COMPUTER ( PAPER 1) Flashcards

1
Q

DEFINE INTERNET

A

-The internet refers to the global network of computers and other electronic devices connected together through a system of routers and servers

-It is the infrastructure that allows us to send and receive information, including email, instant messaging, and file transfers

-The internet also provides access to other services such as online gaming, video streaming, and cloud computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

DEFINE WWW

A

-The World Wide Web, or simply the Web, is a collection of websites and web pages that are accessed using the Internet.

-The web consists of interconnected documents and multimedia files that are stored on web servers around the world.

-Web pages are accessed using a web browser, which communicates with the web server to retrieve and display the content

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Difference between WWW and the INTERNET?

A
  1. INTERNET is a infrastructure and WWW is a service on top of that infrastructure.
  2. Internet uses
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

WHAT IS A WEB BROWSER?

A

A web browser is a piece of software used to access and display information on the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Purpose of a Web Browser

A

The main purpose of a web browser is to render hypertext markup language (HTML) and display web pages.

Web browsers interpret the code in HTML documents and translate it into a visual display for the user such as videos,images/text and audio.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Features of a Web Browser

A
  • Render HTML
  • Storing bookmarks and favorites
  • Recording user history
  • Allowing use of multiple tabs
  • Storing cookies
  • Providing navigation tools - forward and backward
  • They make use of hyperlinks which allow navigation
  • Providing an address bar
  • It have a home page
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define URL?

A

-The URL stand for uniform resource locator, and it is a text-based address that identifies the location of a resource on the internet.
-It is the address of a web page, image, video, or any other resource available on the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Components of a URL

A

A URL can contain three main components:
~Protocol
~Domain name
~Web page/file name
–protocol://domainhost,domain name,domaintype /path/file name
– https://www.ashifaansari.com/path/ict

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DEFINE HTTP

A

-HTTP stands for hypertext transfer protocol and is used for transferring data between a client and a server on the internet.

-It is a stateless protocol, meaning it does not store any information about previous requests or responses.

-HTTP operates on port 80 by default and sends data in plain text format, making it vulnerable to interception and manipulation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

DEFINE HTTPs

A

-HTTPS is a secure version of HTTP that uses encryption to protect data transferred between a client and a server.
-It operates on port 443 by default and uses Transport Layer Security (TLS) or Secure Socket Layer (SSL) to encrypt data.
-HTTPS ensures that data transferred between the client and server is secure, making it harder for unauthorized users to intercept or manipulate data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How are web pages retrieved from webserver?

A
  • When you type in a URL the browser sends the URL to the DNS using HTTP
  • The DNS finds the matching IP addresses for the domain name in the URL and sends the IP address to the web browser.
  • The web browser sends a request to the web server for web pages.
  • The web pages are sent from the web server to the browser.
  • The browser renders HTML to display web pages.
  • Any security certificates are exchanged.
  • SSL/HTTPS is used to secure the data which will encrypt any data that is sent.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Websites can be separated into which 2 parts?

A
  • STRUCTURE
  • PRESENTATION
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

STRUCTURE OF WEBSITE?

A

HTML is:
A language used to create the structure/layout of a website.
Written in plain text.
Used in the content layer.
Made up of a set of markup codes.
Used to tell the browser how to display the page.
E.g.
Where text is placed
Margins of page
Line break
Padding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

PRESENTATION OF WEBSITE?

A

CSS is:
A language used to create the presentation / formatting of the page.
Written in plain text.
Used in the presentation layer.
Used by web pages to produce a consistent format between different web pages.
E.g.
Font size
Font color
Background color

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

WHY ARE THE PRESENTATION AND STRUCTURE OF THE WEBSITE KEPT SEPARATELY?

A
  • The presentation of the page can be changed without needing to alter the structure; so regular updates can be made without needing to check the structure.
  • The formatting document (written in CSS) can be used again for a different website.
  • If further content and web pages are added to the website, the necessary formatting can be easily applied so this can save time when developing a website.
  • CSS to standardize formatting so CSS only needs to be created once and be applied to each webpage.
  • One person can develop the structure and one can develop the presentation so this can save time when developing and updating a website.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

WHAT IS SSL AND HOW DOES IT WORK?

A
  • SSL or secure socket layer is a security protocol developed to provide secure communication over the Internet.
  • It uses symmetric and asymmetric encryption to secure data and ensure data integrity.
  • It uses digital certificate for authentication.
  • This digital certificate which contains _ public key is sent to the browser.
  • The browser will validate the certificate and check whether it trust the certificate.
  • If it does, it sends a message to the server. The server sends back a digitally signed acknowledgement to start an SSL encrypted session and the transaction will begin.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is TLS ?

A
  • TLS or transport layer socket is a security protocol used to provide secure communication over the internet.
  • It uses a combination of symmetric and asymmetric encryption to secure data and ensure data integrity.
  • TLS is an updated version of SSL.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

2 layers of TLS?

A

Handshake Layer
* This is used to establish a secure connection between two endpoints.
Record Layer
* This is responsible for transmitting data securely between the client and the server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How does TLS works?

A
    • The client/browser requests secure connection to the server.
    • The client/browser requests the server to identify itself.
    • The server provides a digital certificate.
    • The client/browser validates the certificate.
    • The client/browser sends a signal back to the server to begin data transmission.
    • The encryption method will be agreed & a session key is generated.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are cookies?

A

Cookies are small text files that are stored on a user’s device by a website. They are sent between a Web browser to a web server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Functions of cookies?

A
  • Saving Personal Details
  • Tracking User Preferences
  • Holding Items in an Online Shopping Basket
  • Storing Login Details
  • Storing Relevant Purchases
  • Displaying Relevant Adverts
  • Tracking Visitor Statistics
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

WHAT ARE 2 TYPES OF COOKIES AND THIER FEATURES?

A

Session Cookies
* These are temporary and are stored only during a user’s browsing session
* They are used to maintain a user’s state or activity during a single session, such as when filling out a form or navigating through a website.

Persistent Cookies
* These are stored on a user’s device for a longer period, usually for a few weeks to several years
* They are used to remember user preferences and settings, such as language preferences, login details, and shopping cart items

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

DIFFERENCE BETWEEN SESSION AND PERSISTENT COOKIES?

A
  • Session cookies are stored in memory/RAM ,whereas persistent cookies are stored on the hard drive/secondary storage.
  • When the browser is closed a session cookie is lost , whereas a persistent cookie is not lost until deleted by the user/they expire.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Name Cyber Security Threats

A
  • Hacking
  • Malware - Virus, Worms, Trojan horse, Spyware, Ransomware
  • Brute - force - attack
  • Pharming
  • Phishing
  • Distributed Denial of services attack
  • Data interception
  • Social engineering
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is hacking?
* Hacking involves gaining unauthorized access to a system or network to steal or manipulate data, disrupt services, or cause damage. * The aim of hacking can vary from personal gain to activism or cyber espionage.
26
What is Brute - force - attack?
* A brute-force attack is a trial-and-error method used to crack passwords or encryption keys by trying every possible combination until the correct one is found. * The aim of a brute-force attack is to gain unauthorised access to a system or network OR to delete,change and steal data Or to disrupt business{place}. * It can be carried out manually or automatically by software.
27
Define Data Interception?
- Data interception involves eavesdropping on communication channels to intercept and steal sensitive information, such as passwords, credit card numbers, or personal data. - The aim of data interception is to steal sensitive information for personal gain or to use it for further cyber-attacks.
28
What is distributes denial of services attack?
* A DDoS attack is where multiple computers are used as bots. * They flood a server with lots of requests at same time which the server can’t respond to; causing it to crash/fail or become unavailable to users. * The aim of a DDoS attack is to disrupt the normal functioning of a system or network by denying users access to a website. * The aim can be for revenge, to affect someone's,Entertainment value OR To demand a ransom to stop it
29
Define Malware?
* Malware is malicious software designed to harm or gain unauthorized access to a system or network. * It replicates itself and fills the hard disk.
30
Define virus?
A virus is a piece of code that attaches itself to a legitimate program or file and then replicates itself with an active host in order to spread to other programs or files on the computer. It can cause damage to the system, including deleting/corrupting data or damaging hardware. It also takes up memory space.
31
Define worms?
A worm is a standalone program means without an active host that can spread and replicate itself over computer networks. It can take up storage space or bandwidth. It can also cause damage to the system, including deleting/corrupting data or damaging hardware. - It also opens back doors to computers over the network and is used to deposit other malware on networked computers
32
Define Trojan horse?
A Trojan horse is a program that disguises itself as a legitimate program or file, but when installed, the malware it contains such as virus is installed that it can delete data or damage hardware.
33
Define spyware?
Spyware is software that records all key presses and transmits these to a third party.
34
what is ransomware?
Ransomware is a type of malware that stops the user to access thier data by encrypting the user's files and demanding a ransom payment/fee to decrypt them. It can cause data loss, financial damage and disrupt business operations.
35
Define Adware?
Adware is a type of software that displays unwanted advertisements on the computer without the user's consent. Some of these may contain spyware and some may link to viruses when clicked. It reduces internet speed which reduce device performance and redirects the user to fake websites.
36
Define phishing?
* Phishing involves when a user is sent an email which contains a link to a fake/bogus website where the user is encouraged to enter their details. * The aim of phishing is to steal sensitive information for exmaple bank account info .
37
Define pharming?
* Pharming involves malware being downloaded without the user’s knowledge. * This redirects the user to a fake website where they’re encouraged to enter their personal details. * The aim of pharming is to steal sensitive information for personal gain or to use it for further cyber attacks.
38
DAMAGE TO YOUR DATA
LOSS OF POWER --- USE A UPS LIQUIDS BEING SPILLED --- KEEP DRINKS AWAY FROM THE DEVICE NATURAL HAZARDS ~~ FLOOD FIRE HARDWARE/SOFTWARE FAULT HUMAN ERROR INCORRECT USE OF STORAGE DEVICE
39
Social engineering techniques?
**Impersonation**: This involves posing as someone else to gain trust or access to sensitive information. [co-worker, IT support personnel, or a law enforcement officer] **Baiting:** Enticing a victim with a desirable item or promise to extract sensitive information or gain access to a system **Pretexting:** involves creating a fake scenario to extract sensitive information. [The attacker might pose as a bank representative and ask for personal information to "verify your account.”]
40
Social Engineering
* Social engineering involves manipulating individuals to gain access to confidential information or to perform an action that benefits the attacker. * The aim of social engineering is to exploit human behavior and vulnerabilities to gain unauthorized access to a system or network.
41
Cyber security + Prevention from damaging your data
1. Access Levels 1. Authentication 1. Anti-malware 1. Firewall 1. Proxy server 1. SSL/TLS 1. Privacy Settings 1. URL 1. Communications 1. Automating Software Updates 1. Backup
42
DEFINE ANTI - MALWARE
* Anti-malware solutions are used to prevent and remove malware, which is a common type of security threat to data. * Anti-malware software includes anti-virus and anti-spyware programs, which help to detect and remove malicious software from a computer system. * This software works by scanning the computer’s files and any files being downloaded and comparing them to a list of known malwares. * If any malware is found, it is quarantined to prevent its spread. * The malware is then deleted. * Checks data before it is downloaded and stops the download if any virus is detected.
43
DEFINE ACCESS LEVELS.
* Access levels are used to restrict access to sensitive information and provide users with different permission to access the data. * This helps to prevent unauthorised access, which is one of the main security threats to data. * Access levels are normally linked to a username and can be set based on a user's role, responsibility, or clearance level. * This limits the access to read,view,edit or delete the data to only those people who have the access. * This only allows the user to open files without editing or deleting them. This hides the file from the user. Full access Read-only access No access
44
WHAT IS PASSWORD?
* Passwords are used to protect sensitive data by preventing unauthorized access. * A strong password should be complex, unique, and not easily guessed. For example, @N$@r!128 * Passwords should be changed regularly, and users should avoid reusing passwords across multiple accounts which makes it more difficult to guess. * Users should be locked out after a set number of wrong attempts. * Password stop brute force attack.
45
DEFINE Authentication?
Authentication is used to ensure that only authorized users can access data. TYPES OF AUTHENTICATIONS: - * PASSWORD * BIOMETRICS * TWO-FACTOR AUTHENTICATION
46
WHAT ARE BIOMETRICS?
* Biometrics are statistical analyses of people's physical and Behavioral characteristics. * Authentication by identifying unique physical characteristics of a human such as fingerprints, facial recognition, or iris scans. * It locks out the user after set number of failed attempts.
47
ADVANTAGES AND DISADVANTAGES OF BIOMETRICS
**ADVANTAGES** * Physical and behavioral characteristics are harder to forge as they are unique to each individual. * It is very difficult to fake a biometric password. * A biometric password cannot be recorded by spyware. * Physical characteristics cannot be lost. * User Experience – Convenient and fast. **DISADVANTAGE** * Physical Disabilities- Injury or change in physical characteristics can be a barrier during authentication. * Once lost cannot be recovered. * They are expensive. * Environmental factors can prevent scanning-poor light, makeup, etc.
48
What is Two-factor authentication (2FA)?
* It requires the users to provide two forms of authentication before accessing data, such as a password and a verification code sent to a mobile device. * This is pre-set by the user. * This provides an extra layer of security and reduces the risk of unauthorized access. * Data has to be entered into the same system, so if attempted from a remote location, it will not be accepted.
49
Define firewall?
* A firewall can be software or hardware based. * It monitors incoming and outgoing traffic between the computer and the network and keeps a log of the traffic. * The firewall will compare the traffic with the criteria set by the user. * It will set the blacklist and whitelist and block any traffic that does not meet the criteria set.
50
Define proxy servers.
* A proxy server can be software or hardware based. * Proxy servers are used to hide a user's IP address and location, making it more difficult for hackers to track them. * They act as a firewall and can also be used to filter web traffic by setting criteria for traffic. * Malicious content is blocked, and a warning message can be sent to the user. * Proxy servers are a useful security measure for protecting against external security threats as they can direct traffic away from the server.
51
SIMILARITIES AND DIFFERENCE BETWEEN PROXY SERVER AND FIREWALL.
**Similarities** * Check incoming and outgoing signals // filter traffic * Store whitelist/blacklist * Block incoming/outgoing signals and unauthorised access * Keep a log of traffic * Both can be hardware or software (or both) **Differences** * Proxy can hide user's IP address, firewall does not hide the user's IP address * Proxy intention is to divert attack from server, firewall is to stop unauthorised access * Proxy protects a server, firewall protects individual computer * Proxy processes client-side requests whereas firewall filters packets * Proxy transmits website data to the user, but a firewall does not (it allows valid signals) * Proxy allows faster access to a web page using cache, but a firewall does not (allow faster access or have cache) * Proxy can hide internal network from internet, but a firewall cannot
52
What is Automating Software Updates?
* Automating software updates ensures that software systems are up to date with the latest security patches, which helps to prevent security threats. * This is especially important for operating systems and software that are frequently targeted by hackers. * It does this by scanning the Internet for known updates to software that are installed on the computer. * If any updates are found, these can either be installed automatically or notify the user to install them.
53
Tell how communication gives you security.
Checking the spelling and tone of communications is important to prevent phishing attacks.
54
Tell how checking URL gives you security.
- Checking the URL attached to a link is another way to prevent phishing attacks. - Hackers often use fake URLs to trick users into visiting fraudulent websites. e.g., http://amaz.on.co.uk/ rather than http://amazon.co.uk/
55
Explain how Privacy settings give you security.
* Privacy settings are used to control the amount of personal information that is shared online. * They are an important measure to prevent identity theft and other forms of online fraud. * Users should regularly review their privacy settings and adjust them as needed.
56
Threats + Prevention
* Hacking - Passwords or Biometrics * Malware - * Viruses - Anti-virus software or Firewall * Worms - Anti-malware * Trojan horses - Anti-malware * Spyware - Anti-spyware or 2-step verification or Firewall * Ransomware - Anti-malware * Brute - force - attack - Password * Pharming - Checking URLs, Firewall,Proxy server * Phishing - Checking URLs or Checking the tone of communication. * Distributed Denial of services attack - Firewall or Email filters * Data interception - Using WEP for wardriving * Social engineering- Self awareness
57
WHAT IS DIGITAL CURRENCY?
A digital currency is a type of currency that exists only in electronic form and is not backed by any physical commodity or government. - Only Exists Electronically - Decentralised - Used for Transactions - Volatile Examples include Bitcoin, Ethereum, Litecoin, and Ripple
58
DEFINE THE ROLE OF BLOCKCHAIN IN DIGITAL CURRENCY?
Blockchain is a digital ledger that records every transaction made with a particular digital currency Each transaction is time-stamped and added to the blockchain in a permanent and unalterable way Blockchain is a decentralised technology, meaning that it is not controlled by a single entity or authority Instead, every participant in the network has a copy of the ledger and can verify the transactions independently The blockchain is made up of "blocks" of transactions that are linked together in a "chain" using cryptographic algorithms This creates a secure and tamper-proof record of every transaction made with the digital currency Each transaction in the blockchain must be verified by multiple participants in the network This verification process ensures that the transaction is legitimate and prevents any fraudulent activity
59
WHAT IS AN AUTOMATED SYSTEM?
An automated system is a combination of sensors,microprocessor and actuators that are designed and programmed to work automatically without any human help.
60
DEFINE SENSORS?
Sensors detect changes in the environment and convert them into electrical signals that can be processed by a microprocessor.
61
TYPES OF SENSOR
Acoustic Accelerometer Flow Gas Humidity Infra-red Level Light Magnetic field Moisture pH Pressure Proximity Temperature
62
what does each measure
**Acoustic** Sound levels To detect changes in sound levels of industrial machinery To monitor noise pollution In security system to detect suspicious sounds **Accelerometer** Acceleration rate, tilt, vibration Detecting sudden changes in vehicle movement and deploy safety features if needed In mobile phones to detect orientation of the device **Flow** Rate of gas, liquid or powder flow Detect changes in the flow through pipes in water system **Gas** Presence of a gas e.g. carbon monoxide Detect levels of gas in confined spaces Detect gas levels when fixing gas leaks **Humidity** Levels of water vapour Monitor humidity in greenhouses **Infra-red** Detecting motion or a heat source Security systems detecting intruders who break the beam Measures heat radiation of objects - used by emergency services to detect people **Level** Liquid levels Detects levels of petrol in a car tank Detect levels of water in a water tank Detect a drop in water levels due to a leak **Light** Light levels Automatically switching on lights when it gets dark (street lights, headlights) **Magnetic field** Presence and strength Anti-lock braking system Monitoring rotating machinery such as turbines **Moisture** Presence and levels of moisture Monitoring moisture in soil Monitoring damp in buildings **pH** Acidity or alkaline Monitoring soil to ensure optimum growing conditions Monitor pHlevels in chemical processes **Pressure** Gas, liquid or physical pressure Monitoring tyre pressure Monitoring pressure in pipes during manufacturing process **Proximity** Distance Monitoring position of objects in robotics Used in safety systems to prevent objects colliding **Temperature** Temperature in Celsius, Fahrenheit or Kelvin Used to maintain temperature in swimming pools Used to control temperature in chemical processes
63
WHAT IS A MICROPROCESSOR?
Microprocessors analyse the signals from the sensors and make decisions based on pre-programmed logic.
64
What are actuators?
Actuators receive signals from the microprocessor and perform actions such as opening a valve or turning on a motor.
65
USES OF AUTOMATED SYSTEMS
* INDUSTRY * TRANSPORT * AGRICULTURE * WEATHER * GAMING * SCIENCES * LIGHTNING
66
Uses of automated system in INDUSTRY
**Manufacturing:** Automated systems are used in factories to assemble products, monitor quality control, and improve efficiency. **Inventory Management:** Automated systems help track and manage inventory levels, ensuring that materials are ordered and restocked as needed.
67
USES of automated system IN TRANSPORT
**Traffic Control:** Traffic lights and control systems automate traffic flow to reduce congestion and improve safety. **Automated Guided Vehicles (AGVs)**: These self-driving vehicles are used in warehouses and factories for material handling.
68
USES of automated system in agriculture
**Precision Farming**: Automated systems are used in agriculture to optimise planting, irrigation, and harvesting based on data collected from sensors and drones. **Livestock Monitoring:** Sensors track the health and location of livestock.
69
USES of automated system IN WEATHER
**Weather Forecasting:** Automated systems collect and analyse data from weather stations, satellites, and sensors to predict weather patterns and issue warnings.
70
USES of automated system in gaming
**Game AI:**Automated systems create non-player characters (NPCs) with artificial intelligence, enhancing the realism and challenge in video games. **Procedural Content Generation:** Automated algorithms create game worlds, levels, and landscapes.
71
USES of automated system IN LIGHTNING
**Home Automation:** Automated lighting systems can adjust brightness and colour temperature based on user preferences or time of day. **Energy Efficiency:** Lighting systems can automatically turn off or dim lights when not in use to save energy.
72
USES of automated system IN SCIENCES
**Laboratory Automation:** Automated systems are used in laboratories for tasks such as sample handling, data analysis, and high-throughput screening. **Observatory Control:** Telescopes and scientific instruments can be automated for remote observations.
73
ADVANTAGES OF AUTOMATED SYSTEM IN INDUSTRY
Reduced labour costs Improved efficiency and accuracy Increased production rate - much faster than human operator Keeps humans away from hazardous conditions.
74
DISADVANTAGES OF AUTOMATED SYSTEM IN INDUSTRY
High initial investment Limited flexibility to changes in production processes Maintenance costs can be high Any computerised system can be subject to cyber attack.
75
ADVANTAGES OF AUTOMATED SYSTEM IN TRANSPORT
Improved safety and reliability Reduced labour costs Improved fuel efficiency Improves the punctuality of public transports like trains.
76
DISADVANTAGE OF AUTOMATED SYSTEM IN TRANSPORT
High initial investment May not be suitable for all types of transportation Maintenance costs can be high Cyber attacks
77
ADVANTAGES OF AUTOMATED SYSTEM IN AGRICULTURE
Increased efficiency in planting and harvesting crops Improved crop yield and quality Reduced labour costs
78
Disadvantages of automated system in agriculture
High initial investment May not be suitable for all types of crops or terrain Maintenance costs can be high
79
ADVANTAGES OF AUTOMATED SYSTEM IN WEATHER
Improved accuracy in weather prediction Ability to issue warnings in a timely manner Ability to collect large amounts of data quickly
80
DISADVANATGES OF AUTOMATED SYSTEM IN WEATHER
May be affected by external factors like interference or equipment failure May not be 100% accurate all the time May require continuous monitoring and calibration
81
ADVANTAGES OF AUTOMATED SYSTEM IN GAMING
* Improved speed and efficiency in game development * Ability to create complex and interactive games * Reduced labour costs
82
DISADVANTAGES OF AUTOMATED SYSTEM IN GAMING
* May not be suitable for all types of games or game development * May require significant programming expertise * May be affected by technical glitches or bugs
83
ADVANTAGES OF AUTOMATED SYSTEM IN SCIENCES
* Improved speed and accuracy in data collection and analysis * Ability to carry out complex experiments * Reduced labour costs
84
DISADVANTAGE OF AUTOMATED SYSTEM IN SCIENCES
* High initial investment * May not be suitable for all types of experiments * May require significant technical expertise
85
ADVANTAGES OF AUTOMATED SYSTEM IN LIGHTNING
* Improved energy efficiency * Ability to program lighting to suit different needs * Reduced labour costs
86
DISADVANTAGES OF AUTOMATED SYSTEM IN LIGHTNING
High initial investment May not be suitable for all types of lighting needs Maintenance costs can be high
87
WHAT IS ROBOTICS?
Robotics is an area of computer science that deals with the creation, design, and operation of robots.
88
Characterstics of robots
* Have a mechanical structure or framework * Have electrical components * Programmable
89
3 LAWS OF ROBOTICS
* A robot may not injure humans through action or inaction. * A robot must obey commands given by humans. * A robot must protect itself.
90
Roles of robots
**INDUSTRY** Robots can be used in manufacturing and assembly lines to increase productivity and accuracy **Transport** Robots can be used in warehouses and logistics to move and transport goods **Agriculture** Robots can be used for tasks such as planting, harvesting, and spraying crops. **Medicine** Robots can be used in surgical procedures to increase precision and reduce risk of errors. **Domestic** Robots can be used for tasks such as vacuuming, lawn mowing, and cleaning. **Entertainment** Robots can be used as toys or in amusement parks to provide entertainment.
91
ADVANTAGES OF ROBOTICS
**Increased productivity:** robots can work continuously without breaks or fatigue SO other people dont need to do repetitive/mundane tasks. **Consistency and accuracy:** robots can perform tasks with a high level of precision and accuracy such as performing surgical procedures. **Safety:** robots can perform tasks that are dangerous or hazardous for humans **Cost-effective:** robots can help reduce labour costs in the long run Robots are prone to**cyber attack** and **malfunction**
92
What is ARTIFICIAL INTELLIGENCE?
AI is a branch of computer science dealing with the simulation of intelligent human behaviour by a machine , including: problem-solving, decision-making, natural language processing. The aim of AI is to create systems that will perform tasks that would normally require human intelligence.
93
CHARACTERSTICS OF AI
AI is a collection of data and the rules that are stored to use that data. It also has the ability to reason and learn (uses machine learning) by adapting to its previous decision or mistakes so that it will not be made again. AI can also change its own rules or data to learn and adapt.
94
What is Expert Systems?
Are a form of AI that has been developed to mimic human knowledge and experience.
95
Application of Expert system
OIL AND MINERAL PROSPECTING DIAGNOSIS OF PATIENT’S ILLNESS TAX AND FINANCIAL CALCULATION STRATEGY GAMES LIKE CHESS
96
Parts of Expert system
**knowledge base** - A database of facts to generate rules that are used to solve problems and make decisions. **rule base**- Stores a set of rules or logic that is used by the inference engine to apply the knowledge/link the facts in the knowledge base to solve specific problems and draw conclusions. **inference engine**- A program that applies the rules from the rule base to the facts in the knowledge base to solve problems. **Explanation system**- Informs the user of the reasoning behind its conclusion and recommendation. **User interface**- A way for users to interact with the system and provide input
97
ADVANTAGES OF EXPERT SYSTEM
They offer a high level of expertise. They offer high accuracy and the results are consistent. They have the ability to store vast amounts of ideas and facts.
98
Disadvantages of expert system
* The set up and maintenance cost are very high. * They tend to give ‘cold’ responses which may not be appropriate in certain medical conditions. * Users of expert systems need considerable training to ensure that the system is being used correctly.
99
Define machine learning?
Machine learning is a subset of AI that focuses on giving computers the ability to learn and improve from data, without being explicitly programmed. The program has the ability to automatically adapt its own processes and/or data. Uses algorithms to analyse data and identify patterns or relationships. The system can learn from the data and improve its performance over time. Can be supervised or unsupervised: Supervised machine learning uses labelled data to train the system. Unsupervised machine learning uses unlabelled data.
100
DIFFERENCE BETWEEN AI AND MACHINE LEARNING
**AI** Represents simulated intelligence in a machine. **Machine learning** This is the practice of getting machines to make decisions without being programmed to do so. **AI** The aim is to build machines that are capable of thinking like humans. **Machine learning** The aim is to make machines that learn through data acquisition.
101
USES OF MACHINE LEARNING
CATEGORIZING SPAM EMAILS DETECTION OF FRAUDULENT ACTIVITY
102
What are packets?
Information on the internet is broken down into packets and are created by TCP and transmitted over the internet. Packets are small chunks of information/data.
103
Why information and data are broken down into packets?
Small chunks of data are easier and quicker to route over the internet than big chunks of data.
104
What do packets contain?
* packet header * payload * trailer
105
What does packet header contain?
Source IP address Destination IP address Packet number
106
What does packet trailer contain?
* Additional error checks * End of packet notification
107
**How are packets switch/transmitted?**
Data is **broken down into small chunks of information** called packets. Each packet is given a **source address, a destination address and a packet number**. Each packet could take a **different route** which will be **set and controlled by the router** that will find the **shortest and fastest path** from the source to the destination address. The **packets may arrive out of order** but will be **reassembled to their original sequence according to the packet number** at the receiver's end. **Error checks** like parity check will be performed and if any error is found for example if a packet is missing or corrupted then a request is sent to send it again.
108
**What is Serial data transmission?**
In this form of data transmission, there is a single wire over which data is sent one bit at a time making it inherently synchronised. Each bit is sent and received at a specific clock rate, ensuring that the sender and receiver remain synchronised and there is no need for the data to be reorder once it is received.
109
**Advantages of Serial data transmission?**
* It is less likely to have errors/interferences or the data being skewed. * Serial transmission is cheap over short and long distances as the cost of wire is fairly inexpensive * Transmission speed is adequate in certain situation ( or where it is usually used)
110
**Disadvantages of serial data transmission?**
* Data transmission is slow, especially over long distances as only small quantities of data can be transmitted at a time * Serial transmission is expensive over very long distances as the cost of wire dramatically increases
111
Parellel data transmission
In this form of data transmission, there are several wires of which multiple bits are transmitted simultaneously. Parallel data transmission is asynchronous as some bits may arrive quicker than others. This is known as skewing or skewed data.
112
Advantages of parellel data transmission
* Parallel transmission is fast as large quantities of data can be transmitted at any one time * Can be downloaded and uploaded at the same time
113
Disadvantages of parellel data transmission
* Parallel transmission is expensive over short distances as multiple wires need to be purchased. * Transmission is very expensive over long distances as the cost of wires dramatically increases with the distance. * It responds faster to request. * There can be issues of synchronisation - data can be skewed.
114
3 modes of data transmission
- SIMPLEX - FULL-DUPLEX - HALF-DUPLEX
115
WHAT IS SIMPLEX DATA TRANSMISSION AND ITS PROS+CONS?
Simplex transmissions are unidirectional and travel in only one direction **ADVANTAGE:** Simplex wires are cheap as only one wire is used **DISADVANTAGE:** Data transmission is slow as data still travels one bit at a time in only one direction at a time
116
WHAT IS FULL - DUPLEX DATA TRANSMISSION AND ITS PROS & CONS?
Full-duplex transmissions are bidirectional but can transmit signals in both directions at the same time **ADVANTAGE:** Full-duplex transmission is faster as data can travel in both directions simultaneously. The receiver does not have to wait for the sender to stop before they can start transmitting their data **DISADVANTAGE:** Full-duplex is expensive as the wire technology to transmit in both directions is more difficult to implement
117
What is half-duplex and its pros and cons?
Half-duplex Half-duplex transmissions are bidirectional i.e. can travel in both directions, but not simultaneously **ADVANTAGE:** Half-duplex transmission is cheaper than simplex for bidirectional transmission as it requires fewer wires **DISADVANTAGE:** Transmission is still slow as data travels one bit at a time in only one direction at a time
118
USES of serial data transmission?
* Connecting an external hard drive to a computer * Transmitting data over a telephone line
119
Uses of parellel data transmission?
Transmitting data from a computer to a printer using a multi-wire connector
120
Uses of simplex data transmission?
Transmitting data from a computer to a printer. The printer doesn’t need to send data back to the computer
121
Uses of half duplex transmission
Phone conversations where only one person needs to speak at a time A **walkie-talkie** is a two way radio with a push to speak button. The receiver is turned off while the transmitter is turned on. This prevents you from hearing the other person while you speak
122
Uses of full duplex transmission
Broadband connections to the internet. Data must be sent and received at the same time. Accessing information on the internet is known as downloading information. Putting information onto the internet for others to access is known as uploading Phone conversations where both people can talk and be heard at the same time allowing them to interrupt each other
123
Define USB?
The Universal Serial Bus (USB) is an asynchronous and serial method of transmitting data between devices and has become an industry standard. Many devices use USB such as keyboards, mice, video cameras, printers
124
When a device is connected to a USB port the computer is..?
* Automatically detects that the device has been connected * Automatically recognised and the appropriate device driver is loaded so that the device can communicate with the computer * If the device is new, the computer will look for a matching device driver. If one cannot be found then the user must download and install an appropriate driver manually
125
Advantages of USB
* Devices are automatically detected and drivers are automatically loaded for communication. This simplifies the data transmission process for the user * Cable connectors fit in only one way. This prevents incorrect connections and ensures compatible data transmission * As USB usage is standardised, there is a lot of support available online and from retailers * Several different data transmission rates are supported. * Newer USB standards are backwards compatible
126
Disadvntages of USB
* The maximum cable length is roughly 5 metres meaning it cannot be used over long distances, limiting its use * Older versions of USB have limited transmission rates for example USB 2.0 has 480Mbps * Very old USB standards may not be supported in the near future
127
What is an error?
An error is when data received is not as expected and therefore is difficult or impossible to process.
128
How can errors cause problems?
* Some errors are small and trivial such as a single swapped letter in a large text. * Other errors, in data such as postage addresses, aerospace coordinates or bank transfers, can be difficult to rectify or be disastrous. * Any job or task that relies on a computer to perform highly sensitive or secure processes must have methods of error checking and correction
129
How do errors occur?
Errors can occur using wired or wireless technology due to interference Examples of interference include wire degradation or electrical fields changing the signal Results of interference include: * Data loss - data is lost in transmission * Data gain - additional data is received * Data change - some bits have been changed or flipped
130
What is checksum?
* Before data is transmitted a checksum value is calculated . * This value is calculated using a checksum algorithm for example if the sum of all the bytes in data is more than 200 then the checksum value is the product of all the bytes in the data. * This checksum value is appended to the data to be transmitted. * Once the data is transmitted the checksum value is recalculated using the same algorithm and compared with the transmitted checksum value. * If they are the same then there is no error otherwise an error has occurred
131
What is Parity check?
* The parity checking protocol determines whether bits in a transmission have been corrupted * Every byte transmitted has one bit as a parity bit which should be agreed by the sender and receiver. * The value of the parity bit can be even or odd which is determined by counting the number of 1’s in the byte, including the parity bit * If the number of 1’s does not match the agreed parity then an error has occurred * Parity checks only check that an error has occurred, they do not reveal where the error(s) occurred
132
Echo check
* Echo checks involve transmitting the received data back to the sender. The sender then checks the data to see if any errors occurred during transmission * This method isn’t reliable as an error could have occurred when the sender transmits the data or when the receiver transmits the data. Neither will know when the error occurred. * If an error does occur the sender will retransmit the data
133
How does check digit method works?
* A check digit will be calculated from the data using a mathematical algorithm. * This check digit is stored with the data. * When the data is entered, the check digit is calculated using the data and algorithm. * If the previously calculated check digit and the stored check digit match, * the data entered is correct otherwise the data entered is incorrect.
134
2 examples of check digit algorithms
* ISBN * Barcode
135
Define ARQ?
* When the receiver receives transmitted data it must check for the presence of any errors. Errors can usually be detected but not always pinpointed * An Automatic Repeat Request is a protocol that notifies the sender that an error has occurred and that the data received is incorrect. It works as follows: * If an error is detected the receiver sends a negative acknowledgement transmission to indicate the data is corrupted * If no error is detected the receiver sends a positive acknowledgement transmission meaning the data is correct * If the receiver does not send any acknowledgement transmission then the sender waits for a certain time period known as a time-out before automatically resending the data * This process is repeated until all data has been received and acknowledged
136
What is Encryption?
Encryption involves encoding and scrambling data into a form that is meaningless using an algorithm and cannot be understood by anyone else other than the authorised party. Key is required to decrypt the data If data is stolen it will be meaningless.
137
What is symmetric encryption?
In symmetric encryption both parties are given an identical secret key which can be used to encrypt or decrypt information meaning the decryption and the encryption algorithm are the same.
138
What is asymmetric encryption?
An asymmetric encryption also known as public key encryption, two keys are used: Public key: a key known to everyone Private key: a key known only to the receiver Both keys are needed to encrypt and decrypt information Asymmetric encryption works as follows: Person A uses a public key to encrypt their message Person A sends their message over the network or internet Person B decrypts the message using their secret private key Asymmetric encryption works such that only one private key can be used to decrypt the message and it is not sent over the internet like a symmetric key.
139
What is system software ?
Systems software provides the services that the computer requires, including operating system and utility software.
140
Role of operating system?
This is a program designed to run other programs on a computer. It is considered the backbone of a computer, managing both software and hardware resources
141
Basic functions of a operating system?
* managing files * handling interrupts * providing an interface * managing peripherals and drivers * managing memory * managing multitasking * providing a platform for running applications * providing system security * managing user accounts
142
How does OS manage files?
The file manager controls all of the different files on the system, e.g. text files, graphic files, and program files. It controls file permissions such as the user's ability to see or open a file, write a file or delete a file.It helps to organise and control files so that they are as easy to use as possible for the user. It can help to protect the user from accidental mistakes too.
143
Providing an Interface: OS
Users must interact with the operating system through a user interface. The user interface is a system which converts what the user inputs to a form that the computer can understand and vice versa Many computer or database operating systems use complex programming languages which are not easy to use A user interface is created to allow easier control of the operating system by the system user.​ A good interface should be easy to use **e.g.**: consistent menu structures; consistent operations from actions like clicking the right mouse button
144
Managing Peripherals and Drivers: OS
The overall intention of this is to handle all the devices that are connected to the computer system. This includes input devices such as a keyboard and mouse, it also includes output devices such as a monitor and printer It communicates with the devices through software called **drivers.** These translate the instructions by the device manager into one the devices can understand Peripherals like a mouse, keyboard and printer all need drivers so that they can communicate with the software
145
Managing Memory:OS
Memory management is in charge of the RAM.​ Programs use RAM throughout their operation. ​Some programs will be large and complex and use the RAM extensively whereas some are very small programs and won’t use it as much ​Memory management checks all requests from programs are valid and allocates accordingly.​ It will deallocate space and swap out data to virtual memory. It will ensure overall that different programs can be open at the same time
146
Manage multitasking
Multitasking allows for software tasks to be completed at the same time to ensure multiple elements can be completed immediately, it uses a system called time slicing which splits different tasks into small segments They can all be run one after the other, giving the element of multiple tasks being completed at the same time, instead of waiting for one operation to complete before moving on to the next task
147
Providing a Platform for Running Applications: OS
Application programs and the hardware will communicate through a system within the operating system called an application programs interface(API) This API is a library interface which will share data between software to allow elements to process If any application is installed on the system, the Operating System will manage this process, it will allocate memory space and will control the application's data or devices, user access will also be managed
148
Providing a System Security: OS
System security is just about how the operating system can stay protected and ensure that elements are monitored and actioned to ensure the system is secure. Some areas of security are: Creating/Deleting users for the system Providing access level rights, e.g. administrator rights over installing, modifying a system or accessing files or folders. This is compared to standard rights of just accessing and using software/files on the system. **Auditing** - this is keeping a log of file edits, deleted files, creation of files etc Protecting from threats, viruses, worms, malware or remote hacker attacks Security updates to fix patches in the operating system
149
Managing User Accounts: OS
Each user is provided with an account for access to the system. They will be provided with their username and then will need to create a password based on rules set out initially Each account will then be granted different levels of access, dependent on needs and level of security. This will also monitor login activity and even log users out if they have been inactive for a while.
150
Process of hardware,firmware and OS to run application software?
Application Software must talk to the operating system, this will then allow it to interact with the hardware The hardware will then process and send the information to the operating system which then directly talks back to applications software in a continuous loop Firmware is the process between the Operating System and Hardware When a computer initially first loads up, it has to explore the ROM for its initial boot-up instructions. These are contained in a Bootstrap loader The initial process is handled by the basic input/output system (BIOS) which is known as firmware. This will provide some low-level control for all devices Once complete these are sent to RAM to be processed by the operating system Overall this creates an extra layer which is to ensure that initially the hardware devices e.g. keyboard are available and can be communicated directly with the operating system
151
What are interrupts?
An interrupt is a signal from a device or software to the processor. This will cause the processor to temporarily stop so that it can service the interrupt.
152
Types of interrupts?
Hardware Interrupt - this is caused by a hardware device such as a hardware failure e.g. pressing a key on the keyboard moving the mouse Software Interrupt - this occurs when an application stops or requests services from the OS e.g. a program is not responding division by zero two processes trying to access the same memory location
153
Interrupt service routine
Whenever an interrupt is initiated the status of this task is saved to the interrupt service routine. The interrupt service routine is simply added to a particular area where a certain set of instructions are sent that will need to be fetched, decoded and executed to complete the commands of the interrupt As a result, the current registers will need to be changed at this point to accommodate the interrupt The interrupt will be executed instead of the original instructions When the interrupt is received the current values that were held in the registers are copied back to the RAM in an area known as a stack These values are pushed onto the stack and are added to the top of the stack frame, which will save them for later retrieval when the interrupt is complete.
154
Division by Zero
There is a possibility that an interrupt can also be interrupted which is known as a division by zero. Due to the system in RAM with stack frames, the current interrupt would be moved to the bottom of the stack frame to complete the main interrupt initially
155
What are Utility software?
Utility programs perform specific tasks related to computer functions, resources, files and security.​ They help to configure the system, analyse how it is working and optimise it to improve its efficiency.
156
What are Security utilities?
Anti-Virus - Scans the computer system and ensures that files are quarantined so that they can be removed by the user Encryption - uses an algorithm to scramble (encrypt) a file according to the key which is used to make the file unreadable; the key is needed to decrypt the file back to its original form so it can be read Firewall - monitors network traffic and blocks unauthorised access. Criteria is set and if the data meets the criteria it is accepted otherwise it is rejected
157
Disk organisation utilities: UTILITY SOFTWARE
**System Clean-Up Tools** – to search for and remove files no longer needed, to reduce space and speed up access to the system **Disk Defragmentation Tools**- it is used to rearrange the parts of files on the disk drive: when a file is saved to the disk, parts of the file might be saved in different areas of the disk, these tools try to move all the parts to the same area for quicker access
158
Data compression utilities
**File Compression Software** – to make files smaller so that they take up less storage space and can be transmitted to other users more easily File backup utilities **Full Backup** - stores all files and software on the system **Incremental Backup** - only backs up the files and software that have been added since the last backup
159
What is Application software?
Application software provides the services that the user require
160
TYPES of application sofware
**Word Processing Software** This allows users to create written documents e.g. letters, reports etc **Spreadsheet Software** This allows users to perform numerical calculations and function to create automation for all mathematical elements e.g. budgeting, accounting, stock counts etc **Presentation Software** This allows users to create interactive and multimedia presentations to show to an audience e.g. sales pitches, launching of products etc **Multimedia Software** This is used to create multimedia and interactive content for a number of purposes, it explores text, audio, images, video, sound and animations e.g. image manipulation, editing a video etc **Web Browsers** This allows the user to access the internet and use the world wide web
161
What are Low level language?
* Low level language is a language closer to the language processed by the computer. * They may contains menemonics * Examples are assembly language and machine code
162
Advantages of Low level language
* Programmers can directly manipulate the hardware. * Programs are memory efficient * It is machine independent so there is no requirement for the program to be portable * No requirement for a compiler/interpreter * Quicker to execute
163
Disadvantages of low level language
* Low-level languages are more difficult to write and understand * Machine dependent and cannot be added to different specification machines * More prone to errors * Knowledge of computer architecture is key to program effectively * Much harder to decode
164
What are high level languages?
High Level Languages are programming languages which use English-like statements which allow users to program with easy to use code, allow for clear debugging and once programs are created they become easier to maintain High level languages were needed more due to the development of processor speeds and memory capacity increasing Examples of these languages are Python, C#, Java etc
165
What are the advantages of high level language?
* It is easier to read and write therefore the programmer is less likely to make mistakes * It is easier to debug so it takes less time to find and correct errors. * It is machine independent so it can be used in any computer. * Programmer can focus on the problem instead of the manipulation of memory/hardware
166
What are the disadvantages of high level language?
* The programmer may not be able to make use of special hardware. * Need a compiler/interpreter and programs can take longer to execute. * The program may be less efficient and take considerable memory. * The user is not able to directly manipulate the hardware
167
What is Assembly langauge?
Programmers who use assembly language do so for the following reasons: * Need to make use of specific hardware or parts of the hardware * To complete specific machine dependent instructions * To ensure that too much space is not taken up in RAM * To ensure code can completed much faster Assembly languages allow programmers to program with mnemonics. e.g. * LDA Load - this will ensure a value is added to the accumulator * ADD Addition - this will add the value input or loaded from memory to the value in the accumulator * STO, Store - stores the value in the accumulator in RAM This is used rather than binary code which allowed continuation of working directly with the hardware but removed an element of complexity A mnemonic is received by the computer and it is looked up within a specific table An assembler is needed here to check the word so that it can be converted into machine code If a match from the word is found e.g. STO the word is replaced with the relevant binary code to match that sequence
168
Define Compiler and how and why does it report error?
Compiler translates a high level language to a machine code in one go so that it can be understood by the computer system. It translates all the code before it is executed It creates an executable file If there is any **error** while the compiler is trying to compile then it will create an error report that will display all the errors in the code that need to be corrected before it can be executed.
169
Advantages of compiler?
* Run quickly as the program as the source code has been stored to be translated * Compilers optimise the code, this code will run quicker and take up less memory space * Original source code will not be seen, which is ideal for programmers to stop work being copied
170
Disadvantages of compiler?
* Due to all code being compiled at the same time there must be enough memory space to handle this, if not and virtual memory is used it can be much slower * If there are errors in the code the compiler will not identify directly where the error lies, making it difficult to debug * It is designed solely for one specific processor * If the program is changed it must be recompiled
171
Define Interpreter?
* This is the method that directly sends the high level language to the machine code. * This will translate one line of code and then executes it before moving on to the next line, if an error occurs the program will stop and an error message will occur. * Once the error message is fixed, the program can carry on running from where the error occurred.
172
Advantages of Interpreter?
Program will always run, it will just stop when it finds a specific syntax error in the code It is easier to debug and understand where particular code has gone wrong Interpreters do not store instructions and are not stored for later use, this means they require less RAM to process the code
173
Disadvantage of interpreter?
* Each line of code has to be interpreted separately by the CPU, which can lead to slower execution * Every time the program is run it has to be translated, due to no instructions being stored * They cannot optimise code, it is translated and executed as it is
174
define IDE
An integrated development environment (IDE) is software that provides useful functions for a programmer writing a computer program. Use by programmers to aid the writing of their program.
175
Features of IDE?
* **Code editors** - this will allow users to write and manipulate source code, it includes features such as auto-completion and auto-correction of code, bracket matching, syntax checks etc * **Run-time environment** - to allow the program to run and see its corresponding output * **Built-in interpreter/ compiler** - which compiles or interprets the code * **Error diagnostics** - highlight particular areas of code or provide direct error messages where the error may have appeared e.g. indentation errors etc * **Auto-completion** * **Auto-correction** * **Prettyprint**
176
How is Hexadecimal used in Computers?
* Memory addresses and other hardware related values * Representation of colour values * Error messages * Memory dump * Debugging * IP addresses * ASCII / Unicode * Assembly language * URLs
177
ADVATAGES OF HEXADECIMAL
* Easier to read and write * Less bits = less prone to error * Easier to debug
178
What is character set?
* Character set is a collection of all the characters and symbols that can be represented by a computer. * Each character and symbol is assigned a unique binary value. * It is used to represent text in binary; text is converted to binary to be processed by the computer.
179
What is ASCII?
One of the most commonly used character sets is the **American Standard Code for Information Interchange** (ASCII), which assigns a unique 7-bit binary code to each character, including uppercase and lowercase letters, digits, punctuation marks, and control characters. E.g. The ASCII code for the uppercase letter 'A' is 01000001, while the code for the character '?' is 00111111.
179
DEFINE UNICODE?
Unicode was developed as a character encoding standard that allows for a greater range of characters and symbols than ASCII, including different languages and emojis Unicode uses a variable-length encoding scheme that assigns a unique code to each character, which can be represented in binary form using multiple bytes E.g. The Unicode code for the heart symbol is U+2665, which can be represented in binary form as 11100110 10011000 10100101
179
Problem with ASCII?
ASCII has limitations in terms of the number of characters it can represent, and it does not support characters from languages other than English.
180
PROBLEM with unicode?
As Unicode requires more bits per character (Each character is encoded using more bits) than ASCII, it can result in larger file sizes and slower processing times when working with text-based data.
181
DEFINE SOUND
Sound is a type of analog signal that is captured and converted into digital form to be processed by a computer.
182
# . WHAT IS SAMPLING?
To convert sound into digital form, a process called sampling is used. This involves taking measurements of the sound wave at regular intervals and converting these measurements into binary data
183
WHAT IS SAMPLE RATE?
Sample rate is the number of samples taken per second.
184
WHAT IS SAMPLE RESOLUTION?
The sample resolution refers to the number of bits per sample, which determines the level of detail and accuracy of each sample.
185
What increases with sample rate & resolution?
The **accuracy of the recording** increases as the sample rate and resolution increase, but also increases the **file size** of the digital sound.
186
DEFINE IMAGE
A bitmap image is made up of a series of pixels.
186
What is image resolution?
The resolution of an image refers to the number of pixels in the image or per set area. A higher resolution image has more pixels and is, therefore, sharper and more detailed but also requires more storage space.
186
WHAT IS A PIXEL?
A pixel is a single square of one colour and is the smallest component of the image. Each pixel can be represented by a binary code, which is processed by a computer. Pixels are arranged together in a grid.
186
What is color depth?
The colour depth of an image refers to the number of bits used to represent each colour. A higher colour depth means that more colours can be represented, resulting in a more realistic image but also requires more storage space.
186
What increases with resolution and color depth?
* QUALITY * COLOR DEPTH
187
NIBBLE IS...
GROUP OF 4 BITS
188
Tell the data storage size in order of sequence?
* 4 bits in a **nibble** * 8 bits in a **byte** * 1024 bytes in a **kilobyte** * 1024 kibibytes in a **mebibyte** * 1024 mebibytes in a **gibibyte** * 1024 gibibytes in a **tebibyte** * 1024 tebibytes in a **pebibyte** * 1024 pebibytes in an **exbibyte**
189
what is data compression?
The process of reducing the size of the file.
189
Different types of data transmission?
* Lossy compression * Lossless compression
189
impact of data transmission?
* Less bandwidth required * Less storage space required * Shorter transmission time
189
What are the examples lossless compression?
* ZIP FILES * PDF FILES * PNG IMAGES * GIF IMAGES * FLAC AUDIO
190
What are the examples of lossy compression?
* JPEG IMAGES * MP3 AUDIO * STREAMING MEDIA
191
What is lossless compression?
A compression algorithm is used to reduce the file size without permanently removing any data. Repeated patterns/character in the file are identified and indexed ( index involves assigning unique codes to each data and then using these codes to represent the data efficiently) The data is replaced with the index and positions stored The number of times the pattern appears is also stored Techniques like run-length encoding (RLE) and Huffman encoding are the example of lossless compression.
191
What is lossy compression?
* A compression algorithm is used. * Lossy compression reduces the file size by **permanently removing redundant data** from the file. * This method is often used for images and audio files where minor details or data can be removed without significantly impacting the quality. For example, sound in the background that cannot be heard by human ears. * Techniques like downsampling, reducing resolution or colour depth, and reducing the sample rate or resolution are used for lossy compression * File **cannot be restored back.** * The amount of data removed depends on the level of compression selected and can impact the quality of the final file
192
Difference between lossy and lossless data compression?
**LOSSY COMPRESSION** * QUALITY/DATA LOSS * FILES CANNOT BE RESTORED BACK * SMALLER FILE SIZE * FASTER TRANSMISSION RATE **LOSSLESS COMPRESSION** * NO QUALITY LOSS * FILES CAN BE RESTORED BACK * LARGER FILE SIZE IN COMPARE TO LOSSY * SLOWER TRANSMISSION RATE IN COMPARE TO LOSSY
192
What is the role of the central processing unit (CPU) in a computer?
Data and commands are inputted by the user using an input device, the central processing unit (CPU) processes data by executing instructions and the results are outputted to an output device.
192
What is ALU?
The Arithmetic Logic Unit(ALU) performs the calculations required to execute the instructions, these include ADD and SUBTRACT The ALU also carries out logical operations such as COMPARE The ALU has a built-in register where it stores interim results of calculations it performs.
192
What are control unit?
The control unit sends control signals that manage the flow and transfer of data and instruction within the CPU. The Control Unit also decodes instructions using an instruction set and controls the clock speed.
192
What is a microprocessor?
A microprocessor is a type of integrated circuit on a single chip. The purpose of a microprocessor is to process data and execute instructions.
192
Name all the registers?
* Program Counter (PC) * Memory Address Registers (MAR) * Memory Data Register (MDR) * Current Instruction Register (CIR) * Accumulator
192
Purpose of PC
stores the address of the next instruction to be fetched from memory
192
What are registers?
Registers are small memory locations within the CPU, which temporarily store data needed to execute an instruction.
192
Purpose of MAR
stores the address of the instruction or data to be fetched from or written to memory
193
Purpose of Accumulator
Temporarily stores the results of the calculations performed by the arithmetic and logic unit
193
Purpose of CIR
193
What are buses?
Components within the CPU and wider computer system are connected by buses. These are wires down which electronic signals and data travel. The different buses are collectively called the system bus.
193
What are 3 different types of buses?
* The **data bus** transmits data from the CPU to memory or input/output controllers (OR CAN WRITE / between components in the CPU). It is bidirectional which means data can travel in both directions * The **address bus** transfers addresses from the CPU to memory. It is unidirectional which means addresses only go from the CPU to memory(OR CAN WRITE / between components in the CPU). * The **control bus** transfers control signals from the control unit to other components in the computer system such as memory or input/output controllers. The control bus is bidirectional.
193
TELL THE STEPS OF FETCH-EXECUTE-DECODE CYCLE.
The memory address of the instruction to be fetched is stored in the MAR and is sent down the address bus. The data at the memory address is transferred back to the CPU, via the data bus, where it is stored in the MDR Data from MDR is sent to ALU to be executed ALU performs calculation and logical operations on data and it stores the interim results of calculations in its built-in register. After calculations, ALU sends data to MDR Data is sent from MDR to be written to RAM
193
Purpose of MDR
Stores the data that has been fetched from memory or being written to memory Data from MDR is sent to ALU to be executed
193
WHAT IS AN INSTRUCTION SET?
An instruction set is a list of all the commands that can be processed by a CPU and the commands are machine code. Each command has a unique binary code
193
WHAT IS AN EMBEDDED SYSTEM?
An embedded system is a computer system with either one function or limited specific functions built within a device. Its purpose is to control the device and allow a user to interact with it It runs on firmware and does not have additional peripherals
193
WHAT ARE INPUT DEVICES?
INPUT DEVICE ARE THE DEVICE THAT ALLOWS DATA TO BE ENTERED.
193
What is core?
Core is used to perform a fetch-decode-execute cycle and to process / execute an instruction .
193
TYPES OF CORE?
A dual-core processor has two cores A quad-core processor has four cores
193
TYPES OF INPUT DEVICE.
* KEYBOARD * MOUSE - OPTICAL MOUSE * BARCODE SCANNER * TOUCH SCREEN ((resistive, capacitive and infra-red) * DIGITAL CAMERA * MICROPHONE * QR CODE * two-dimensional (2D) and three-dimensional (3D) scanners
194
HOW DOES A CORE EFFECTS COMPUTER PERFORMANCE?
Multiple cores enables multitasking (running more than one program at the same time) Some programs cannot be split between cores The more cores a computer has the more instructions that can be executed per second simultaneously resulting in better performance.
194
WHAT IS A CLOCK SPEED?
The clock speed is how many instructions the core can execute each second The clock speed is measured in Hertz Modern cores can execute billions of instructions per second
194
DEFINE CACHE?
Cache is a small amount of memory situated within or close to the CPU with very fast read/write speeds It is used for storing **frequently used** instructions/data,**recently used** instructions, and instructions that are **to be fetched and executed** next in a process.
194
HOW DOES A CACHE EFFECT COMPUTER PERFORMANCE?
The impact of increasing the amount of cache is that more data can be stored there and accessed faster than if it was in RAM which improves the performance of the CPU.
195
WHAT IS DIGITAL CAMERA?
A digital camera works by capturing light and converting it into a digital image Light enters the camera through the lens, it reaches an image sensor where it is split into millions of pixels (small squares). Each pixel measures light intensity which is converted into binary and represents a colour. Digital cameras are integrated into smartphones , used in security systems and by professional photographers to create high quality digital images An advantage of digital cameras is they show a preview of the image They also instantly create an image which can then be easily duplicated and transmitted via bluetooth or WiFi.
195
DEFINE KEYBOARD?
A keyboard is the most common device used for text-based data input They are connected either by a USB cable or wirelessly to the computer system They are built into laptops. Smartphones and tablets have virtual keyboards Each key on a keyboard has a peg underneath it which makes contact with a conducting membrane. This is then converted into an electrical signal to transmit a unique character code. USE - ENTERING TEXT.
196
ADVANTAGES OF AN OPTICAL MOUSE?
* Intuitive * No moving parts * Easy to use
196
ADVANTAGES OF KEYBOARD?
* UNIVERSAL * EASY TO USE
197
WHAT ARE OPTICAL MOUSE?
A mouse use a laser to detect and track movement, this is then processed by a microprocessor which interprets the movement and replicates it when moving a virtual cursor on-screen Items can be selected or moved using the left mouse button, whilst the right button usually displays additional menus They can be wired or wireless They are used to control the cursor in a Graphical User Interface (GUIs) They are simple to use and provide the user with an intuitive way to navigate the computer They are reliable due to no moving parts USE- Navigating a GUI and Making selections and entering commands.
197
WHAT DOES A BARCODE SCANNER DO AND HOW?
Barcodes are a series of black and white bars which represent a code A barcode reader shines a red laser at the barcode to read the data it represents The light from the **white lines is reflected** back **Black lines absorb the light** so less is reflected The different levels of reflection are converted into a binary value which can be processed by a microprocessor A barcode reader can be handheld or built into a larger machine such as a self-service checkout at a supermarket Barcodes can be used in many ways such as identifying a product being sold or tracking a package through the delivery process
197
ADVANTAGES OF DIGITAL CAMERA?
Instant preview and image
197
WHAT IS A MICROPHONE?
A computer microphone works by converting sound waves into electrical signals that can be processed by the computer. They can capture any real world sound and convert it into digital data which can be stored, duplicated or modified Microphones are used to record music, telephone calls, communicate online and dictation
198
WHAT IS A QR CODE?
A QR code is a visual representation of data using **black and white squares** QR codes can represent over 7000 digits whereas a barcode represents up to 30 digits QR codes are scanned by a camera (often on a mobile device) A piece of software convert the squares into binary data QR codes often link to a website where more information can be found They can also be used to advertise products, share contact details, provide promotional codes, train tickets, and event tickets.
198
WHAT IS A RESISTIVE SCREEN?
Resistive screens consist of two conductive layers which are separated by a small gap. The top layer is flexible. When the screen is touched the two layers connect, completing a circuit.
198
WHAT IS A CAPACITIVE SCREEN?
Made up of a protective layer, a transparent conductive layer and a glass substrate. Touching the screen changes the electrostatic field of the conductive layer CAPACITIVE PROCESS Electrical field/charge is spread across the screen − Sensors are located around the screen and are used to read the electric field − When finger touches screen, the charge/ is transferred to the user as it is affected by the conductivity of another object − Coordinates of touch determined/calculated/measured.
198
ADVANTAGES AND DISADVANTAGES OF RESISTIVE SCREEN?
**BENEFITS** * Cheap to produce. * Resistant to surface contaminants * Can be activated with nearly every object (stylus, finger, gloved hand **DRAWBACKS** * Have lower accuracy compared to other touch screen types. * Less responsive * Made of polymer so is vulnerable to scratches * Does Not support multi-touch facility * Poor visibility in strong sunlight
199
ADVANTAGES AND DISADVANTAGES OF CAPACITIVE SCREEN?
**BENEFITS** Excellent image quality Unlimited touch-life/ ALLOW MULTI TOUCH Scale well Very durable **DRAWBACKS** Sensitive to interference from light, water, snow SENSITIVE TO ELECTROMAGNETIC RADIATION SURFACE CAPACITIVE SCREEN ONLY WORKS WITH BARE HANDS OR A SPECIAL STYLUS
200
What is infrared screen?
LEDs shine infrared light across a screen forming a matrix. When the screen is touched the beams are interrupted. The sensor will send the reading that it detected to the microprocessor that calculates where the screen was touched.
201
Advantages and disadvantages of infrared screen.
**BENEFITS** * Excellent image quality, * High precision * Durable * Allows for multiple touches at the same time **DRAWBACKS** * Requires a bare finger or stylus for activation * Sensitive to water and moisture
202
What is a 2D scanner?
A two-dimensional (or flat-bed) scanner shines a bright strip of light over a document and the reflected light is captured by mirror and lenses. Reflected light is measured for each pixel. This data is converted into binary data so the document can be digitally recreated and stored in a computer. 2D scanners can be used for creating digital versions of documents or photographs - Reading passports at airports
202
What is a 3D scanner?
A three- dimensional laser scanner shines a light over an object. The geometry and dimensions are recorded so the object can be recreated digitally The digital 3D model can be modified using specialist software A 3D printer could then print out the model 3D scanners can be used to create 3D models for use with computer-aided design (CAD) software Creating replicas with 3D printers Typical uses of 3D scanners and printers are dentistry, product development, medical
203
NAME THE OUTPUT DEVICE.
* actuator * digital light processing (DLP) projector * inkjet printer * laser printer * light emitting diode (LED) screen * liquid crystal display (LCD) projector * liquid crystal display (LCD) screen * speaker * 3D printer
203
What are light projectors?
Used to project computer outputs onto a large screen and give presentations in both business and education settings. It uses many small mirrors to reflect light towards a lens. This will display an image.
204
Types of light projector?
* Digital light processing (DLP) projectors * Liquid crystal display (LCD) projectors
204
What is DLP projector?
DLP systems use millions of micro-mirrors arranged in a grid on a microprocessor within the projector. Light is shone through colour filters and the mirrors. The position of the mirrors can be altered to change the intensity of the light.
204
How does a LCD projector works?
LCD projectors use three mirror filters to separate an image into red, green and blue wavelengths. The three images are then combined to produce the full colour image which is passed through the lens on to the wall/screen.
204
What are the advantages and disadvantages of DLP projector?
**ADVANTAGE** * Higher contrast ratios. * Smooth video * Higher reliability * Smaller and lighter * Better suited to dusty atmospheres than LCD projectors **DISADVANTAGE** * Image tends to suffer from “shadows” when showing a moving image * DLP do not have grey components in the image * The colour definition is not as good as LCD projectors
204
What are the advantages and disadvantages of LCD PROJECTOR?
**ADVANTAGES** * Give a sharper image than DLP projectors * Contrast ratios are not as good as DLPs * Better colour saturation and intensity than DLP projectors **DISADVANTAGES** * Have a limited life * Use less power and generate less heat * LCD panels degrade over time. * Quieter running that DLP
204
TYPES OF PRINTERS.
* INKJET PRINTER * LASER PRINTER * 3D PRINTER
205
WHAT IS AN INKJET PRINTER?
Have a print head which moves across the page Spray liquid ink droplets from ink cartridges through very fine nozzles onto the paper (these are in the print head) The droplets can be piezoelectric or thermal bubble technology Inkjet printers produce high quality hard copies of digital images or documents
205
ADVANTAGES OF INKJET PRINTER?
* Great for bright colours and images * Widely used in homes and home offices with lower print volumes
205
WHAT IS A LASER PRINTER?
* Have large toner (dry ink) cartridges and large paper trays * Use positive and negative charges to make the toner particles stick to piece of paper, heat is then used to bond the particles to the paper * Are often used in business and education setting
206
ADVANTAGES AND DISADVANTAGES OF LASER PRINTER?
**ADVANTAGES** * Are very fast when making multiple copies of a document -[PRINTS FASTER] * Are useful for high volume print jobs for example producing leaflets * Have a low running cost per page. -[CHEAP] * It prints text at a high quality * Colour fast **DISADVANTAGE** * Expensive to purchase printer * Toner is expensive * Print images at a lower quality * Can be quite large in size
207
WHAT IS A 3D PRINTER?
3D printers create 3D models of a digital model by depositing layers of material, such as plastic or resin, on top of one another to slowly build up a 3D object They allow for precision and can be used in medicine to create prosthetics and blood vessels 3D printers can be used to create rapid prototypes Models can be transmitted digitally and then models printed out all across the world.
208
WHAT IS LCD?
* It stands for Liquid Crystal Display screens. * LCD screens are made up of millions of tiny liquid crystals. * The display is made of pixels arranged in a matrix * The display requires backlighting * They are used for TVs, monitors, tablets and phones
208
208
209
209