This can often be in the form of videos, images or sound.
¨ identifies protocols
Most web browsers share the following features:
¨ they have a HOME page
¨ they have the ability to store a user’s favourite websites/pages
¨ they keep a history of the websites visited by the user
¨ they give the ability to go backward and forward to websites opened.
The web browser will break up the URL (Uniform Resource Locator) into three parts:
http://www.hoddereducation.com/igcse
Protocol: http://
Web servers name: www.hoddereducation.com
Domain name: hoddereducation.com
Domain suffix/type: .com
File name (webpage): igcse
How the web browser uses the URL to access the webpage?
¨ The web browser sends URL to DNS
¨ DNS stores an index of URL and matching IP address
¨ DNS searches for URL to obtain the IP address
¨ IP address sent to web browser, (if found)
¨ Web browser sends request to IP of webserver
¨ If URL not found DNS returns error
-9-
Paper 1 Theory Summary
OL CS Gamal Orphy
How is information sent from a web server on the Internet to the user’s
computer and displayed on screen?
¨ a web browser is used
¨ user enters URL
¨ protocols used is HTTP of HTTPS
¨ The URL contains the domain name
¨ The DNS server looks up the IP address of the company
¨ the web browser sends a request to the web server
¨ Data for the website is stored on the company’s web server
¨ the web server sends back the data back to the web browser
¨ web server uses users IP address to send back the data
¨ the data is transferred into HTML
¨ HTML is translated by the user’s web browser to display the website
- 10 -
Paper 1 Theory Summary
OL CS Gamal Orphy
Description:
The output, X, is 1 if:
the input, A, is 0
Truth table:
Input Output
A X
0 1
1 0
How to write this:
X = NOT A (logic notation)
X = ā (Boolean algebra)
AND gate
Description:
The output, X, is 1 if:
both inputs, A and B, are 1
Truth table:
Input Output
A B X
0 0 0
0 1 0
1 0 0
1 1 1
- 11 -
Paper 1 Theory Summary
OL CS Gamal Orphy
OR gate
Description:
The output, X, is 1 if:
either input, A or B, is 1
Truth table:
Input Output
A B X
0 0 0
0 1 1
1 0 1
1 1 1
Description:
The output, X, is 1 if:
input A AND input B are NOT both 1
Truth table:
Input Output
A B X
0 0 1
0 1 1
1 0 1
1 1 0
- 12 -
Paper 1 Theory Summary
OL CS Gamal Orphy
Description:
The output, X, is 1 if:
neither input A nor input B is 1
Truth table:
Input Output
A B X
0 0 1
0 1 0
1 0 0
1 1 0
XOR gate
Description:
The output, X, is 1 if:
(input A is 1 AND input B is 0)
OR
(input A is 0 AND input B is 1)
Truth table:
Input Output
A B X
0 0 0
0 1 1
1 0 1
1 1 0
- 13 -
Paper 1 Theory Summary
OL CS Gamal Orphy
The OR gate:
- 14 -
Paper 1 Theory Summary
OL CS Gamal Orphy
It is worth mentioning here that simple devices with embedded microprocessors don’t
always have an operating system.
Devices not having an operating system:
¨ Household items, such as cookers, microwave ovens and washing machines.
Reason for not having an operating system:
¨ They only carry out single tasks which don’t vary.
¨ The input is usually a button pressed or a touchscreen option selected which activates a
simple hardware function which doesn’t need an operating system to control it.
- 15 -
Paper 1 Theory Summary
OL CS Gamal Orphy
Interrupts
¨ Signal sent from a device or from software to the processor.
¨ The interrupt will cause the OS/current process to pause
¨ Used to make sure that vital tasks are dealt with immediately
¨ The OS/CPU/Interrupt Service Routing will service/handle the interrupt
¨ They have different levels of priority
¨ After the interrupt is serviced, the (previous) process is continued
¨ It enables multi-tasking to be carried out on a computer
¨ A valid example of an interrupt e.g. ‘out of paper’ message for a printer, a disk drive is
ready to receive more data
What happens when an interrupt is serviced?
1. Whenever an interrupt is serviced, the status of the current task being run is saved;
2. This is done using an INTERRUPT HANDLER and once the interrupt has been fully
serviced
3. the status of the interrupted task is reinstated, and it continues from the point prior to the
interrupt being sent.
Buffers
¨ Used in computers as a temporary memory area.
¨ If it wasn’t for buffers, processors would spend the majority of their time idle, waiting for
the hardware device to complete its operation.
¨ Buffers are essentially filled from the processor or memory unit and whilst these are
emptied to the hardware device, the processor carries on with other tasks.
¨ Buffers are used, for example, when streaming a video from the internet.
- 16 -
Paper 1 Theory Summary
OL CS Gamal Orphy
This flow chart shows how buffers and interrupts are used when a document is sent to a
printer.
- 17 -
Paper 1 Theory Summary
OL CS Gamal Orphy
Computer architecture
VON NEUMANN ARCHITECTURE
¨ Buses essentially move data around the computer and also send out control signals to
make sure everything is properly synchronised.
Type of Bus Description of bus Signal direction
¨ Then a ‘read signal’ is sent to the computer memory using the control bus
¨ Then the data itself in the contents of that location is copied to the MDR (memory data
register).
¨ Then data from the MDR are then output to the user.
¨ Then the data itself to be written is copied into the MDR (memory data register).
¨ Then a ‘write signal’ is sent to the computer memory using the control bus
¨ Then the data in the MDR is copied into the location held in the MAR
- 18 -
Paper 1 Theory Summary
OL CS Gamal Orphy
CPU
Arithmetic and Logic Unit (ALU)
¨ The ALU is responsible for carrying out any mathematical operations
¨ The ALU is responsible for carrying out any logical operations (AND/OR/NOT)
¨ The ALU contains the register ACC
¨ The ACC stores data and values that are being calculated and used by the ALU
Control unit (CU)
¨ controls the operation of the memory, processor and input/output devices.
¨ Sends signals to other components telling them what to do
¨ Instructions are interpreted
Input and output devices
¨ Input devices convert external data into a form the computer can understand and can
then process (e.g. keyboards, touchscreens and microphones).
¨ Output devices show the results of computer processing in a humanly understandable
form (e.g. printers, monitors and loudspeakers).
The fetch–execute cycle
Stages:
¨ Fetch
¨ Decode
¨ Execute
Cycle:
¨ The program counter (PC) contains the address of the memory location of the next
instruction which has to be fetched
¨ This address is then copied from the PC to the memory address register (MAR).
¨ the address is then sent to the memory unit using the address bus
¨ The value in the PC is then incremented by 1 so that it now points to the next instruction
which has to be fetched
¨ The contents of the (instruction) at the memory location (address) contained in MAR are
then copied temporarily into the memory data register (MDR)
¨ Data is sent using the data bus
¨ The contents (instructions) of the MDR are then copied and placed into the current
instruction register (CIR)
¨ The address part of the instruction if any is placed in the MAR
¨ The instruction is finally decoded and then executed by sending out signals (via the
control bus) to the various components of the computer system
- 19 -
Paper 1 Theory Summary
OL CS Gamal Orphy
- 20 -
Paper 1 Theory Summary
OL CS Gamal Orphy
Two-dimensional scanners
¨ Shines a light onto the surface of the document
¨ A scan head moves across the document
¨ Reflected light is captured using sensors (CCD)
¨ Uses mirrors and lenses
¨ Captured image is converted into a digital file
¨ Produces a 2D digital image
To input text from documents:
¨ Computers equipped with OPTICAL CHARACTER RECOGNITION (OCR) software allow
the scanned text from the document to be converted into a TEXT FILE FORMAT.
Three-dimensional scanners:
¨ Scanners shines a laser (or light) over the surface of a 3D object
¨ Records measurements of the geometry/dimensions of the object
¨ Measurements are converted to digital file
¨ Produces a 3D digital model
¨ The scanned images can be used in COMPUTER AIDED DESIGN (CAD).
¨ TOMOGRAPHY technology which basically builds up an image of the solid object
through a series of very thin slices.
Barcode readers/scanners
¨ Shines light or laser at barcode
¨ Light is called an illuminator
¨ Light is reflected back; black lines reflect less light than white lines
¨ Sensors (photoelectric cells) detect the light
¨ Different reflections give different binary values
¨ A microprocessor interprets the barcode
- 21 -
Paper 1 Theory Summary
OL CS Gamal Orphy
¨ The number of stock items in the record is reduced by one each time the barcode is
read.
¨ This new value for number of stock items is written back to the stock item record.
¨ The number of stock items is compared to the re-order level; if it is less than or equal to
this value, more stock items are automatically ordered.
¨ Once an order for more stock items is generated, a flag is added to the record to stop re-
ordering every time the stock item barcode is read.
¨ When new stock items arrive, the stock levels are updated in the database.
Advantages of using barcodes to the management include:
¨ Much easier and faster to change prices on stock items
¨ Much better and more up-to-date sales information / sales trends
¨ No need to price every stock item on the shelves (this reduces time and cost to the
management)
¨ Allows for automatic stock control
¨ Possible to check customer buying habits more easily by linking barcodes to, for
example, customer loyalty cards.
Advantages of using barcodes to the customers include:
¨ Faster checkout queues (staff don’t need to remember/look up prices of items)
¨ Errors in charging customers are reduced
¨ The customer is given an itemised bill
¨ Cost savings can be passed on to the customer
¨ Better track of ‘sell by dates’ so food should be fresher.
- 22 -
Paper 1 Theory Summary
OL CS Gamal Orphy
Digital cameras
Taking an image:
¨ Image is converted from analogue to digital (using ADC)
¨ Image is turned into pixels
¨ Each pixel is given a binary value
¨ Pixels form a grid (to create the image)
¨ Each pixel has a colour
¨ Pixels are stored in sequence (in a file)
¨ Meta data/file header is stored (to describe the dimensions/resolution of the image)
Keyboards
¨ A circuit board present under the keys
¨ A key is pressed that presses a switch
¨ When a key is pressed it completes a circuit
¨ An index is searched to find the corresponding character
¨ Each character is represented by an ASCII code
¨ Each character is added to a buffer to be processed
Microphones
For example:
¨ doing a ‘voice over’ in a presentation
¨ part of a speech recognition system
¨ part of a voice recognition system
¨ enabling a disabled person to communicate with a computer.
- 23 -
Paper 1 Theory Summary
OL CS Gamal Orphy
How it operates:
¨ When a microphone picks up sound, a diaphragm vibrates
¨ This vibration produces an electric signal.
¨ This signal goes to a sound card
¨ the signal is converted into digital values and stored in the computer.
Touchscreens
Capacitive:
¨ uses multiple layers that acts as a capacitor
¨ that transmits electric currents from all 4 corners of the screen
¨ when the top layer is touched the current changes
¨ sensors are used to read the electric field
¨ the coordinates of the “touch” is determined by a microprocessor
Benefits:
¨ good visibility in sunlight
¨ allows multitouch
¨ this is a midium cost technology
Drawbacks
¨ Cannot use while wearing standard gloves
Infra-red:
¨ (Infrared) rays are sent across screen (from the edges)
¨ Has sensors around edge
¨ (Infrared) rays form a grid across the screen
¨ (Infrared) ray is broken (by a finger blocking a beam)
¨ Calculation is made (on where beam is broken) to locate the ‘touch’
Benefits:
¨ allows multitouch
¨ can use fingers/stylus/gloved fingers/pen
Drawback:
¨ expensive to manufacture
¨ sensitive to dust/dirt
¨ some heat sensitive systems allow only bare fingers to be used
- 24 -
Paper 1 Theory Summary
OL CS Gamal Orphy
Resistive:
¨ uses multiple layers of materials to transmit current
¨ when the top layer is touched into the bottom layer
¨ this closes a circuit
¨ and the electric current is transmitted to find the location of the “touch”
Benefits:
¨ cheap to manufacture
¨ can use stylus/fingers/gloved fingers/pen
Drawbacks
¨ poor visibility in sunlight
¨ vulnerable to scratching
¨ does not allow multitouch
Sensors
¨ SENSORS are input devices which read or measure physical properties.
¨ These can include temperature, pressure, acidity and so on.
¨ When the computer is used to control devices, such as a motor or a valve, it is necessary
to use a DIGITAL TO ANALOGUE CONVERTER (DAC) since these devices need
analogue data to operate in many cases.
¨ Frequently, an ACTUATOR (in output devices) is used in these control applications.
Analogue signals:
¨ Continuous data that contains infinite values
Digital data:
¨ Discrete data that has only two values
- 25 -
Paper 1 Theory Summary
OL CS Gamal Orphy
Sensor Application
temperature • control a central heating system
• control/monitor a chemical process
• control/monitor the temperature in a greenhouse
moisture/humidity • control/monitor the moisture levels in soil in a greenhouse
• control/monitor the humidity levels in the air in a greenhouse
• monitor dampness levels in an industrial application
(e.g., monitor moisture in a paint spray booth in a car factory)
Light • switch street lighting on at night and off during the day
• monitor/control light levels in a greenhouse
• automatically switch on a car’s headlights when it gets dark
infra-red/motion • turn on the windscreen wipers on a car automatically
• detect intruders in a burglar alarm system
• count people entering/leaving a building
Pressure • detect intruders in a burglar alarm system
• weigh things (e.g. check the weight of a vehicle)
• monitor/control a process where gas pressure is Important
acoustic/sound • pick up noise levels (e.g. footsteps) in a burglar alarm system
• detect the noise of liquids dripping in a pipe
Monitoring operation:
¨ Sensors send data to the microprocessor
¨ Data is converted to digital using ADC
¨ The microprocessor compares data with stored values
¨ If the data from the sensors is different than the stored values
¨ …the microprocessor sends a signal to alert the user
¨ Using a buzzer or warning lights
¨ This process is continuous
- 26 -
Paper 1 Theory Summary
OL CS Gamal Orphy
Control operation:
¨ Sensors send data to the microprocessor
¨ Data is converted to digital using ADC
¨ The microprocessor compares data with stored values
¨ If the data from the sensors is different than the stored values
¨ …the microprocessor sends a signal to an actuator
¨ To take an output action and affect the physical environment
¨ This process is continuous
Benefits of sensors:
¨ Can work continuously
¨ Avoids human error
¨ It could be a dangerous environment and will avoid human risk
¨ Detect errors instantly
¨ Maintain consistent and correct conditions
Interactive whiteboards
They also allow a user:
¨ to write on the whiteboard using a special stylus and the text or drawings produced are
then stored in an electronic form for later use.
¨ It is possible for this image to be annotated by adding labels, a description or even
changes to the design for later use.
¨ The annotated version can then be saved in an electronic form to allow these changes to
be made.
Output Devices
¨ A device used to extract and output data from the computer system to the user to output
data in human readable format
Inkjet printer
¨ a print head which consists of nozzles which spray droplets of ink on to the paper to form
characters
¨ an ink cartridge or cartridges
¨ a stepper motor and belt which moves the print head assembly across the page from
side to side
¨ a paper feed which automatically feeds the printer with pages as they are required.
- 27 -
Paper 1 Theory Summary
OL CS Gamal Orphy
Types
Thermal bubble:
¨ Tiny resistors create localised heat which makes the ink vaporise.
¨ This causes the ink to form a tiny bubble
¨ as the bubble expands, some of the ink is ejected from the print head onto the paper.
¨ When the bubble collapses, a small vacuum is created which allows fresh ink to be drawn
into the print head.
Piezoelectric:
¨ A crystal is located at the back of the ink reservoir for each nozzle.
¨ The crystal is given a tiny electric charge which makes it vibrate.
¨ This vibration forces ink to be ejected onto the paper
¨ at the same time more ink is drawn in for further printing.
Steps
1. The printer driver ensures that the data is in a correct format
2. The data is then sent to the printer and it is stored in a temporary memory known as a
printer buffer
3. Rollers are used to move the paper through the printer
4. Nozzles spray/drop/jet ink onto the paper
5. Ink jets/print head/nozzles are moved across the paper (to distribute the ink)
6. The print head moves from side to side across the paper printing
7. After a full pass, the paper is advanced very slightly to allow the next line to be printed
Laser printers
Steps
1. The printer driver ensures that the data is in a correct format
2. The data is then sent to the printer and it is stored in a temporary memory known as a
printer buffer
3. The start of the printing process involves a printing drum being given a positive charge
4. As this drum rotates, a laser beam is scanned across it removing the positive charge in
certain areas,
5. this leaves negatively charged areas which exactly match the text/images of the page to
be printed
6. The drum is then coated with positively charged TONER (powdered ink).
7. Toner sticks to the negatively charged parts of the drum
8. A negatively charged sheet of paper is then rolled over the drum to attract the toner
9. The paper finally goes through a fuser to melt ink on paper
10. Then a discharge lamp removes all the electric charge from the drum making it ready to
print the next page
- 28 -
Paper 1 Theory Summary
OL CS Gamal Orphy
3D printers
¨ 3D PRINTERS are primarily used in COMPUTER-AIDED DESIGN (CAD) applications.
¨ The solid object is built up layer by layer using materials such as powdered resin,
powdered metal, paper or ceramic powder.
How to create a solid object using a 3D printer
¨ A design is made using computer-aided-design (CAD) software
¨ The finalised drawing is imported into some special software that prepares it in a format
which is understood by the 3D printer
¨ The 3D printer is set up to allow the solid object to be made
¨ The solid object is built up layer by layer (often 0.1 mm thick); this can take several hours
¨ The object is removed from the printer and then prepared; some require the removal of
excess powder and other.
2D and 3D cutters
¨ Design is created on the CAD
¨ Material is loaded to cutter
¨ Different types of material can be used
¨ Uses lasers to cut material
¨ That is focussed using a special lens
¨ Can work on both the x, y (2D) and z axis (3D)
Actuators
¨ Used in many control applications involving sensors and devices such as ADC and DAC.
- 29 -
Paper 1 Theory Summary
OL CS Gamal Orphy
Loudspeakers/headphones
¨ Sound is produced from a computer by passing the digital data through a DIGITAL TO
ANALOGUE CONVERTER (DAC) and then through an AMPLIFIER
¨ Finally, the sound emerges from speaker
¨ Sampling rate: No. of samples per second
¨ Sampling resolution: No. of bits per sample
¨ Bit rate: No. of bits per second (Sampling rate multiplied by sampling resolution)
LEDs advantages:
¨ LEDs reach their maximum brightness almost immediately
¨ LEDs give a whiter light which sharpens the image
¨ LEDs produce a brighter light
¨ monitors using LED technology are much thinner
¨ LEDs last longer
¨ LEDs consume very little power
OLED
¨ OLEDs are thinner, lighter and more flexible
¨ OLED layers can be made from plastic rather than the glass used in LED and LCD
screens
¨ OLEDs give a brighter light than LEDs
¨ OLEDs do not require backlighting like LCD screens – OLEDs generate their own light
¨ since OLEDs require no backlighting, they use much less power than LCD screens
¨ since OLEDs are essentially plastics, they can be made into large, thin sheets
- 30 -
Paper 1 Theory Summary
OL CS Gamal Orphy
Light projectors
Digital Light Projectors (DLP):
¨ Uses a large number of micro mirrors
¨ Each mirror can create a pixel in an image
¨ Mirrors tilt away and towards the light source
¨ Mirrors reflect light towards a lens
¨ Light passes through color wheel and color filter
¨ Then projected onto a wall or screen
LCD projectors:
¨ Light sent to stationary mirrors
¨ Light reflected back at red, green and blue wavelengths
¨ Reflected light passes through three lcd screens
¨ Light then produces red, green and blue versions of the image
¨ Light passes through special color filters to produce the colored image
¨ Then projected through a lens onto a wall or screen
- 31 -
Paper 1 Theory Summary
OL CS Gamal Orphy
- 32 -
Paper 1 Theory Summary
OL CS Gamal Orphy
MPEG-4 (.mp4)
¨ This format allows the storage of multimedia files rather than just sound. Music, videos,
photos and animation can all be stored in the MP4 format.
¨ Videos, for example, could be streamed over the internet using the MP4 format without
losing any real discernable quality.
- 33 -
Paper 1 Theory Summary
OL CS Gamal Orphy
- 34 -
Paper 1 Theory Summary
OL CS Gamal Orphy
Primary memory
Random Access Memory (RAM):
¨ it is volatile/temporary memory (the contents of the memory are lost when the power to
the RAM is turned off)
¨ the data or contents of a RAM chip can be read from or written to.
¨ they can be changed.
¨ There is another type of RAM that is non-volatile which is SRAM
It is used to store:
¨ data, files or part of the operating system that are currently in use
¨ it can be written to or read from and the contents of the memory can be changed.
There are currently two types of RAM technology:
¨ dynamic ram (DRAM)
¨ static RAM (SRAM).
Dynamic RAM (DRAM)
¨ Consists of transistors and capacitors.
¨ Capacitor – this holds the bits of information (0 or 1)
¨ Transistor – this acts like a switch; it allows the chip control circuitry to read the capacitor
or change the capacitor’s value.
¨ This type of RAM needs to be constantly REFRESHED.
DRAMs have a number of advantages over SRAMs:
¨ they are much less expensive to manufacture than SRAM
¨ they have a higher storage capacity than SRAM.
Static RAM (SRAM)
¨ A big difference between SRAM and DRAM is that this type of memory doesn’t need to
be constantly refreshed.
¨ It makes use of ‘flip flops’
¨ SRAM is much faster than DRAM when it comes to data access
- 35 -
Paper 1 Theory Summary
OL CS Gamal Orphy
Secondary storage
Hard Disk Drives (HDD)
¨ The hard disk drive will have a number of platters (magnetized)
¨ These read–write heads can move very quickly – typically they can move from the centre
of the disk to the edge of the disk (and back again) 50 times a second.
¨ Data is stored on the surface in sectors and tracks.
¨ A sector on a given track will contain a fixed number of bytes.
Description how it stores data:
¨ Uses a read/write head
¨ Data stored on tracks and sectors on the platters
¨ the disc rotates at very high speed
¨ the read/write head changes the magnetic field of the disc
¨ the data is stored on a magnetizable media
¨ it changes the polarity of the medium
¨ the difference in magnetic signals represents binary values when read or stored.
Benefits of HDD(Magnetic media):
¨ Cheaper than solid state per unit memory
¨ They have longer longevity for read/write operations
¨ HDD are trusted technology
¨ Sometimes for cases of file servers, the speed is not that big of an issue
¨ For fixed devices, the durability is not an issue.
Solid-state Drives (SSD)
¨ They have no moving parts, and all data is retrieved at the same rate.
¨ The most common type of solid-state storage devices store data by controlling the
movement of electrons within NAND chips.
¨ The data is stored as 0s and 1s in millions of tiny transistors
¨ This effectively produces a non-volatile rewritable memory.
¨ However, a number of solid-state storage devices sometimes use
o ELECTRONICALLY ERASABLE PROGRAMMABLE READ-ONLY MEMORY
(EEPROM) technology. The main difference is the use of NOR chips rather than
NAND.
The benefits of SSDs:
¨ they are more reliable (no moving parts to go wrong)
¨ they are considerably lighter (which makes them suitable for laptops)
¨ they don’t have to ‘get up to speed’ before they work properly
¨ they have a lower power consumption
¨ they run much cooler than HDDs (these last two points again make them very suitable for
laptop computers)
¨ because they have no moving parts, they are very thin
¨ data access is considerably faster than HDD.
- 36 -
Paper 1 Theory Summary
OL CS Gamal Orphy
Off-line storage
Off-line storage includes:
¨ Optical Storage: CD/DVD/DVD-RAM/ Blu-ray disks
¨ Solid State: USB flash memory/memory sticks/SD-XD cards
¨ removable/external hard disk drives (magnetic storage systems).
Optical off-line storage
CD/DVD disks
¨ CDS and DVDS are described as OPTICAL STORAGE DEVICES.
¨ Laser light is used to read data and to write data in the surface of the disk.
¨ Both CDs and DVDs use a thin layer of metal alloy or light-sensitive organic dye to store
the data.
¨ The data is stored in ‘pits’ and ‘lands’ on the spiral track.
¨ A red laser is used to read and write the data.
¨ One of the main differences of DVD and CD is the use of DUAL-LAYERING in DVD
Types of CDs/DVDs:
CD-ROM/DVD-ROM:
¨ An optical disc that already has data on it and cannot be edited
CD-R/DVD-R:
¨ An empty disc that data can be added to only once
CD-RW/DVD-RW:
¨ An empty disc that data can be added to multiple times
DVD-RAM
¨ Instead of a single, spiral track, they use a number of concentric tracks
¨ Use of concentric tracks allows simultaneous read and write operations to take place.
¨ They allow numerous read and write operations (up to 100 000 times) and have great
longevity (over 30 years) which makes them ideal for archiving.
Blu-ray disks
¨ Single layer of polycarbonate
¨ Uses blue laser
- 37 -
Paper 1 Theory Summary
OL CS Gamal Orphy
- 38 -
Paper 1 Theory Summary
OL CS Gamal Orphy
- 39 -
Paper 1 Theory Summary
OL CS Gamal Orphy
High-level languages
¨ High-level languages enable a programmer to focus on the problem to be solved and
require no knowledge of the hardware so much
¨ Many high-level programming languages are portable and can be used on different
types of computer.
¨ High-level languages are designed with programmers in mind; programming statements
are easier to understand than those written in a low-level language.
Benefits:
¨ no need to understand workings of a computer
¨ easier to understand because it is closer to English
¨ much easier to debug
¨ much easier to test
¨ portable; can run on different types of computer (not machine dependent)
Low-level languages
¨ Low-level languages relate to the specific architecture and hardware of a particular
type of computer.
Assembly languages
¨ to make use of special hardware
¨ to make use of special machine-dependent instructions
¨ to write code that doesn’t take up much space in primary memory
¨ to write code that performs a task very quickly.
Machine code
¨ Binary code that the processor understands and can execute
Benefits:
¨ can be written to run faster
¨ shorter code so it requires less storage
¨ in machine language no need for compilers or interpreters
¨ can address memory addresses directly
- 40 -
Paper 1 Theory Summary
OL CS Gamal Orphy
Translators
¨ any source code written by the programmer needs to be translated into machine code in
order to be understood by the computer
Source code:
¨ The code that is written originally by the programmer before translation into machine
code
Types:
Compiler:
¨ Translates high-level language into machine code
¨ Translates (the source code) all in one go/all at once
¨ Produces an executable file (standalone file that doesn’t need a translator to run) if no
errors
¨ Produces an error report at the end if any
¨ One high-level language statement can be translated into several machine code
instructions.
Interpreter:
¨ Translates high-level language into machine code
¨ Translates (the source code) line by line/statement by statement
¨ Stops if it finds an error
¨ Will only continue when error is fixed
¨ Program will not run unless the interpreter is available
¨ One high-level language statement can be translated into several machine code
instructions.
Assembler
¨ Translates a low-level language program into machine code.
¨ An executable file of machine code is produced.
¨ One low-level language statement is usually translated into one machine code
instruction.
¨ Assembled programs can be used without the assembler.
¨
Errors
¨ A SYNTAX ERROR is where a program statement doesn’t obey the rules of the
programming language.
¨ A LOGIC ERROR is where the program doesn’t do what the programmer wanted it to
do.
- 41 -
Paper 1 Theory Summary
OL CS Gamal Orphy
Features:
¨ pretty printing: colour codes of lines to help programmer understand the code
¨ automatic indentation
¨ automatic syntax check
- 42 -
Paper 1 Theory Summary
OL CS Gamal Orphy
Hacking
¨ The act of gaining illegal access to a computer system
Leads to:
¨ Identity theft
¨ Gaining personal information
¨ Data can be deleted, changed or corrupted
Prevention:
¨ Authentication techniques
¨ Firewalls
Cracking
¨ The act of illegally changing the source code of a program so that it can be exploited for
another use
Leads to:
¨ Gaining personal information
¨ Data can be corrupted
Prevention:
¨ Authentication techniques
¨ Activation codes
¨ Dongles
¨ Online registration
Viruses
¨ Program/program code that replicates itself
¨ For malicious purpose
Leads to:
¨ Cause computer to crash/stop functioning normally
¨ Delete/corrupt data
Prevention:
¨ Up-to-date antivirus
o Antivirus features:
§ Scans files for viruses
§ Can run a scheduled scan
§ Can quarantine a virus
§ Can delete a virus
- 43 -
Paper 1 Theory Summary
OL CS Gamal Orphy
Phishing
¨ Sending of fake email
¨ That may contain a link
¨ To redirect the user to a fake website to steal confidential information
Leads to:
¨ Gaining personal information
¨ Identity theft
Prevention:
¨ The user should be cautious when opening emails
¨ Many mail servers have filters for phishing emails
Pharming
¨ Malicious code installed on users’ hard disk or on the web server
¨ The code redirects user to a fake website
¨ To steal confidential information
Leads to:
¨ Gaining personal information
¨ Identity theft
Prevention
¨ Make sure the web address is what it is claimed to be
¨ Some software called anti-spyware can delete this malicious code
Wardriving
¨ Act of using the wireless internet connection illegally
Leads to:
¨ Steal a user’s internet time
¨ Possible to steal personal information sent on WIFI
Spyware/key-logging software
¨ Software that gathers information by monitoring key presses on the keyboard
¨ The information is recorded in a log file
¨ The log file is sent back to the hacker/person who sent the spyware
Leads to:
¨ Gaining personal information
¨ Identity theft
Prevention:
¨ Use of anti-spyware
¨ Use of virtual on-screen keyboard to enter passwords with a mouse
- 44 -
Paper 1 Theory Summary
OL CS Gamal Orphy
Cookies
¨ A COOKIE is a packet of information stored in a text file
¨ Sent by a web server to a web browser.
¨ Cookies are generated each time the user visits the website.
¨ Every time a user visits the website, cookies will have collected some key information
about the user.
¨ Cookies aren’t programs but are simply pieces of data.
¨ They only allow the detection of web pages viewed by a user on a particular website and
store user preferences, as described above.
¨ Detected by the website when it is visited again
used to store:
¨ To store personal information/data
¨ To store login details
¨ To save items in an online shopping basket
¨ To track/save internet surfing habits // to track website traffic
¨ To carry out targeted advertising
¨ To store payment details
¨ To customise a webpage // to store user preferences
¨ Store progress in online games/quizzes
- 45 -
Paper 1 Theory Summary
OL CS Gamal Orphy
An individual user or a website can guard against these attacks to some degree by:
¨ using an up-to-date malware/virus checker
¨ setting up a firewall to restrict traffic to and from the internet server or user’s computer
¨ applying email filters to manage or filter out unwanted traffic or spam emails.
Signs that a user can look out for to see if they are a victim of one of these attacks
include:
¨ slow network performance (opening files or accessing certain websites)
¨ unavailability or inability to access particular websites
¨ large amounts of spam mail reaching the user’s email account.
Spam
¨ Unwanted emails
¨ Sent to a large number of people
¨ Could be used for advertising or spreading viruses and malware
Leads to:
¨ Fills up the mailbox
¨ Could download viruses and malware to the computer if opened
Prevention:
¨ Mail servers have anti-spam filters
Accidental reasons:
Human error (Accidental deletion of a file, not saving data…)
¨ Use of back ups
¨ Save data on a regular basis
¨ Use of passwords on important files
Hardware malfunction
¨ Use of back ups
¨ Use of generators and UPS (Uninterruptable Power Supply) to prevent from power loss
¨ Save data on regular basis
Software fault
¨ Use of back ups
¨ Save data on regular basis
Incorrect computer operation (incorrect shutdown)
¨ Use of back ups
¨ Correct training procedure for users
- 46 -
Paper 1 Theory Summary
OL CS Gamal Orphy
- 47 -
Paper 1 Theory Summary
OL CS Gamal Orphy
Encryption
¨ Scrambling the data to make it meaningless
¨ Uses encryption key to encrypt the data using encryption algorithm
¨ Uses decryption key to decrypt the data
¨ Data before encryption is called plain text
¨ Data after encryption is called cypher text
Security protocols
¨ Secure Sockets Layer (SSL)
¨ Transport Layer Security (TLS).
SECURE SOCKETS LAYER (SSL)
¨ is a type of protocol (a set of rules used by computers to communicate with each other
across a network).
¨ This encrypts the data.
¨ When a user logs onto a website, SSL encrypts the data – only the user’s computer and
the web server are able to make sense of what is being transmitted.
- 48 -
Paper 1 Theory Summary
OL CS Gamal Orphy
¨ A user will know if SSL is being applied when they see https or the small padlock in the
status bar at the top of the screen.
Hashing
Hashing can be used for checking data integrity (data sent without corruption)
¨ The sender sends the type of hashing algorithm used to the recipient
¨ The sender puts the data into the hashing algorithm to produce a sender’s version of
hash code
¨ The sender sends the data and the hash code
¨ The recipient puts the data into the hashing algorithm to produce recipient version of
hash code
¨ The recipient compares both sender and recipient hash codes
¨ If both hash codes are the same, then data is sent without corruption
Authentication
¨ AUTHENTICATION is used to verify the identity and that the data comes from a trusted
source.
¨ Username and password matching the username
¨ Biometrics, biological measurements that are compared with stored measurements
- 49 -
Paper 1 Theory Summary
OL CS Gamal Orphy
Explanation of how biometric system uses biometric device to control entry to the
office:
¨ Suitable biometric device, such as fingerprint scanner/retina/eye/iris scanner/face
recognition/voice recognition/palm scanner // description of use e.g., use fingerprint on
device
¨ Sensor (in biometric device) captures/takes data/readings (of user)
¨ Data/readings are converted from analogue to digital (using ADC)
¨ Data/reading sent to the microprocessor
¨ Data/readings compared to stored values/data
¨ if data/readings match user can enter
¨ if data/readings do not match user is declined entry // user asked to try again
¨ alert may be sent to security // alarm may sound
Improving security of a website
¨ Make the password require more characters
¨ Makes the password harder to crack/guess
¨ More possible combinations for the password
¨ Make the password require different types of characters
¨ Makes the password harder to crack/guess
¨ More possible combinations for the password
¨ Two-step verification
¨ Adds an additional level to hack
¨ Have to have the set device for the code to receive it
¨ Drop-down boxes // onscreen keyboard
¨ To prevent passwords being obtained using keylogger
¨ Request random characters
¨ Won’t reveal entire password
¨ Set number of password attempts
¨ Will lock account if attempting to guess multiple times
- 50 -
Paper 1 Theory Summary
OL CS Gamal Orphy
Computer ethics
¨ Computer ethics is a set of principles set out to regulate the use of computers.
¨ Three factors are considered:
¨ Intellectual property rights – these covers, for example, copying of software without the
permission of the owner
¨ Privacy issues – these covers, for example, hacking or any illegal access to another
person’s personal data
¨ Effect of computers on society – this covers factors such as job losses, social impacts and
so on.
Plagiarism
¨ this is when a person takes another person’s idea/work and claims it as their own.
¨ It is essential that some acknowledgement is made so that the originator of the idea is
known to others.
¨ This can be done by a series of references at the end of a document or footnotes on
each page where a reference needs to be made.
Copyright
¨ Legal protection for a person and software developers
¨ against illegal use and distribution of their work
- 51 -
Paper 1 Theory Summary
OL CS Gamal Orphy
- 52 -
Paper 1 Theory Summary