Paper 2 Revision Document 2 Flashcards
Counting Numbers
Measure Numbers
Counting = Natural
Measure = Real
Advantages of Hexadecimal
- easier to code
- easier to read
- easier to spot errors
Bit
The fundamental unit of information
Units (Kibi)
Kibi (Ki) = 2^10
Mebi (Mi) = 2^20
Gibi (Gi) = 2^30
Tebi (Ti) = 2^40
Absolute Error
original - binary
Relative Error
absolute error / original
Percentage Error
Relative error %
Character Sets (2)
- a unique binary representation of a character
- globally recognised, uniform
Advantages of Parity Bits (3)
- little storage
- less to process
- easy to make
Disadvantages of Parity Bits (3)
- multiple errors
- doesn’t fix errors
- not very reliable
Majority Voting (2)
- bits can change due to interference
- each bit transmitted 3 times - most common taken
Majority Voting Advantages (4)
- multiple errors
- fixes errors
- easier to make
- very reliable
Majority Voting Disadvantages (2)
- more storage
- more to process
Check Sums (3)
- bytes of data lock added up
- result transmitted with data
- accepted if checksum = result
Check Digit (4)
- many different algorithms
- calculated from digits in the code
- added to the end, then compared
- purpose = spot human error on data entry
Analog
continuous stream of transmission
Digital
discrete, set of fixed values
Bitmap Graphics (2)
- pixels, colour code –> binary, stored in grid like pattern
- resolution = dots per inch
Bitmap Advantages (1)
- real life
Bitmap Disadvantages (3)
- big file size
- not scalable
- can’t edit easily
Vector Images (2)
- objects layered + properties recorded
- logos
Vector Images Advantages (4)
- better quality
- small file size
- edit easily
- scalable
Vector Images Disadvantages (1)
- can’t represent real life images
Sample rate
num samples taken per second
Sample resolution (bit depth)
num bits available for each sample
Nyquist Theorem
accurate reading = sample res. >/ 2 x highest frequency
MIDI (8)
- technical standard
- describes: a protocol, digital interface, standard set of connectors
- allows communication between computer + instruments to synthesise sound
- controller send + receive event messages:
- pitch, vibrato, note length
- all easily changed
- “List of Instructions”
- sounds pre recorded from real instruments
MDI Advantages (4)
- easy to modify
- score generated directly from file
- takes up much less storage
- easy to change instruments
Run Length Encoding (3)
- lossless compression
- doc searched for repeated patterns
- stores 1 instance + amount of times repeated
Dictionary Encoding (4)
- lossless compression
- doc searched word by word
- 1st instance of word stored with unique reference
- doc replaced with unique references
Caesar Cipher (1)
- shift right n places
Caesar Cipher Advantages (2)
- easy to code
- simplistic
Caesar Cipher Disadvantages (3)
- easy to hack
- 25 possibilities
- less secure
Vernam Cipher (4)
- Plaintext XOR key = cipher key
- Cipher key XOR key = plaintext
- key must be: same length as plaintext, random, used once, secure
- mathematically impossible to hack
Hardware
physical components of a computer
Software
code that carries out operations on hardware
Application Software (3)
- created for specific purpose for user to carry out a task
- e.g. spreadsheets, games, browsers
- bespoke = tailor made for 1 user
System Software (2)
- controls how computer works, tells it what to do
- e.g. OS, utilities, translators, libraries
OS - Purpose
controls + organises the general operation of computer
OS - Functions (7)
- managing the processor (alternate between simultaneous tasks)
- managing the memory
- handling external peripherals
- platform for networking
- security
- user interface
- utility programs
Defragmentation Software (2)
- over time files on hard drives become split up making retrieval slower
- helps consolidate parts back together
Assembly Language (1)
- mnemonics have a 1-1 relationship with machine code
Low Level Languages (2)
- each function maps directly to process in object code
- closer to the hardware
Imperative High-Level Languages (1)
use sequence, selection and iteration where instructions must be executed in order
D-Type Flip Flop (3)
- designed to store single bit of information
- 2 inputs: clock input, clock signal
- output only changes when clock pulse at rising edge
Computer Misuse Act (3)
Protects against
- unauthorised access
- with intent to commit crime
- with intent to modify or delete
Data Protection Act (8)
All data must be:
- Fairly and lawfully processed
- Processed for limited purposes
- Adequate, relevant and not excessive
- Accurate and up to date
- Not kept longer than necessary
- Processed in line with your rights
- Secure
- Not transferred to other countries without adequate protection
Acts (7)
- Computer Misuse Act
- Data Protection Act
- Freedom of Information Act
- Copyright, Designs and Patents Act
- Creative Commons Licensing
- The Regulation of Investigatory Powers Act
- Health and Safety
Main Memory (RAM) (4)
- primary storage - volatile
- used for quick and direct access
- data can only be manipulated if stored here
- OS, software application, info for CPU
Busses
Pass data around different parts of the computer
Address Bus
identify locations in memory
Data Bus
pass data/instructions around computer