1.5/1.6 Flashcards
2 types of system software?
operating software = provides a platform which users can run programs
utility software= used to maintain the computer system
types of user interface?
graphical user interference
command line
natural language
user interface?
the means which a user can interact and exchange info with the computer.
command line interface?
an environment where the computer is controlled by typing text commands using a keyboard.
- cannot display graphics, only text.
- CLIs use less system resource than graphical interfaces but are less intuitive
graphical user interface?
are more modern environments that use graphics and animations to work in.
- usually based on the window-icon-menu pointer diagram
- easier to use, more attractive but require more system resources.
natural language?
uses voice recognition to interact with the users.
multitasking in operating system?
running multiple applications at the same time by giving each application a small time- slice of processor time.
this allows more than one program to be held in memory at a time and data shared between them such as copy and paste.
it also enables you to listen to music on your pc at the same time as word processing
multitasking in operating system?
running multiple applications at the same time by giving each application a small time- slice of processor time.
this allows more than one program to be held in memory at a time and data shared between them such as copy and paste.
it also enables you to listen to music on your pc at the same time as word processing
memory management in operating system?
when programs are loaded, the operating systems decide where they are held in memory.
over time the memory becomes fragmented as programs are loaded and closed because they use different amounts of memory.
the operating system must keep track of different programs fragments.
when the memory is full, the operating system uses virtual memory
peripheral management/device drivers in operating system?
translate operating system instructions into commands that the hardware will understand.
each peripheral needs a device driver
many are already built into the operating system
user management in the operating system?
the OS has to manage the accounts of different users, including authenticating users and controlling permissions.
- providing for different users to log into a computer
- operating system will retain settings for each user such as icons desktop
- each user may have different access rights to file and programs
- client server network may imposed a fixed memory or roaming profile for a user and manage login requests to the network.
file management in the operating system?
the OS manages the different documents and executable programs stored in secondary storage
- data is stored in files
- an extension to the filename tells the operating system which application to load the file into.
- the operating system may present a logical structure of files into folders and allow the user to rename, delete , copy and move files
utilities?
small programs that perform specific maintenance.
encryption software?
software that encrypts (and decrypts) files on a storage device and data packets over a network to prevent unauthorised access
defragmentation software?
physically organising the files on a storage device into the smallest number of fragments to improve performance.
- this reduces the movement of read/write head across the surface of the disk which speeds up file access
- solid state drive should not be defragmented
- it is unnecessary as they have no moving parts
- also reduces their life spam
data compression software?
compression utilities reduce the size of a file so that it takes up less space and is quicker to download over the internet.
- compression file must be extracted before they can read
- depending on the algorithm used data is either lost or reducing the quality of an image or sound e.g jpeg
ethics?
whether something is morally right or wrong
should the internet be regulated? (yes)
internet is no different to other medias; radios
children should be better protected
internet has harmful offensive and illegal content.
should the internet be regulated (no)
freedom of expression is an absolute right.
parents should take more responsibility.
internet grows quickly for filtering to be effective.
should smart devices be continually recording? (for)
data encryption makes it private
can assist disable users
if you have nothing to hide then privacy is not an issue
should smart devices be continually recording? (for)
data encryption makes it private
can assist disable users
if you have nothing to hide then privacy is not an issue
should smart devices be continually recording (against)
invasion of privacy
data is sent over the internet for processing
tv may also be taking video footage
privacy issues of computer science:
face recognition
cell phone location and gps technology
smart listening data
restricting access to the internet and youtube
preventing criticism of a ruler , government or religion
preventing violence of national law
preventing violations of hate speech, ethics or morality based laws
cultural issues:
The pace of technological change and the effect on society.
cultural influences of developers on software.
digital divide and unequal access to the internet.
energy consumption of computing technology?
2% of global energy consumption is used by data centres
disposal of computing technologies
harmful materials include:
dioxins
chromium
mercury
cadmium
radioactive sources
computing technology is often shipped to countries with lower standards for disposal.
people trawl through waste looking for metals to be recycled and sold , exposing themselves to danger.
impacts on digital technology to customers
no need to travel to bank
can access the bank 24/7
potentially opening to hacking
impacts on digital technology to bank staff
may lose jobs due to closure of the branch
new types of jobs created
skill-set working
impacts on digital technology to bank as companies
targeted marketing on customers
responsibility for data protection
less overhead; staff , utility bills , rent etc
impact on digital technology to local communities
small businesses rely on local service
other local shops may suffer less revenue as there are less people
elderly and vulnerable customers in particular value local services.
preparing for exams:
remember some keyholders:
customers
staff at the company
company directors/shareholders
local communities
remember some key impacts:
increase profits
increased production
loss of jobs
less overheads
less personal service
24/7 access
what is the data protection act 2018?
law that sets out 7 key principles that should be central to processing personal data:
- lawfulness, fairness and transparency
- purpose limitation
- data minimisation
- accuracy
- storage limitation
- security
- accountability
what is the data protection act 2018?
law that sets out 7 key principles that should be central to processing personal data:
- lawfulness, fairness and transparency
- purpose limitation
- data minimisation
- accuracy
- storage limitation
- security
- accountability
what is the computer misuse act 1990?
it is illegal to make any unauthorised access to data
…. with the intent to commit further access
…. with the intent to modify data
what does open source software mean?
the source code for the program is made available so that people can edit and distribute the code.
what does open source software mean?
the source code for the program is made available so that people can edit and distribute the code.
features of an open source?
users can modify and distribute the software.
can be installed on any number of computers.
support provided by the community.
users have access to the source data.
may not be fully tested.
what does a proprietary source mean?
the source code is kept secure and is not included when you buy the program. this can stop people changing the code or stealing a companies intellectual property.
features of a proprietary source
users cannot modify the software. protected by copyright design and potential acts.
usually paid for and licensed per user/per computer.
supported by developers
users do not have access to source code
tested by developers prior to release. although they may run beta programmes