IB Computer science Flashcards
Hardware
<ul><li>Physical parts of a computer</li><li>Includes both internal(RAM+motherboard) and external(keyboards+monitors etc.)</li><li>Internal-<span>components</span></li><li><span>External-</span><span>peripherals</span><br></br></li></ul>
Peripherals
<ul><li>External device providing input/output</li><li>Communicate with system via device drivers</li></ul>
Network
<ul><li>Multiple devices that can communicate and share resources with one another via a transmission medium</li><li>2 main networks-<span>LANs </span>and <span>WANs</span></li></ul>
<span>Software</span>
<ul><li>Computer programs or sets of instructions</li><li>Consists of lines of codes that have been compiled into a program</li></ul>
<span>Human resources</span>
<ul><li>Describes both people who work for a company/organisation+dept that manages resources for employees</li><li>Known as <span>end-users</span><span> and </span><span>stakeholders</span></li></ul>
Client(in networks)
<ul><li><span>Accesses services+resources provided by a server</span></li></ul>
Server
<ul><li>Provides data to other computers and fulfils a client's request</li><li>Software is specific to type of server,but hardware is not important</li></ul>
Client server model
<ul><li>Each client is connected to a single server</li><li>Clients request connections to the servers</li><li>Can be accepted/rejected</li></ul>
Client server model <span>+ves</span>
<ul><li>Centralised management of resources</li><li>Backups and network security controlled centrally</li></ul>
Client server model <span>-ves</span>
<ul><li>High set up and maintenance costs</li><li>Single point of failure</li></ul>
DNS server
<ul><li>Translates domain names into IP addresses, so they can be accessed by the user</li><li>Sends corresponding IP address of the needed web server back to the user's browser</li></ul>
Router
<ul><li>Routes data from a LAN to another network</li><li>Receives+forwards data packets</li><li>Determines most efficient path for packet</li></ul>
Firewall
<ul><li>Acts as a filter protecting a network from incoming and outgoing traffic</li><li>Monitors incoming+outgoing traffic,following set rules</li><li>Hardware/software</li></ul>
Social issue
<ul><li>Problem that influences a considerable number of individuals </li><li>Includes crime, health,education,media+propaganda etc.<br></br></li></ul>
Ethical issue
<ul><li>Problem or situation that needs person/organization to choose between options which are considered right/wrong</li><li>Examples include:</li></ul>
-Computer crime<br></br> -Privacy<br></br>
Social issues in networks
<ul><li>Cyberbullying</li><li>Less face-face interaction</li><li>Addiction</li><li>Hacking</li></ul>
Ethical issues in networks
<ul><li>Cybercrime</li><li>Identity theft</li><li>Data privacy</li><li>Malware attacks</li></ul>
Stakeholder
<ul><li>Person,group or organisation that has an interest/concern in an organisation</li></ul>
Ask yourself… when identifying stakeholders
<ul><li>Who will be affected by new system?</li><li>Who will new system affect?</li><li>Who will the end-users be?</li><li>What are their needs?</li></ul>
Methods of obtaining a client’s requirements
<ul><li>Surveys</li><li>Interviews</li><li>Direct observation</li><li>Collecting documents</li></ul>
Observation
<ul><li>Walk around organisation-watching how things are done</li></ul>
Observation <span>+ves</span>
<ul><li>Information gathered is first-hand + unbiased</li></ul>
Observation <span>-ves</span>
<ul><li><span>People may act differently than normal when being observed</span><br></br></li></ul>
Interviews
<ul><li>Interview key members within a system-find out how it works</li></ul>
- Lots of detailed info can be gathered
- Suggestions for improvements to the system can be heard
- Takes a long time
- People are given questionnaires to fill out
- Large amount of data from large group can be gathered
- Simple
- Little time needed to analyse(if done electronically)
- Bias possible-info is limited by survey qs
- Quality of responses may be poor/not useful
- Hard to ask the 'right question'
- Look at documents currently being used in the system-find how system works
- Detailed info about current system can be gathered
- Can be seen where old system has problems
- Time consuming
- Documents may be hard to understand(forms/outputs etc.)
- Examine current systems
- Look at competing products
- Literature search
- Organisational capabilities
- Who does what?
- How do they do that?
- Determine what organisation can manage+do
- Can they afford new equipment?
- Can the staff use new system(do they need training?)?
- Can they have any 'downtime' to upgrade?
- Observe competitors
- See what is being done/is possible
- Something unique that you physically create
- Consult literature to see other products
- System flow chart
- Data flow diagram
- Structure chart
- Represent algorithms,workflow or processes
- Used to show how processes should work+help figure out how to create a system
- Inform decisions that need to be made+ the necessary steps that must be taken
- Estimate development time frames
- Identify who should be involved at each step
- Identify bottlenecks+other problems








- Shows flow of data in an information system




- Represent organisation of a system,showing different parts in a hierachy
- Abstract representations of a system,only focusing on one/two aspects
- Important in testing-each component can be tested+idea of system can be illustrated to client
- Fail early and inexpensively
- Gather more accurate requirements-demonstrate functionality of product+help end-users decide what they want in the product
- Technically understand the problem-can see any possible challenges of the design
- File patent
- procedure in which repetition of a sequence of operations yields results successively closer to a desired result
- Helps you be sure on what needs to be improved
- Improvements in one iteration only possible due to improvements in last iteration
- New technology/techniques can be used
- User's needs can change
- Stability and reliability improves
- Software is not suitable for intended use-decrease user productivity
- User may be unsatisfied
- Unhappy customers-reduced user productivity
- Legal action could be taken against developers
- Decreased reputation
- Loss of market share/breakdown of company
- Harder to get feedback+help from users
- Understand own needs+situation far better
- Software developer has limited domain knowledge-can't appreciate end users' needs
- Robots replacing humans
- AI algorithms replacing humans
- New systems are addictive/less efficient
- New systems lead to new markets
- How simple and self-explanatory the use of a system is for inexperienced end-users
- How well the form fits the function
- Discipline concerned with optimising human well being and system performance through the application of theory,principles,data and methods
- Ability of the device to meet the needs of as many people as possible
- Difficult to handle hardware
- Complex user interface
- Specialist support needed to use device
- Short battery life
- Small screen size
- Limited storage/portability
- Small text
- Visual
- Auditory
- Mobility and dexterity
- Cognitive
- Touch screens
- Voice recognition
- Text-speech
- Braille keyboard
- What happens if they can't access system/only certain parts?
- Can't access output?
- Glitches+crashes
- Incompatibility-time formats,currencies
- Interface language problems
- Issue with potential to help or harm anyone
- Issue concerned with organisation of money,industry and trade etc.
- Problem concerned with protection of the natural world
- the background, environment, framework, setting or situation surrounding a system
- The extent of the new system
- The limitations of the new system
- Software/hardware incompatibility
- User roles / the organisation restructure their workflow
- Users may not like change
- New systems may omit old features
- Expensive
- Old systems may be faster in certain situations
- Data loss during migration
- Plan
- Communicate
- Integrate
- Evaluate
- Business must first need a clear and valid reason for the change process
- Communicating the change to the key stakeholders
- Consult the stakeholders before enacting the change process
- Examining the stakeholders' and end-users' response to the change
- An old method, technology, computer system or app that is no longer supported or available for purchase anymore
- More susceptible to security vulnerabilities and malware
- Increased maintenance costs-less hardware and software for the system, lack of IT staff with the skills for that specific system
- Integrating with other systems can be difficult
- Compliance risks-data protection and privacy laws etc.
- Inefficient operations-decreased productivity
- Software incompatibility
- Language differences
- Time zone differences
- Workforce cultural differences
- Where the software is installed on a particular computer or set of computers
- Software distribution model where a third-party provider hosts applications and makes them available to clients over the internet
- Minimises IT responsibilities and costs
- Useful for small businesses- subscription can be adjusted easily for their specific needs
- Reduction in staff workload-IT workers don't need to perform tasks associated with onsite hardware+software
- Companies using multiple SaaS applications or trying to connect them with on site software may experience some integration issues
- Relying on a third party to store your data and business processes
- Businesses must be mindful of compliance regulations regarding storing data in a remote data centre
- Direct changeover
- Parallel running
- Pilot running
- Phased conversion
- Old system is stopped and new one is started
- Minimal time and effort
- New system is available immediately
- No backup if new system fails
- New system is initialised but old system is kept running alongside it
- Backup if new system fails
- Outputs from both can be compared-ensure new one is functioning properly
- Expensive to run 2 systems
- New system is tested using a small part of the organisation
- Once it is running properly and all bugs have been fixed, it is implemented everywhere
- All features are fully tested-any bugs can be found
- If the new system fails only a small part of the organisation suffers
- Staff part of the pilot can train others
- No backup for subset of the organisation in the pilot group if new system fails
- New system is introduced in phases
- People can get used to new system
- Staff training can be split into stages
- No backup for new system
- Incompatible file formats
- Data structure differences
- Validation rules
- Incomplete data transfers
- International conventions on dates, currencies & character sets
- Same piece of software may have different versions-data from one version may not be compatible with another
- Data being moved from an array to a linked list etc. can cause problems
- Rules applied to inputs
- If different at destination than at source-data can be rejected and lost
- Only part of data will be at destination-data loss
- In the UK, 3/5/18 means 3 May 2018, but it means 5 March in the USA
- The $ might mean US dollars, but could be taken to mean Zimbabwe dollars which use the same symbol but is worth significantly less.
- A set of character used in one country, e.g. ﷼ in Saudi-Arabia, might be copied as ?? on Russian computer.
- System that doesn't work as expected-reduces productivity and end-user satisfaction
- Software may not be appropiate for intended purpose
- Undiscovered bugs in system
- Decrease in organisation's reliability and reputation
- Involves verification
- Can include reviews, walkthroughs or inspections
- No execution of code
- Involves validation
- Program is executed
- Can be done to test specific parts of the code
- Performed by internal employees of the organisation
- Done on the developer's site
- Performed by clients/end-users not part of the organisation
- Done at client location
- Testing software without knowing its internals
- Uses software interfaces
- Looks inside the software
- Uses that knowledge to help with the testing process
- Testing any new/updated system with its end users
- Checks if it meets their expectations
- Method in software testing using machines to automatically execute tests and compare the results with the expected ones
- Usually done on large amounts of code
- Any document that explains how to use the features and functions of a system to its end-users
- Makes users aware of particular features that may not be obvious
- If the documentation is simple-less training needed for users so system implementation is faster
- Help files
- Online support
- Printed manuals
- Files supplied together with the system
- Accessible any time when using program
- Provide general instructions on how to use system
- General instructions on solving common errors
- Only can be used after system installation
- Only deal with general errors
- Lack a search capability-have to look through the file for your specific solution
- Web service hosted by the system's developer to provide user documentation
- More extensive than help files
- Constantly updated by developers with FAQs
- Often have live support-can talk to a real human operator
- Search capabilities
- Reliant on internet connection
- Live support can be ineffective with users unfamiliar with computers
- Manuals printed on paper and supplied with the system
- Always available
- Help with system installation
- Can be read by users before they work with the system
- Can be lost/destroyed
- Usually only provides help on system installation
- Rarely updated
- Productivity is dependent on familiarity with the system
- Self-instruction
- Formal classes
- Remote training
- Users learn how to use the system on their own
- Usually use a manual or watch a tutorial etc.
- Lowest cost
- Flexible timeline
- Training is specific to exactly what the user wants to learn
- Certain key features may be missed-learning is unstructured
- User may feel overwhelmed without guidance
- Users sit in a classroom listening to an instructor
- Structured learning environment
- Expert on hand to answer questions
- Curriculum covers all aspects
- Expensive
- Rigid schedule+curriculum
- Hardly any personalisation
- Instructor training a user or a group of users via a form of remote connection
- Structured learning environment
- Expert on hand for questions
- Curriculum covers all aspects
- Flexible locations
- Expensive
- Computer based-need basic knowledge to be able to join the meetings etc.
- Hardware/system malfunctions
- Human error
- Software corruption
- Malware
- Natural disasters
- Malicious activity of employees or intruders
- Can the data be replaced?
- How easy is the data to replace?
- Who will be affected by the data loss?
- Are there financial implications to the data loss?
- Are there ‘life-and-death’ consequences to the loss?
- Who is responsible for data recovery?
- Failover system
- Redundancy
- Removable media
- Offsite/online storage
- Failover-constant capability to automatically and effortlessly switch to a backup system
- Condition in a database or another data storage technology where data is stored in 2 separate places at once
- Use of any storage device that can be removed from a computer while the system is still running
- Where data or applications are stored in a facility offsite to the organisation or core IT environment
- Where cloud storage is used to store data from backups
- Cloud resources and infrastructure can be used to create, edit, manage and restore data along with perform backups
- Process of launching a new product for a specific market or user base
- Software file that contains fixes for problems found by users or developers
- Almost always free
- Software update where code is inserted into the code of the program
- May:
- Manually
- Automatically
- Full control
- Time consuming
- No need to worry about updates
- No control
- Continuous delivery
- Agile software development
- DevOps
- Teams produce software in short cycles
- Allows more incremental updates to the application
- Requirements of the software evolve through collaboration between end users and cross functional teams within the organisation
- Done in iterations (sprints)
- Aims to unify software development and operation
- Utilises lots of automation
- Monitors each step of the software construction
- Group of computer systems and nodes linked together via transmission media to allow for communication and resource sharing
- Local Area Network
- Uses MAC addresses and switches
- Private infrastructure
- Usually almost always use Ethernet protocol
- Wide Area Network
- IP addresses and routers
- Public infrastructure
- Collection of other networks
- Virtual Local Area Network
- Group of nodes that appear to be on the same LAN despite not being geographically in the same area
- Software implemented
- Able to quickly adapt to changes in the network requirements
- Storage Area Network
- Secure high speed data transfer network
- Allows access to a centralised storage system
- Allows multiple servers to access a network of storage devices
- Wireless Local Area Network
- Network that uses radio-waves and usually an access point to the internet
- Allows the users to have mobility
- Uses TCP/IP protocols for data transmission
- network of networks
- Global communication system
- Both hardware and infrastructure
- Private LAN that cannot be accessed remotely(only can be accessed via VPN or on the organisation's premises)
- Intranet that can only be accessed remotely via authentication
- Utilised to allow 3rd parties to gain information without granting access to the entire network
- Virtual Private Network
- Uses the internet
- Allows people to access a network remotely but encrypts the connection
- Data is transmitted through a secure pathway known as a tunnel-tunnelling
- Personal Area Network
- A network covering a very small area
- Bluetooth etc.
- Peer to Peer network
- Network model where nodes are connected directly to one another
- Directly exchange files and resources etc.
- Rules followed by manufacturers of network hardware to ensure interoperability between devices
- Allows devices to be compatible and communicate with each other
- Helps ensure data transmission is secure-minimum latency and good integrity of data
- Allows manufacturers to have a framework on which to build their system
- OSI Network layer-7 layers
- TCP/IP Network layer-4 layers
- New protocols can be added to each layer easily
- Change to one layer doesn't affect functionality of another layer
- Similar protocols can be grouped into layers with a specific function in data transmission
- 7 -Application
- 6-Presentation
- 5-Session
- 4-Transport
- 3-Network
- 2-Data link
- 1-Physical
- Application
- Transport
- Network
- Link
- Collects data to be transmitted
- Breaks up data into packets
- Adds packet sequence number
- Adds checksum
- Adds IP addresses of the sender and receiver node
- Adds MAC addresses of sender+receiver node
- Physically transmits data as bits

- Encryption
- Tunnelling
- Converting plaintext to ciphertext via a private key
- Need a decryption key to understand the data
- Computers at each end of the tunnel encrypt incoming data and decrypt it at the other end
- Tunnel-secure pathway through the public network
- On this connection packets are constructed via the specific VPN protocol format and sent privately over public networks via encapsulation
- Client VPN software
- VPN infrastructure
- VPN server
- Need to use specific VPN-routers and firewalls which allow legitimate VPN traffic to pass through
- Handles and manages incoming VPN traffic
- Establishes and manages VPN sessions and their access to network resources
- Improved productivity
- Reduced costs for businesses and employees
- Flexibility for the employees
- No need to commute to work
- Less environmental impact
- Social isolation
- Lack of expertise or support on certain issues
- Need specific hardware and a network connection etc.
- May be more distractions in a home environment
- Allow for telecommuting
- Improves data security-encryption and tunnelling
- Bypass geo restricted content via masking IP addresses
- Reliability of VPN is controlled by ISP
- Not all VPNs are compatible with products
- May lead to increased latency on the user's connection if the nearest VPN server is very far
- Set of rules for data communication over a network
- Small unit of data that is used in network communication
- Header
- Payload
- Trailer
- IP address of sender and receiver
- MAC address of sender and receiver
- Sequence number
- Actual data block
- Check Sum
- Parity Bit
- Maintain data integrity
- Manage flow control
- Prevent deadlock
- Manage congestion
- Error checking
- The overall completeness,accuracy and consistency of the data
- Mechanism which ensures the rate at which data is being transmitted is in proportion with the receiver's receiving capabilities
- Ensures receiving node is not overwhelmed with data
- Congestion-where a node or link carries so much data network service quality deteriorates
- This leads to queuing delay,frame or data packet loss and new connections unable to be made
- Techniques used to detect noise or other impairments introduced to data during transmission
- Utilises parity bits and checksums
- Where 2 nodes/processes are trying to access the same node at once-neither is able to proceed
- Relevant protocol needs to stop and re-queue them
- Traffic
- Number of users
- Time of day
- Distance
- Infrastructure
- Type of cabling
- Environmental issues(temperature etc.)
- Infrastructure limitations due to financial reasons
- Type of data being transmitted
- Encoding data to use fewer bits than the original version

- Backups/archiving
- File transfer
- Media file transfer over the web
- Encryption/protection
- Compressed data is smaller in size than original file-saves storage space
- Fewer bits transferred per second-faster transmission rates
- Lower bandwidth needed for uploads and downloads
- Compressing files scrambles their data adding an extra layer of protection against any hackers etc
- Reduces amount of data needing to be encrypted
- Security
- Reliability
- Cost
- Speed
- Security-moderate if encrypted
- Susceptible to EMI
- Relatively cheap
- Relatively fast(faster than radiowaves)
- Security-very secure
- Generally quite fragile(glass)
- Very expensive
- Fastest transmission media
- Security-insecure unless encryption is used
- Susceptible to interference
- Technically free
- Quite slow speeds
- Routing data packets through a network depending on the destination address contained in each packet
- Data is broken up into packets
- Routed from source to destination using switches and routers
- The most efficient routes for the packets are found via the MAC and IP addresses in the header
- Reassembled at destination using sequence number
- Checked for errors using checksum
- If any packets are missing data is retransmitted
- Radiowaves are technically free
- No need for cabling
- Global standards
- Minimal set up costs
- Allows for user mobility
- Interference
- Limited range
- WAPs can be used to steal data
- Transfer speeds are slower than wired networks
- Each WAP only has a finite amount of bandwidth
- Nodes
- Wireless NIC
- Radio waves
- Connection point(WAP etc)
- Network Operating System (with drivers)
- Protocol stack
- Applications
- WiFi
- Wimax
- 3G
- LTE
- Also known as WLAN
- Most commonly used for home networks
- Backwards compatible with most older Wi-Fi standards
- Relatively slow to quick data transmission
- Worldwide Interoperability for Microwave Access
- Large distance internet connections
- Relatively cheap
- Primary way mobile phones access the internet today
- Allows tunnelling of phone lines
- Relatively fast
- Confidentiality
- Integrity
- Availability
- Users
- 'Arms race'-constantly evolving malware etc.
- Systems may have a weak point which can cause it to collapse
- Something you know-password etc.
- Something you have
- OTP etc.
- Something you are
- Biometrics etc.
- Hardware or software or combo of both
- Analyses data packets based on predetermined rules
- Acts as a filter monitoring incoming and outgoing network traffic
- Hard-coded into devices by manufacturers
- Can be used to identify specific pieces of hardware
- Routers can keep track of allowed and banned MAC addresses
- Locks on doors
- Security personnel
- Reinforced rooms
- Barbed wire fences
- Using algorithms to convert plaintext into ciphertext, so that it cannot be understood by any hackers
- 3 main standards-WEP,WPA,WPA2
- Wireless Equivalent Privacy
- Very quickly broken and replaced by WPA
- WPA-intrusions could still occur from outside the network
- WPA2-intrusion can only occur by those who have accessed the network previously
- Access rights can be set for each user
- User groups can be created-manage access rights in batches
- userIDs can be stolen
- System can be bypassed
- No protection against interception
- Strong encryption is very difficult to break
- Maintains confidentiality of data
- Data is encrypted so even if transmission media is insecure, data is still secure
- Hard to encode-need specialists
- Computationally expensive
- Some encryption methods may have built in backdoors
- Another layer of security
- Danger of whitelist being discovered, so MAC addresses can then be spoofed
- Difficult to manage whitelist
- Doesn't help against data interception
- Effectively prevents unauthorised access to a network
- May slow the network
- Issues with censorship on a software firewall
- Memory which stores currently running programs and data being used.
- Part of secondary storage needs to be used as virtual memory (much slower than RAM)
- Less processes can be executed simultaneously
- If virtual memory is not available, programs or data won't load
- Permanent storage of data and programs including vital programs such as OS
- Non-volatile
- May not be enough space to permanently store programs and data-data loss occurs
- Not enough space available to use virtual memory
- Less data can be stored on the system in general
- Processor performs all calculations and instructions in a system
- Speed - measurement of how many instructions executed per second
- Processor takes longer to perform tasks
- Each processor has at least one core (ALU) which performs arithmetic and logic operations
- Without multiple cores, tasks cannot be executed simultaneously
- More cores=more tasks executed simultaneously
- Measurement of the number of pixels in the height x width of a display
- Number of pixels displayed is lower-pixelated display
- Poorer quality images but also smaller file size
- Helps the system with sound reproduction and processing-frees up CPU
- Also may contain bank of sampled sounds-helps to produce better quality audio
- CPU has to help with processing sounds-reduces system performance
- Overall quality of audio is not as high without use of sound processor
- Complex graphics processing-3D rendering etc.
- CPU is less efficient at graphics processing-lower quality or slower
- Stores instructions and data most likely to be requested next by the CPU from the RAM
- CPU doesn't need to wait for instruction or data to arrive all the way from RAM
- CPU will have to wait longer for instructions/data to be fetched from RAM, decreasing performance
- Less cache hits
- Slower processing of common tasks on the system
- Measurement of the amount of data able to be sent at the same time in a certain time frame
- Lower data transmission speeds from one point to another-slower network performance
- Takes longer to process data in its entirety
- The type of network connection being used within a network
- Reduced data transmission speeds, and higher latency
- Possibly more interference and transmission errors depending on the type of connection
- Lower download and upload speeds
- Contains thousands of cores
- Vast amounts of primary and secondary memory
- Virtualise smaller computers
- Weather/financial models and predictions
- Many high spec PCs running in parallel
- Vast amounts of primary memory (less than mainframes, more than PCs) along with secondary memory
- Serve networks
- Data centres for cloud storage
- Online data backups
- Single processor, but multiple cores
- Quite a lot of primary ( less than servers) and secondary memory (much less than servers)
- Upgradeable
- Companies and schools with no need for portability
- Gaming
- Single or low multi-core
- Limited RAM
- Quite little secondary storage,usually a SSD
- Personal computing devices
- Single or multi-core
- Moderate RAM
- Quite limited secondary storage
- Constrained by screen size along with input options
- Personal computing devices
- Single or multi-core
- Not much RAM
- Moderate secondary storage(less than PC)
- Very portable
- Media consumption
- Personal computing device
- Single core
- Very limited RAM and secondary storage
- Not used that much anymore
- Calendars/emails
- Delivery drivers
- Single core
- Limited secondary and primary memory,however secondary storage is expandable
- Higher end photography
- Primary memory
- Secondary storage
- CPU speed
- CPU cores
- Connectivity
If the processor has only one core?
If the amount of primary memory is limited?
If the amount of cache is limited?
If network connectivity is limited?
If user access is limited to a single user per device?
- Many users on the same machine or many users connected to the same network
- System that can have different programs installed
- Can only run one program/set of programs
- Device configuration
- File management
- Memory management
- Interface platform
- OS uses device drivers (software program that acts as a translator) to allow the system to communicate with peripherals
- OS ensures each process runs in its own allocated memory space
- Therefore OS allocates and deallocates memory
- Prevents overwriting
- Ensures a program has sufficient memory to run
- Virtual memory is part of the secondary storage that is used as RAM when RAM is full
- Virtual memory is transferred in the form of pages
- Data from RAM is temporarily transferred to secondary storage
- Provides structure and access methods for the storage
- Known as folder-structure
- OS manages security access of these folders and files also
- User gives commands to computer and enters data
- OS translates I/O and sends it to correct memory or folder address to be processed
- Provides link between user and computer hardware
- Multi-user system-time slice is set amount of processing time each user gets
- Single user system-time slice is set amount of processing time each program gets
- Allocating a fixed period of time to each process for which they are allowed to run
- CPU time is allocated dependent on time and priority
- Function of the OS which is executed when an interrupt is detected
- Interrupt-signal to processor emitted by hardware/software indicated an event needs immediate attention
- Utilises authentication and access rights
- In multi user systems OS also isolates each users tasks, data and programs along with controlling access rights to specific parts of memory and secondary storage
- Multi-core systems
- Utilises prioritising where highest priority tasks are executed until a higher priority task appears
- Scheduler sorts tasks into order of priority
- Scheduling
- Policies and mechanisms
- Multitasking
- Virtual memory
- Interrupt
- Polling
- Action of deciding which processes can occur when and for how long
- Allocating CPU time amongst running programs and tasks
- Policies-what is to be done
- Mechanism-how it is to be done
- Policies are rules followed by the system in order for it to run as effectively and safely as possible
- The OS allows more than one program or task to be executed simultaneously on a system
- OS keeps track of the progress of each of these tasks and allows you to move from one to another without any loss of information
- Feature of the OS where secondary storage is used as an extension to RAM
- Involves transferring pages from RAM to VM when you are running many programs or large ones
- OS is constantly swapping data between the 2 locations
- OS will transfer back pages they need from VM and then send other pages to the VM so there is space for these needed pages
- Memory manager determines this by sending the least-used page usually to VM
- Signal emitted by hardware or software indicating an event needs immediate attention
- OS responds first suspending its current activities,saving these tasks then execute an interrupt handler
- After interrupt handler is finished the system resumes its previous activities
- Process of where OS regularly checks another device or peripheral in order to see its status(ready or not)
- Often done with low-level hardware
- OS designed for a specific device or purpose
- Higher level of security-developers can restrict possible entry methods for malware etc.
- Can be customised for maximum speed and efficiency for whatever specific device or purpose it is being used for
- Since you know the purpose and hardware for the OS, developers can eliminate elements of a typical OS which may not be needed in this scenario(less resource usage)
- In general, it is omitting the unnecessary and complex info in a system
- In OSs certain hardware details may be hidden and higher-level functions may be provided
- Single A-Z letter assigned to a physical drive or drive partition in a system
- Example of abstraction
- OS handles paging in the optimal manner to maximise performance, we can just alter settings of virtual memory
- Interprets compiled Java binary code for a computer's processor
- Each platform has its own JVM
- Device/set of devices that manages,commands or regulates the behaviour of other devices or systems
- Open-loop control systems
- Closed-loop control systems
- Non-feedback system(output has no impact on control action of input)
- No self correction of errors
- Toaster
- Electric hand dryer
- Automatic washing machine
- Utilises feedback-output can influence control action of input
- Output is measured to be compared with input
- Self correction can then occur based on the output
- Air conditioner
- Centralised heating system
2.Analogue data converted to digital using ADC
3.Digital data is processed by the microprocessor and digital output generated
4.Digital data converted to analogue using DAC
5.Output executed using actuators


- Computer system that contains all the functions of a CPU
- A device that converts a physical stimulus into a readable output
- Part of a device or machine that helps it with physical movement
- Converts energy into mechanical force
- Adapted keyboard
- Bigger keys
- Ergonomic(help with Carpal Tunnel Syndrome)
- Adapted mouse,trackball and joystick
- Ergonomic mouse
- Xbox Adaptive Controller(large buttons+is affordable)
- USB mouse with a large trackball
- Screen readers
- Screen magnification software
- Alternative input devices
- Motion/eye tracking
- Head pointers
- Speech input software
- Airflow sensor
- Body temp sensor
- Accelerometer
- Electrocardiogram sensor
- A device which converts signals from analogue to digital and vice versa
- Compatible with microprocessors and computers
- Ease of convertibility between analogue and digital
- Remote controllability
- Modification or control of a process or system by its results or effects
- Missile tracking moving target
- A heating system in a house
- Auto-pilot
- A computer system within another mechanical or electrical device with a specific purpose
- Allows non-dangerous criminals to move
- Reduces number of people needed to be in prison
- Allows for tracking at all times
- Could be hacked to track innocent people
- Tracking data could be sold to make money
- Loss of freedom of movement
- Monitoring/observation from a distance using electrical equipment
- Greater security
- Can be used as evidence in court cases
- Fewer people need to monitor others-physical security replaced by cameras etc.
- Loss of privacy
- Could be hacked and used for malicious purposes
- Utilised to spy on people
- Video surveillance technique
- Works independently to monitor a certain area
- Reduces crime-deterrent
- Cost effective solution to criminal damage
- People may feel safer
- Doesn't stop crime
- Expensive to install and maintain
- May be used for illegal spying
- Control system where all processing occurs at a single, central location such as a microprocessor
- Microprocessor controls numerous terminals (sensors/actuators)
- Control system where multiple decentralised microprocessors control multiple sensors and actuators
- These terminals all communicate with one another via a network
- Easier to maintain-everything is managed centrally
- More control
- Cheaper-just need one microprocessor
- Quicker access
- Sharing of tasks and resources
- No single point of failure
- Response will be more specific to environment
- Single point of failure
- Slower processing-single processor has to manage all terminals and respond to all sensors etc
- Actuators will be less responsive to their environments
- Much more expensive-multiple microprocessors and sensors
- Much more complex-harder to maintain
- Harder to fix any potential errors
- Software entity that carries out a set of operations on behalf of a user or another program with some degree of independence
- A-autonomy
- B-reactive behaviour
- C-concurrency/sociality
- D-persistence
- Self activation-agents don't need to be triggered to perform a task
- No human intervention-agents can select task themselves without human intervention
- Agent senses environment it is in (use of sensors) and decides what to do
- Agents able to interact with other agents through communication in various modes
- Include coordination,cooperation and competition
- Code describing an agent runs continuously like a process
- Not executed on demand