0% found this document useful (0 votes)
10 views

CS Short Notes

The document discusses various topics related to information representation including the differences between kilobyte and kibibyte, applications of BCD, character sets such as ASCII and Unicode, bitmap images, vector graphic logos, sampling, encoding images and sound, temporal and spatial redundancy, and lossless compression techniques like run-length encoding.

Uploaded by

ultimisticfest
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views

CS Short Notes

The document discusses various topics related to information representation including the differences between kilobyte and kibibyte, applications of BCD, character sets such as ASCII and Unicode, bitmap images, vector graphic logos, sampling, encoding images and sound, temporal and spatial redundancy, and lossless compression techniques like run-length encoding.

Uploaded by

ultimisticfest
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 17

Aryan Maheshwari

Information collected from all post-2016 (P1) and 2015 (P2) Marking Schemes - Joyous#4286

(-) - Appears once or twice || (*) - Appears frequently || (**) - Appears a lot, Should know!

Chapter 1: Information Representation


◈ Kilobyte vs Kibibyte; (-)
1. Kibi is 1024 bytes while kilo is 1000 bytes
2. Kilo is a denary preQx while kibi is binary preQx

◈ Applications of BCD; (-)


String of digits on any electronic device displaying numeric values.

◈ Character Set; (-)


List of characters and symbols recognized by the computer hardware and software.
◈ ASCII vs Unicode; (--)
ASCII Unicode
Computer Science Paper 1 & 2 Guide | AS (9608)
Greater range of characters
Used for English only Represents most written languages in
the world
One (1) byte per character Four (4) bytes per character
Standardized

◈ Bitmap Image; (*--)


An image of pixels where each pixel has one color and the color is stored as a
binary number.

◈ Vector Graphic Logo; (-)


Series of geometric shapes & lines; A drawing list with commands to create each
individual object and the attributes for it.

○ BeneQt; (*-)
1. Logo can be enlarged without pixelating because instructions to create a
logo is stored.
2. Smaller Qle size as only coordinates and calculations are stored.
3. Image is recalculated using equations and commands with each
adjustment.

◈ Sampling; (-)
Amplitude of the analogue sound wave is recorded at set intervals.
~
Increase means more samples taken → Better quality
https://docs.google.com/document/d/1Hm21P4kPqfkFVWohxDcEeQkb66WVY3d3Z5l7b4o7xqY/mobilebasic 30/08/2023, 7 00 PM
Page 1 of 17
◈ Sampling Rate; (*-)
Number of samples per unit time.
~
Increase would mean more samples → larger Qle size (and vice versa)

◈ Sampling Resolution; (*--)


Number of bits used to store each sample
~
Increase means more bits per sample → larger Qle size (and vice versa)

◈ Image Resolution; (-)


Number of pixels per unit measurement

◈ Analogue to Digital; (-)


Amplitude of the sound wave is measured at set time intervals. Value of the sample
Edit with the Docs app as a binary number.
is recorded
Make tweaks, leave comments and share with others to edit at the same time.
◈ Encoding Images; (-)
Images are stored in bitmaps. Each image is made up of pixels and each pixel has a
single color. Each color has a unique binary number and the sequence of binary NO, THANKS GET THE APP
numbers is stored for each image.

◈ Encoding Sound; (--)


Measures the amplitude of the sound wave at regular intervals. Each amplitude has
:
Measures the amplitude of the sound wave at regular intervals. Each amplitude has
a unique binary number and the sequence of binary numbers is stored for each
sample.

◈ Sound Sampling for Encoding; (-)


Amplitude of the wave is measured at set intervals and the value is stored as a
binary number.

◈ Interlaced Encoding; (*-)


Data from a single frame is encoded as two separate Qelds. One Qeld contains data
for even numbered rows and the other Qeld contains data for odd numbered rows.
Image is rendered by alternating between even and odd Qelds of each successive
frame. The viewer sees data from two frames simultaneously and the rate of picture
display is twice the frame rate. High refresh rate is produced while halving the
bandwidth requirements.

◈ Progressive Encoding; (*--)


Stores the data for an entire frame and displays it at the same time. The rate of
picture display is the same as the frame rate. High bandwidth requirement.

◈ Bit Streaming; (-)


Data is compressed before transmitting. The video is then transmitted continuously
as a series of bits hosted on a media server. The buffer stores the data from the
server and the recipient receives bit stream from the buffer.

○ Real-time vs On-demand; (-)


Real-Time On-Demand
Live-stream of an event taking place Streaming an event that has already
taken place
Captured with video camera Media encoded to bit streaming format
connected to a computer and uploaded to a server
Cannot be paused Can be paused

◈ Multimedia Container Format; (-)


A meta Qle that contains various different types of data.

◈ Temporal Redundancy; (-)


Pixels in a sequence of consecutive video frames have the same value in the same
location.

◈ Spatial Redundancy; (-)


A sequence of consecutive pixels in a single video frame have the same value.

◈ Lossless Compression; (-)


Compression where data is not lost and the original Qle can be obtained back. It is
based on some replacement technique.
○ Run-length encoding; (*-)
Lossless method of compression; Looks for runs of consecutive pixels of
the same color and stores the color value along with the number of times it
occurs.

◈ Lossy Compression; (-)


Compression where data is lost and the original Qle cannot be obtained back.
https://docs.google.com/document/d/1Hm21P4kPqfkFVWohxDcEeQkb66WVY3d3Z5l7b4o7xqY/mobilebasic 30/08/2023, 7 00 PM
◈ File Header; (--) Page 2 of 17

Stores data about the Qle contents. Eg. File size, color depth, image resolution

Chapter 2: Communication and Internet Technologies


◈ Radio Waves; (-)
Carries data in the form of electromagnetic waves // Carries data wirelessly, often
known as Wi-Fi

◈ Satellite; (-)
A communication device in Earth’s orbit that receives and transmits data.

◈ BeneQt of wireless network over wired network; (-)


BeneDt Drawback
Devices can be mobile Easier to Hack
Easier to set up Interference
Add additional devices easily Signal degrades quickly
Different devices connected at the
:
Different devices connected at the
same time

◈ Router; (-)
Connects devices to the internet // Transmits data between servers and Internet

◈ Gateway; (-)
Connects a server that uses a different protocol to the Internet // Joins two
different types of network

◈ Router vs. Gateway; (--)


Router Gateway
Connect two networks
Receive packs from a network and forward packets onto a network
Connects two networks using the Connects two networks using different
same protocol protocols

◈ Local Area Network (LAN); (-)


Devices are connected over a small geographical area through dedicated
infrastructure.
○ How packets are transferred in LAN; (-)
Packet has address of recipient. Sender transmits the packet directly to the
server, which reads the address to identify where the recipient is, and then
transmits the packet directly to the recipient.
◈ Modem; (-)
Connects the servers to the Internet over a telephone line.

◈ Internet vs World Wide Web (WWW); (--)


Internet World Wide Web
Infrastructure of networks Multimedia pages / contents
Uses IP protocol Accessed over the Internet
Web pages written in HTML
HTTP protocol used to transfer web
pages

◈ Network Interface Card (NIC); (-)


Enables the servers to connect to the (company) network.
◈ Public Switched Network Telephone (PSTN); (-)
PSTN consists of many different types of communication lines; duplex data
transmission; communication passes through different switching centers.
◈ IP Address; (-)
Gives each device on a network an identiQer; each address is unique within the
network; Allows a device to send data to the correct destination.
○ Static; (-)
https://docs.google.com/document/d/1Hm21P4kPqfkFVWohxDcEeQkb66WVY3d3Z5l7b4o7xqY/mobilebasic 30/08/2023, 7 00 PM
When a computer disconnects and rejoins a network the address
Page 3 of 17 does not
change because it is assigned by the ISP.
○ Dynamic; (-)
Each time the computer rejoins the network, the address is changed
because it is assigned by the network OS.

◈ Format of an IPv6 Address; (-)


Set of 8 numbers where each number is 4 hexadecimal digits separated by colons
Eg. AAAA:AAAA:AAAA:0000:0000:0000:0000:0000

◈ Need for IPv6 Addresses; (-)


Number of IP addresses needed will exceed the number available using IPv4.

◈ BeneQts of Private IP Addresses; (-)


1. Improved security because IP addresses are not available outside the network.
2. Reduces number of public IP addresses required.
3. Only the router has a public IP address and is visible externally.

◈ URL converted to IP; (*-)


URL is parsed to obtain the Domain name which is sent to the nearest Domain
Name Server (DNS) → DNS name resolver searches the database of Domain names
and matching IP addresses to provide a rest → If Domain name is found, the IP
address is returned, otherwise the request is forwarded to a higher level DNS → If
still not found then an error message is generated.
:
address is returned, otherwise the request is forwarded to a higher level DNS → If
still not found then an error message is generated.
◈ Accessing a web page without DNS; (-)
Enter the IP address directly

◈ BeneQt & Drawback of Dedicated Lines; (-)

BeneDt Drawback
Faster data transmission Expensive to maintain
Consist transmission speed Disruption to line = no alternative
Improved security

◈ Copper Cable; (-)


Carries data as electrical signals and can consist of a twisted pair or coaxial.
◈ Fiber-Optic Cables; (-)
Uses a bundle of glass threads to transmit data as light.

○ BeneQts and Drawbacks; (--)

BeneDt Drawback
Faster data transmission High cost for new hardware
More stable connection Expertise required for installation
More secure Fibers can break when bent
Less interference Transmits data in one direction

◈ Use of Client-side Scripting; (-)


Depending on the situation...Interactive features (Text box, buttons), validates
input-client side, handles data returned from server-side script.
◈ Use of Server-side Scripting; (-)
Data is held on the server which only sends the results of the query to the client.
The client does not have access to all of the data which keeps data secure.
○ User request with PHP Code; (--)
Browser requests a web page from the web server which accesses the page
and processes the PHP code to produce HTML for the web page. Web
server returns the HTML web page to the client web browser.
◈ Client-server Model;

○ Use of Key Features; (--)


[Role of server and data held there]; [Company]’s server performs requested
tasks and computers used by [Customer]’s are clients who send requests to
the server and get a result.
~
File is made available from a server and the user’s browser is the client.
Client requests a Qle from the server and the desired Qle is returned to the
client computer.
○ Access of same Qles from different devices; 30/08/2023, 7 00 PM
https://docs.google.com/document/d/1Hm21P4kPqfkFVWohxDcEeQkb66WVY3d3Z5l7b4o7xqY/mobilebasic (-)
Server hosts shared Qles, an individual can request aPage Qle4 offrom
17
the server
from any of the client computers, several people can access the same Qle at
the same time.

○ Other applications that use this model; (-)


Sending and receiving emails; Using a print server; Using a Qle server

◈ How is JavaScript translated using an interpreter; (-)


Code is translated one at a time and executed immediately. Interpreter stops as
soon as an error is found.
◈ Client-Side vs Server-Side; (-)

Client-Side Server-side
Computer makes the request Run on web server
Data received by computer Results are sent to the computer

◈ PHP and JavaScript; (*)


JavaScript runs client-side
PHP runs server-side
:
Chapter 3: Hardware
◈ Diagram of Components in a Personal Computer; (--)

◈ Clock Speed; (-)


Clock sends out a number of pulses in a given time interval. Each processor
instruction takes a certain number of clock cycles to execute. The higher the clock
frequency, the faster the execution time for the instruction.
◈ Solid State Memory; (-)
Makes use of blocks and arrays of integrated circuits; has no moving parts; non-
volatile
○ Features; (-)
1. Large capacity to store large Qles.
2. Fast access speeds so users will not have to wait for Qles to load.
3. Reliable as it can be dropped and will likely still work.
4. Quiet as it has no moving parts.
◈ Hard Drive; (--)
Hard disk has one or more platters made of aluminium or glass. The platters are
mounted on the central spindle and the disks are rotated at high speeds. Surface of
the platter is divided into concentric tracks and sectors. One track in one sector is
the basic unit of storage called a block.
○ Features; (--)
1. Large capacity to store large Qles.
2. Slower access speeds
3. Inexpensive per unit storage so low cost when large amount needed
4. Moving parts that can be damaged from dropping
5. Slower degradation of data so it will last longer
◈ Random Access Memory (RAM); (*)
Stores currently running parts of Qles and programs.
https://docs.google.com/document/d/1Hm21P4kPqfkFVWohxDcEeQkb66WVY3d3Z5l7b4o7xqY/mobilebasic 30/08/2023, 7 00 PM
◈ Read Only Memory (ROM); (*) Page 5 of 17
Stores boot up instructions; stores data permanently; stores operating system /
Qrmware.

◈ RAM vs ROM; (--)

Random Access Memory (RAM) Read Only Memory (ROM)


Volatile Non-volatile
Can change Cannot be changed
Read and write Read only
Stores data in use Stores BIOS

◈ Dynamic RAM vs Static RAM; (*)


Dynamic RAM (DRAM) Static RAM (SRAM)
Used in main memory Used in cache memory
Slower access time Faster access time
:
Less expensive More expensive
High storage density Lower storage density

◈ Keyboard; (-)
Uses switches and circuits to translate keystrokes into signals the computer can
understand. Each circuit is broken beneath the keys, so when a key is pressed, the
circuit is complete and a signal is sent.
◈ Optical Disc; (-)
A drive motor is used to spin the disc. Track on the disc has a sequence of pits and
lands and the surface of the disc has a reoective metal layer. A laser beam is shone
onto the disc to read or write. The reoected light is encoded as a bit pattern.
◈ Operation of a trackerball mouse; (-)
The ball touches horizontal and vertical rollers. When the ball moves, one or both of
the rollers rotate as well. Each roller connects to a shaft which spins a disk with
holes. Infrared beams shine through the holes and as the ball moves the roller, the
beam is broken by the space between the holes creating pulses of lights. The
distance and speed of the mouse is determined from the rate of the pulses by an
on-board processor chip.
◈ Optical Mouse; (-)
A laser shines onto a surface through a polished ring at the base. A sensor detects
the reoected light from the surface and captures details of the surface. As the
mouse moves, the sensor detects the changes in the surface details and translates
into movement. The processor then updates the position of the cursor on the
screen.
◈ Scanner; (-)
Contains a CCD array that is a collection of light sensitive diodes. A laser beam is
shone onto the source document and the scanned image reaches the CCD through
mirrors and lenses. The sensors detect levels of reoected light which is converted
by software to a digital value.
◈ Resistive Touchscreen; (--)
Consists of two charged plates; Pressure causes the plates to touch and complete
the circuit. The point of contact is registered and the coordinates are calculated.
◈ Capacitive Touchscreen; (--)
Screen has a layer that stores an electrical charge; When the user touches the
screen, the charge transfers to the Qnger and the sensors at the corners detect the
change. The point of contact is registered and the coordinates are calculated.
◈ Laser Printer; (-)
Revolving drum is given an electric charge → Laser beam scans back and forth
across the drum discharging certain points → Drum is coated with oppositely
charged toner which rolls over electro-statically charged paper → ‘pattern’ on the
drum is transferred to the paper which is passed through the fuser to seal the
image. → The electric charge is removed from the toner and excess toner is
collected.
◈ Inkjet Printer;

○ Print Head; (-)


Print head contains a large number of very small nozzles; ink is fed to each
nozzle from a reservoir; print head Qres droplets of ink onto the paper; print
head moves horizontally across the paper.
https://docs.google.com/document/d/1Hm21P4kPqfkFVWohxDcEeQkb66WVY3d3Z5l7b4o7xqY/mobilebasic 30/08/2023, 7 00 PM
Page 6 of 17

○ Stepper Motor; (-)


Stepper motor is connected to the print head by a belt and moves the print
head across the paper; it parks the print head assembly when not in use and
also turns the rollers that provide the paper feed.
◈ 3D Printer; (-)
Object is designed using Computer Aided Software (CAD) software → Software
splits object into splices → Data about the splices is sent to the printer → Solid
plastic is melted and transferred to the nozzle → Stepper motor moves the nozzle
into position → Nozzle extrudes the molten plastic → Layer is completed → Fan
cools the layer → Steps are repeated for each subsequent layer.
◈ Microphone; (--)
Incoming sound waves cause vibrations of the diaphragm → Moves a coil past the
magnet. → An electrical signal is produced
◈ External Speaker; (--)
Electric current is sent to the speaker and passes through a coil → Current in the
coil creates an electromagnetic Qeld → Changes in audio signal causes direction of
electric current to change to determine polarity of the electromagnet →
Electromagnet is repelled by, or attracted to the permanent magnet → Movement of
the coil causes the diaphragm to vibrate which creates sound waves.
:
the coil causes the diaphragm to vibrate which creates sound waves.
○ Components; (-)
Diaphragm; coil of wire; spider / suspension; magnet; basket; dust cap;
outer frame
◈ Purpose of a Port; (-)
Provides connection to a peripheral device and interface between computer and
other devices.
Types - USB, HDMI, SCSI, Firewire, Ethernet
◈ BeneQts of USB Port; (-)
1. Fast data transfer - useful for transferring large Qles such as videos
2. Automatic Connection - no need to install separate device drivers
3. Standard by all manufacturers - new computers come equipped with it
4. Device powered by USB - external devices charged while working

Chapter 4: Logic Gates and Logic Circuits

Chapter 5: Processor Fundamentals


◈ Arithmetic Logic Unit (ALU); (-)
Performs arithmetic and logical operations
◈ Control Unit (CU); (-)
Sends and receives signals; synchronizes and controls operations
◈ Data Bus; (-)
Carries data between processor and memory.
◈ Control Bus; (-)
Transmits signals between the control unit and the other components.
◈ BeneQt of increasing bus width; (-)
Increases the number of directly addressed memory locations

◈ Macro; (--)
Sequence of instructions that are given an identiQer and may need to be executed
several times. Can be called whenever it is needed to be used.
◈ Directive; (--)
An instruction that tells the assembler to do something. It is not a program
instruction.
Eg. Including an external Qle; state the start address for the program
◈ Processor Instruction Sets; (*)
Data movement; Input and Output; Arithmetic Operations; Jump instructions;
Compare instructions; Modes of addressing

◈ Register; (-)
Small piece of memory that temporarily stores data which is about to be or has
been processed.
◈ Fetch-Execute Cycle Registers; (*--)
Program Counter (PC) - Stores address of next instruction to be fetched.
https://docs.google.com/document/d/1Hm21P4kPqfkFVWohxDcEeQkb66WVY3d3Z5l7b4o7xqY/mobilebasic 30/08/2023, 7 00 PM
Memory Address Register (MAR) - Stores address where instruction is to be read
Page 7 of 17

from or saved to
Memory Data Register (MDR) - Stores data that has just been read from memory.
Current Instruction Register (CIR) - Stores instruction that is currently being
decoded.
Status Register - Interpreted as independent oags that are set depending on an
event.
◈ Interrupt; (-)
Signal from a source telling the processor its attention is needed.
◈ Handling an Interrupt; (--)
Processor checks for interrupt at the end or start of each Fetch-execute cycle → If
an interrupt oag is set, the processor identiQes the source of interrupt and checks
priority. → If high enough, processor saves current contents of registers and calls
Interrupt Service Routine (ISR) → Address of ISR is loaded into Program Counter
(PC) → Once interrupt is complete, processor restores registers and continues with
the cycle.
◈ Tasks by Operating System to manage Main Memory; (-)
Reads data from RAM so CPU can access instructions from program; Allocates
virtual memory when there is insuqcient RAM to run a program; Allocates RAM to
optimize performance through paging and segmentation.
:
Chapter 6: Assembly Language Programming
◈ Two Pass Assembler; (--)
Assembler reads assembly language instructions → Encounters symbolic address
and checks to see if already in the symbol table → If not, adds to symbol table → If
already in symbol table, checks to see if absolute address is known → If known, it
is entered → If not known, it is marked as unknown.
○ Second Table needed for Second Pass; (-)
Op code table / instruction table
◈ Relative Addressing; (-)
A number is added to the base address to give the actual address.
◈ Indexed Addressing; (--)
The contents of the index register are added to operand to give the actual address.

◈ Direct Addressing; (-)


Operand is the address where the data is stored.

◈ Indirect Addressing; (-)


Operand is an address that holds another address where the data is stored.
◈ Immediate Addressing; (-)
Operand is the actual value to be loaded
◈ Absolute Addressing; (-)
Operand is a numeric address
◈ Symbolic Addressing; (-)
Operand is a word/symbol
◈ Machine Independent; (-)
Program can be translated to run on any processor or platform.

◈ How is Java Source Code translated; (-)


Uses a two-step translation process where code is translated Qrst into intermediate
code using the java compiler. The bytecode is Qnally interpreted by the Java Virtual
Machine.

Chapter 7: System Software


◈ Operating System; (--)
Provides an interface between user and hardware; hardware unusable without one;
provides software platform
◈ Utility Program; (-)
Additional program that helps to maintain or conQgure the system.
◈ Library Program; (-)
Provides a ready-built routine that can be imported into a program.
○ BeneQts & Drawbacks (for routine as well); (--)
BeneDt
https://docs.google.com/document/d/1Hm21P4kPqfkFVWohxDcEeQkb66WVY3d3Z5l7b4o7xqY/mobilebasic
Drawback
30/08/2023, 7 00 PM
Page 8 of 17

Routines are pre-written and save Compatibility issues.. May not work
developers time with other programs
Routines are pre-tested so they are Not guaranteed thorough testing so
reliable may have bugs
Complex algorithms so do not Library routine may not meet exact
need to know the code needs...
Can be written in a different If the library routine is changed,
programming language to make there may be unexpected errors.
use of special features
Performs complex tasks

◈ Library Routine; (-)


Pre-compiled code that can be linked into a program to perform common or
complex tasks.

◈ Defragmentation Software / Defragmenter; (-)


Reorganizes Qles on a disk to improve eqciency; Moves split Qles so they are
contagious; Creates a larger area of free space.
:
contagious; Creates a larger area of free space.
◈ Disk Repair Software; (--)
Scans a hard disk to identify bad sectors, marks them, and resolves any errors. Also
retrieves Qles from a damaged disk.
◈ Disk Formatter; (*)
Makes existing data inaccessible; Partitions the disk into logical drives; Prepares a
hard disk for initial use.

◈ Disk Formatter, Disk Contents Analysis, and Disk Repair together; (-)
Disk contents analysis checks for errors/problems with disk. Disk repair attempts
to Qx the errors. Disk formatter prepares disk for initial use again.

◈ Purpose of Firewall; (-)


Prevents unauthorized access to the data, monitors incoming and outgoing traqc,
blocks transmission from unauthorized sources, maintains and allow list / deny list
of IP addresses.
◈ Dynamic Link Library (DLL); (--)
Collection of self-contained programs that are already compiled. Separate from .exe
Qle and only loaded when required to run

○ BeneQts & Drawbacks; (*-)


BeneDt Drawback
Routines are pre-written and save Does not function if DLL is
developers time corrupted
Routines are pre-tested so they are External change could stop the
reliable program or change the way it works
Same DLL Qle can be used in DLL must be present at run-time
multiple programs at same time otherwise there is an error
Changes and updates in the DLL
Qle are independent of the main
program so the program will be
updated automatically.
Performs complex tasks

◈ Language translator; (-)


Converts high-level programming language to a different form.
◈ Interpreter; (*-)
Used during development; translates and executes line by line, stops translation
when error is found and resumes from there once error is corrected, there is no
need for an executable Qle.

◈ Compiler; (*)
Used when development completely; produces an executable Qle and does not need
to be present for the program to be run; converts source code into a low-level
language.
◈ Why High-Level Languages do not need a Compiler/Interpreter; (-)
Software built using a compiler so it is already pre-compiled; Software is an
executable Qle and already in machine code; Source code is not provided so no
need for compiling or interpreting.
https://docs.google.com/document/d/1Hm21P4kPqfkFVWohxDcEeQkb66WVY3d3Z5l7b4o7xqY/mobilebasic 30/08/2023, 7 00 PM
Page 9 of 17

◈ Compiler over Interpreter; (*)


Compiler prepares an executable Qle; Source code is not visible to a client or
customer; It is faster to run the executable Qle than to interpret source code.
◈ Interpreter over Compiler; (--)
Easier debugging because errors can be corrected in real-time; Parts of program
can be tested; any change is seen immediately
◈ Features of Bitmapped Graphics Software; (--)
Feature Description
Color Select Select all pixels of the same color
Add Text To show the name of...
Select ‘Grab’ a number of pixels to perform a task with
Copy Replicate a number of pixels
Resize Increase or decrease the size of images
Crop Remove part of the image
:
Crop Remove part of the image
Blur Reduce the focus
Red Eye Reduction Reduces red light reoected from human eyes

◈ Features of Sound Editing Software; (*)


Feature Description
Amplify Increases the volume for a particular section
Change Pitch Increase/Decrease frequency of a section
Change Sampling Change accuracy of the sound Qle
Resolution
Cut / Delete Remove part of the sound Qle
Copy and Paste Replicate part of the sound
Fading Change the volume of a section of the sound for it
to get louder or quieter

◈ Process Management; (*)


Manages the scheduling of processes by allowing multi-tasking, ensuring fair
access, and handling priorities. Manages resources required by the processor and
prevents any interference between them.

○ Tasks; (*)
Resource management; scheduling of processes; resolution of conoicts
when two or more processes require the same resource.
◈ Memory Management; (*)
Handles allocation of memory to processes and ensures a fair usage. Organizes
and makes use of virtual memory while keeping processes separate.
○ Tasks; (*)
Allocates RAM to programs; keeps track of allocated and free memory
locations; handles virtual memory; memory protection prevents a process
from accessing memory not allocated to it.

◈ Peripheral Management Tasks; (*)


Installation of device driver software, Managing interrupts from device, Sending
control signals to the device, Control of buffers, Management of queues.

◈ Security Management; (--)


Provides user accounts and passwords. Ensure privacy of data

○ Tasks; (*)
Sets up user accounts; authenticates; implements access rights; automatic
backup; system restore / roll back; prevents unauthorized access

◈ File Management Tasks; (--)


SpeciQes tasks that can be performed on Qles; maintains and creates directory
structures; provides Qle naming conventions; controls access to Qles
◈ Printer Management Tasks; (-)
Installs printer driver; sends data to the printer to print; receives and handles error
messages from the printer.
https://docs.google.com/document/d/1Hm21P4kPqfkFVWohxDcEeQkb66WVY3d3Z5l7b4o7xqY/mobilebasic 30/08/2023, 7 00 PM
Page 10 of 17
◈ Secondary Storage Management; (*)
Storage space divided into Qle allocation units, allocating space to particular Qles,
providing Qle naming conventions, controlling access

◈ Interrupt Processing; (-)


Handles the signals sent when the attention of the processor is required elsewhere.

◈ Software Platform; (-)


Provides an environment within which the programs can be run.

◈ User Interface; (--)


Allows a user to communicate with the hardware by making navigation around the
system easier. It provides a facility for user-inputting data and outputting to the
user. Eg. Command line, GUI, menu-driven

Chapter 8: Data Security, Privacy, and Integrity


◈ Encryption; (*-)
Source code is scrambled using an encryption key or algorithm. It will be
meaningless to access a Qle without the decryption key to unscramble it.
:
◈ Disk Mirroring; (--)
Data is written on two or more disks simultaneously. Copy available if one of the
disk fails or is damaged.

◈ Virus Checker; (--)


Scans Qles stored on a computer system for malicious code and when they enter a
system; Sets up schedule for virus-checking; Quarantines viruses

◈ Data Backup Software; (*)


Creates a copy of the contents of a disk. Can be set up to automatically backup;
Allows the user to decide what is backed up; Allows the user to set up an off-site
backup; May encrypt the backup Qles; Restores the data if necessary.

◈ Data Validation; (-)


Checks that the data entered is reasonable.
○ Validation Checks; (--)
Uniqueness; Length; Presence; Format
◈ Data VeriQcation; (-)
Checks that the data entered is the same as original; compares two versions of the
data; user re-enters data if there is an error.

◈ Copyright; (-)
Formal or legal recognition of ownership of the program.
◈ Prevent illegal copies of a Software; (-)
Encryption; Product Key; Limit number of time software can be installed; Set a time
limit within which the software must be installed

◈ Security; (*)
Keep data safe from accidental or malicious damage.

◈ Privacy; (*)
Keep data conQdential so it is only seen by authorized personnel.

◈ Password // Biometrics; (-)


Prevents unauthorized access
◈ User Accounts; (--)
User has a username and password; Access to resources can be limited for each
account; Prevents unauthorized access to the system

◈ Firewall; (*)
All incoming and outgoing traqc goes through a Qrewall that blocks signals that do
not meet requirements; Keeps a log of signals; Applications can have network
access restricted
◈ Anti-Malware; (--)
Scans for malicious software and quarantines any that is found; Scans can be
scheduled at regular intervals
◈ Auditing; (-)
Logs all actions or changes to the system in order to identify any unauthorized use.
◈ Parity Check; (--)
Each byte of data has a parity bit, and there is another additional parity byte sent
with vertical parity. Each row and column must have an even/odd number of 1s. If
there is an error, it can be identiQed by the incorrect row 30/08/2023,
https://docs.google.com/document/d/1Hm21P4kPqfkFVWohxDcEeQkb66WVY3d3Z5l7b4o7xqY/mobilebasic
and column intersection.
7 00 PM
Page 11 of 17

◈ Check Sum; (-)


Calculation is done on a block of data and the result is transmitted with the data.
Calculations are repeated at the receiving end and results are compared. If
different, then an error has occurred.

Chapter 9: Ethics and Ownership


◈ Ethics; (-)
System of moral principles based on philosophical or religious views that guide
behavior and decision making.

◈ Commercial License / Software; (*)


Program is purchased for a fee; Software key required to install; Source code is
protected; Anyone can purchase it if they agree to the terms

○ BeneQts; (--)
1. Charge a fee for program
2. Copyright so program cannot be re-distributed without permission
3. Better support because a fee is charged
4. Likely to have less bugs
5. Redress available if program doesn’t function properly
:
5. Redress available if program doesn’t function properly

◈ Open Source License; (*)


Program is free of cost; source code is released with program; users can change
and edit the source code enhance the program; Users may re-release the program
under same terms

◈ Shareware License; (*)


Program is free for a trial period with limited features; source code protected;
software may be redistributed.

◈ Freeware License; (--)


Program is free of cost; software could still be copyrighted; restrictions can be set
on what a user can do.

◈ How to distribute software without source code; (-)


Provide an .exe Qle // Use a compiler

◈ Code of Ethics; (--)

Principle Description
Product Ensure that products and related modiQcations meet the
highest professional standards.
Judgement Maintain integrity and independence in professional
judgement.
Managers and leaders shall subscribe to and promote an
Management ethical approach to the management of software
development and maintenance.
Profession Advance the integrity and reputation of the profession
consistent with the public interest.
Colleagues Be fair and supportive of your colleagues
Participate in life-long learning regarding the practice of
Self your profession and promote an ethical approach to the
practice of the profession

Chapter 10: Database and Data Modelling


◈ Tasks using DBMS Developer Interface; (--)
1. Creating tables and set up relationships between them
2. Create outputs
3. Friendly Features - Forms, Report, and Queries
4. Interactive Features - Buttons and Menus

◈ Tasks using DBMS Query Processor; (*)


1. Create SQL queries
2. Search up data that meets user entered criteria
3. Perform calculations on extracted data
https://docs.google.com/document/d/1Hm21P4kPqfkFVWohxDcEeQkb66WVY3d3Z5l7b4o7xqY/mobilebasic 30/08/2023, 7 00 PM
◈ Data Redundancy; (-) Page 12 of 17

Repeated or duplicated data.


◈ Referential Integrity; (--)
Make sure tables do not try to reference data that does not exist; primary key
cannot be deleted or updated unless all dependent record are already deleted or
updated.

◈ Data integrity; (-)


Ensures data is consistent and accurate.

○ Role of Relational Database in reducing...; (-)


Each record stored once and referenced by a primary key; Referential
integrity enforced; Going through normalization process

◈ BeneQt of Relational Database; (*-)


1. Reduced Data redundancy and dependency
2. Improved data integrity and privacy
3. Program-data independence so structure of data or programs can be changed
without affecting data or programs.
4. Different access rights for different types of viewers to maintain data privacy.

◈ Schema of Database; (-)


:
Schema Description
External The individual’s view of the database
Conceptual The view seen by users of the database
Physical / Internal Data stored on the physical media
Logical Relationships will be implemented in the logical
structure of the database

◈ Primary and Foreign key in database relationships; (-)


Primary key uniquely identiQes each tuple and can be used as a foreign key in
another table to link the two tables.
◈ Table / Relation; (-)
All the data about one entity.
◈ Tuple / Record; (-)
The data in one row of a table.
◈ Attribute; (-)
A column or Qeld in a table.
◈ Data Dictionary; (-)
Stores all the information about the database. Eg. Fields, data types, validation,
keys
◈ Normalizations; (*)
1NF - No repeating groups
2NF - No partial dependencies
3NF - No non-key dependencies // No transitive dependencies

Chapter 11: Algorithm Design and Problem Solving


◈ Algorithm; (*)
Solution to a problem expressed as a sequence of deQned steps
~
Used when designing a solution to a problem
Purpose is to describe solution as a sequence of steps
○ Stages; (--)
Stage Description
Input Enter data into the system
Process Manipulate data in some way
Output Send data out from the system

◈ Basic Constructs of an Algorithm; (**)

Construct
https://docs.google.com/document/d/1Hm21P4kPqfkFVWohxDcEeQkb66WVY3d3Z5l7b4o7xqY/mobilebasic
Description
30/08/2023, 7 00 PM
Page 13 of 17

Selection Line of code executed in a Qxed order // Testing a


condition to determine the sequence of execution
Sequence Lines of code are executed in a Qxed order
Assignment A value is given to a variable

◈ Declaration; (-)
Assigns a data type to a variable
◈ Contents of an IdentiQer Table; (-)
List of identiQer / variable names; explanations of what they are used for; data
types

◈ Pseudocode Features for Ease; (--)


- Indentation
- Blank Lines / White Space
- Sensible identiQer names (Use of CamelCase)
- Capitalized Keywords
◈ Features of Code easy to recognize; (*--)
- Selection, Iteration, or Assignment statements
:
- Selection, Iteration, or Assignment statements
- Data declarations / structures / data types
- Modular structure
- Subroutine parameters
- Code Format
- Operators

◈ Transferable Skill; (*-)


Experience of one programming language can be applied to an unknown language.

○ Common features in High-level languages; (-)


- Similar Syntax (Assignment, variable, common operators)
- Control Structures (Iteration, selection sequence)
- Modular features (Objects, procedures, functions)
◈ Comments; (-)
Explain the functionality of the code
◈ Indentation; (-)
Easier to identify block of code

Chapter 12: Stepwise ReDnement and Structure Charts


◈ Features of a Structure Chart; (*--)
- Parameters passed between modules
- Module Iteration
- Module Selection
- Module Sequence
- Module hierarchy
◈ Stepwise ReQnement; (*--)
Breaking down a problem into smaller steps until it is easier to solve and be
programmed from.
~
Increases the level of detail of the algorithm

Chapter 13: Programming and Data Representation


◈ Bubble Sort Algorithm; (--)
Reduces the number of items to be checked by one after each pass. Use of a oag
variable which stops the outer loop after no swaps made in the inner loop and
resets again before the start of inner loop. Set again if swap is made.

○ Effectiveness; (-)
Prevents unnecessary iterations through the array

◈ Features/Advantage of 1D Array; (--)


- Same data type using a single identiQer
- Access of individual elements
- Easier to search data and understand it
◈ Built-in functions; (-)
- Made available by the programming language because it is already in the system
- Ready made and tested
○ Advantages; (-)
https://docs.google.com/document/d/1Hm21P4kPqfkFVWohxDcEeQkb66WVY3d3Z5l7b4o7xqY/mobilebasic 30/08/2023, 7 00 PM
- Saves development time Page 14 of 17
- Pre-compiled and tested
- Available to all programs

◈ User-deQned functions; (-)


- Can be modiQed
- Designed to meet the user’s requirements
- Can only be used by that program or module
◈ Types of Loop; (-)
Loop Description
Count Controlled The number of iterations is known or Qxed
The number of iterations depends on the condition
Post-Condition being tested at the end or before the loop is
repeated.
Pre-Condition

◈ Storing Data in File over Array; (--)


Retain data when the computer shuts down or the program ends.
◈ File Modes; (-)
:
◈ File Modes; (-)

Mode Description
READ Used to read data from a Qle
APPEND Used to add data
WRITE Used to write data from scratch*

Chapter 14: Structured Programming


◈ Advantages of Subroutines; (*-)
1. Code can be called from multiple places
2. Code can be independently tested and debugged
3. Change only needs to be made once if the subroutine task changes
4. Reduces unnecessary program lines
5. Enables sharing of development between programmers

◈ Use of Subroutines; (-)


Makes a more manageable and understandable solution

◈ Use of Parameters in Subroutines; (--)


- Pass values to/from the subroutine
- Produce reusable code
- Avoid global variables
- Allow recursion
◈ Modular Approach Features of High-level programming languages; (--)
- Parameters
- Procedures
- Functions
- Local / Global Variables
◈ Advantages of Decomposing Programs to Modules; (--)
- Easier to solve & implement the solution
- Easier to debug as each module can be tested separately
- Tasks shared among a team of programmers
*Include reference to given scenario for each point above*
◈ Advantage of constructing using Modules; (-)
- Manageable and understandable solution
- Subroutine may be independently tested and debugged
- Program is easier to maintain

◈ Problem Decomposition; (-)


Breaking down a problem into sub tasks to make it easier to solve.
◈ Minimize program faults during design and coding stages; (-)
1. Use of tried and tested library subroutines
2. Use of modular programming to break the problem down and make it easier to
solve.
3 Use of programming practice to make the code easier to read
◈ Passing By Reference; (-)
Address of the parameter is passed to the subroutine
https://docs.google.com/document/d/1Hm21P4kPqfkFVWohxDcEeQkb66WVY3d3Z5l7b4o7xqY/mobilebasic 30/08/2023, 7 00 PM
Page 15 of 17

Chapter 15: Software Development


◈ IDE; (-)
Software program that features a program editor, compiler, and observes output
◈ Features of Integrated Development Environment (IDE) for: (*--)
For Features
Context-sensitive help; syntax checking; automatic
Coding indentation; type checking; PrettyPrinting
Context sensitive prompts; dynamic syntax
Initial Error Detection checking; pretty printing; formatting; text editor;
built in functions
Presentation PrettyPrint; Expand and collapse code blocks;
Automatic indentation
Debugging Breakpoints; Single-stepping; Watch window
:
◈ Using an IDE to Write, Translate, and Test; (*)
Use an editor to write the source code. A compiler will translate the source code
into object code. A debugger is used to Qnd and help to correct errors.
◈ Ways to minimize errors; (-)
- Meaningful variable names
- PrettyPrint
- Indentation
- Dynamic Syntax Checking
◈ PrettyPrint; (-)
Color coding of command and key words
◈ Expansion and Collapse of code blocks; (-)
Allows programmer to focus on a section of code
◈ Automatic Indentation; (-)
Allows programmer to clearly see the different code sections

◈ Types of Program Maintenance; (*--)


Maintenance Description
Corrective Amend the algorithm to eliminate errors
Adaptive Change in code due to change in program
requirements; Affects data structure & program
algorithm
Perfective Make improvements to the program

◈ Stub Testing; (*-)


Testing may be carried out before modules are developed. Dummy modules are
made to simulate the actual modules. These module stubs contain simple code to
return a Qxed and known value.

◈ Single Stepping; (-)


Executes a line of code each time; used to trace the path of execution; tracks
variable values using a watch window.
◈ White-box Testing; (*)
Tests every path through the algorithm.
◈ Black-box Testing; (-)
Data is chosen to test that the program does what it is supposed to.

○ Errors revealed; (-)


Run-time; Logical; incorrect algorithm

◈ Program Errors; (*-)


Error Description
Syntax Statement in the source code that breaks the rules
of the language
Logic An error in the algorithm that causes the program to
not behave as intended.
https://docs.google.com/document/d/1Hm21P4kPqfkFVWohxDcEeQkb66WVY3d3Z5l7b4o7xqY/mobilebasic 30/08/2023, 7 00 PM
Page 16 of 17
Run-time Program performs an invalid operation or enters an
inQnite loop. Eg. divide by zero

◈ Program Fault; (-)


Something that makes the program not do what it is supposed to do under certain
circumstances.
◈ Features of a program; (-)
- Indentation
- Blank lines
- Capitalization of keywords
- Sensible variable names
- Functions
- Comments
- Pretty print
◈ Program-Development Cycle; (-)
Source code represents an algorithm expressed in a high level language. Object
code is produced by the compiler during the translation stage. Corrective
maintenance occurs to Qx faults or errors revealed from testing the program.
○ Stages; (-)
- Problem deQnition
:
- Problem deQnition
- Design
- Coding
- Testing
- Documentation
- Implementation
- Maintenance
○ Features that assist in cycle; (-)
- Context-sensitive prompts
- Dynamic syntax checking
- Pretty Printing
- Formatting
- Single-stepping; Allow program statements to be executed one at a time
- Breakpoints; Stop the program at a speciQc statement
- Watch window; Monitor value of variables as program is run
- Text Editor
- Compiler / Interpreter

https://docs.google.com/document/d/1Hm21P4kPqfkFVWohxDcEeQkb66WVY3d3Z5l7b4o7xqY/mobilebasic 30/08/2023, 7 00 PM
Page 17 of 17
:

You might also like