COMPUTER ( PAPER 1) Flashcards

1
Q

DEFINE INTERNET

A

-The internet refers to the global network of computers and other electronic devices connected together through a system of routers and servers

-It is the infrastructure that allows us to send and receive information, including email, instant messaging, and file transfers

-The internet also provides access to other services such as online gaming, video streaming, and cloud computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

DEFINE WWW

A

-The World Wide Web, or simply the Web, is a collection of websites and web pages that are accessed using the Internet.

-The web consists of interconnected documents and multimedia files that are stored on web servers around the world.

-Web pages are accessed using a web browser, which communicates with the web server to retrieve and display the content

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Difference between WWW and the INTERNET?

A
  1. INTERNET is a infrastructure and WWW is a service on top of that infrastructure.
  2. Internet uses
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

WHAT IS A WEB BROWSER?

A

A web browser is a piece of software used to access and display information on the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Purpose of a Web Browser

A

The main purpose of a web browser is to render hypertext markup language (HTML) and display web pages.

Web browsers interpret the code in HTML documents and translate it into a visual display for the user such as videos,images/text and audio.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Features of a Web Browser

A
  • Render HTML
  • Storing bookmarks and favorites
  • Recording user history
  • Allowing use of multiple tabs
  • Storing cookies
  • Providing navigation tools - forward and backward
  • They make use of hyperlinks which allow navigation
  • Providing an address bar
  • It have a home page
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define URL?

A

-The URL stand for uniform resource locator, and it is a text-based address that identifies the location of a resource on the internet.
-It is the address of a web page, image, video, or any other resource available on the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Components of a URL

A

A URL can contain three main components:
~Protocol
~Domain name
~Web page/file name
–protocol://domainhost,domain name,domaintype /path/file name
– https://www.ashifaansari.com/path/ict

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DEFINE HTTP

A

-HTTP stands for hypertext transfer protocol and is used for transferring data between a client and a server on the internet.

-It is a stateless protocol, meaning it does not store any information about previous requests or responses.

-HTTP operates on port 80 by default and sends data in plain text format, making it vulnerable to interception and manipulation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

DEFINE HTTPs

A

-HTTPS is a secure version of HTTP that uses encryption to protect data transferred between a client and a server.
-It operates on port 443 by default and uses Transport Layer Security (TLS) or Secure Socket Layer (SSL) to encrypt data.
-HTTPS ensures that data transferred between the client and server is secure, making it harder for unauthorized users to intercept or manipulate data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How are web pages retrieved from webserver?

A
  • When you type in a URL the browser sends the URL to the DNS using HTTP
  • The DNS finds the matching IP addresses for the domain name in the URL and sends the IP address to the web browser.
  • The web browser sends a request to the web server for web pages.
  • The web pages are sent from the web server to the browser.
  • The browser renders HTML to display web pages.
  • Any security certificates are exchanged.
  • SSL/HTTPS is used to secure the data which will encrypt any data that is sent.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Websites can be separated into which 2 parts?

A
  • STRUCTURE
  • PRESENTATION
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

STRUCTURE OF WEBSITE?

A

HTML is:
A language used to create the structure/layout of a website.
Written in plain text.
Used in the content layer.
Made up of a set of markup codes.
Used to tell the browser how to display the page.
E.g.
Where text is placed
Margins of page
Line break
Padding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

PRESENTATION OF WEBSITE?

A

CSS is:
A language used to create the presentation / formatting of the page.
Written in plain text.
Used in the presentation layer.
Used by web pages to produce a consistent format between different web pages.
E.g.
Font size
Font color
Background color

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

WHY ARE THE PRESENTATION AND STRUCTURE OF THE WEBSITE KEPT SEPARATELY?

A
  • The presentation of the page can be changed without needing to alter the structure; so regular updates can be made without needing to check the structure.
  • The formatting document (written in CSS) can be used again for a different website.
  • If further content and web pages are added to the website, the necessary formatting can be easily applied so this can save time when developing a website.
  • CSS to standardize formatting so CSS only needs to be created once and be applied to each webpage.
  • One person can develop the structure and one can develop the presentation so this can save time when developing and updating a website.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

WHAT IS SSL AND HOW DOES IT WORK?

A
  • SSL or secure socket layer is a security protocol developed to provide secure communication over the Internet.
  • It uses symmetric and asymmetric encryption to secure data and ensure data integrity.
  • It uses digital certificate for authentication.
  • This digital certificate which contains _ public key is sent to the browser.
  • The browser will validate the certificate and check whether it trust the certificate.
  • If it does, it sends a message to the server. The server sends back a digitally signed acknowledgement to start an SSL encrypted session and the transaction will begin.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is TLS ?

A
  • TLS or transport layer socket is a security protocol used to provide secure communication over the internet.
  • It uses a combination of symmetric and asymmetric encryption to secure data and ensure data integrity.
  • TLS is an updated version of SSL.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

2 layers of TLS?

A

Handshake Layer
* This is used to establish a secure connection between two endpoints.
Record Layer
* This is responsible for transmitting data securely between the client and the server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How does TLS works?

A
    • The client/browser requests secure connection to the server.
    • The client/browser requests the server to identify itself.
    • The server provides a digital certificate.
    • The client/browser validates the certificate.
    • The client/browser sends a signal back to the server to begin data transmission.
    • The encryption method will be agreed & a session key is generated.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are cookies?

A

Cookies are small text files that are stored on a user’s device by a website. They are sent between a Web browser to a web server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Functions of cookies?

A
  • Saving Personal Details
  • Tracking User Preferences
  • Holding Items in an Online Shopping Basket
  • Storing Login Details
  • Storing Relevant Purchases
  • Displaying Relevant Adverts
  • Tracking Visitor Statistics
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

WHAT ARE 2 TYPES OF COOKIES AND THIER FEATURES?

A

Session Cookies
* These are temporary and are stored only during a user’s browsing session
* They are used to maintain a user’s state or activity during a single session, such as when filling out a form or navigating through a website.

Persistent Cookies
* These are stored on a user’s device for a longer period, usually for a few weeks to several years
* They are used to remember user preferences and settings, such as language preferences, login details, and shopping cart items

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

DIFFERENCE BETWEEN SESSION AND PERSISTENT COOKIES?

A
  • Session cookies are stored in memory/RAM ,whereas persistent cookies are stored on the hard drive/secondary storage.
  • When the browser is closed a session cookie is lost , whereas a persistent cookie is not lost until deleted by the user/they expire.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Name Cyber Security Threats

A
  • Hacking
  • Malware - Virus, Worms, Trojan horse, Spyware, Ransomware
  • Brute - force - attack
  • Pharming
  • Phishing
  • Distributed Denial of services attack
  • Data interception
  • Social engineering
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is hacking?

A
  • Hacking involves gaining unauthorized access to a system or network to steal or manipulate data, disrupt services, or cause damage.
  • The aim of hacking can vary from personal gain to activism or cyber espionage.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is Brute - force - attack?

A
  • A brute-force attack is a trial-and-error method used to crack passwords or encryption keys by trying every possible combination until the correct one is found.
  • The aim of a brute-force attack is to gain unauthorised access to a system or network OR to delete,change and steal data Or to disrupt business{place}.
  • It can be carried out manually or automatically by software.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Define Data Interception?

A
  • Data interception involves eavesdropping on communication channels to intercept and steal sensitive information, such as passwords, credit card numbers, or personal data.
  • The aim of data interception is to steal sensitive information for personal gain or to use it for further cyber-attacks.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is distributes denial of services attack?

A
  • A DDoS attack is where multiple computers are used as bots.
  • They flood a server with lots of requests at same time which the server can’t respond to; causing it to crash/fail or become unavailable to users.
  • The aim of a DDoS attack is to disrupt the normal functioning of a system or network by denying users access to a website.
  • The aim can be for revenge, to affect someone’s,Entertainment value OR To demand a ransom to stop it
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Define Malware?

A
  • Malware is malicious software designed to harm or gain unauthorized access to a system or network.
  • It replicates itself and fills the hard disk.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Define virus?

A

A virus is a piece of code that attaches itself to a legitimate program or file and then replicates itself with an active host in order to spread to other programs or files on the computer.

It can cause damage to the system, including deleting/corrupting data or damaging hardware. It also takes up memory space.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Define worms?

A

A worm is a standalone program means without an active host that can spread and replicate itself over computer networks. It can take up storage space or bandwidth. It can also cause damage to the system, including deleting/corrupting data or damaging hardware.
- It also opens back doors to computers over the network and is used to deposit other malware on networked computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Define Trojan horse?

A

A Trojan horse is a program that disguises itself as a legitimate program or file, but when installed, the malware it contains such as virus is installed that it can delete data or damage hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Define spyware?

A

Spyware is software that records all key presses and transmits these to a third party.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

what is ransomware?

A

Ransomware is a type of malware that stops the user to access thier data by encrypting the user’s files and demanding a ransom payment/fee to decrypt them. It can cause data loss, financial damage and disrupt business operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Define Adware?

A

Adware is a type of software that displays unwanted advertisements on the computer without the user’s consent.
Some of these may contain spyware and some may link to
viruses when clicked.
It reduces internet speed which reduce device performance and redirects the user to fake websites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Define phishing?

A
  • Phishing involves when a user is sent an email which contains a link to a fake/bogus website where the user is encouraged to enter their details.
  • The aim of phishing is to steal sensitive information for exmaple bank account info .
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Define pharming?

A
  • Pharming involves malware being downloaded without the user’s knowledge.
  • This redirects the user to a fake website where they’re encouraged to enter their personal details.
  • The aim of pharming is to steal sensitive information for personal gain or to use it for further cyber attacks.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

DAMAGE TO YOUR DATA

A

LOSS OF POWER — USE A UPS
LIQUIDS BEING SPILLED — KEEP DRINKS AWAY FROM THE DEVICE
NATURAL HAZARDS ~~ FLOOD
FIRE
HARDWARE/SOFTWARE FAULT
HUMAN ERROR
INCORRECT USE OF STORAGE DEVICE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Social engineering techniques?

A

Impersonation: This involves posing as someone else to gain trust or access to sensitive information. [co-worker, IT support personnel, or a law enforcement officer]
Baiting: Enticing a victim with a desirable item or promise to extract sensitive information or gain access to a system
Pretexting: involves creating a fake scenario to extract sensitive information.
[The attacker might pose as a bank representative and ask for personal information to “verify your account.”]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Social Engineering

A
  • Social engineering involves manipulating individuals to gain access to confidential information or to perform an action that benefits the attacker.
  • The aim of social engineering is to exploit human behavior and vulnerabilities to gain unauthorized access to a system or network.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Cyber security + Prevention from damaging your data

A
  1. Access Levels
  2. Authentication
  3. Anti-malware
  4. Firewall
  5. Proxy server
  6. SSL/TLS
  7. Privacy Settings
  8. URL
  9. Communications
  10. Automating Software Updates
  11. Backup
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

DEFINE ANTI - MALWARE

A
  • Anti-malware solutions are used to prevent and remove malware, which is a common type of security threat to data.
  • Anti-malware software includes anti-virus and anti-spyware programs, which help to detect and remove malicious software from a computer system.
  • This software works by scanning the computer’s files and any files being downloaded and comparing them to a list of known malwares.
  • If any malware is found, it is quarantined to prevent its spread.
  • The malware is then deleted.
  • Checks data before it is downloaded and stops the download if any virus is detected.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

DEFINE ACCESS LEVELS.

A
  • Access levels are used to restrict access to sensitive information and provide users with different permission to access the data.
  • This helps to prevent unauthorised access, which is one of the main security threats to data.
  • Access levels are normally linked to a username and can be set based on a user’s role, responsibility, or clearance level.
  • This limits the access to read,view,edit or delete the data to only those people who have the access.
  • This only allows the user to open files without editing or deleting them.
    This hides the file from the user.
    Full access
    Read-only access
    No access
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

WHAT IS PASSWORD?

A
  • Passwords are used to protect sensitive data by preventing unauthorized access.
  • A strong password should be complex, unique, and not easily guessed. For example, @N$@r!128
  • Passwords should be changed regularly, and users should avoid reusing passwords across multiple accounts which makes it more difficult to guess.
  • Users should be locked out after a set number of wrong attempts.
  • Password stop brute force attack.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

DEFINE Authentication?

A

Authentication is used to ensure that only authorized users can access data.
TYPES OF AUTHENTICATIONS: -
* PASSWORD
* BIOMETRICS
* TWO-FACTOR AUTHENTICATION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

WHAT ARE BIOMETRICS?

A
  • Biometrics are statistical analyses of people’s physical and Behavioral characteristics.
  • Authentication by identifying unique physical characteristics of a human such as fingerprints, facial recognition, or iris scans.
  • It locks out the user after set number of failed attempts.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

ADVANTAGES AND DISADVANTAGES OF BIOMETRICS

A

ADVANTAGES
* Physical and behavioral characteristics are harder to forge as they are unique to each individual.
* It is very difficult to fake a biometric password.
* A biometric password cannot be recorded by spyware.
* Physical characteristics cannot be lost.
* User Experience – Convenient and fast.

DISADVANTAGE
* Physical Disabilities- Injury or change in physical characteristics can be a barrier during authentication.
* Once lost cannot be recovered.
* They are expensive.
* Environmental factors can prevent scanning-poor light, makeup, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

What is Two-factor authentication (2FA)?

A
  • It requires the users to provide two forms of authentication before accessing data, such as a password and a verification code sent to a mobile device.
  • This is pre-set by the user.
  • This provides an extra layer of security and reduces the risk of unauthorized access.
  • Data has to be entered into the same system, so if attempted from a remote location, it will not be accepted.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Define firewall?

A
  • A firewall can be software or hardware based.
  • It monitors incoming and outgoing traffic between the computer and the network and keeps a log of the traffic.
  • The firewall will compare the traffic with the criteria set by the user.
  • It will set the blacklist and whitelist and block any traffic that does not meet the criteria set.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Define proxy servers.

A
  • A proxy server can be software or hardware based.
  • Proxy servers are used to hide a user’s IP address and location, making it more difficult for hackers to track them.
  • They act as a firewall and can also be used to filter web traffic by setting criteria for traffic.
  • Malicious content is blocked, and a warning message can be sent to the user.
  • Proxy servers are a useful security measure for protecting against external security threats as they can direct traffic away from the server.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

SIMILARITIES AND DIFFERENCE BETWEEN PROXY SERVER AND FIREWALL.

A

Similarities
* Check incoming and outgoing signals // filter traffic
* Store whitelist/blacklist
* Block incoming/outgoing signals and unauthorised access
* Keep a log of traffic
* Both can be hardware or software (or both)
Differences
* Proxy can hide user’s IP address, firewall does not hide the user’s IP address
* Proxy intention is to divert attack from server, firewall is to stop unauthorised access
* Proxy protects a server, firewall protects individual computer
* Proxy processes client-side requests whereas firewall filters packets
* Proxy transmits website data to the user, but a firewall does not (it allows valid signals)
* Proxy allows faster access to a web page using cache, but a firewall does not (allow faster access or have cache)
* Proxy can hide internal network from internet, but a firewall cannot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

What is Automating Software Updates?

A
  • Automating software updates ensures that software systems are up to date with the latest security patches, which helps to prevent security threats.
  • This is especially important for operating systems and software that are frequently targeted by hackers.
  • It does this by scanning the Internet for known updates to software that are installed on the computer.
  • If any updates are found, these can either be installed automatically or notify the user to install them.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Tell how communication gives you security.

A

Checking the spelling and tone of communications is important to prevent phishing attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Tell how checking URL gives you security.

A
  • Checking the URL attached to a link is another way to prevent phishing attacks.
  • Hackers often use fake URLs to trick users into visiting fraudulent websites.
    e.g., http://amaz.on.co.uk/ rather than http://amazon.co.uk/
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Explain how Privacy settings give you security.

A
  • Privacy settings are used to control the amount of personal information that is shared online.
  • They are an important measure to prevent identity theft and other forms of online fraud.
  • Users should regularly review their privacy settings and adjust them as needed.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Threats + Prevention

A
  • Hacking - Passwords or Biometrics
  • Malware -
  • Viruses - Anti-virus software or Firewall
  • Worms - Anti-malware
  • Trojan horses - Anti-malware
  • Spyware - Anti-spyware or 2-step verification or Firewall
  • Ransomware - Anti-malware
  • Brute - force - attack - Password
  • Pharming - Checking URLs, Firewall,Proxy server
  • Phishing - Checking URLs or Checking the tone of communication.
  • Distributed Denial of services attack - Firewall or Email filters
  • Data interception - Using WEP for wardriving
  • Social engineering- Self awareness
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

WHAT IS DIGITAL CURRENCY?

A

A digital currency is a type of currency that exists only in electronic form and is not backed by any physical commodity or government.
- Only Exists Electronically
- Decentralised
- Used for Transactions
- Volatile
Examples include Bitcoin, Ethereum, Litecoin, and Ripple

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

DEFINE THE ROLE OF BLOCKCHAIN IN DIGITAL CURRENCY?

A

Blockchain is a digital ledger that records every transaction made with a particular digital currency
Each transaction is time-stamped and added to the blockchain in a permanent and unalterable way
Blockchain is a decentralised technology, meaning that it is not controlled by a single entity or authority
Instead, every participant in the network has a copy of the ledger and can verify the transactions independently
The blockchain is made up of “blocks” of transactions that are linked together in a “chain” using cryptographic algorithms
This creates a secure and tamper-proof record of every transaction made with the digital currency
Each transaction in the blockchain must be verified by multiple participants in the network
This verification process ensures that the transaction is legitimate and prevents any fraudulent activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

WHAT IS AN AUTOMATED SYSTEM?

A

An automated system is a combination of sensors,microprocessor and actuators that are designed and programmed to work automatically without any human help.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

DEFINE SENSORS?

A

Sensors detect changes in the environment and convert them into electrical signals that can be processed by a microprocessor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

TYPES OF SENSOR

A

Acoustic
Accelerometer
Flow
Gas
Humidity
Infra-red
Level
Light
Magnetic field
Moisture
pH
Pressure
Proximity
Temperature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

what does each measure

A

Acoustic
Sound levels
To detect changes in sound levels of industrial machinery
To monitor noise pollution
In security system to detect suspicious sounds
Accelerometer
Acceleration rate, tilt, vibration
Detecting sudden changes in vehicle movement and deploy safety features if needed
In mobile phones to detect orientation of the device
Flow
Rate of gas, liquid or powder flow
Detect changes in the flow through pipes in water system
Gas
Presence of a gas e.g. carbon monoxide
Detect levels of gas in confined spaces
Detect gas levels when fixing gas leaks
Humidity
Levels of water vapour
Monitor humidity in greenhouses
Infra-red
Detecting motion or a heat source
Security systems detecting intruders who break the beam
Measures heat radiation of objects - used by emergency services to detect people
Level
Liquid levels
Detects levels of petrol in a car tank
Detect levels of water in a water tank
Detect a drop in water levels due to a leak
Light
Light levels
Automatically switching on lights when it gets dark (street lights, headlights)
Magnetic field
Presence and strength
Anti-lock braking system
Monitoring rotating machinery such as turbines
Moisture
Presence and levels of moisture
Monitoring moisture in soil
Monitoring damp in buildings
pH
Acidity or alkaline
Monitoring soil to ensure optimum growing conditions
Monitor pHlevels in chemical processes
Pressure
Gas, liquid or physical pressure
Monitoring tyre pressure
Monitoring pressure in pipes during manufacturing process
Proximity
Distance
Monitoring position of objects in robotics
Used in safety systems to prevent objects colliding
Temperature
Temperature in Celsius, Fahrenheit or Kelvin
Used to maintain temperature in swimming pools
Used to control temperature in chemical processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

WHAT IS A MICROPROCESSOR?

A

Microprocessors analyse the signals from the sensors and make decisions based on pre-programmed logic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

What are actuators?

A

Actuators receive signals from the microprocessor and perform actions such as opening a valve or turning on a motor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

USES OF AUTOMATED SYSTEMS

A
  • INDUSTRY
  • TRANSPORT
  • AGRICULTURE
  • WEATHER
  • GAMING
  • SCIENCES
  • LIGHTNING
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Uses of automated system in INDUSTRY

A

Manufacturing: Automated systems are used in factories to assemble products, monitor quality control, and improve efficiency.
Inventory Management: Automated systems help track and manage inventory levels, ensuring that materials are ordered and restocked as needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

USES of automated system IN TRANSPORT

A

Traffic Control: Traffic lights and control systems automate traffic flow to reduce congestion and improve safety.
Automated Guided Vehicles (AGVs): These self-driving vehicles are used in warehouses and factories for material handling.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

USES of automated system in agriculture

A

Precision Farming: Automated systems are used in agriculture to optimise planting, irrigation, and harvesting based on data collected from sensors and drones.
Livestock Monitoring: Sensors track the health and location of livestock.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

USES of automated system IN WEATHER

A

Weather Forecasting: Automated systems collect and analyse data from weather stations, satellites, and sensors to predict weather patterns and issue warnings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

USES of automated system in gaming

A

Game AI:Automated systems create non-player characters (NPCs) with artificial intelligence, enhancing the realism and challenge in video games.
Procedural Content Generation: Automated algorithms create game worlds, levels, and landscapes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

USES of automated system IN LIGHTNING

A

Home Automation: Automated lighting systems can adjust brightness and colour temperature based on user preferences or time of day.
Energy Efficiency: Lighting systems can automatically turn off or dim lights when not in use to save energy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

USES of automated system IN SCIENCES

A

Laboratory Automation: Automated systems are used in laboratories for tasks such as sample handling, data analysis, and high-throughput screening.
Observatory Control: Telescopes and scientific instruments can be automated for remote observations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

ADVANTAGES OF AUTOMATED SYSTEM IN INDUSTRY

A

Reduced labour costs
Improved efficiency and accuracy
Increased production rate - much faster than human operator
Keeps humans away from hazardous conditions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

DISADVANTAGES OF AUTOMATED SYSTEM IN INDUSTRY

A

High initial investment
Limited flexibility to changes in production processes
Maintenance costs can be high
Any computerised system can be subject to cyber attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

ADVANTAGES OF AUTOMATED SYSTEM IN TRANSPORT

A

Improved safety and reliability
Reduced labour costs
Improved fuel efficiency
Improves the punctuality of public transports like trains.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

DISADVANTAGE OF AUTOMATED SYSTEM IN TRANSPORT

A

High initial investment
May not be suitable for all types of transportation
Maintenance costs can be high
Cyber attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

ADVANTAGES OF AUTOMATED SYSTEM IN AGRICULTURE

A

Increased efficiency in planting and harvesting crops
Improved crop yield and quality
Reduced labour costs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

Disadvantages of automated system in agriculture

A

High initial investment
May not be suitable for all types of crops or terrain
Maintenance costs can be high

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

ADVANTAGES OF AUTOMATED SYSTEM IN WEATHER

A

Improved accuracy in weather prediction
Ability to issue warnings in a timely manner
Ability to collect large amounts of data quickly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

DISADVANATGES OF AUTOMATED SYSTEM IN WEATHER

A

May be affected by external factors like interference or equipment failure
May not be 100% accurate all the time
May require continuous monitoring and calibration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

ADVANTAGES OF AUTOMATED SYSTEM IN GAMING

A
  • Improved speed and efficiency in game development
  • Ability to create complex and interactive games
  • Reduced labour costs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

DISADVANTAGES OF AUTOMATED SYSTEM IN GAMING

A
  • May not be suitable for all types of games or game development
  • May require significant programming expertise
  • May be affected by technical glitches or bugs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

ADVANTAGES OF AUTOMATED SYSTEM IN SCIENCES

A
  • Improved speed and accuracy in data collection and analysis
  • Ability to carry out complex experiments
  • Reduced labour costs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

DISADVANTAGE OF AUTOMATED SYSTEM IN SCIENCES

A
  • High initial investment
  • May not be suitable for all types of experiments
  • May require significant technical expertise
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

ADVANTAGES OF AUTOMATED SYSTEM IN LIGHTNING

A
  • Improved energy efficiency
  • Ability to program lighting to suit different needs
  • Reduced labour costs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

DISADVANTAGES OF AUTOMATED SYSTEM IN LIGHTNING

A

High initial investment
May not be suitable for all types of lighting needs
Maintenance costs can be high

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

WHAT IS ROBOTICS?

A

Robotics is an area of computer science that deals with the creation, design, and operation of robots.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

Characterstics of robots

A
  • Have a mechanical structure or framework
  • Have electrical components
  • Programmable
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

3 LAWS OF ROBOTICS

A
  • A robot may not injure humans through action or inaction.
  • A robot must obey commands given by humans.
  • A robot must protect itself.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

Roles of robots

A

INDUSTRY
Robots can be used in manufacturing and assembly lines to increase productivity and accuracy

Transport
Robots can be used in warehouses and logistics to move and transport goods

Agriculture
Robots can be used for tasks such as planting, harvesting, and spraying crops.

Medicine
Robots can be used in surgical procedures to increase precision and reduce risk of errors.

Domestic
Robots can be used for tasks such as vacuuming, lawn mowing, and cleaning.

Entertainment
Robots can be used as toys or in amusement parks to provide entertainment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

ADVANTAGES OF ROBOTICS

A

Increased productivity: robots can work continuously without breaks or fatigue SO other people dont need to do repetitive/mundane tasks.
Consistency and accuracy: robots can perform tasks with a high level of precision and accuracy such as performing surgical procedures.
Safety: robots can perform tasks that are dangerous or hazardous for humans
Cost-effective: robots can help reduce labour costs in the long run
Robots are prone tocyber attack and malfunction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

What is ARTIFICIAL INTELLIGENCE?

A

AI is a branch of computer science dealing with the simulation of intelligent human behaviour by a machine , including: problem-solving, decision-making, natural language processing.
The aim of AI is to create systems that will perform tasks that would normally require human intelligence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

CHARACTERSTICS OF AI

A

AI is a collection of data and the rules that are stored to use that data. It also has the ability to reason and learn (uses machine learning) by adapting to its previous decision or mistakes so that it will not be made again. AI can also change its own rules or data to learn and adapt.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

What is Expert Systems?

A

Are a form of AI that has been developed to mimic human knowledge and experience.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

Application of Expert system

A

OIL AND MINERAL PROSPECTING
DIAGNOSIS OF PATIENT’S ILLNESS
TAX AND FINANCIAL CALCULATION
STRATEGY GAMES LIKE CHESS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

Parts of Expert system

A

knowledge base - A database of facts to generate rules that are used to solve problems and make decisions.

rule base- Stores a set of rules or logic that is used by the inference engine to apply the knowledge/link the facts in the knowledge base to solve specific problems and draw conclusions.

inference engine- A program that applies the rules from the rule base to the facts in the knowledge base to solve problems.

Explanation system- Informs the user of the reasoning behind its conclusion and recommendation.

User interface- A way for users to interact with the system and provide input

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

ADVANTAGES OF EXPERT SYSTEM

A

They offer a high level of expertise.
They offer high accuracy and the results are consistent.
They have the ability to store vast amounts of ideas and facts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

Disadvantages of expert system

A
  • The set up and maintenance cost are very high.
  • They tend to give ‘cold’ responses which may not be appropriate in certain medical conditions.
  • Users of expert systems need considerable training to ensure that the system is being used correctly.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

Define machine learning?

A

Machine learning is a subset of AI that focuses on giving computers the ability to learn and improve from data, without being explicitly programmed.

The program has the ability to automatically adapt its own processes and/or data.
Uses algorithms to analyse data and identify patterns or relationships.
The system can learn from the data and improve its performance over time.
Can be supervised or unsupervised:
Supervised machine learning uses labelled data to train the system.
Unsupervised machine learning uses unlabelled data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

DIFFERENCE BETWEEN AI AND MACHINE LEARNING

A

AI
Represents simulated intelligence in a machine.
Machine learning
This is the practice of getting machines to make decisions without being programmed to do so.
AI
The aim is to build machines that are capable of thinking like humans.
Machine learning
The aim is to make machines that learn through data acquisition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

USES OF MACHINE LEARNING

A

CATEGORIZING SPAM EMAILS
DETECTION OF FRAUDULENT ACTIVITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

What are packets?

A

Information on the internet is broken down into packets and are created by TCP and transmitted over the internet.
Packets are small chunks of information/data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

Why information and data are broken down into packets?

A

Small chunks of data are easier and quicker to route over the internet than big chunks of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

What do packets contain?

A
  • packet header
  • payload
  • trailer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

What does packet header contain?

A

Source IP address
Destination IP address
Packet number

106
Q

What does packet trailer contain?

A
  • Additional error checks
  • End of packet notification
107
Q

How are packets switch/transmitted?

A

Data is broken down into small chunks of information called packets. Each packet is given a source address, a destination address and a packet number. Each packet could take a different route which will be set and controlled by the router that will find the shortest and fastest path from the source to the destination address. The packets may arrive out of order but will be reassembled to their original sequence according to the packet number at the receiver’s end. Error checks like parity check will be performed and if any error is found for example if a packet is missing or corrupted then a request is sent to send it again.

108
Q

What is Serial data transmission?

A

In this form of data transmission, there is a single wire over which data is sent one bit at a time making it inherently synchronised. Each bit is sent and received at a specific clock rate, ensuring that the sender and receiver remain synchronised and there is no need for the data to be reorder once it is received.

109
Q

Advantages of Serial data transmission?

A
  • It is less likely to have errors/interferences or the data being skewed.
  • Serial transmission is cheap over short and long distances as the cost of wire is fairly inexpensive
  • Transmission speed is adequate in certain situation ( or where it is usually used)
110
Q

Disadvantages of serial data transmission?

A
  • Data transmission is slow, especially over long distances as only small quantities of data can be transmitted at a time
  • Serial transmission is expensive over very long distances as the cost of wire dramatically increases
111
Q

Parellel data transmission

A

In this form of data transmission, there are several wires of which multiple bits are transmitted simultaneously. Parallel data transmission is asynchronous as some bits may arrive quicker than others. This is known as skewing or skewed data.

112
Q

Advantages of parellel data transmission

A
  • Parallel transmission is fast as large quantities of data can be transmitted at any one time
  • Can be downloaded and uploaded at the same time
113
Q

Disadvantages of parellel data transmission

A
  • Parallel transmission is expensive over short distances as multiple wires need to be purchased.
  • Transmission is very expensive over long distances as the cost of wires dramatically increases with the distance.
  • It responds faster to request.
  • There can be issues of synchronisation - data can be skewed.
114
Q

3 modes of data transmission

A
  • SIMPLEX
  • FULL-DUPLEX
  • HALF-DUPLEX
115
Q

WHAT IS SIMPLEX DATA TRANSMISSION AND ITS PROS+CONS?

A

Simplex transmissions are unidirectional and travel in only one direction
ADVANTAGE:
Simplex wires are cheap as only one wire is used
DISADVANTAGE:
Data transmission is slow as data still travels one bit at a time in only one direction at a time

116
Q

WHAT IS FULL - DUPLEX DATA TRANSMISSION AND ITS PROS & CONS?

A

Full-duplex transmissions are bidirectional but can transmit signals in both directions at the same time
ADVANTAGE:
Full-duplex transmission is faster as data can travel in both directions simultaneously. The receiver does not have to wait for the sender to stop before they can start transmitting their data
DISADVANTAGE:
Full-duplex is expensive as the wire technology to transmit in both directions is more difficult to implement

117
Q

What is half-duplex and its pros and cons?

A

Half-duplex
Half-duplex transmissions are bidirectional i.e. can travel in both directions, but not simultaneously
ADVANTAGE:
Half-duplex transmission is cheaper than simplex for bidirectional transmission as it requires fewer wires
DISADVANTAGE:
Transmission is still slow as data travels one bit at a time in only one direction at a time

118
Q

USES of serial data transmission?

A
  • Connecting an external hard drive to a computer
  • Transmitting data over a telephone line
119
Q

Uses of parellel data transmission?

A

Transmitting data from a computer to a printer using a multi-wire connector

120
Q

Uses of simplex data transmission?

A

Transmitting data from a computer to a printer. The printer doesn’t need to send data back to the computer

121
Q

Uses of half duplex transmission

A

Phone conversations where only one person needs to speak at a time
A walkie-talkie is a two way radio with a push to speak button. The receiver is turned off while the transmitter is turned on. This prevents you from hearing the other person while you speak

122
Q

Uses of full duplex transmission

A

Broadband connections to the internet. Data must be sent and received at the same time. Accessing information on the internet is known as downloading information. Putting information onto the internet for others to access is known as uploading
Phone conversations where both people can talk and be heard at the same time allowing them to interrupt each other

123
Q

Define USB?

A

The Universal Serial Bus (USB) is an asynchronous and serial method of transmitting data between devices and has become an industry standard.
Many devices use USB such as keyboards, mice, video cameras, printers

124
Q

When a device is connected to a USB port the computer is..?

A
  • Automatically detects that the device has been connected
  • Automatically recognised and the appropriate device driver is loaded so that the device can communicate with the computer
  • If the device is new, the computer will look for a matching device driver. If one cannot be found then the user must download and install an appropriate driver manually
125
Q

Advantages of USB

A
  • Devices are automatically detected and drivers are automatically loaded for communication. This simplifies the data transmission process for the user
  • Cable connectors fit in only one way. This prevents incorrect connections and ensures compatible data transmission
  • As USB usage is standardised, there is a lot of support available online and from retailers
  • Several different data transmission rates are supported.
  • Newer USB standards are backwards compatible
126
Q

Disadvntages of USB

A
  • The maximum cable length is roughly 5 metres meaning it cannot be used over long distances, limiting its use
  • Older versions of USB have limited transmission rates for example USB 2.0 has 480Mbps
  • Very old USB standards may not be supported in the near future
127
Q

What is an error?

A

An error is when data received is not as expected and therefore is difficult or impossible to process.

128
Q

How can errors cause problems?

A
  • Some errors are small and trivial such as a single swapped letter in a large text.
  • Other errors, in data such as postage addresses, aerospace coordinates or bank transfers, can be difficult to rectify or be disastrous.
  • Any job or task that relies on a computer to perform highly sensitive or secure processes must have methods of error checking and correction
129
Q

How do errors occur?

A

Errors can occur using wired or wireless technology due to interference
Examples of interference include wire degradation or electrical fields changing the signal
Results of interference include:
* Data loss - data is lost in transmission
* Data gain - additional data is received
* Data change - some bits have been changed or flipped

130
Q

What is checksum?

A
  • Before data is transmitted a checksum value is calculated .
  • This value is calculated using a checksum algorithm for example if the sum of all the bytes in data is more than 200 then the checksum value is the product of all the bytes in the data.
  • This checksum value is appended to the data to be transmitted.
  • Once the data is transmitted the checksum value is recalculated using the same algorithm and compared with the transmitted checksum value.
  • If they are the same then there is no error otherwise an error has occurred
131
Q

What is Parity check?

A
  • The parity checking protocol determines whether bits in a transmission have been corrupted
  • Every byte transmitted has one bit as a parity bit which should be agreed by the sender and receiver.
  • The value of the parity bit can be even or odd which is determined by counting the number of 1’s in the byte, including the parity bit
  • If the number of 1’s does not match the agreed parity then an error has occurred
  • Parity checks only check that an error has occurred, they do not reveal where the error(s) occurred
132
Q

Echo check

A
  • Echo checks involve transmitting the received data back to the sender. The sender then checks the data to see if any errors occurred during transmission
  • This method isn’t reliable as an error could have occurred when the sender transmits the data or when the receiver transmits the data. Neither will know when the error occurred.
  • If an error does occur the sender will retransmit the data
133
Q

How does check digit method works?

A
  • A check digit will be calculated from the data using a mathematical algorithm.
  • This check digit is stored with the data.
  • When the data is entered, the check digit is calculated using the data and algorithm.
  • If the previously calculated check digit and the stored check digit match,
  • the data entered is correct otherwise the data entered is incorrect.
134
Q

2 examples of check digit algorithms

A
  • ISBN
  • Barcode
135
Q

Define ARQ?

A
  • When the receiver receives transmitted data it must check for the presence of any errors. Errors can usually be detected but not always pinpointed
  • An Automatic Repeat Request is a protocol that notifies the sender that an error has occurred and that the data received is incorrect. It works as follows:
  • If an error is detected the receiver sends a negative acknowledgement transmission to indicate the data is corrupted
  • If no error is detected the receiver sends a positive acknowledgement transmission meaning the data is correct
  • If the receiver does not send any acknowledgement transmission then the sender waits for a certain time period known as a time-out before automatically resending the data
  • This process is repeated until all data has been received and acknowledged
136
Q

What is Encryption?

A

Encryption involves encoding and scrambling data into a form that is meaningless using an algorithm and cannot be understood by anyone else other than the authorised party. Key is required to decrypt the data If data is stolen it will be meaningless.

137
Q

What is symmetric encryption?

A

In symmetric encryption both parties are given an identical secret key which can be used to encrypt or decrypt information meaning the decryption and the encryption algorithm are the same.

138
Q

What is asymmetric encryption?

A

An asymmetric encryption also known as public key encryption, two keys are used:
Public key: a key known to everyone
Private key: a key known only to the receiver
Both keys are needed to encrypt and decrypt information
Asymmetric encryption works as follows:
Person A uses a public key to encrypt their message
Person A sends their message over the network or internet
Person B decrypts the message using their secret private key
Asymmetric encryption works such that only one private key can be used to decrypt the message and it is not sent over the internet like a symmetric key.

139
Q

What is system software ?

A

Systems software provides the services that the computer requires, including operating system and utility software.

140
Q

Role of operating system?

A

This is a program designed to run other programs on a computer. It is considered the backbone of a computer, managing both software and hardware resources

141
Q

Basic functions of a operating system?

A
  • managing files
  • handling interrupts
  • providing an interface
  • managing peripherals and drivers
  • managing memory
  • managing multitasking
  • providing a platform for running applications
  • providing system security
  • managing user accounts
142
Q

How does OS manage files?

A

The file manager controls all of the different files on the system, e.g. text files, graphic files, and program files. It controls file permissions such as the user’s ability to see or open a file, write a file or delete a file.It helps to organise and control files so that they are as easy to use as possible for the user. It can help to protect the user from accidental mistakes too.

143
Q

Providing an Interface: OS

A

Users must interact with the operating system through a user interface. The user interface is a system which converts what the user inputs to a form that the computer can understand and vice versa
Many computer or database operating systems use complex programming languages which are not easy to use
A user interface is created to allow easier control of the operating system by the system user.​ A good interface should be easy to use
e.g.: consistent menu structures; consistent operations from actions like clicking the right mouse button

144
Q

Managing Peripherals and Drivers:
OS

A

The overall intention of this is to handle all the devices that are connected to the computer system. This includes input devices such as a keyboard and mouse, it also includes output devices such as a monitor and printer
It communicates with the devices through software called drivers. These translate the instructions by the device manager into one the devices can understand Peripherals like a mouse, keyboard and printer all need drivers so that they can communicate with the software

145
Q

Managing Memory:OS

A

Memory management is in charge of the RAM.​ Programs use RAM throughout their operation. ​Some programs will be large and complex and use the RAM extensively whereas some are very small programs and won’t use it as much
​Memory management checks all requests from programs are valid and allocates accordingly.​ It will deallocate space and swap out data to virtual memory. It will ensure overall that different programs can be open at the same time

146
Q

Manage multitasking

A

Multitasking allows for software tasks to be completed at the same time to ensure multiple elements can be completed immediately, it uses a system called time slicing which splits different tasks into small segments
They can all be run one after the other, giving the element of multiple tasks being completed at the same time, instead of waiting for one operation to complete before moving on to the next task

147
Q

Providing a Platform for Running Applications: OS

A

Application programs and the hardware will communicate through a system within the operating system called an application programs interface(API)
This API is a library interface which will share data between software to allow elements to process
If any application is installed on the system, the Operating System will manage this process, it will allocate memory space and will control the application’s data or devices, user access will also be managed

148
Q

Providing a System Security: OS

A

System security is just about how the operating system can stay protected and ensure that elements are monitored and actioned to ensure the system is secure. Some areas of security are:
Creating/Deleting users for the system
Providing access level rights, e.g. administrator rights over installing, modifying a system or accessing files or folders. This is compared to standard rights of just accessing and using software/files on the system.
Auditing - this is keeping a log of file edits, deleted files, creation of files etc
Protecting from threats, viruses, worms, malware or remote hacker attacks
Security updates to fix patches in the operating system

149
Q

Managing User Accounts: OS

A

Each user is provided with an account for access to the system. They will be provided with their username and then will need to create a password based on rules set out initially
Each account will then be granted different levels of access, dependent on needs and level of security. This will also monitor login activity and even log users out if they have been inactive for a while.

150
Q

Process of hardware,firmware and OS to run application software?

A

Application Software must talk to the operating system, this will then allow it to interact with the hardware
The hardware will then process and send the information to the operating system which then directly talks back to applications software in a continuous loop
Firmware is the process between the Operating System and Hardware
When a computer initially first loads up, it has to explore the ROM for its initial boot-up instructions. These are contained in a Bootstrap loader
The initial process is handled by the basic input/output system (BIOS) which is known as firmware. This will provide some low-level control for all devices
Once complete these are sent to RAM to be processed by the operating system
Overall this creates an extra layer which is to ensure that initially the hardware devices e.g. keyboard are available and can be communicated directly with the operating system

151
Q

What are interrupts?

A

An interrupt is a signal from a device or software to the processor. This will cause the processor to temporarily stop so that it can service the interrupt.

152
Q

Types of interrupts?

A

Hardware Interrupt - this is caused by a hardware device such as a hardware failure e.g.
pressing a key on the keyboard
moving the mouse

Software Interrupt - this occurs when an application stops or requests services from the OS e.g.
a program is not responding
division by zero
two processes trying to access the same memory location

153
Q

Interrupt service routine

A

Whenever an interrupt is initiated the status of this task is saved to the interrupt service routine.
The interrupt service routine is simply added to a particular area where a certain set of instructions are sent that will need to be fetched, decoded and executed to complete the commands of the interrupt
As a result, the current registers will need to be changed at this point to accommodate the interrupt
The interrupt will be executed instead of the original instructions
When the interrupt is received the current values that were held in the registers are copied back to the RAM in an area known as a stack
These values are pushed onto the stack and are added to the top of the stack frame, which will save them for later retrieval when the interrupt is complete.

154
Q

Division by Zero

A

There is a possibility that an interrupt can also be interrupted which is known as a division by zero. Due to the system in RAM with stack frames, the current interrupt would be moved to the bottom of the stack frame to complete the main interrupt initially

155
Q

What are Utility software?

A

Utility programs perform specific tasks related to computer functions, resources, files and security.​ They help to configure the system, analyse how it is working and optimise it to improve its efficiency.

156
Q

What are Security utilities?

A

Anti-Virus - Scans the computer system and ensures that files are quarantined so that they can be removed by the user
Encryption - uses an algorithm to scramble (encrypt) a file according to the key which is used to make the file unreadable; the key is needed to decrypt the file back to its original form so it can be read
Firewall - monitors network traffic and blocks unauthorised access. Criteria is set and if the data meets the criteria it is accepted otherwise it is rejected

157
Q

Disk organisation utilities:
UTILITY SOFTWARE

A

System Clean-Up Tools – to search for and remove files no longer needed, to reduce space and speed up access to the system
Disk Defragmentation Tools- it is used to rearrange the parts of files on the disk drive: when a file is saved to the disk, parts of the file might be saved in different areas of the disk, these tools try to move all the parts to the same area for quicker access

158
Q

Data compression utilities

A

File Compression Software – to make files smaller so that they take up less storage space and can be transmitted to other users more easily
File backup utilities
Full Backup - stores all files and software on the system
Incremental Backup - only backs up the files and software that have been added since the last backup

159
Q

What is Application software?

A

Application software provides the services that the user require

160
Q

TYPES of application sofware

A

Word Processing Software
This allows users to create written documents
e.g. letters, reports etc
Spreadsheet Software
This allows users to perform numerical calculations and function to create automation for all mathematical elements
e.g. budgeting, accounting, stock counts etc
Presentation Software
This allows users to create interactive and multimedia presentations to show to an audience
e.g. sales pitches, launching of products etc
Multimedia Software
This is used to create multimedia and interactive content for a number of purposes, it explores text, audio, images, video, sound and animations
e.g. image manipulation, editing a video etc
Web Browsers
This allows the user to access the internet and use the world wide web

161
Q

What are Low level language?

A
  • Low level language is a language closer to the language processed by the computer.
  • They may contains menemonics
  • Examples are assembly language and machine code
162
Q

Advantages of Low level language

A
  • Programmers can directly manipulate the hardware.
  • Programs are memory efficient
  • It is machine independent so there is no requirement for the program to be portable
  • No requirement for a compiler/interpreter
  • Quicker to execute
163
Q

Disadvantages of low level language

A
  • Low-level languages are more difficult to write and understand
  • Machine dependent and cannot be added to different specification machines
  • More prone to errors
  • Knowledge of computer architecture is key to program effectively
  • Much harder to decode
164
Q

What are high level languages?

A

High Level Languages are programming languages which use English-like statements which allow users to program with easy to use code, allow for clear debugging and once programs are created they become easier to maintain
High level languages were needed more due to the development of processor speeds and memory capacity increasing
Examples of these languages are Python, C#, Java etc

165
Q

What are the advantages of high level language?

A
  • It is easier to read and write therefore the programmer is less likely to make mistakes
  • It is easier to debug so it takes less time to find and correct errors.
  • It is machine independent so it can be used in any computer.
  • Programmer can focus on the problem instead of the manipulation of memory/hardware
166
Q

What are the disadvantages of high level language?

A
  • The programmer may not be able to make use of special hardware.
  • Need a compiler/interpreter and programs can take longer to execute.
  • The program may be less efficient and take considerable memory.
  • The user is not able to directly manipulate the hardware
167
Q

What is Assembly langauge?

A

Programmers who use assembly language do so for the following reasons:
* Need to make use of specific hardware or parts of the hardware
* To complete specific machine dependent instructions
* To ensure that too much space is not taken up in RAM
* To ensure code can completed much faster

Assembly languages allow programmers to program with mnemonics. e.g.
* LDA Load - this will ensure a value is added to the accumulator
* ADD Addition - this will add the value input or loaded from memory to the value in the accumulator
* STO, Store - stores the value in the accumulator in RAM
This is used rather than binary code which allowed continuation of working directly with the hardware but removed an element of complexity
A mnemonic is received by the computer and it is looked up within a specific table
An assembler is needed here to check the word so that it can be converted into machine code
If a match from the word is found e.g. STO the word is replaced with the relevant binary code to match that sequence

168
Q

Define Compiler and how and why does it report error?

A

Compiler translates a high level language to a machine code in one go so that it can be understood by the computer system.
It translates all the code before it is executed
It creates an executable file

If there is any error while the compiler is trying to compile then it will create an error report that will display all the errors in the code that need to be corrected before it can be executed.

169
Q

Advantages of compiler?

A
  • Run quickly as the program as the source code has been stored to be translated
  • Compilers optimise the code, this code will run quicker and take up less memory space
  • Original source code will not be seen, which is ideal for programmers to stop work being copied
170
Q

Disadvantages of compiler?

A
  • Due to all code being compiled at the same time there must be enough memory space to handle this, if not and virtual memory is used it can be much slower
  • If there are errors in the code the compiler will not identify directly where the error lies, making it difficult to debug
  • It is designed solely for one specific processor
  • If the program is changed it must be recompiled
171
Q

Define Interpreter?

A
  • This is the method that directly sends the high level language to the machine code.
  • This will translate one line of code and then executes it before moving on to the next line, if an error occurs the program will stop and an error message will occur.
  • Once the error message is fixed, the program can carry on running from where the error occurred.
172
Q

Advantages of Interpreter?

A

Program will always run, it will just stop when it finds a specific syntax error in the code
It is easier to debug and understand where particular code has gone wrong
Interpreters do not store instructions and are not stored for later use, this means they require less RAM to process the code

173
Q

Disadvantage of interpreter?

A
  • Each line of code has to be interpreted separately by the CPU, which can lead to slower execution
  • Every time the program is run it has to be translated, due to no instructions being stored
  • They cannot optimise code, it is translated and executed as it is
174
Q

define IDE

A

An integrated development environment (IDE) is software that provides useful functions for a programmer writing a computer program.
Use by programmers to aid the writing of their program.

175
Q

Features of IDE?

A
  • Code editors - this will allow users to write and manipulate source code, it includes features such as auto-completion and auto-correction of code, bracket matching, syntax checks etc
  • Run-time environment - to allow the program to run and see its corresponding output
  • Built-in interpreter/ compiler - which compiles or interprets the code
  • Error diagnostics - highlight particular areas of code or provide direct error messages where the error may have appeared e.g. indentation errors etc
  • Auto-completion
  • Auto-correction
  • Prettyprint
176
Q

How is Hexadecimal used in Computers?

A
  • Memory addresses and other hardware related values
  • Representation of colour values
  • Error messages
  • Memory dump
  • Debugging
  • IP addresses
  • ASCII / Unicode
  • Assembly language
  • URLs
177
Q

ADVATAGES OF HEXADECIMAL

A
  • Easier to read and write
  • Less bits = less prone to error
  • Easier to debug
178
Q

What is character set?

A
  • Character set is a collection of all the characters and symbols that can be represented by a computer.
  • Each character and symbol is assigned a unique binary value.
  • It is used to represent text in binary; text is converted to binary to be processed by the computer.
179
Q

What is ASCII?

A

One of the most commonly used character sets is the American Standard Code for Information Interchange (ASCII), which assigns a unique 7-bit binary code to each character, including uppercase and lowercase letters, digits, punctuation marks, and control characters.
E.g. The ASCII code for the uppercase letter ‘A’ is 01000001, while the code for the character ‘?’ is 00111111.

179
Q

DEFINE UNICODE?

A

Unicode was developed as a character encoding standard that allows for a greater range of characters and symbols than ASCII, including different languages and emojis
Unicode uses a variable-length encoding scheme that assigns a unique code to each character, which can be represented in binary form using multiple bytes
E.g. The Unicode code for the heart symbol is U+2665, which can be represented in binary form as 11100110 10011000 10100101

179
Q

Problem with ASCII?

A

ASCII has limitations in terms of the number of characters it can represent, and it does not support characters from languages other than English.

180
Q

PROBLEM with unicode?

A

As Unicode requires more bits per character (Each character is encoded using more bits) than ASCII, it can result in larger file sizes and slower processing times when working with text-based data.

181
Q

DEFINE SOUND

A

Sound is a type of analog signal that is captured and converted into digital form to be processed by a computer.

182
Q

.

WHAT IS SAMPLING?

A

To convert sound into digital form, a process called sampling is used. This involves taking measurements of the sound wave at regular intervals and converting these measurements into binary data

183
Q

WHAT IS SAMPLE RATE?

A

Sample rate is the number of samples taken per second.

184
Q

WHAT IS SAMPLE RESOLUTION?

A

The sample resolution refers to the number of bits per sample, which determines the level of detail and accuracy of each sample.

185
Q

What increases with sample rate & resolution?

A

The accuracy of the recording increases as the sample rate and resolution increase, but also increases the file size of the digital sound.

186
Q

DEFINE IMAGE

A

A bitmap image is made up of a series of pixels.

186
Q

What is image resolution?

A

The resolution of an image refers to the number of pixels in the image or per set area. A higher resolution image has more pixels and is, therefore, sharper and more detailed but also requires more storage space.

186
Q

WHAT IS A PIXEL?

A

A pixel is a single square of one colour and is the smallest component of the image. Each pixel can be represented by a binary code, which is processed by a computer.
Pixels are arranged together in a grid.

186
Q

What is color depth?

A

The colour depth of an image refers to the number of bits used to represent each colour. A higher colour depth means that more colours can be represented, resulting in a more realistic image but also requires more storage space.

186
Q

What increases with resolution and color depth?

A
  • QUALITY
  • COLOR DEPTH
187
Q

NIBBLE IS…

A

GROUP OF 4 BITS

188
Q

Tell the data storage size in order of sequence?

A
  • 4 bits in a nibble
  • 8 bits in a byte
  • 1024 bytes in a kilobyte
  • 1024 kibibytes in a mebibyte
  • 1024 mebibytes in a gibibyte
  • 1024 gibibytes in a tebibyte
  • 1024 tebibytes in a pebibyte
  • 1024 pebibytes in an exbibyte
189
Q

what is data compression?

A

The process of reducing the size of the file.

189
Q

Different types of data transmission?

A
  • Lossy compression
  • Lossless compression
189
Q

impact of data transmission?

A
  • Less bandwidth required
  • Less storage space required
  • Shorter transmission time
189
Q

What are the examples lossless compression?

A
  • ZIP FILES
  • PDF FILES
  • PNG IMAGES
  • GIF IMAGES
  • FLAC AUDIO
190
Q

What are the examples of lossy compression?

A
  • JPEG IMAGES
  • MP3 AUDIO
  • STREAMING MEDIA
191
Q

What is lossless compression?

A

A compression algorithm is used to reduce the file size without permanently removing any data.
Repeated patterns/character in the file are identified and indexed ( index involves assigning unique codes to each data and then using these codes to represent the data efficiently)
The data is replaced with the index and positions stored
The number of times the pattern appears is also stored
Techniques like run-length encoding (RLE) and Huffman encoding are the example of lossless compression.

191
Q

What is lossy compression?

A
  • A compression algorithm is used.
  • Lossy compression reduces the file size by permanently removing redundant data from the file.
  • This method is often used for images and audio files where minor details or data can be removed without significantly impacting the quality. For example, sound in the background that cannot be heard by human ears.
  • Techniques like downsampling, reducing resolution or colour depth, and reducing the sample rate or resolution are used for lossy compression
  • File cannot be restored back.
  • The amount of data removed depends on the level of compression selected and can impact the quality of the final file
192
Q

Difference between lossy and lossless data compression?

A

LOSSY COMPRESSION
* QUALITY/DATA LOSS
* FILES CANNOT BE RESTORED BACK
* SMALLER FILE SIZE
* FASTER TRANSMISSION RATE

LOSSLESS COMPRESSION
* NO QUALITY LOSS
* FILES CAN BE RESTORED BACK
* LARGER FILE SIZE IN COMPARE TO LOSSY
* SLOWER TRANSMISSION RATE IN COMPARE TO LOSSY

192
Q

What is the role of the central processing unit (CPU) in a computer?

A

Data and commands are inputted by the user using an input device, the central processing unit (CPU) processes data by executing instructions and the results are outputted to an output device.

192
Q

What is ALU?

A

The Arithmetic Logic Unit(ALU) performs the calculations required to execute the instructions, these include ADD and SUBTRACT
The ALU also carries out logical operations such as COMPARE
The ALU has a built-in register where it stores interim results of calculations it performs.

192
Q

What are control unit?

A

The control unit sends control signals that manage the flow and transfer of data and instruction within the CPU.
The Control Unit also decodes instructions using an instruction set and controls the clock speed.

192
Q

What is a microprocessor?

A

A microprocessor is a type of integrated circuit on a single chip.
The purpose of a microprocessor is to process data and execute instructions.

192
Q

Name all the registers?

A
  • Program Counter (PC)
  • Memory Address Registers (MAR)
  • Memory Data Register (MDR)
  • Current Instruction Register (CIR)
  • Accumulator
192
Q

Purpose of PC

A

stores the address of the next instruction to be fetched from memory

192
Q

What are registers?

A

Registers are small memory locations within the CPU, which temporarily store data needed to execute an instruction.

192
Q

Purpose of MAR

A

stores the address of the instruction or data to be fetched from or written to memory

193
Q

Purpose of Accumulator

A

Temporarily stores the results of the calculations performed by the arithmetic and logic unit

193
Q

Purpose of CIR

A
193
Q

What are buses?

A

Components within the CPU and wider computer system are connected by buses. These are wires down which electronic signals and data travel. The different buses are collectively called the system bus.

193
Q

What are 3 different types of buses?

A
  • The data bus transmits data from the CPU to memory or input/output controllers (OR CAN WRITE / between components in the CPU). It is bidirectional which means data can travel in both directions
  • The address bus transfers addresses from the CPU to memory. It is unidirectional which means addresses only go from the CPU to memory(OR CAN WRITE / between components in the CPU).
  • The control bus transfers control signals from the control unit to other components in the computer system such as memory or input/output controllers. The control bus is bidirectional.
193
Q

TELL THE STEPS OF FETCH-EXECUTE-DECODE CYCLE.

A

The memory address of the instruction to be fetched is stored in the MAR and is sent down the address bus.
The data at the memory address is transferred back to the CPU, via the data bus, where it is stored in the MDR
Data from MDR is sent to ALU to be executed
ALU performs calculation and logical operations on data and it stores the interim results of calculations in its built-in register.
After calculations, ALU sends data to MDR
Data is sent from MDR to be written to RAM

193
Q

Purpose of MDR

A

Stores the data that has been fetched from memory or being written to memory
Data from MDR is sent to ALU to be executed

193
Q

WHAT IS AN INSTRUCTION SET?

A

An instruction set is a list of all the commands that can be processed by a CPU and the commands are machine code.
Each command has a unique binary code

193
Q

WHAT IS AN EMBEDDED SYSTEM?

A

An embedded system is a computer system with either one function or limited specific functions built within a device.
Its purpose is to control the device and allow a user to interact with it
It runs on firmware and does not have additional peripherals

193
Q

WHAT ARE INPUT DEVICES?

A

INPUT DEVICE ARE THE DEVICE THAT ALLOWS DATA TO BE ENTERED.

193
Q

What is core?

A

Core is used to perform a fetch-decode-execute cycle and to process / execute an instruction .

193
Q

TYPES OF CORE?

A

A dual-core processor has two cores
A quad-core processor has four cores

193
Q

TYPES OF INPUT DEVICE.

A
  • KEYBOARD
  • MOUSE - OPTICAL MOUSE
  • BARCODE SCANNER
  • TOUCH SCREEN ((resistive, capacitive and infra-red)
  • DIGITAL CAMERA
  • MICROPHONE
  • QR CODE
  • two-dimensional (2D) and three-dimensional (3D) scanners
194
Q

HOW DOES A CORE EFFECTS COMPUTER PERFORMANCE?

A

Multiple cores enables multitasking (running more than one program at the same time)
Some programs cannot be split between cores
The more cores a computer has the more instructions that can be executed per second simultaneously resulting in better performance.

194
Q

WHAT IS A CLOCK SPEED?

A

The clock speed is how many instructions the core can execute each second
The clock speed is measured in Hertz
Modern cores can execute billions of instructions per second

194
Q

DEFINE CACHE?

A

Cache is a small amount of memory situated within or close to the CPU with very fast read/write speeds
It is used for storing frequently used instructions/data,recently used instructions, and instructions that are to be fetched and executed next in a process.

194
Q

HOW DOES A CACHE EFFECT COMPUTER PERFORMANCE?

A

The impact of increasing the amount of cache is that more data can be stored there and accessed faster than if it was in RAM which improves the performance of the CPU.

195
Q

WHAT IS DIGITAL CAMERA?

A

A digital camera works by capturing light and converting it into a digital image
Light enters the camera through the lens, it reaches an image sensor where it is split into millions of pixels (small squares). Each pixel measures light intensity which is converted into binary and represents a colour.
Digital cameras are integrated into smartphones , used in security systems and by professional photographers to create high quality digital images
An advantage of digital cameras is they show a preview of the image
They also instantly create an image which can then be easily duplicated and transmitted via bluetooth or WiFi.

195
Q

DEFINE KEYBOARD?

A

A keyboard is the most common device used for text-based data input
They are connected either by a USB cable or wirelessly to the computer system
They are built into laptops.
Smartphones and tablets have virtual keyboards
Each key on a keyboard has a peg underneath it which makes contact with a conducting membrane. This is then converted into an electrical signal to transmit a unique character code.
USE - ENTERING TEXT.

196
Q

ADVANTAGES OF AN OPTICAL MOUSE?

A
  • Intuitive
  • No moving parts
  • Easy to use
196
Q

ADVANTAGES OF KEYBOARD?

A
  • UNIVERSAL
  • EASY TO USE
197
Q

WHAT ARE OPTICAL MOUSE?

A

A mouse use a laser to detect and track movement, this is then processed by a microprocessor which interprets the movement and replicates it when moving a virtual cursor on-screen
Items can be selected or moved using the left mouse button, whilst the right button usually displays additional menus
They can be wired or wireless
They are used to control the cursor in a Graphical User Interface (GUIs)
They are simple to use and provide the user with an intuitive way to navigate the computer
They are reliable due to no moving parts
USE- Navigating a GUI and Making selections and entering commands.

197
Q

WHAT DOES A BARCODE SCANNER DO AND HOW?

A

Barcodes are a series of black and white bars which represent a code
A barcode reader shines a red laser at the barcode to read the data it represents
The light from the white lines is reflected back
Black lines absorb the light so less is reflected
The different levels of reflection are converted into a binary value which can be processed by a microprocessor
A barcode reader can be handheld or built into a larger machine such as a self-service checkout at a supermarket
Barcodes can be used in many ways such as identifying a product being sold or tracking a package through the delivery process

197
Q

ADVANTAGES OF DIGITAL CAMERA?

A

Instant preview and image

197
Q

WHAT IS A MICROPHONE?

A

A computer microphone works by converting sound waves into electrical signals that can be processed by the computer.
They can capture any real world sound and convert it into digital data which can be stored, duplicated or modified

Microphones are used to record music, telephone calls, communicate online and dictation

198
Q

WHAT IS A QR CODE?

A

A QR code is a visual representation of data using black and white squares
QR codes can represent over 7000 digits whereas a barcode represents up to 30 digits
QR codes are scanned by a camera (often on a mobile device)
A piece of software convert the squares into binary data
QR codes often link to a website where more information can be found
They can also be used to advertise products, share contact details, provide promotional codes, train tickets, and event tickets.

198
Q

WHAT IS A RESISTIVE SCREEN?

A

Resistive screens consist of two conductive layers which are separated by a small gap. The top layer is flexible. When the screen is touched the two layers connect, completing a circuit.

198
Q

WHAT IS A CAPACITIVE SCREEN?

A

Made up of a protective layer, a transparent conductive layer and a glass substrate. Touching the screen changes the electrostatic field of the conductive layer
CAPACITIVE PROCESS
Electrical field/charge is spread across the screen
− Sensors are located around the screen and are used to read the electric field
− When finger touches screen, the charge/ is transferred to the user as it is affected by the conductivity of another object
− Coordinates of touch determined/calculated/measured.

198
Q

ADVANTAGES AND DISADVANTAGES OF RESISTIVE SCREEN?

A

BENEFITS
* Cheap to produce.
* Resistant to surface contaminants
* Can be activated with nearly every object (stylus, finger, gloved hand

DRAWBACKS
* Have lower accuracy compared to other touch screen types.
* Less responsive
* Made of polymer so is vulnerable to scratches
* Does Not support multi-touch facility
* Poor visibility in strong sunlight

199
Q

ADVANTAGES AND DISADVANTAGES OF CAPACITIVE SCREEN?

A

BENEFITS
Excellent image quality
Unlimited touch-life/ ALLOW MULTI TOUCH
Scale well
Very durable

DRAWBACKS
Sensitive to interference from light, water, snow
SENSITIVE TO ELECTROMAGNETIC RADIATION
SURFACE CAPACITIVE SCREEN ONLY WORKS WITH BARE HANDS OR A SPECIAL STYLUS

200
Q

What is infrared screen?

A

LEDs shine infrared light across a screen forming a matrix. When the screen is touched the beams are interrupted. The sensor will send the reading that it detected to the microprocessor that calculates where the screen was touched.

201
Q

Advantages and disadvantages of infrared screen.

A

BENEFITS
* Excellent image quality,
* High precision
* Durable
* Allows for multiple touches at the same time

DRAWBACKS
* Requires a bare finger or stylus for activation
* Sensitive to water and moisture

202
Q

What is a 2D scanner?

A

A two-dimensional (or flat-bed) scanner shines a bright strip of light over a document and the reflected light is captured by mirror and lenses. Reflected light is measured for each pixel. This data is converted into binary data so the document can be digitally recreated and stored in a computer.
2D scanners can be used for creating digital versions of documents or photographs
- Reading passports at airports

202
Q

What is a 3D scanner?

A

A three- dimensional laser scanner shines a light over an object. The geometry and dimensions are recorded so the object can be recreated digitally
The digital 3D model can be modified using specialist software
A 3D printer could then print out the model
3D scanners can be used to create 3D models for use with computer-aided design (CAD) software
Creating replicas with 3D printers
Typical uses of 3D scanners and printers are dentistry, product development, medical

203
Q

NAME THE OUTPUT DEVICE.

A
  • actuator
  • digital light processing (DLP) projector
  • inkjet printer
  • laser printer
  • light emitting diode (LED) screen
  • liquid crystal display (LCD) projector
  • liquid crystal display (LCD) screen
  • speaker
  • 3D printer
203
Q

What are light projectors?

A

Used to project computer outputs onto a large screen and give presentations in both business and education settings.
It uses many small mirrors to reflect light towards a lens. This will display an image.

204
Q

Types of light projector?

A
  • Digital light processing (DLP) projectors
  • Liquid crystal display (LCD) projectors
204
Q

What is DLP projector?

A

DLP systems use millions of micro-mirrors arranged in a grid on a microprocessor within the projector. Light is shone through colour filters and the mirrors. The position of the mirrors can be altered to change the intensity of the light.

204
Q

How does a LCD projector works?

A

LCD projectors use three mirror filters to separate an image into red, green and blue wavelengths. The three images are then combined to produce the full colour image which is passed through the lens on to the wall/screen.

204
Q

What are the advantages and disadvantages of DLP projector?

A

ADVANTAGE
* Higher contrast ratios.
* Smooth video
* Higher reliability
* Smaller and lighter
* Better suited to dusty atmospheres than LCD projectors

DISADVANTAGE
* Image tends to suffer from “shadows” when showing a moving image
* DLP do not have grey components in the image
* The colour definition is not as good as LCD projectors

204
Q

What are the advantages and disadvantages of LCD PROJECTOR?

A

ADVANTAGES
* Give a sharper image than DLP projectors
* Contrast ratios are not as good as DLPs
* Better colour saturation and intensity than DLP projectors

DISADVANTAGES
* Have a limited life
* Use less power and generate less heat
* LCD panels degrade over time.
* Quieter running that DLP

204
Q

TYPES OF PRINTERS.

A
  • INKJET PRINTER
  • LASER PRINTER
  • 3D PRINTER
205
Q

WHAT IS AN INKJET PRINTER?

A

Have a print head which moves across the page
Spray liquid ink droplets from ink cartridges through very fine nozzles onto the paper (these are in the print head)
The droplets can be piezoelectric or thermal bubble technology
Inkjet printers produce high quality hard copies of digital images or documents

205
Q

ADVANTAGES OF INKJET PRINTER?

A
  • Great for bright colours and images
  • Widely used in homes and home offices with lower print volumes
205
Q

WHAT IS A LASER PRINTER?

A
  • Have large toner (dry ink) cartridges and large paper trays
  • Use positive and negative charges to make the toner particles stick to piece of paper, heat is then used to bond the particles to the paper
  • Are often used in business and education setting
206
Q

ADVANTAGES AND DISADVANTAGES OF LASER PRINTER?

A

ADVANTAGES
* Are very fast when making multiple copies of a document -[PRINTS FASTER]
* Are useful for high volume print jobs for example producing leaflets
* Have a low running cost per page. -[CHEAP]
* It prints text at a high quality
* Colour fast
DISADVANTAGE
* Expensive to purchase printer
* Toner is expensive
* Print images at a lower quality
* Can be quite large in size

207
Q

WHAT IS A 3D PRINTER?

A

3D printers create 3D models of a digital model by depositing layers of material, such as plastic or resin, on top of one another to slowly build up a 3D object
They allow for precision and can be used in medicine to create prosthetics and blood vessels
3D printers can be used to create rapid prototypes
Models can be transmitted digitally and then models printed out all across the world.

208
Q

WHAT IS LCD?

A
  • It stands for Liquid Crystal Display screens.
  • LCD screens are made up of millions of tiny liquid crystals.
  • The display is made of pixels arranged in a matrix
  • The display requires backlighting
  • They are used for TVs, monitors, tablets and phones
208
Q
A
208
Q
A
209
Q
A
209
Q
A