Computer Science ( Computer Systems ) Flashcards

1
Q

1.1 Systems architechure

Explain the Fetch-Decode-Execute

A

1. Fetch - The memory address is copied from the program counter to the MAR.
2. Fetch - the instruction stored in the MAR is copied to the MDR.
3. Decode - The instruction the MDR is then decoded by the CU
4. Execute - The instruction is then performed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

1.1 Systems architechure

Describe the 3 different main components of a CPU

A

1. The Control Unit
- This is in overally control of the CPU. Its main job is to manage the fetch-decode-executing of instructions
- It controls the flow of data inside the CPU & outside the CPU

2. The Arithmetic Logic Unit ( ALU )
- The ALU does all the calculations
- It performs logic operations such as AND, OR and NOT and binary shifts
- It contains the accumulator register

3. The Cache
- The cache is very fast memory in the CPU. It’s slower than the registers but faster than RAM
- It stores regularly used data so that the CPU can access it quickly, the CPU checks the cache first before the RAM.
- Caches have a very low capacity & are expensive compared to RAM & secondary storage.
- There are different levels of cache, L1, L2 and L3. Higher level = slower but more size

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

1.1 Systems architechure

Describe the different components of Von Neumann’s architechture

A

1. Memory Address Register ( MAR )
- holds any memory address about to be used by the CPU. The address might point to data or a CPU instruction.

2. Memory Data Register ( MDR )
- holds the actual data or instruction. This may have bee nfetched from memory, or be waiting to be written to memory

3. Accumulator
- stores intermediate results of calculations in the ALU.

4. Program Counter
- holds the memory address of the next instruction to be executed for each cycle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

1.2 Memory and storage

Describe the features & purposes of;
A) RAM
B) ROM

A

A) RAM;
- RAM is used as the main memory in a computer. It can be read & written to. RAM is volatile ( meaning it is temporary memory ).
- The main memory is where all data, files & programs are stored while they’re being used.
- When a computer boots up, the os is copied from secondary storage to RAM.
- RAM is slower than CPU cache, but way faster than secondary storage

B) ROM;
- ROM is non-volatile memory, it can only be read, not written to.
- ROM comes on a small factory-made chip built into the motherboard.
- Contains all the instructions a computer need to boot up, called the BIOS.
- As soon as the computer is powered on, the CPU reads the instructions from ROM. this tells the CPU to perform self checks & set up the computer.
- It is possible to update (‘flash’) the BIOS on a ROM chip.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Memory

Describe what Virtual Memory is & how it functions.

A

1. When the RAM is full, Computers move data that hasn’t been used recently to a location on secondary storage, virtual memory.
- VM may be needed if; too many applications open, or a particularly memory-instensive application is open.

2. If the CPU has to read data from VM, it must move the data back to RAM, This is slow as data transfer rates are much slower on Secondary Storage than RAM.

3. VM can make a computer slow to respond when switching between applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

1.2 Memory and storage

Describe the different factors that can affect CPU performance.

A

1. Clock Speed
- This the number of instructions a single processor core can carry out per second.
- The higher the clock speed, the greater number of instructions that can be carried out per second.
- Some CPUs can be overclocked to make them run at a higher clock speed, however, it could make CPU’s overheat.

2. Number of Cores
- Each core in a CPU can process data independently of the rest
- The more cores a CPU has, the more instructions it can carry out at once, so the faster it can process a batch of data.

3. Cache Size
- The cache is data storage inside the CPU that’s much faster than RAM.
- A large cache gives the CPU faster access to more data it needs to process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

1.2 Memory and storage

Describe the function of GPUs

A
  • GPUs are specialised circuits for handling graphics and image processing. They relieve the processing load on the CPU, freeing it do other things.
  • Computers have basic GPUs integrated onto the motherboard or the CPU. For better graphics performance, a dedicated GPU is often used.
  • Using high-end graphics cards can greatly improve performance in graphics-intensive applications.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

1.2 Memory and storage

Describe the features of; Magnetic, Solid State and Optical Storage

A

1. Magnetic Storage ( HDDs )
- A hard disk drive is made up of a stack of magnetised metal disks that spin thousands of times a second. Data is stored magnetically in small areas on the disk’s circular tracks.
- A moveable arm can access these areas and read or write data.

2. Solid State Storage
- These are storage devices with no moving parts, used for the same purpose as HDDs - for internal/external storage.

3. Optical Storage
- Optical discs are things like CDs, DVDs and Blu-ray discs.
- Optical discs come in 3 forms: read-only, write-once and rewritable.
- Nowadays their use is declining: As internet speeds have increased, streaming and download services have removed the need for optical discs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

1.2 Memory and storage

Evaulate the benefits & drawbacks of:
A) Magnetic storage
B) Solid state storage
C) Optical Storage

A

A) Magnetic Storage
Benefits
- cheaper than Solid states, higher capacity than Optical & Solid state, longer read/write life than solid states, reliable

Drawbacks
- slower than solid states, noisy due to moving parts, very durable due to moving parts, aren’t very portable

B) Solid State
Benefits
- faster than HDDs, don’t need degramenting, more shock-proof than HDDs, silent, very reliable, very durable, more capacity than optical

Drawbacks
- very expensive, less storage than HDDs

C) Optical Storage
Benefits
- very cheap, portable, don’t be damaged by water or shocks

Drawbacks
- Lowest capacity, very slow read/write speads, poor reliability compared to flash storage devices, easily scratched

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

1.5 Systems software

State the main functions of the OS.

A

The main functions of an OS are to:
- Communicate with internal and external hardware via the device drivers
- Provide a user interface, allowing a user to interact with the computer and vice-versa
- Provide a platform for different applications to run.
- Allow the computer to multi-task by controlling memory resources and the CPU
- Deal with file managment and disk management
- Manage system security & user accounts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

1.5 Systems software

Describe how the OS works in;
A) Peripheral management & Drivers
B) User Interfaces

A

A) Peripheral management
- Every piece of hardware connected to the computer requires a device driver. Drivers act as a ‘translator’ for signals between OS & hardware
- The OS will choose the correct device drivers for the hardware it detects. If a new hardware is connected, the system will install the new matching driver.
- Drivers may be updated automatically by the OS or manually by the user.

B) User Interface
- A User Interface allows the user to interact with a computer system
- GUI systems are designed to be easy for every day users and are optimised for specific input methods.
- A command-line interface is text based, the user enters specific commands to complete tasks.
- For advanced users, command-line interfaces are far more efficient and powerful than a GUI, they can be used to automate processes using scripts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

1.5 Systems software

Describe how the OS works in;
A) File & Disk Management
B) User Accounts

A

A) File & Disk Management
- The OS is responsible for file management, the organisation of data into a useable structure.
- It deals with the naming, saving, movement, editing & deletion of data.
- The OS manages the hard disk. It splits the physical disk into storage sectors, decides which sectors to write data to, and keeps track of free space on the disk.

B) User Accounts
- The OS is also responsible for User Account Control. User accounts allow different users to be granted access to specific data.
- On most desktop operating systems each user has access to their own personal data and desktop, but cannot access other users’ personal data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

1.5 Systems software

Describe how the OS works in Multi-tasking & Memory management

A
  • When an application is opened, the OS moves the necessary parts of the application to memory. The OS will decide if applications or features have been used recently, if not, they may be removed from memory.
  • To run multiple applications, the OS needs to make sure the applications don’t overwrite or interfere with each other. A memory manager allocates certain applications certain memory addresses.
  • Only 1 application is processed by the CPU at a time. The OS divides CPU time between open applications and may prioritise certain processes in order for instruction to be exectuted in the most efficient order.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

1.2 Memory and storage

A) State what is ment by a character set
B) Describe what; ASCII is, UNICODE is
C) Provide the formula for File size

A

A) Character sets are collection of characters that a computer recognises from their binary representation.

B1) ASCII
- Each ASCII character is given a 7-bit binary code - this means it can represent a total of 128 different characters.
- An extra bit ( 0 ) is added to the start of the binary code for each ASCII character. This means each ASCII character fits nicely into 1 byte.
- The codes for numbers, uppercase letters and lowercase letters are ordered.

B2) Unicode
- This comes in several different forms & tries to cover every possible letter or symbol that might be written. Unicode uses multiple byes for each character.
- It covers all major languages.

C) File size ( in bits ) = number of bits per character x number of characters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

1.2 Memory and storage

Describe:
A) How Images are stored
B) The effects of increasing Colour depth & Resolution

A

A) Most images you use are bitmap images, they’re made up of lots of tiny dots, called pixels
- The colour of each pixel is represented by a binary code. The number of colours available in an image is related to the number of bits the code has.

B1) Colour depths is the number of bits used for each pixel, given the colour depth yo can work out how many colours can be made; Total number of colours = 2^n ( where n = number of bits per pixel )

B2) Increasing colour depth or resolution will increase the quality of the image but also the file size, shown by the formula; File size ( in bits ) = image resolution x colour depth
- Resolution is the number of pixel in the image.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

1.2 Memory and storage

Describe how sound is sampled and stored.

A

-Sound is recorded by a microphone as an analogue signal. Analogue signals are pieces of continually changing data.
- Analogue signals eed to be converted into digital data so that computers can read and store sound files.
- This is done by analogue to digital converters, which are found in most modern recording devices.
- The process of converting analogue to digital is called sampling.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

1.2 Memory and storage

Describe how sample rate, bit depth and duration effect; Quality, Size

A
  • Sample rate is how many samples you take in a second, Bit depth is the number of bits available for each sample. You can calculate the size of a sound file using the formula
  • File size ( in bits ) = Sample rate ( in Hz ) x bit depth x length ( in seconds )
  • Increasing the sample rate will increase the quality of the playback as it will closer match the recording.
  • Increasing the bit depth means the digital file picks up quieter sounds, increasing quality.
18
Q

1.2 Memory and storage

Describe the main uses of compressing data files

A
  • Smaller files take up less storage space on a device
  • Streaming and downloading files form the Internet is quicker as they take up less bandwith
  • It allows web pages to load more quickly in web browsers
  • Email services normally have restrictions on the size of the attachment you can send - compressing the file allows you to send the same content with a much smaller file size.
19
Q

What are some Pro’s & Con’s of;
A) Lossy Compression
B) Lossless Compression

A

A) Lossy ( MP3 { Audio }, AAC { Audio }, JPEG { Image } )

1. Advantages Include;
- Greatly reduced file size, meaning more files can be stored.
- Lossy files take up less bandwidth so can be download & streamed more quickly
- Commonly used, lots of softare can read lossy files

2. Disadvantages Include;
- Lossy compression loses data.
- Lossy compression cannot be used on text files.
- While the quality will be worse, its usally unnoticable

B) Lossesless ( FLAC { Audio }, TIFF { Image }, PNG { Image } )

1. Advantages Include;
- Data is only removed temporarily so there is no reduction in quality.
- Lossess files can be decompressed.
- Lossless compression can be used on text & software files.

2. Disadvantages Include;
- Only a slight reduction in file sizes

20
Q

1.5 Systems software

List & Explain Some Different Utility Softwares

A

A) Disk Defragmentation
Reason Needed: Files are stored on hard disk, When files are moved, deleted or change size, lots of small gaps appear in the disk.
- Over time the disk becomes more and more fragmented. This makes the reading & writing speeds much slower.
- Why It’s Needed: Defragmentation re-organises data on the hardrive to put the fragmented files back together.

B) Compression Software
- Compression software reduces the size of files by permanetly or temporarily removing data from them.
- Compressed files take up less disk space & are quicker to download.

C) Encryption Software
- Encryption software scrambles data to prevent 3rd parties from accessing it.
- So stolen data is still secure, as only the intended reader will have the key to read it.

Utility Softwares - Help to maintain,

21
Q

1.3 Computer networks, connections & protocols

Describe the characteristics of a;
A) LAN
B) WAN

A

A) LAN
- A LAN covers a small geographical area located on a single site.
- All the hardware for a LAN is owned by the organisation that uses it.
- LANs are either wired or wireless
- Often find LANs in businesses, schools & universities.

B) WAN
- A WAN connects LANs that are in different geographical locations.
- Unlike a LAN, organisations hire infrastructure from teleocommunication companies, who own & manage the WAN, this is because WANs are much more expensive
- WANs may be connected using fibre or copper telephone lines, satellite links or radio links.

22
Q

1.3 Computer networks, connections & protocols

Describe the different reasons why someone should use a LAN

A
  • Sharing files is easier, network users can access the same files, work collaboratively on them and copy files between machines
  • You can share the same hardware ( e.g. printers ) on a LAN.
  • The Internet connection can be shared between every device connected to the LAN.
  • You can install and update software on all computers at once.
  • You can communicate with LAN users cheaply & easily
23
Q

1.3 Computer networks, connections & protocols

Describe the different factors that can affect the performance of networks

A
  • Bandwith is the amount of data that can be transferred in a given time. Available bandwith is shared between the devices on a network, this may cause congestion and slow the network.
  • You can limit the bandwith available to each user to address this.
  • Wired connections are generally faster & more reliable than wireless. Fibre optic gives much better performance than copper cables
  • Wireless performance depends on signal quality so is affected by the range of the device, so physical obstructions may worsing this quality.
24
Q

1.3 Computer networks, connections & protocols

Describe the roles of; WAPs and NICs

A

1. WAP ( Wireless Access Point )
- To set up a WI-FI network, you need a WAP device. The WAP is essentially a switch that allows devices to connect wirelessly.

2. NIC ( Network Interface Controller )
- A NIC is an internal piece of hardware that allows a device to connect to a network. These exist for both wired and wireless connections.

25
# ***1.3 Computer networks, connections & protocols*** Describe the roles of; **Routers** and **Switches**
**1. Routers** - Routers are responsible for **transmitting data** between networks - they're always connected to at least **2 different networks**. - Routers also have the job of **recieving and directing packets**. - Routers are also needed to connect the **LAN** to the internet. **2. Switches** - Switches connect devices on a **LAN**. Switches receive data **( in units called frames )** from 1 device & transmit this data to the device on the network with the correct **MAC address**.
26
# ***1.3 Computer networks, connections & protocols*** Describe the different types of **transmission media**.
**1.** Ethernet networks can use different types of **Ethernal cables** to connect **devices on a LAN**. **2.** Most common **Ethernet cables** are **CAT 5e** and **CAT 6**. They are **'twisted pair'** cables, containing **4 pairs of copper wires** which are twisted together to reduce **internal interference** **3. Coaxial cables** are made of a **single copper wire** surrounded by a **plastic layer** for insulation & a **metallic mesh** which provides shielding from **outside interference.** **4. Fibre optic** cables transmit data as **light**. They are **high performance** & **expensive cables**, they don't suffer intereference & can transmit over large distance without **loss of signal quality**.
27
# ***1.3 Computer networks, connections & protocols*** Compare **Bluetooth** and **Wi-Fi** as wireless technologies
**1. Bluetooth** - Usually a **direct connection** between 2 devices so that data can be shared - Connection range varies, but mobile devices are typically **10metres** - **Low bandwith** compared to Wi-Fi - Often used in **mobile/wearable devices - smartphones/watches, headphones** **2. Wi-Fi** - Can be used by **multiple devices** to connect to a LAN at the same time. - Connections have a range between **40 & 100metres** - **High bandwith** compared to Bluetooth - Often used in the home - **routers, desktops, laptops, smartphones**
28
# ***1.3 Computer networks, connections & protocols*** Describe what is ment by a; **A)** Client-server network **B)** Peer-peer network
**A)** Files & software are usually stored centrally on the server rather than **individual client devices** - Clients send requests to the server, the server processes the **request and responds**. This is the **client-server relationship**. **B)** In **Peer-to-Peer** networks all devices are equal, connecting directly to **eachother without a server**.
29
# ***1.3 Computer networks, connections & protocols*** Provide the **advantages & disadvantages** of; **A)** Star Topolgies **B)** Mesh Topologies
***A) Star Topologies*** **Advantages** - If a device fails or a cable is **disconnected**, the rest of the network is **unaffected**. - It's simple to add **more devices** to the network. - **Better performance** than other setups - data goes straight to the **central device** so all devices can transmit data at once & there are **very few data collisions** **Disadvantages** - In wired networks, every device needs a cable to connect to the **central switch** or server. This can be **expensive**. - If there is a problem with the switch, then the whole network is affected. ***B) Mesh Topologies*** **Advantages** - There is no **single point** where the network can fail, data will just be sent along a **new pathway**. - There is no **dedicated equipment** needed. **Disadvantages** - If a device fails, it may limit the speed of the **overall network** - Its much more complicated to add new devices to the network. **( They have to be connected to every other device )**
30
# ***1.3 Computer networks, connections & protocols*** Provide the format for; **A)** A MAC address **B)** An IPv4 & IPv6
**A)** Mac addresses are assinged to all network-enabled devices by the manufacturer. They are unique to the device & cannot be changed. - **Format:** 48 or 64-bit binary numbers converted into hexadecimal - E.g: **98-81-55-CD-F2-2F** **B1)** IPv4 uses **32** bits in **8-bit chunks** & each one is given as a denary number - Example: **37.153.62.136** **B2)** IPv6 uses 128 bits in **16-bit chunks** and each one is given as a hexadecimal number. - Example: **2001:0db8:85a3:0000:0000:8a2e:0370:7334**
31
# ***1.3 Computer networks, connections & protocols*** Describe the **different protocols** and what they do.
**1. TCP/IP** - dictates how data is sent between networks. **TCP ( Transmission Control Protocol )** sets the rules for **how devices connect on the network**. In charge of splitting data into backs & reassembling them. Also responsible for checking the data is correctly sent & delivered - **IP ( Internet Protocol )** - responsible for **directing packets** to their destination across the network. **2. HTTP ( Hyper Text Transfer Protocol )** - Used by web browsers to access websites & communicate with web servers. **3. HTTPS ( HTTP Secure )** - A more secure version of HTTP. Encrypts all information sent & recieved. **4. FTP ( File Transfer Protocol )** - Used to access, edit, and move files between devices on a network. **5. POP ( Post Office Protocol )** - Used to retrieve emails from a server. The server holds the email until you download it, It is then deleted from the server. **6. IMAP ( Internet Message Access Protocol )** - Used to retrieve emails from a server. The server holds the email until you actually delete it - you only download a copy. **7. SMTP ( Simple Mail Transfer Protocol )** - Used to send emails. Also used to transfer emails between servers.
32
# ***1.3 Computer networks, connections & protocols*** **A)** State what layers are **B)** Describe the benefits of using layers
**A)** A layer is a group of protocols which have similar functions. Layers are **self-contained** - protocols in each layer don't need to know **what's happening in other layers**. **B) Benefits of using Layers;** - It breaks **network communication** into manageable pieces. This helps developers concentrate on only one area of the network without having to **worry about the others**. - As layers are **self-contained**, they can be changed without the other layers being affected - Having standards for each layer forces companies to make **compatible, universal hardware and software**, so different brands will work with each other & always work in **basically the same way**.
33
# ***1.3 Computer networks, connections & protocols*** Describe the role of the **DNS**
- A **Domain Name Service ( DNS )** is used to **translate** website domain names into **IP addresses** - this means you don't need to remember IP addresses to **access websites.** - These services use a network of **Domain Name Server** which store IP addresses & **matching domain names**.
34
# ***1.3 Computer networks, connections & protocols*** **A)** Describe what the cloud is **B)** Provide advantages & disadvantages of using the cloud
**A) Hosting** is when a business uses its **servers** to **store files of another organisation**, traditional use is hosting of **websites** on web servers. - Businesses also use their servers to offer a **great range** of services, cleients can access data storage, software etc. This is known as **cloud computing** or **'the cloud'**. **Benefits** - Users can access **files & applications** from any connected device. - Easy to increase how much **storage is available** - No need to buy expensive hardware to **store data**. **Drawbacks** - Need a connection to the Internet to **access files or applications** - Dependent on **host** for security and back-ups. - Data stored on the cloud can be **vulnerable to hackers**.
35
# ***1.4 Network security*** Describe the following forms of attack; **Malware**, **Social engineering** & **Brute-force attacks**
**1. Malware** - Typical actions of malware include; **Deleting or modifying files**, **Locking files** to attempt ransomware, **Spyware** to monitor users actions, **Scareware** - it tells the user their computer is infected to scare them into folowing malicious links. - **3 Main types of Malware: Viruses** - attach by copying themselves to certain files, users spread them by coping infected files. **Worms** - Self-replicate on their own. **Torjan horse** - malware disguised as legitimate software. **2. Social engineering** - Social engineering is a way of gaining **sensitive information** or illegal access to neworks by **influencing people**. - Common type is **phishing** - criminals send emails to people claiming to be from a well-known business & ask them to update their personal information, which goes straight to the criminal **3. Brute-force attack** - A type of **active attack** used to gain information by cracking passwords through **trial and error**. Brute force attacks use automated softwares.
36
# ***1.4 Network security*** Describe the following forms of attack; **DoS**, **SQL Injections** & **Man-In-the-middle**
**1. DoS ( Denial-of-service )** - This is where a hacker tries to stop users from accessing a part of a **network or website**. Most **DoS** attacks involve flooding the **network** with useless traffic, making it **very slow**. **2. SQL Injections** - SQL injection are pieces of **SQL** typed into a website's input box which then reveal sensitive information. **3. Man-In-the-middle** - This Is When A **Malicious Hacker** Sets Up A Fake Wi-Fi That If Connected To Allows Them To **Eavesdrop On Communication** Between The User & The **Server**
37
# ***1.6 Ethical, legal, cultural & environmental impacts of tech*** Describe the 3 different **compuer legislations**
**1. Data Protection Act 2018** - This gives rights to people whose **personal data** is tored on computer systems. The Act has **6 princples**. Before collecting **personal data** an organisation must register with the gov.t, saying **what data they'll collect** & **how they'll use it**. - The Act gives data subjects the right to **see**, **amend** and **delete** the personal data an organisation holds about them - **Data must be;** used in a lawful & fair way, used for specified purposes, adequate & relevant, accurate and kept up to date. **2. Copyright, Designs and Patents Act 1988** - This was introduced to protect **intellectual property** - anything that someone has created. - The Act makes it illegal to share **copyrighted files** without the holder's permission, use unlicensed software or **plagiarise somebody** else's work. **3. Computer Misuse Act 1990** - This was introduced to stop hacking and cyber crime. It added 3 new offences: - **Gaining unauthorised access** to a private network or device. - **Gaining unauthorised access** to a network or device in order to commit a crime - Unauthorised **modification** of computer material.
38
# ***1.6 Ethical, legal, cultural & environmental impacts of tech*** Describe the benefits & drawbacks of **Open Source Software**
**Benefits:** - It is usually **free**. - Made for the **greater good**, not profit - it benefits everyone, encourages collaboration, sharing of ideas. - Software can be **adapted** by users to **fit their needs**. - Wide pool of collaborators can be more **creative** & **innovative** than the programmers of 1 company - Popular software is **very reliable and secure** - any problems are solved quickly by the community **Drawbacks:** - **Small** projects may not get regular updates... - ...and so could be **buggy** - ...or have unpatched **security holes**. - There may be limited **user documentation** - No **warranties** if something goes wrong. - No **customer support** ( community forumes often make up for this ) - **Competitors** get to see the source code.
39
# ***1.6 Ethical, legal, cultural & environmental impacts of tech*** Describe the benefits & drawbacks of **Proprietary Software**
**Benefits:** - Comes with **warranties**, **documentation** & **customer support**. - Should be **well-tested** & **reliable** as the company's repuation depends on this. **Fixes** & **updates** will come regularly ( Open source will vary more ) - Usually **cheaper** for companies than developing their own **custom-built** software **Drawbacks:** - Can be **expensive** - Software may not exactly fit a **user's needs**, and they can't do anything about it. - Software companies may not **maintain** older software after warranties expire - they'll want people to buy their **latest** product.
40
# ***1.3 Computer networks, connections & protocols*** What are some **Advantages;** **A)** Wired Networks **B)** Wireless Networks
**A) Wired Networks** **1. Advantages Include;** - Generally faster, offering higher data transfer speeds. - Lower latency, **( Important for airports that are always updating flight times )** - More reliable, less prone to interference. **( Important for airports due to the amount of people ).** **B) Wireless Networks** **1. Advantages Include;** - No need for physical cables. **( Good for public due to increased flexibility )** - Prevents hazards in congested areas **( Good for public due to airports being busy )**
41
# ***1.1 Systems architechure*** What is an Embedded System?
- Embedded systems are **computers built into other devices**. - As they're dedicated to a **single task**, embedded systems are usually **easier to design**, **cheaper to produce**, and **more efficient** at doing their task than a general purpose computer. - Embedded systems are often used as **control systems** - they monitor and control **machinery** in order to achieve a desired result.
42
What are some Advantages and Disadvantages of; **A)** Client-Server Network **B)** Peer-to-Peer
**A) Client-Server** **1. Advantages** - Easier to keep track of files as they are **stored centrally** - Easier to install and **update software** - Easier to manage **network security** - Servers are very reliable and are **always on**. **2. Disadvantages** - Expensive to set up and need **IT Specialists** to Maintain - **Server Dependance** - If the server goes down all clients lose access. - Server may become overloaded if too many clients are using it at once. **B) Peer-to-Peer** **1. Advantages** - **Easy to maintain** ~ You don't need any expensive hardware. - No dependence on server **2. Disadvantages** - **No centralised management**, Backups are also more complicated - Peer machines are less reliable and data may be lost if one fails. - Machines are prone to **slow down** when other devices access them.