Podcast
Questions and Answers
The term 'Spam' in computing refers to unsolicited electronic messages and is related to a tinned meat product.
The term 'Spam' in computing refers to unsolicited electronic messages and is related to a tinned meat product.
True
A virus can only spread through direct user actions and cannot propagate automatically.
A virus can only spread through direct user actions and cannot propagate automatically.
False
Output refers to data that is sent to a computer for processing.
Output refers to data that is sent to a computer for processing.
False
Computer data can include factual information that is used for analysis or decision-making.
Computer data can include factual information that is used for analysis or decision-making.
Signup and view all the answers
A system is defined as a single component that performs a function in isolation.
A system is defined as a single component that performs a function in isolation.
Signup and view all the answers
An algorithm is a structured set of rules defining a logical solution to a problem.
An algorithm is a structured set of rules defining a logical solution to a problem.
Signup and view all the answers
A chip is another term for a computer's keyboard.
A chip is another term for a computer's keyboard.
Signup and view all the answers
A ROM chip is a type of volatile memory that can be changed.
A ROM chip is a type of volatile memory that can be changed.
Signup and view all the answers
The CPU is often referred to as the 'brains' of the computer.
The CPU is often referred to as the 'brains' of the computer.
Signup and view all the answers
Compiling refers to converting machine language code into a higher level language code.
Compiling refers to converting machine language code into a higher level language code.
Signup and view all the answers
The definition of a computer program includes a microprogramme.
The definition of a computer program includes a microprogramme.
Signup and view all the answers
The Computer Misuse Act 1990 defines what a computer program is.
The Computer Misuse Act 1990 defines what a computer program is.
Signup and view all the answers
An integrated circuit can be permanently fixed or volatile.
An integrated circuit can be permanently fixed or volatile.
Signup and view all the answers
A computer hacker originally referred to someone who was very enthusiastic about computers.
A computer hacker originally referred to someone who was very enthusiastic about computers.
Signup and view all the answers
Operating system software is specifically designed to perform functions such as creating documents and spreadsheets.
Operating system software is specifically designed to perform functions such as creating documents and spreadsheets.
Signup and view all the answers
High-level languages are closer to machine language than low-level languages.
High-level languages are closer to machine language than low-level languages.
Signup and view all the answers
Machine language consists of a set of instructions that control the computer directly.
Machine language consists of a set of instructions that control the computer directly.
Signup and view all the answers
An interpreter is used to convert high-level language code directly into binary code.
An interpreter is used to convert high-level language code directly into binary code.
Signup and view all the answers
Applications software provides the basic functionalities required by the operating system.
Applications software provides the basic functionalities required by the operating system.
Signup and view all the answers
Spam refers to unsolicited emails that are often seen as junk.
Spam refers to unsolicited emails that are often seen as junk.
Signup and view all the answers
Bespoke software is software created specifically for a client rather than being sold 'off-the-shelf'.
Bespoke software is software created specifically for a client rather than being sold 'off-the-shelf'.
Signup and view all the answers
The goal of the Preliminary Investigation is to define the symptoms of the problem rather than the problem itself.
The goal of the Preliminary Investigation is to define the symptoms of the problem rather than the problem itself.
Signup and view all the answers
System requirements are established only after a thorough analysis of the existing system.
System requirements are established only after a thorough analysis of the existing system.
Signup and view all the answers
In the Analysis phase of the SDLC, a data flow diagram (DFD) is one of the tools used to analyze data.
In the Analysis phase of the SDLC, a data flow diagram (DFD) is one of the tools used to analyze data.
Signup and view all the answers
The design phase of the SDLC consists of only one step to create the new system.
The design phase of the SDLC consists of only one step to create the new system.
Signup and view all the answers
A prototype in the design phase is a fully functional version of the final system.
A prototype in the design phase is a fully functional version of the final system.
Signup and view all the answers
Interviews are the only method used for data gathering during the analysis phase.
Interviews are the only method used for data gathering during the analysis phase.
Signup and view all the answers
Recommendation for the next step is part of the report to management during the Analysis phase.
Recommendation for the next step is part of the report to management during the Analysis phase.
Signup and view all the answers
The feasibility study is a key component of the Analysis phase in the SDLC.
The feasibility study is a key component of the Analysis phase in the SDLC.
Signup and view all the answers
The modem converts signals from the receiving computer into a format that can be understood by the sending computer.
The modem converts signals from the receiving computer into a format that can be understood by the sending computer.
Signup and view all the answers
Computer Based Training (CBT) programs are typically delivered through USB drives.
Computer Based Training (CBT) programs are typically delivered through USB drives.
Signup and view all the answers
Automation in car factories involves the use of computer-controlled robots for vehicle assembly.
Automation in car factories involves the use of computer-controlled robots for vehicle assembly.
Signup and view all the answers
Stock control systems in many companies are still mainly manual.
Stock control systems in many companies are still mainly manual.
Signup and view all the answers
Working from home is one of the common uses of computers within the home environment.
Working from home is one of the common uses of computers within the home environment.
Signup and view all the answers
The provision of adequate lighting and ventilation is unnecessary for creating a good working environment.
The provision of adequate lighting and ventilation is unnecessary for creating a good working environment.
Signup and view all the answers
Computer Aided Design (CAD) is utilized to create detailed specifications and drawings for new products.
Computer Aided Design (CAD) is utilized to create detailed specifications and drawings for new products.
Signup and view all the answers
Smart ID cards are not considered a use of computers in daily life.
Smart ID cards are not considered a use of computers in daily life.
Signup and view all the answers
Regular backups of information stored on the computer are not essential.
Regular backups of information stored on the computer are not essential.
Signup and view all the answers
Good ventilation and a clean environment are beneficial for the performance of computers.
Good ventilation and a clean environment are beneficial for the performance of computers.
Signup and view all the answers
A UPS (Un-interruptible Power Supply) helps to prevent data loss during power outages.
A UPS (Un-interruptible Power Supply) helps to prevent data loss during power outages.
Signup and view all the answers
Computer viruses can only infect disks but cannot spread through computer networks.
Computer viruses can only infect disks but cannot spread through computer networks.
Signup and view all the answers
Incremental backups only save changes made since the last backup.
Incremental backups only save changes made since the last backup.
Signup and view all the answers
Placing objects on top of monitors is acceptable for maintaining a clutter-free workspace.
Placing objects on top of monitors is acceptable for maintaining a clutter-free workspace.
Signup and view all the answers
Using virus detection software is unnecessary if you believe your computer is safe.
Using virus detection software is unnecessary if you believe your computer is safe.
Signup and view all the answers
Repetitive Strain Injury (RSI) is a concern associated with poor posture while working on computers.
Repetitive Strain Injury (RSI) is a concern associated with poor posture while working on computers.
Signup and view all the answers
Study Notes
Computer Crime
- Algorithm: A set of rules to solve a problem or achieve a goal. Often expressed as a flow chart.
- Chip (Integrated Circuit): A small piece of semiconductor material (like silicon) with conductive and insulating layers, forming a microcircuit. It contains many electronic devices like transistors, resistors, and diodes.
- ROM (Read Only Memory) Chips: Contain permanently stored data.
- RAM (Random Access Memory) Chips: Data is volatile (lost when power off)
- EPROM (Erasable Programmable Read-Only Memory): Programmable memory that can be erased and reprogrammed.
- CPU (Central Processing Unit): The "brain" of the computer, located on an integrated circuit. It carries out machine language instructions from computer programs.
- Compiler: A program that translates high-level language code to machine language. Its opposite, converting machine language to high-level code, is called decompilation.
- Computer: A programmable machine for storing, retrieving, and processing data, mainly electronically.
- Computer Program: A series of instructions guiding computer operation. Stored in various ways, including integrated circuits, magnetic disks/tapes, and punched cards, loaded into memory as needed. A precise definition is found in the Export of Goods (Control) Order (S.I. 1989 No. 2376) detailing processes executable through electronic computers, also including microprograms.
- Data: Information (facts, numbers) to analyze something.
- Database: A structured collection of data (e.g., client names, addresses). Stored in computers or storage media like magnetic disks.
Systems Analysis and Design
- System: A collection of interrelated components working together to perform a function.
- Systems Analysis: Studying an existing system to understand its workings and user needs.
- Systems Design: Creating a plan for an improved system based on analysis results.
Systems Specialist
- Systems Specialist: A computer professional handling analysis and design.
- Typical Career Path: Programmer → Designer → Systems Analyst
Systems Analyst Functions
- Coordination: Managing and scheduling system-related tasks.
- Personnel Communication: Communicating via presentations or written documents.
- Planning and Design: Creating new systems, from initial planning to deployment.
Project Phases
- Planning: Determining the purpose, process, and steps for system building.
- Analysis: Identifying users, system functions, and usage.
- Design: How the system will work.
- Implementation: Putting the system into operation.
Planning
- Identifying business value: Defining the advantages of the system.
- Analyze feasibility: Evaluating the practicality of the system.
- Develop work plan: Creating a plan to implement the project.
- Staff the project: Choosing the team to work on the project.
- Control and direct project: Keeping the project on track.
Analysis
- Analysis strategy : A plan for completing the analysis phase.
- Gathering business requirements: Collecting information about user needs for the system.
- Requirements Definition Use Cases: Detailed descriptions of interactions users will have with the system.
- Process modeling: Illustrating different processes within the system.
- Data modeling: Identifying different types of data in the system.
Design
- Design selection: Choosing the best approach for designing the system
- Architecture design: Creating the overall structure of the system
- Interface design: Determining user interactions with the system.
- Data storage design: Deciding how data will be stored within the system
- Program design: Planning individual program components
Implementation
- Construction: Developing and testing the programs.
- Installation: Setting up the system and training users.
- Conversion marketing strategy: Focuses on increasing the number of site visitors who complete a specific action (called a conversion).
- Training plan: Creating a plan to train users.
- Support plan: Setting up support channels for users.
SDLC (Systems Development Life Cycle)
- Preliminary investigation: Initial study to define the problem.
- Analysis: Understanding the existing system and determining requirements.
- Design: Creating a detailed plan for the new system.
- Development: Building the software.
- Implementation: Installing and deploying the system.
Preliminary Investigation
- Feasibility Study / System Survey: Assessing the practicality and possibility of the project.
- Determine the problem: Defining the exact problems to be addressed.
- Describe the problem: Clearly articulating the issues.
- Understand management decisions: Determining the organizational structure and related decisions.
- Produces rough plan and what to do: Planning a brief overview and outline of the projected work steps.
- Report: Documenting the steps taken and findings, including recommendations and financial feasibility analysis.
Goal of Preliminary Investigation
- Problem Definition: Determining the exact nature of the problem, isolating it from symptoms, and understanding its scope.
- Scope of the project: Determining the project limits and boundaries.
- Budget and schedule: Determining budget and timeline for the project.
- Objectives of the project: Defining goals and objectives for the project.
- What user thinks system should do: Gathering user expectations for the system's intended functionality.
SDLC: Analysis
- Understand the existing system: Determining how the current system functions. Includes gathering and analyzing relevant data.
- Establish system Requirements: Defining the functionalities needed in the new system.
Analysis – Data Gathering
- Written documents: Analyzing existing documentation related to the system.
- Interviews: Gathering information from system users. These can be structured or unstructured.
- Questionnaires: Collecting data through a series of questions.
- Observation: Monitoring system usage through observation. Includes both guided and participant observations.
- Sampling: Utilizing sample data to represent larger trends.
Analysis – Analyze Data
- How the current system works: Understanding the current system's operations.
- Determine system requirements: Identifying the needed aspects of the new system.
- Tools: Employing appropriate tools, including data flow diagrams (DFD) and decision tables.
SDLC: Analysis – Data Flow Diagram
- Illustrates data flow within a system, visually showing data movement and transformations. Includes inputs, outputs, processes, and data stores.
SDLC: Analysis – Decision Tables
- Defines conditions under which system actions should take place.
Analysis – System Requirements
- Detailed specifications of what the system needs to accomplish.
- Basis for all design decisions and must be agreed upon.
Analysis – Report to Management
- Summarizing the problems and requirements.
- Presenting a cost analysis.
- Presenting recommendations for the next steps.
- Requesting authorization for proceeding.
SDLC: Design
- Planning the new system: Overall approach.
- Two Phases: Preliminary design, Detailed Design
Preliminary Design
- Create an overall plan: Creating a blueprint for the project.
- Offer alternatives: Developing multiple ways to address the system needs.
- Explain differences: Documenting the reasoning for choice of alternative.
- Evaluate costs: Assessing the financial implications of implementation and choices between alternatives.
- Build a prototype: Creating a working model of the system. A subset demonstration focused on key features.
- Prototype: Testing implementation with a working model to accommodate feedback.
- CASE Tools (Computer-Aided Software Engineering): Tools aiding in software design tasks.
Detailed design
- Presentation: Presenting developed system details
- All Alternatives: Reviewing all the alternative solutions.
- Selected plan: Choosing the chosen solution amongst all alternatives.
- Prototype of the system: Demonstrating a prototype (working model) of the final design.
- Obtain authorization to proceed: Gaining approval before moving onto the next design stage.
Computer Virus
- What are computer viruses?: Small programs hidden on disks, that replicate.
- How do viruses infect PCs?: Hidden on disk/floppy, and activated when accessed; spreading via infected floppy or computer networks (including the internet).
- How to prevent virus damage?: Utilizing anti-virus software that is kept updated; ensuring that computer software is the latest version.
Software Copyright
- What about software that you find on the Internet?: Freeware, Shareware, Software with licenses are identified and their usage clarified.
- Freeware: Available cost-free.
- Shareware: Initially free for trials, often requiring purchase for continued use.
- Software with licenses: Copyrighted software requiring a license for use.
- If your computer system holds information...: It's important to respect information privacy.
- In a free society...: Protecting privacy rights is crucial, along with their data protection laws.
Other
- Operating System (OS): A special program handling computer operation and advanced features.
- Application Software: Programs like word processors, spreadsheets, etc., that users utilize after the OS loads.
- LAN (Local Area Network): Connecting several computers in a limited area (e.g., office).
- WAN (Wide Area Network): Connecting devices over a much wider range (e.g., globally).
- Modem: Converts computer signals to signals used by phone systems, facilitating data transmission.
- Computer Games, Working from Home, Banking from Home, Connecting to the Web: Common computer uses in a home environment.
- CBT(Computer Based Training): Computer-based training solution. An economical way to train large groups on a single subject.
- Office Applications: Automation through computer-controlled robots and using CAD programs in design.
- Stock Control, Payroll: Examples of office application systems which are computerized.
Additional Points
- Specific examples: Include names of software (e.g., Microsoft Word, Lotus 123, Microsoft Access, etc.).
- Data Flow Diagrams (DFD): Illustrative diagrams.
- Decision Tables: Tabular format clarifying conditions.
- Backup Procedure: Regular backing up of important data to avoid data loss and to properly organize computer systems to aid in the backup procedure.
- Good Working Environment: The physical setup to minimize computer-related health issues such as RSI (Repetitive Strain Injury), glare, bad posture.
- Specific Computer Accessories: Modems, Printers, Keyboards, etc., to support the study notes.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Test your knowledge of computer science fundamentals with this quiz that covers key concepts such as algorithms, memory types, and the history of computing. Challenge yourself to understand the definitions and applications of various computing terms and principles. Perfect for students and enthusiasts alike!