Binary and Hexadecimal

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following statements accurately describes the relationship between binary, hexadecimal, and decimal number systems in data representation?

  • Hexadecimal is used to shorten binary, where one hexadecimal digit represents four binary digits. (correct)
  • Binary is used to shorten hexadecimal, where one digit represents four hexadecimal digits
  • Decimal is used to shorten hexadecimal and uses digits from 0 and 1.
  • Hexadecimal is used to lengthen binary and uses digits from 0-20

In binary arithmetic, performing a right shift operation always results in doubling the original number.

False (B)

Explain how increasing the sampling rate and sample resolution affects the quality and file size of a digital audio file.

Both the quality and file size are increased.

In the context of character encoding, __________ is a character set that utilizes variable-length character codes to support a wide range of characters, including those from various languages.

<p>Unicode</p> Signup and view all the answers

Match the data storage units with their corresponding sizes relative to a byte:

<p>Kilobyte (KB) = 1,000 bytes Megabyte (MB) = 1,000,000 bytes Gigabyte (GB) = 1,000,000,000 bytes Terabyte (TB) = 1,000,000,000,000 bytes</p> Signup and view all the answers

Given a bitmap image with a resolution of 1920x1080 pixels and a color depth of 24 bits per pixel, calculate the file size of the uncompressed image in bytes. (closest answer)

<p>5,971,968 bytes (A)</p> Signup and view all the answers

Which of the following is a primary reason for using data compression techniques?

<p>To reduce storage space and shorten upload/download times. (D)</p> Signup and view all the answers

The 'place value table' method can be utilized to convert only between binary and decimal numbers, but not hexadecimal numbers.

<p>False (B)</p> Signup and view all the answers

Which network topology presents the greatest risk of network disruption if the central device fails?

<p>Star (C)</p> Signup and view all the answers

The Internet Layer is primarily responsible for ensuring reliable data transfer between applications, including error handling and congestion control.

<p>False (B)</p> Signup and view all the answers

Explain how unpatched software can be a cybersecurity risk and provide a specific example of a potential exploit.

<p>Unpatched software contains vulnerabilities that attackers can exploit to install malware, gain unauthorized access, or disrupt services. An example is an outdated web browser with a known vulnerability that allows an attacker to inject malicious code via a compromised website.</p> Signup and view all the answers

A __________ attack involves creating an appealing scenario to trick users into revealing information or falling for a scam.

<p>baiting</p> Signup and view all the answers

Match each cybersecurity measure with its primary function:

<p>Penetration testing = Simulates real-world attacks to identify security weaknesses. Firewall = Acts as a digital filter to block malicious network traffic. Biometrics = Uses unique physical characteristics for user authentication. Encryption = Scrambles data to make it unreadable without the correct key.</p> Signup and view all the answers

Which SQL query command is used to modify existing records in a database table?

<p>UPDATE (A)</p> Signup and view all the answers

Ethical issues in computing exclusively revolve around privacy concerns and data protection regulations.

<p>False (B)</p> Signup and view all the answers

Describe the key differences between white box and black box penetration testing approaches.

<p>White box penetration testing involves the testing team having prior knowledge of the system's architecture and security measures, whereas black box penetration testing involves no prior knowledge, simulating an outsider's attack.</p> Signup and view all the answers

__________ is a type of malware that hides within legitimate software and executes malicious actions once installed.

<p>Trojan</p> Signup and view all the answers

Which type of social engineering attack involves observing someone entering sensitive information, such as passwords, over their shoulder?

<p>Shoulder surfing (A)</p> Signup and view all the answers

A primary key in a database table is used to link tables together and establish relationships between them.

<p>False (B)</p> Signup and view all the answers

Explain how a pharming attack works and why it is considered a significant cyber threat.

<p>Pharming redirects website traffic to a counterfeit site, often by compromising DNS servers. This is a severe threat because users are often unaware they are being redirected, making it difficult to detect and leading to potential data theft.</p> Signup and view all the answers

__________ is a method of controlling access to a network based on the unique hardware address of a device.

<p>MAC address filtering</p> Signup and view all the answers

Which layer of the network protocol stack is responsible for handling interactions between applications, such as web browsing and email?

<p>Application Layer (C)</p> Signup and view all the answers

Fiber optic cables are primarily used for short-distance data transmission in local area networks (LANs) due to their limited bandwidth capacity.

<p>False (B)</p> Signup and view all the answers

Which of the following scenarios would benefit MOST from lossless compression over lossy compression?

<p>Archiving important legal documents where any data loss is unacceptable. (C)</p> Signup and view all the answers

Huffman coding assigns longer character codes to frequently used characters in a text to optimize storage space.

<p>False (B)</p> Signup and view all the answers

If a character 'A' appears 10 times consecutively in a data stream, how would run-length encoding represent this sequence?

<p>10A</p> Signup and view all the answers

An _______ gate is true only when one of its inputs is true, and the other is false.

<p>XOR</p> Signup and view all the answers

Match each type of software with its primary function:

<p>System Software = Supports running the computer and processing tasks needed for system functionality. Application Software = Designed for users and performs useful tasks, such as word processing or image editing. Utility Software = Focused on computer management, such as antivirus or compression.</p> Signup and view all the answers

Which characteristic distinguishes high-level programming languages from low-level languages?

<p>Greater human readability and portability across different systems. (C)</p> Signup and view all the answers

Interpreters translate the entire code at once, creating an executable file for later use.

<p>False (B)</p> Signup and view all the answers

Name the component of the CPU responsible for performing mathematical calculations.

<p>ALU</p> Signup and view all the answers

In the Von Neumann architecture, the _______ generates a consistent electrical signal to synchronize the operations of the CPU components.

<p>clock</p> Signup and view all the answers

How does increasing the cache size typically affect CPU performance?

<p>It allows more frequently used data to be stored closer to the CPU, reducing access times and improving performance. (C)</p> Signup and view all the answers

Embedded systems generally have broad functionality and are designed for general-purpose computing tasks.

<p>False (B)</p> Signup and view all the answers

What type of memory loses its data when the power is turned off?

<p>RAM</p> Signup and view all the answers

Unlike HDDs, _______ store data electronically and have no moving parts.

<p>SSDs</p> Signup and view all the answers

Which of these storage solutions offers versatile access to files from any location, scalability, but relies on the security of the provider?

<p>Cloud storage (A)</p> Signup and view all the answers

Match the following networks with their typical coverage area:

<p>PAN (Personal Area Network) = Network used by a single person to connect devices like wireless headphones. LAN (Local Area Network) = Covers a small geographical area, like a single building, and is typically owned and operated by a single organization.</p> Signup and view all the answers

Flashcards

Binary Number System

The simplest numbering system, consisting of 0s and 1s.

Bit

A binary unit, which can be either 0 or 1.

Byte

A collection of 8 bits.

Hexadecimal

A base-16 numbering system using 0-9 and A-F.

Signup and view all the flashcards

Character Set

A system that assigns a binary representation to each character.

Signup and view all the flashcards

Bitmap

An image made up of pixels.

Signup and view all the flashcards

Sampling Rate

Number of sound samples taken per second, measured in Hertz (Hz).

Signup and view all the flashcards

File Compression

The process of reducing file size to save space.

Signup and view all the flashcards

WAN

A Wide Area Network spans large geographic areas and connects multiple locations.

Signup and view all the flashcards

Network Topology

The physical arrangement of devices in a network.

Signup and view all the flashcards

Star Topology

A network topology where each device is connected to a central device.

Signup and view all the flashcards

Bus Topology

A topology where all devices share a single communication line.

Signup and view all the flashcards

Network Protocols

Sets of rules for communication between devices from different vendors.

Signup and view all the flashcards

Application Layer

The top layer that handles interactions between software applications.

Signup and view all the flashcards

Transport Layer

Provides reliable data transfer and error handling between applications.

Signup and view all the flashcards

Pharming

A cyber attack redirecting users to a counterfeit website.

Signup and view all the flashcards

Social Engineering

Manipulative tactics that trick users into revealing information.

Signup and view all the flashcards

Malware

Malicious software designed to harm or steal information.

Signup and view all the flashcards

Penetration Testing

Testing systems by simulating attacks to find vulnerabilities.

Signup and view all the flashcards

SQL

Structured Query Language for managing and manipulating databases.

Signup and view all the flashcards

Primary Key

A unique identifier for each record in a database table.

Signup and view all the flashcards

Encryption

Scrambling data to protect information from unauthorized access.

Signup and view all the flashcards

Baiting

A social engineering attack using enticing offers to trick victims.

Signup and view all the flashcards

Lossy Compression

A technique that permanently removes data, often used for images and sound.

Signup and view all the flashcards

Lossless Compression

A method that rearranges data without losing any information, suitable for documents.

Signup and view all the flashcards

Huffman Coding

A lossless compression technique that assigns shorter codes to frequently used characters.

Signup and view all the flashcards

Run-Length Encoding

Compression method that stores data as frequency and value pairs.

Signup and view all the flashcards

Boolean Operators

Logic operations that manipulate true and false values.

Signup and view all the flashcards

System Software

Software designed to perform useful tasks for users, like document editing.

Signup and view all the flashcards

CPU

Central Processing Unit; executes program instructions and manages operations.

Signup and view all the flashcards

Clock Speed

The rate at which a CPU executes instructions, measured in GHz.

Signup and view all the flashcards

ROM

Read Only Memory; non-volatile memory that retains data without power.

Signup and view all the flashcards

Hard Disk Drive (HDD)

A storage device using magnetism on spinning disks to store data.

Signup and view all the flashcards

Solid-State Drive (SSD)

A faster storage device that uses no moving parts and stores data electronically.

Signup and view all the flashcards

Optical Storage

Storage using lasers to read/write data on discs like DVDs.

Signup and view all the flashcards

Cloud Storage

Storing data offsite and accessing it via the internet.

Signup and view all the flashcards

Local Area Network (LAN)

A network covering a small area, typically for one organization.

Signup and view all the flashcards

Study Notes

Data Representation

  • All data instructions in a computer are represented in binary
  • Binary is the simplest numbering system
  • It's represented by switches
  • A bit is a binary unit, which can be either 0 or 1
  • A byte is 8 bits
  • Kilobytes, megabytes, gigabytes, and terabytes are all 1000 times larger than the previous unit
  • Always show your working when converting between units
  • The place value table is a simple method for converting between binary, hex and decimal
  • The one's column is always on the right-hand side in the place value table
  • Hexadecimal digits 0 to 9 are the same as decimal digits
  • Letters are used to represent hexadecimal values between 10 and 15
  • A in hexadecimal is 10 in decimal
  • F in hexadecimal is 15 in decimal

Binary & Hexadecimal

  • The purpose of hexadecimal is to shorten binary.
  • One hexadecimal digit equals four binary digits.
  • Perform binary addition like normal math, adding in columns.
  • If the sum of a column is greater than 1, carry the remainder over to the next column
  • A left shift in binary doubles a number by adding a 0 to the right side.
  • A right shift in binary halves a number by removing the right digit and rounds down.

Character Sets

  • Character sets provide a list with a binary representation for each character.
  • ASCII is a character set that uses 7 bits for each character, allowing for 128 characters.
  • Unicode is a character set with longer character codes, allowing representation of thousands of characters and multiple languages.
  • For both ASCII and Unicode, character codes are sequential.

Bitmaps

  • A bitmap image is made up of pixels (smallest dot of color)
  • Image resolution is width x height
  • Color depth is the number of bits per pixel, not the number of colors.
  • File size = Image size x Color depth

Digital Sound

  • Computers use digital sound in contrast to analog sound because analog sound is continuous and smooth.
  • The sampling process takes measurements of the amplitude of a wave at regular intervals.
  • Sampling rate is the number of sample measurements per second, measured in Hertz (Hz).
  • Sample resolution is the color depth for sound which is the number of bits per sample.
  • Increasing sampling rate, sample resolution, or sound duration increases quality, but also file size.
  • File size (sound) = Sample rate x Sample resolution x Duration

Compression

  • The goal of compression is to reduce file size.
  • Compression is used for reducing storage space, shortening upload/download times.
  • Lossy compression permanently removes data from the file, suitable for images and sound where quality loss is tolerable.
  • Lossless compression rearranges file data to store it more efficiently, suitable for documents, programs where no data can be lost.

Huffman Coding

  • Huffman coding is an example of lossless compression.
  • Huffman coding gives frequently used characters the shortest character codes, unlike ASCII which uses equal length codes for every character.
  • Each Huffman tree is unique to the specific text it was created for.
  • To interpret a Huffman tree, start at the top, where numbers represent frequencies, and characters are at the bottom.
  • Branches on the left represent 0, branches on the right represent 1.

Run-Length Encoding

  • Run-length encoding stores data in frequency and value pairs.
  • Pairs group consecutive characters or consecutive bits of data with their frequency.

Boolean Operators

  • Boolean operators perform logic on 'true' or 'false' values, often represented as logic gates.
  • NOT gate inverts an input.
  • AND gate is true only if both inputs are true.
  • OR gate is true unless both inputs are false.
  • XOR gate (exclusive OR) is true only if one input is true and the other is false.

Software

  • System software is designed for users and performs useful tasks, such as word processing or image editing.
  • Application software supports running a computer and processes tasks needed for system functionality.
  • Utility software is a type of application software focused on computer management, such as antivirus or compression.
  • An Operating System (OS) manages hardware and programs on your computer, examples include Windows, Linux, and iOS.
  • The OS manages the processor, scheduling instructions and switching rapidly between programs for multitasking.
  • The OS also manages memory by loading programs and data into RAM.
  • Input/output devices are plugged into the computer and require drivers to communicate with the system.

Programming Languages

  • High-level languages, such as Java, Python, and C++, are more human-readable and portable than low-level languages.
  • Low-level languages, such as assembly and machine code, are closer to what the CPU actually executes.
  • Machine code is directly executed by the CPU and is composed of binary digits.
  • Assembly is more readable than machine code, using decimal or bits of English.
  • Assembly has a one-to-one correspondence with machine code (one assembly instruction = one machine code instruction).

Translators

  • Translators convert high-level languages into machine code.
  • Compilers translate the entire code at once and produce an executable file that can be executed independently.
  • Interpreters translate and execute code one line at a time, which is helpful for debugging.

CPU

  • The CPU (Central Processing Unit) executes program instructions using data.
  • Components within the CPU include the ALU (Arithmetic Logic Unit) for math and logic calculations, the control unit that oversees all CPU operations, and the cache for storing frequently accessed data.
  • The clock generates a consistent pulse to synchronize CPU components.
  • Buses are collections of wires that connect CPU components.

Von Neumann Architecture

  • The Von Neumann architecture uses a set of components, including the ALU, control unit, cache, and clock.
  • CPUs follow the fetch-decode-execute cycle.

CPU Performance Factors

  • Clock speed is the rate at which the fetch-decode-execute cycle occurs, usually measured in gigahertz (GHz).
  • A higher clock speed means a faster CPU.
  • Multi-core CPUs have multiple cores (processors) inside, allowing for parallel execution of instructions.
  • Cache size affects performance; a larger cache holds more frequently used data, minimizing the need to access RAM.

Embedded Systems

  • Embedded systems are computers integrated into other devices, with a specific purpose and limited functionality.
  • Examples include household appliances, cars, and other devices.

Main Memory

  • Main memory provides short-term storage for programs and data.
  • RAM (Random Access Memory) is volatile, meaning data is lost when the power is turned off.
  • ROM (Read Only Memory) is non-volatile, retaining data even when the power is off.
  • ROM contains the program that starts the computer when it is turned on.

Secondary Storage

  • Secondary storage is used for long-term storage of programs and data.
  • It is non-volatile, meaning data persists even when the power is off.
  • Examples of secondary storage include hard disk drives, optical drives, and solid-state drives.

Hard disk drives (HDDs)

  • HDDs use magnetism to store data on a spinning disk, with a read/write head moving across the disk surface.
  • HDDs are reliable, have large capacity, and are relatively inexpensive.
  • HDDs are prone to damage due to their moving parts and can be noisy.

Solid-state drives (SSDs)

  • SSDs store data electronically using logic gates and contain no moving parts.
  • SSDs are faster than HDDs for reading and writing data and are more durable.
  • SSDs are typically more expensive than HDDs for the same capacity.

Optical storage

  • Optical drives use lasers to read and write data on a disc.
  • Examples include DVDs and Blu-ray discs.
  • Optical drives are portable, reliable, but less durable and have limited capacity per disc.

Cloud storage

  • Data is stored in an offsite location and accessed via the internet.
  • Examples include Dropbox, Google Drive, and Amazon Cloud storage.
  • Cloud storage enables easy access to files from any location, scalability, and versatility.
  • Cloud storage relies on the reliability and security of the cloud provider.

Networks

  • A PAN (Personal Area Network) is a network used by a single person to connect devices like wireless headphones.
  • A LAN (Local Area Network) covers a small geographical area, like a single building, and is typically owned and operated by a single organization.
  • A WAN (Wide Area Network) spans a broader area, often including multiple buildings or locations, and is typically owned by multiple organizations.
  • Both wired and wireless connections can be used in PAN, LAN, and WAN networks.

Network Topologies

  • Network topology refers to the physical arrangement of devices in a network.
  • Star topology connects each device to a central device, such as a router or access point.
  • Bus topology uses a single cable to connect all devices.

Network Protocols

  • Protocols are sets of rules that allow devices from different companies to communicate with each other.
  • Protocols are layered, with each layer responsible for specific functions.

Layers of Network Protocol

  • Application Layer: Handles interactions between applications, like web browsing, email, or file transfer.
  • Transport Layer: Provides reliable data transfer between applications, including error handling and congestion control.
  • Internet Layer: Handles addressing and routing packets between networks.
  • Link Layer: Manages the physical transmission of data between devices on the same network segment, including error detection and correction.

Transmission Media

  • Wired transmission media include copper cables, used extensively for LANs.
  • Fiber optic cable transmits data using light pulses, offering high bandwidth and long-distance support.

Cyber Threats

  • Pharming redirects website traffic to a counterfeit website, deceiving users.
  • Data breaches expose confidential data by unauthorized users.
  • Removable media includes devices like USB drives that can be easily removed from a computer, making them a risk for data theft or introducing malware.
  • Unpatched software can contain vulnerabilities exploited by attackers.
  • Weak passwords, including default passwords, are easily guessed or cracked by brute-force attacks.
  • Social engineering tricks users into revealing information or giving up money.

Types of Social Engineering Attacks

  • Baiting: Creating appealing scenarios, often with a reward, to deceive users into falling for a scam.
  • Phishing: Using emails, text messages, or other communications to lure users into fake websites or information-gathering links.
  • Shoulder surfing: Observing someone entering information, especially passwords.

Malware

  • Malware is malicious software designed to harm computers or steal information.
  • Viruses: Self-replicate, infecting other programs, spreading when the host program is run.
  • Trojans: Hide within legitimate software, executing malicious actions once installed.
  • Spyware: Collects personal information from a target computer without consent.

Cybersecurity Measures

  • Penetration testing simulates real-world attacks to identify security weaknesses.
  • White box penetration testing assumes the attackers have knowledge of the system.
  • Black box penetration testing simulates an outsider's attack without prior knowledge of the system.
  • Firewalls act as digital filters, checking incoming and outgoing network traffic and blocking packets that do not adhere to defined rules.
  • MAC (Media Access Control) address filtering can be used to control access to a network based on the unique hardware address of a device.
  • CAPTCHAs help identify human users by requiring them to solve visual puzzles or tasks that are difficult for bots to complete.
  • Biometrics uses unique physical characteristics of a user, such as fingerprints, facial recognition, or voice recognition, for authentication.
  • Antivirus software scans computers for known malware and attempts to remove it.
  • Encryption scrambles data to make it unreadable without the correct key.

Databases

  • A database organizes and stores data in a structured format.
  • Tables contain organized data with rows (records) and columns (fields).
  • Primary keys uniquely identify each record within a table.
  • Foreign keys link tables together using a relationship (foreign key is a primary key from another table).
  • Relational databases use foreign keys to link tables, reducing data redundancy and inconsistencies.

SQL Queries

  • SQL (Structured Query Language) is used for interacting with databases.
  • SQL queries are used to retrieve, insert, update, and delete data from databases.
  • Select query extracts data from a database, using clauses: WHERE to filter data, ORDER BY to sort results, and FROM to specify the table.
  • Insert query adds a new record into a table.
  • Update query modifies existing records.
  • Delete query removes records from a table.

Impacts of Computing

  • Ethical issues: Examining the morality of technological development, including concerns like job displacement by automation, ethical implications of AI decisions, and social impacts.
  • Environmental issues: Concerns about environmental impact, including resource consumption, disposal of electronic waste, and responsible sourcing of materials.
  • Legal issues: Legal implications and regulations related to data protection, computer misuse, and intellectual property.
  • Privacy issues: Concerns about the collection, use, and protection of personal data by governments, companies, and online services.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

More Like This

Binary and Hexadecimal Number Systems
47 questions
Binary to Hexadecimal Conversion Quiz
5 questions
Use Quizgecko on...
Browser
Browser