1_merged
1_merged
Nibble 4Bits
Byte 8Bits
Example 2 Convert the following Binary Coded Decimal (BCD) number into denary Answer 83
Benefits of using Binary Coded Decimal (BCD) to Less complex to encode and decode for programmers
represent values Easier for digital equipment use BCD to display output information
Stored coordinates
Bitmap Image and Vector Graphic
Contains a drawing list
Animations
Uses
Logos
The symbols that the computer uses
Definition: A list of characters recognised by the computer
hardware and software
Character Set
Contains 256 Characters
Extended ASCII
8 Bits for each charcater
Use of filters
How sampling is used to record the sound clips? To get an approximation of the sound wave
Increasing the sampling rate will improve the accuracy of the recording
Designed to lose none of the original detail
Repeated patterns of notes are identified and are grouped, with an index
The file can be restored to the exact same state it was before compression
Why lossless compression is used to compress
It is a computer program so no data can be lost but lossy would remove data
programs rather than lossy?
Will not run correctly with lossy compression
A compression algorithm is used
This would remove all the unnecessary data from the file
How different Files are compressed using
Removes sound that the human ear may hear and
lossy compression? Video File
removes pixel that human eye may not see
Reduce resolution
Image File Reduce the range of colour depth Number of bits per pixel
Drawbacks of using bit streaming to watch a Video stops if inadequate buffering capacity
The server then sends the live images it to all users requesting it
as real-time video streaming
Cannot be paused
Plays continually
Less expensive to install
Centralised back-up
Benefits of using the Client-Server Model
Intranet capability
Internet monitoring
Client-Server Model Clients can be less powerful machines, therefore less expensive to buy
Drawbacks of using the Client-Server Model If the server fails for any reason, then none of the
requests of the clients can be fulfilled
Web services
Computing services offered by 3rd party provider over the public Internet
Public Cloud Public is available to anyone with the appropriate equipment,
software and credentials
Types of Cloud Computing services offered either over the Internet or a private
internal network
Private Cloud
Only available to select users not the general public
Stored in 32bits
Consists of 8 groups
21E5:69AA:FFFF:1:E100:B691:1285:F56E
59FB::1005:CC57:6571
Provided by ISP
Public IP
Are unique to the Internet
IP addresses from the private address space are never assigned as public.
Reduces congestion
Improves performance
Subnetworks and IP Classes
IP Classes Class B IP starts 128-191 16bits for network ID and 16 for host
Benefits of connecting computers to a LAN Allows the sharing of resources e.g. sharing a printer
How packets are transmitted in Start Topology?? Server reads address and identifies where recipient is
LAN (Local Area Network) Server transmits packets only to the recipient
Home networks
Easier to hack
Router Holds the private IP / MAC addresses of the devices on the LAN
How it is used in LAN? Provides the public IP address for the network
Faster connection
Modems
World Wide Web Content from web servers organised as web pages
Benefits Failure of one node or link doesn’t affect the rest of network
Fewer collisions
THIN-CLIENT
Thin Client Few local resources such as disk, computing power and memory.
Local Resources
Thick Client Generally consumes more local resources
Thin Client vs Thick Client Thin Client Data is typically stored on servers
Data
Thick Client Data may be stored locally.
The two packets from A and B cannot both use the bus
Definition at the same time
Steps to ensure the successful transmission of packet Check for idle bus
Attempt to re-transmit
Star Topology
Ethernet
Uses Carrier Sense Multiple Access / Collision Detection (CSMA/CD)
Powdered resin
Powdered metal
Description
The solid object is built up layer by layer using materials such as: Paper
Plastic
Ceramic powder
Steps to create a solid object using a 3D printer 5- A stepper motor moves the nozzle into position
How it registers touch? Sensors around the screen monitor the electrostatic field
Vulnerable to scratching
Disadvantages
Wears out through time
Good durability
Infra-red
Advantages Allows multi-touch facility
Expensive to manufacture
Disadvantages
Sensitive to dust
Definition Temporary memory area
Buffers Buffers are used when streaming a video from the internet
Example of using Buffers This ensures that the video playback doesn’t keep on
stopping to wait for data from the internet
It is volatile memory the contents of the memory are lost when the power is turned off
It is used to store data, files, or part of the operating system that are currently in use
Can be edited
Temporary
Primary Memory
Non-volatile the contents of the memory remain even when the
Types of Primary Memory power to the ROM is turned off
Permanent
Non-volatile storage
Types of Offline CD,DVD,Blu Ray, Pen Drive, External HDD and SSD
1- The printer driver ensures that the data is in a
format that the laser printer can understand
How it registers touch? Sensors around the screen monitor the electrostatic field
Vulnerable to scratching
Disadvantages
Wears out through time
Good durability
Infra-red
Advantages Allows multi-touch facility
Expensive to manufacture
Disadvantages
Sensitive to dust
Does not request a refresh
Lower storage
Has to be refreshed
Higher storage
Each surface of the platter is ferrous oxide which is capable of being magnetised
How a magnetic hard disk drive stores Electronic circuits control the movement of the arm and hence the heads
data??
One track in one sector is the basic unit of storage called a block
Storage Devices How Solid State Operate The second transistor is called the control gate
DVD-RAM can read and write at the same time because it has a
read/write head
Back-up systems
Optical device can determine the binary value from the light reflection
The laser beam makes indentations on the surface of the disc of pits
and lands
How data is written to CD-R and DVD-R?
The data is written in a spiral track
Can be edited
Primary Memory
Temporary
Types of Primary Memory Non-volatile the contents of the memory remain even when the
power to the ROM is turned off
Permanent
Digital cameras
MP3 players
Refrigerators
Definition:
Embedded system in washing machine only controls the programs
Examples of embedded systems include: for the washing cycle
Washing Machines
It is part of the washing machine but does not perform any other
function within it
Microwave ovens
Calculators
Characteristics of an embedded system Combination of hardware and software designed for a specific function
Embedded Systems Must have a processor, memory and input or output
The system is not easily changed or updated by the owner of the system
It is highly reliable
When the pressure sensor detects the tin is in the correct place
Continuous data
Difference between analogue and digital data Measurements are converted to digital file
Chemical process
Oven
Chemical process
Programmable ROM (PROM). Program or data once installed cannot be changed
Erasable PROM (EPROM) Usually requires the chip to be removed from the circuit
Logic Gates
Transports signals
Benefit of increasing the data bus width Hence improving processing speed as fewer transfers are needed
Fetch Stage using register transfer notation The data stored at the address held in MAR is copied into the
MDR ← [[MAR]]
MDR
Keyboard
Mouse
The user has pressed a key to interrupt the current process Ctrl+Alt+Delete
Paper jam
Examples of Interrupt
Buffer full
Printer ready
Awaiting input
Out of toner/ink
Print complete
Memory Address Register (MAR) Holds the address of the instruction or data that is next to be used
Current Instruction Register (CIR) Holds the instruction while it is being executed
System Primary memory (also known as main memory) Directly accessible by the processor
Storage RAM and ROM form main memory, along with cache memory
Slow to access
Secondary storage (also known as backing storage)
It is not directly accessible by the processor
USB Port Uses serial transmission, bits of data are sent one at a time
Drawbacks of using a compiler compared to an The program will not run if there are any errors
interpreter during program development
Errors cannot be corrected in real-time
Some high-level languages are partially compiled Intermediate code still needs to be interpreted on the
and partially interpreted such as JAVA Drawbacks user’s computer, which may run slowly
Structure blocks e.g. IF structure and loops begin and end highlighted
Variable report window to monitor the value of variables as the program is run
Auto-indent
Type checking
Context-sensitive help
Automatic indentation
Features of an IDE that are helpful when coding Type checking and Parameter checking
a program PrettyPrinting
Indentation
First Pass Data items are converted into their binary equivalent
Utility Programs
To compress or decompress the contents of the disc,
Disc Compression thus increasing capacity
Disc Space Analysis Visually demonstrates the disc usage by showing sizes of files and folders
Virus Checker Checks for viruses and then quarantines removes any virus found
Scheduling of processes , multi-tasking or multi-programming
Memory protection to ensure that two programs do not try to use the same space
Main memory management Deciding which processes need to be in main memory at any one time
Controls access
Example of Odd Parity: 01100100 only needed a 0 since already odd parity
If more than one bit has been changed or bits transposed, parity
Disadvantage
check may not pick up transmission error
Presence check Checks if data is actually present and has not been missed out
Type check Checks that the input data does not contain invalid characters.
Length check Checks if the input data contains the required number of characters.
Checking that data that has been entered into a computer has
been copied correctly from the data source.
Verification will not pick up the fact that the original data might be invalid.
Validation and Verification Visually checking the entered data against the source document
Visual Check
Carried out by a human
Example of Odd Parity: 01100100 only needed a 0 since already odd parity
If more than one bit has been changed or bits transposed, parity
Disadvantage
check may not pick up transmission error
If they are the same value, then the data was transmitted without
any error
If the values are different, then a request is sent for the data to
be retransmitted
Note:
Hacking, virus can delete and corrupt files.
Phishing, Pharming, and Spyware steal personal
information
Heuristic checking is checking of software for types of behaviour that could indicate a
Completes heuristic checking possible virus, useful if software is infected by a virus not yet on the database
Two-step verification
Biometrics
Firewall
A company stores personal details of its Anti-spyware
customers on a computer system what the
Virus checking software
company should do to keep this data safe.
Spyware checking software
Access rights
Strong password
Biometric device
TLS
Two-step verification
Proxy server
Backups
Security Measures
Anti-virus
Restricted access
Physical methods
Drop-down boxes
Online bank to reduce the impact of spyware Only requires part of the password
Firewall
Strong Passwords
Company - How to prevent unauthorised access?
Biometrics
Keep data safe during transimission Using Secure Socket Layer (SSL) protocol
Symmetric Encryption The same key is used for encrypting and decrypting
A PRIVATE KEY and a public key are both needed to encrypt and decrypt messages.
Detects tampering
How the strength of the encryption can be Increase the length of the key
improved? Uses a more complex encryption algorithm
Message is hashed
The message and the hash are sent over the internet
Financial transaction
Software distribution
Software engineers shall act consistently with the public
PUBLIC inte
The rules, past moves and decision making algorithms of the game
will be stored
Machines can learn from past mistakes and they can adapt to stop
the same problem occurring again
Applications
They can learn to predict what might happen and raise an alert
Machine learning
Robotics
Self-driving car
Table names
Data types
Field names
Data Dictionary A file containing all the data about the detail of the database design
Primary keys
Foreign keys
Relationships
Data Integrity Data design features to ensure the validity of data in the database
Create reports
Relational Database Benefits over Flat File Complex queries can be more easily made as the
DBMS will have a query language
Database Terms
Attribute or combination of attributes that is used
Primary key to uniquely identify a record
Are not necessarily unique and can contain duplicate values. They
Secondary Key are used to speed up the retrieval of data based on columns other
than the primary key
Database Terms Referential integrity ensures that every foreign key has a
corresponding primary key
Why referential integrity is important in a database? Referential Integrity prevents records from being added, deleted
or modified incorrectly
SQL Examples
PHOTO_DATA(PhotoID, PartyID, TimeTaken, CameraID)
Write a Structured Query Language (SQL) script to display the SELECT COUNT (PhotoID)
FROM PHOTO_DATA
total number of photographs that have been taken using a camera WHERE CameraID LIKE "CAN*;
with a camera ID starting with CAN.