IGCSE Computer Science: Exam Study Guide

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

What is the primary reason for choosing the binary number system in computers?

  • It is easier for humans to understand.
  • It maximizes data storage capacity.
  • It corresponds to ON and OFF states in the computer system. (correct)
  • It allows complex mathematical calculations.

The hexadecimal number system is base 8.

False (B)

What is the denary equivalent of the binary number 1010?

10

An 8-bit register shifts 1-bit to the left is the same as multiplying by a factor of ______.

<p>2</p> Signup and view all the answers

Match the following data storage measurements to their corresponding byte values:

<p>KiB (kibibyte) = 2^10 bytes MiB (mebibyte) = 2^20 bytes GiB (gibibyte) = 2^30 bytes TiB (tebibyte) = 2^40 bytes</p> Signup and view all the answers

What is the purpose of file compression?

<p>To save storage space, reduce streaming times, and bandwidth requirements. (B)</p> Signup and view all the answers

Lossy file compression allows for perfect reconstruction of the original file after decompression.

<p>False (B)</p> Signup and view all the answers

Name one example of lossless file compression.

<p>RLE</p> Signup and view all the answers

In run length encoding (RLE) the first value represents the number of ______ data items.

<p>identical</p> Signup and view all the answers

Match the compression type with its file type examples:

<p>Lossy = MP3 Lossless = RLE</p> Signup and view all the answers

A video conference is taking place using packet switching. What does the packet header contain?

<p>IP addresses of sending and receiving stations, sequence number and packet size. (D)</p> Signup and view all the answers

Circuit switching dynamically selects the fastest route for data packets.

<p>False (B)</p> Signup and view all the answers

What kind of communication does simplex data transmission support?

<p>One-way</p> Signup and view all the answers

A ______ connection exemplifies serial data transmission.

<p>USB</p> Signup and view all the answers

Match the type of data transmission with its characteristic:

<p>Simplex = Data sent in one direction only Half-duplex = Data sent in both directions, but not at the same time Full-duplex = Data sent in both directions simultaneously</p> Signup and view all the answers

What is a key advantage of using USB-C over USB-A?

<p>It offers higher power connectivity and can support 4K video delivery. (A)</p> Signup and view all the answers

Even parity checks can detect every error in data transmission.

<p>False (B)</p> Signup and view all the answers

What is a common application of Automatic Repeat Request (ARQ)?

<p>Mobile phone networks</p> Signup and view all the answers

In ______, data is sent back to the sending computer to check if it has been changed.

<p>echo check</p> Signup and view all the answers

Match the following error detection methods with their description:

<p>Parity Check = Uses an extra bit to determine if the number of 1s is even or odd. Checksum = Calculates a value from the data block and compares it at the receiving end. Automatic Repeat Request (ARQ) = Utilizes positive and negative acknowledgements, along with timeouts.</p> Signup and view all the answers

What is the main function of encryption?

<p>To prevent unauthorized access to data by converting it into an unreadable format. (D)</p> Signup and view all the answers

Asymmetric encryption uses the same key for both encryption and decryption.

<p>False (B)</p> Signup and view all the answers

Why is asymmetric encryption more secure than symmetric encryption?

<p>Two keys</p> Signup and view all the answers

Is a computer program that translates a program written in a high-level language into machine code

<p>Compiler</p> Signup and view all the answers

Match the HLL translation program with it's definition:

<p>Compiler = Translates the whole program at once, producing an executable file. Interpreter = Executes a program one statement at a time, without producing an executable file.</p> Signup and view all the answers

An integrated development environment (IDE) is:

<p>A suite of software development tools that help write and develop programs. (B)</p> Signup and view all the answers

Utilities are not involved in file management

<p>False (B)</p> Signup and view all the answers

What is a security system that manages access control to a computer or network, linking into virus checkers and firewalls and using encryption to safeguard data?

<p>The security system</p> Signup and view all the answers

An ______ is commonly known as one of a type of Human Computer Interface.

<p>CLI</p> Signup and view all the answers

Match the computer parts with it's usage:

<p>ALU = Arithmetic (+,-,*,/) and Logic (AND,OR,NOT) operations System clock = Produces timing signals on the control bus to ensure all functions are synchronised Registers = High speed areas of memory within a microprocessor</p> Signup and view all the answers

In the Fetch Decode Execute Cycle, what does the Program Counter hold?

<p>Address of next instruction (D)</p> Signup and view all the answers

The width of the data bus restricts addresses locations that can be used

<p>False (B)</p> Signup and view all the answers

What needs to happen if increasing the clock speed goes too far?

<p>Crashes</p> Signup and view all the answers

At every junction is a transistor known as a Floating ______ and another the control gate

<p>Gate</p> Signup and view all the answers

Match the use case to what they are usually used for:

<p>Memory Sticks = Store data transferred between computers and as a backup Flash memory = Used in Mobile Phones and Tablets SD card = Stores data on digital cameras</p> Signup and view all the answers

Because the components to produce a result is made from a solid material has become more reliable:

<p>SSDs (B)</p> Signup and view all the answers

Because blue light has shorter wave lengths this allow a greater capacity that what DVD

<p>True (A)</p> Signup and view all the answers

What is required rather than installing additional storage

<p>memory mapping</p> Signup and view all the answers

The illusion of always having RAM and giving more memory even when the RAM is full is known as, ______.

<p>unlimited</p> Signup and view all the answers

Match the cloud description types:

<p>public cloud = client and cloud storage provider different companies private cloud = dedicated server, controlled behind a firewall Hybrid cloud = mix of a public and private setup</p> Signup and view all the answers

What is primarily the usage case of a Barcode ?

<p>Faster price changes (D)</p> Signup and view all the answers

Does increased higher capacity of QR codes means less ability to do error checking?

<p>False (B)</p> Signup and view all the answers

What is the type of injury to the hand that can be done through regular data entering into a keypad by hand?

<p>RSI</p> Signup and view all the answers

Sound can be translated with what object with varying electronic current. ______

<p>loudspeaker</p> Signup and view all the answers

Match some sensors to their usecases:

<p>Temperature = Control central heating Humidity = Monitor humidity levels in a buldign Light = Switch car headlights automatically</p> Signup and view all the answers

What is called when the microprocess sends back the process to control it?

<p>Feedback (B)</p> Signup and view all the answers

Is infrared intrusive and dangerous compared to visible light?

<p>False (B)</p> Signup and view all the answers

What do we call a system for facial recognition, typically?

<p>Biometrics</p> Signup and view all the answers

Flashcards

Central Processing Unit (CPU)

A computer system that has the responsibility for execution and processing of all instructions and data.

Microprocessor

An integrated circuit (microchip) containing the ALU and control unit to interpret and execute instructions and carry out arithmetic operations.

Von Neumann architecture

A computer architecture that has a central processing unit(CPU) or processor than can access the memory directly.

Arithmetic and Logic Unit (ALU)

Allows all arithmetic (such as +, -) and logic (such as AND, OR) operations to be carried out.

Signup and view all the flashcards

Control Unit

Reads instructions from memory and synchronises data flow and program instructions throughout computer.

Signup and view all the flashcards

Registers

High speed areas of memory within a microprocessor/CPU used to store small amounts of data, address of next instruction or current instruction.

Signup and view all the flashcards

System clock

Used to produce timing signals on the control bus to ensure all functions are synchronised.

Signup and view all the flashcards

System buses

Transfers data and control signals throughout a computer.

Signup and view all the flashcards

Fetch-Decode-Execute cycle

Process consisting of the CPU fetching data/instructions storing them in registers. Then the data is decoded and finally actions are executed.

Signup and view all the flashcards

Instruction Set

Defines how data and instructions are carried out through units of computer hardware.

Signup and view all the flashcards

Embedded system

Combining a computer’s hardware and software to make a particular task

Signup and view all the flashcards

Barcodes

A series of varying thickness representing 0-9. Are read by scanners that use laser or LED to create digital sequence (eg: LDDDDLD).

Signup and view all the flashcards

QR codes

Codes that hold more info/data than barcodes and made of a matrix of dark squares and a light background.

Signup and view all the flashcards

Optical mouse

A pointing device using tiny cameras and a red LED light source to calculate the mouse's position across a surface.

Signup and view all the flashcards

Microphone

An input device that detects sound for a computer through an electric current of varying amplitude. Converts sound to electrical data.

Signup and view all the flashcards

Scanners

Scans two-dimensional objects or documents so that an image can be saved to a computer. OCR technology can translate them into a text file.

Signup and view all the flashcards

Timing signal

Data needs to be synchronised and a defined clock to manage processing

Signup and view all the flashcards

Input/output process

A process (ie: HDD or printer) needs some data to be sent to it.

Signup and view all the flashcards

Hardware fault

Often involving a printer, to say there's no more jam to keep printing with your device.

Signup and view all the flashcards

User interaction

Involving a user, to let the micro know to stop it all.

Signup and view all the flashcards

Software error

For something broken or dividing zero, a signal is sent to stop.

Signup and view all the flashcards

Cookies

Can be permanent (stored), or the data can be cleared at the session’s end

Signup and view all the flashcards

MAC address

The physical location of a computer within computer networks

Signup and view all the flashcards

IP address

Unique id assigned for each item attached to internet, given IP during Dynamic Host process.

Signup and view all the flashcards

Routers

Allow data packets to be routed back and forth through networks.

Signup and view all the flashcards

Http/ https

Consists of rules to follow when on web so data across the internet can be followed

Signup and view all the flashcards

Web browsers

Software that allows pages to be shown

Signup and view all the flashcards

Domain name sever (DNS)

Takes the web servers domain names and converts them to IP to allow people to use the website with the web browser

Signup and view all the flashcards

Digital currency

A digital money that can change form.

Signup and view all the flashcards

Blockchaining

A method of transaction and information keeping between users

Signup and view all the flashcards

Cyber security

Refers to protecting devices from cybercrime like hacking, phishing, malware, pharming and social engineering.

Signup and view all the flashcards

Hacking

Hackers get access to data

Signup and view all the flashcards

Malware

A type of hacking involving unwanted, irritating downloads.

Signup and view all the flashcards

Phishing

Deceptive emails from legitimate looking website to trick user into giving data.

Signup and view all the flashcards

Pharming

Fake code on a web server to attempt to get passwords and information.

Signup and view all the flashcards

Social engineering

Interacting with data that causes users to do bad things that give access.

Signup and view all the flashcards

Biometrics

Type of protection with user's unique characteristics known.

Signup and view all the flashcards

Anti-malware

A program that protects PC against malware or spyware by examining their structure based of known bad program.

Signup and view all the flashcards

Authentication

The ability to find out who is on a system.

Signup and view all the flashcards

Study Notes

  • This study guide is for the Cambridge IGCSE and O Level Computer Science syllabuses (0478/0984/2210).
  • It is designed to help students revise for their Computer Science examinations.
  • It follows the new Computer Science syllabus, with first exams in June 2023.
  • The guide includes sample questions, answers, and exam-style practice questions and answers.
  • Sample practice papers are available at the end of the book and online at https://www.hoddereducation.co.uk/cambridgeextras.
  • The author has also provided an online glossary for key words that appear in red bold in the book.

Study Tips

  • Find a copy of the IGCSE Computer Science syllabus to use with this text.
  • A list of topics will act as a revision checklist.
  • Stop and learn something if you don’t understand it early, while you still recall the topic.
  • Anything in the syllabus could be in a question.
  • Understand the instruction type given by the questions of what action is required (complete, describe, explain, give, state, suggest).
  • Make sure an answer relates to a specific scenario given.
  • Give more than a single-word answer to questions.
  • Use correct technical terms and avoid trade names.
  • Allocate enough time for the number of marks awarded to a question.
  • Ensure spellings are correct for computer science terminology.
  • Learn the definitions of key terms and show understanding by providing examples.
  • Don't ignore syllabus items not understood or with no notes; research items to address gaps in knowledge.
  • Avoid cramming facts without understanding.
  • Instead, revise to make it interesting, rather than just reading and re-reading.
  • Write things down to better recollect important facts.
  • Do exam-style questions while timing responses to avoid running out of time in the actual exam.
  • Revision cards are useful for last-minute checks, such as for binary arithmetic.
  • Questions asked in exams will be within the syllabus; guidance is given to call on already known facts.
  • Read each question carefully, understand the work being done, and make sure of the facts.
  • Sensibly use allocated times based on allocated marks.

Getting Ready for the Exam

  • Get enough sleep and a decent lunch break before tests.
  • Stay calm and formulate ways to relax before starting.
  • Read the whole paper first to gather thoughts.
  • Then answer the questions that are familiar or easy to complete.
  • Be sure to read each question thoroughly before answering.
  • Highlight key words in the question to avoid missing something.
  • Use clear English and handwriting.
  • Do not use correction fluid; cross out unwanted work neatly.
  • Show clearly where an alternative answer is found on a different page.
  • Attempt all questions; you might get credit by writing something that seems relevant.

Command Words

  • Calculate: Work out from given facts, figures, or information.
  • Compare: Identify/comment on similarities and/ or differences.
  • Define: Give precise meaning.
  • Demonstrate: Show how or give an example.
  • Describe: State the points of a topic/give characteristics and main features.
  • Evaluate: Judge or calculate the quality, importance, amount or value of something.
  • Explain: Set out purposes or reasons; make the relationships between things evident; provide why and/or how and support with relevant evidence.
  • Give: Produce an answer from a given source or from memory.
  • Identify: Name/select/recognize.
  • Outline: Set out the main points.
  • Show: Provide structured evidence that leads to a given result.
  • State: Express in clear terms.
  • Suggest: Apply knowledge and understanding to situations where there are a range of valid responses in order to make proposals/put forward considerations.

Assessment Overview

  • The guide supports the Cambridge IGCSE and O Level Computer Science syllabuses (0478/0984/2210) for examination from 2023, as well the following:
  • Paper 1 Computer systems: 1 hour 45 minutes, 75 marks, 50% of overall marks, Syllabus topics 1-6
  • Paper 2 Algorithms, programming and logic: 1 hour 45 minutes, 75 marks, 50% of overall marks, Syllabus topics 7-10

Data Representation

Number Systems

  • The basic building block in all computers is the binary number system as it consists of 1s and 0s only which correspond to ON and OFF states in the computer system.

  • The binary number system is based on the number 2 and it can only use the two values 0 and 1 (these are referred to as bits).

  • The binary heading values are 20, 21, 22, 23 etc.

  • If an 8-bit system is being used the headings are: 128 (27), 64 (26), 32 (25), 16 (24), 8 (23), 4 (22), 2 (21) and 1 (20).

  • The denary system is a base 10 number system with column headings: 100 (1), 101 (10), 102 (100), 103 (1000) and so on.

  • Converting from binary to denary is accomplished by simply adding together all the heading values where a 1-value appears.

  • Converting from positive denary to binary, it is necessary to carry out successive divisions by 2 until a zero value results.

  • The hexadecimal number system is based on the number 16.

  • The 16 digits are represented by the numbers 0 to 9 and the letters A to F (representing 10 to 15).

  • The hexadecimal headings are 160, 161, 162, 163, and so on.

  • To convert a binary number to a hexadecimal number, it is first necessary to split the binary number into 4-bit groups starting from the right-hand side.

  • If the final (left-most group) doesn't contain four binary digits, then infill by zeros is done and each 4-bit group is then assigned a hexadecimal digit.

  • To convert from hexadecimal to binary, it is necessary to write the 4-bit binary code for each hexadecimal digit.

  • To convert a hexadecimal number to denary, it is necessary to multiply each hexadecimal digit by its heading value and then add them together.

  • To convert from denary to hexadecimal, it is necessary to carry out successive divisions by 16 until zero value results.

Uses of the Hexadecimal System

  • The hexadecimal number system is used by computer programmers and designers because it is easier to deal with, for example AF01, than the binary equivalent of 1010111100000001.
  • Error codes refer to memory locations; automatically generated by the computer.
  • A Media Access Control (MAC) address identifies a device on a network via the NIC (NN-NN-NN-DD-DD-DD, first six digits are the manufacturer code and the last six digits are the serial number).
  • Internet Protocol (IP) address is given to a device when it joins a network.
  • Hypertext mark-up language (HTML) colour codes; pixel represented by a hex code.

Addition of Binary Numbers

  • Binary addition involves a carry and a sum for each of the 2 or 3 bits being added: 0+0+0 = 0 (carry), 0 (sum); 0+0+1 = 0 (carry), 1 (sum); 0+1+0 = 0 (carry), 1 (sum); 0+1+1 = 1 (carry), 0 (sum); 1+0+0 = 0 (carry), 1 (sum); 1+0+1 = 1 (carry), 0 (sum); 1+1+0 = 1 (carry), 0 (sum); 1+1+1 = 1 (carry), 1 (sum)
  • If the result of a calculation is too large for the allocated word size (for example a word size of 8 bits can represent a maximum value of 255) then overflow occurs.
  • Logical shifts involve shifting bits to the left or the right, if the result results in a loss of 1-bits, then this would result in an error.
  • With shifting, any gaps created by the shift operation can be filled by zeros.
  • Shifting a binary number left is the same as multiplying by factors of 2.
  • Shifting binary numbers right is the same as dividing by factors of 2.

Two's Complement Binary Numbers

  • To allow for the possibility of representing negative integers we make use of two's complement notation.
  • Converting denary numbers into binary in two's complement format involves placing 1-bits in the appropriate position remembering that the right-most bit now represents –128.

Text, Sound and Images

  • All keyboard characters are represented by 7-bit American Standard Code for Information Interchange (ASCII code) or 8-bit Extended ASCII code character set.
  • Use Unicode characters in order to represent non-Western languages, which supports up to 4 bytes per character (that is, up to 32 bits per character).
  • Sound is analogue data, to store in a computer, it is necessary to convert the analogue data into a digital format.
  • To convert sound to digital, the sound waves must be sampled at regular time intervals.
  • The amplitude (loudness) of the sound uses a number of bits to represent the range (for example, 0 to 15 bits).
  • The number of bits per sample is called the sampling resolution and the sampling rate is the number of sound samples taken per second.

Bitmap Images

  • Bitmap images are made up of pixels (picture elements). An image is made up of a two-dimensional matrix of pixels.
  • Each pixel can be represented as a binary number, so bitmap images are stored as a series of binary numbers.
  • A black and white image only requires 1 bit per pixel (1 if white and 0 if black).
  • A pixel represented by 2 bits has 4 possible values (00 = 0, 01= 1, 10 =2, and 11 = 3) so that four colors are represented.
  • The number of bits to represent each possible colour is called the colour depth. Image resolution refers to the number of pixels.

Data Storage Measurement

  • A bit refers to each binary digit and is the smallest unit; four bits make up a nibble, and eight bits make up a byte.
  • 1 KiB (kibibyte) = 210 bytes
  • 1 MiB (mebibyte) = 220 bytes
  • 1 GiB (gibibyte) = 230 bytes
  • 1 TiB (tebibyte) = 240 bytes
  • 1 PiB (pebibyte) = 250 bytes
  • 1 EiB (exbibyte) = 260 bytes

Image File Size and Sound File Size

  • Image file size is calculated by: image resolution (number of pixels) × colour depth (in bits)
  • Sound file size is calculated by: sample rate (in Hz) × sample resolution (bits) × length of sample (secs)

Data Compression

  • Files are compressed to save storage space, reduce streaming and downloading or uploading times, reduce the bandwidth requirements and reduce costs.

Lossy compression

  • Lossy file compression algorithms eliminate unnecessary data.
  • The original file cannot be reconstructed once it has been compressed.
  • The files are smaller than those produced by lossless algorithms, for example MPEG and JPEG.

Lossless compression

  • Data from the original uncompressed file can be reconstructed following compression.
  • No data is lost following the application of the lossless algorithms
  • The most common example is Run length encoding (RLE).
  • Run length encoding (RLE) works by reducing the size of a string of adjacent, identical data items, the repeating unit is encoded into two values (first value represents number of identical data items, and second value represents ASCII value of data item).

Data Transmission

Data Packets

  • Data is split up into packets before it is transmitted, and those data packets are split up into what follows:
  • packet header (containing the IP address of the sending station and receiving station, the sequence number of the packet, so it can be reassembled, and packet size, to ensure the receiving station knows that the whole packet has been received)
  • payload (the actual data), and
  • packet trailer (containing cyclic redundancy check (CRC) error check and a way of identifying the end of the data packet).
  • Data packets allow data to be sent in manageable chunks to enable the most efficient route from A to B with routers used known as nodes.
  • This uses called packet switching.
  • Hop numbers are added to packet headers to ensure packets don't 'bounce around' from router to router and get lost.

Benefits of Packet Switching

  • There is no need to tie up a single communication line.
  • It is possible to overcome failed, busy or faulty lines by simply re- routing packets.
  • It is relatively easy to expand package usage.
  • A high data transmission rate is possible.

Drawbacks of Packet Switching

  • Packets can be lost and need to be re-sent.
  • The method doesn't work well with real-time streaming (for example, live sporting event being transmitted over internet).
  • There is a delay at the destination whilst the packets are being re- ordered.

Modes of Data Transmission

  • Simplex
    • Data can be sent in one direction only.
  • Half Duplex
    • Data can be sent in both directions, but not at the same time.
  • Full Duplex
    • Data can be sent in both directions at the same time.

Serial Data Transmission

  • Transmits data one bit at a time down single wire or channel (e.g. USB).

Parallel Data Transmission

  • Transmits several bits of data down multiple wires or channels, with each wire or channel transmitting each bit (e.g. the internal circuits of a computer).

Features of Serial Transmission

  • Has less risk of external interference.
  • Provides more reliable transmission over longer distances.
  • Transmitted bits won’t have the risk of skewing.
  • Is used if the amount of data being sent is relatively small, since transmission rate is slower than parallel.
  • Is used to send data over long distances.
  • Is less expensive than parallel due to fewer hardware requirements.

Features of Parallel Transmission

  • Has a faster rate of data transmission than serial (preferred method where speed is needed).
  • Works well over short distances.
  • Data can become skewed over long distances (no longer synchronised).
  • Provides easier input/output operations.
  • It requires more hardware, making it more expensive to implement than serial ports.

Universal Serial Bus (USB)

  • A form of serial data transmission known as the industry standard that automatically detects the device and loads the appropriate device driver.

USB Benefits

  • Devices are automatically detected and device drivers are loaded, and connection types prevent incorrect connections from being made.
  • USB has industry standard, has a number of transfer rates, +5V power in the cable, and re-transmits data if its corrupted.
  • Easy to attach more ports using hubs and they're backwards compatible.

USB Drawbacks

  • Standard USB only supports a maximum cable length of 5 m; beyond that, USB hubs are needed to extend the cable length.
  • Very early USB standards of even standard versions are backwards compatible on the latest computers.
  • Even the latest version 3 (V3) and version 4 (V4) USB-C systems have a data transfer rate which is slow compared with, for example, Ethernet connections.

Error Detection

  • Data may be corrupted, lost, or even gained.
  • Error conditions range from electrical interference, packet switching, and data skewing.

Parity Checks

  • Parity checks are a method to check if data has changed or corrupted following data transmission set to even parity or odd parity.

Checksums

  • Calculated by the sending computer and sent to the receiving computer for comparison.
  • Differences in checksum means data alteration.

Echo Check

  • Sends data back to the sending computer to be compared with the data originally sent.
  • Data is re-sent if differences are found.

Automatic Repeat Requests (ARQ)

  • A method to check data following data transmission, commonly used by mobile phone networks to guarantee data integrity.
  • ARQs use positive and negative acknowledgements and timeout.

Check Digits

Check digits are used to identify any errors following data entry. Check digits can detect incorrect digits entered, transposition errors, omitted or extra digits in the number, and phonetic errors.

Encryption

  • Encryption protects data by altering it into an unreadable. The original data is called plaintext and data which is encrypted is called ciphertext.

Symmetric Encryption

  • Uses a single encryption key to encrypt and decrypt data.

Asymmetric Encryption

  • Uses two keys, a public key that is public and a private key that is known only to one user.

Hardware

Central Processing Unit (CPU)

  • Responsible for execution and processing of all instructions and data in a computer.
  • It consists of: a control unit (CU), an arithmetic and logic unit (ALU), registers, and buses.

Microprocessor

  • An integrated circuit (microchip) that contains the ALU and control unit to execute all instructions.
  • A microprocessor contains the system clock and primary memory.

Von Neumann Achitecture

Introduced the ideas of:

  • Central processing unit
  • Processor access to memory
  • Computer memories store data and programs.
  • Stored programs made up of instructions executable in sequence.

Arithmetic Logic Unit

  • The ALU allows arithmetic (such as +, -) and logic operations to be carried out.
  • Computers can have more than one ALU.
  • The ALU allows multiplication and division using shifting operators.

Control Unit

  • Reads instructions from memory, and synchronises data flow and program instructions throughout the computer.
  • Signals are generated during the fetch-decode-execute cycle to control all components of the computer.

Registers

  • They are high speed memory, and may be for general or special purpose.
  • Stored is small amounts of data, address of next instruction to be executed, or current instruction being decoded.
  • include: current instruction register , accumulator, the memory address register, memory data or buffer register, program counter.

System Clock

  • Clock that synchronises all functions, changes to the clock speed improve performance but at the risk of system crashes.
  • Generates timing signals on the control bus to ensure all functions are synchronised

System (IO) Busses

  • The transfer data and control signals, and use parallel data transfer; width of a bus varies according to computer architecture or the number of bits used. The three bus types are: - Address Bus - Data Bus - Control Bus

Memory

Random Access Memory, or RAM, holds all data, programs, or any of the operating system currently being used. The Address indicates the location for data or instructions, and is unique to every aspect of information.

EEPROM

  • Flash Memory chip that stores the BIO, and its task is to tell the CPU where the operating system can be found.

Fetch, Decode, Execute Cycle

  • Carries out stored instructions
  • Fetch: CPU requests data from memory and stores the instructions/data in the appropriate registers.
  • Memory (MAR) has address of the next action is copied from it to memory through an address bus.
  • Data passes along the data bus. If not sufficient room, more data is read along a buffer.
  • This processes everything because each instruction needs to be decoded and fully enacted to perform everything correctly. All data also goes through an address bus to make everything possible.

Computer Performance Core Elements

  • Caches & Internal Clock - The system clock defines the clock cycle, timing signals are transmitted on the control bus. - Speed comes from clock speed. More speed or width increases processing.

Instruction Set

  • A set of oerations for the processor encoded in sequence of an Opcode and Operand

Embedded Systems

  • An electronic system can become an electromechanical computer or microprocessor on a chip that becomes more specialized over time.

  • Embedded systems contain sensor input, mechanical components, actuators, and software.

  • Benefits include being small, low-cost, dedicated, low power and able to be controlled remotely. Concerns include that the devices are not easy to upgrade or repair, they can use simpler interfaces and can lead to environmental issues.

Input/Output Devices

  • Barcode Readers - These consist of special shapes, letters, and more, and use lasers and LED lights to get a correct reading by a sensor and a key field.

  • QR Codes - Carry more power than barcode, can provide advertising products and gain automatic access to websites through camera from smart devices.

Touchscreens

  • Allow use with bare fingers or Stylus -Capacitive technology is used with an electrostatic field where a change in electricity is generated, allowing a unique reading. These are easy to read and durable. -Infrared technology is durable and has glass screens and infrared transmitters with good screen durability -Resistive is good for dust and water, but less sensitive; made up of plymers and glass with high water resistance.

Output Devices

  • Actuators -Used an an output component for processes so as to start or stop operations.

-Light Projectors - These output data and show the results on screens or Interactive Whiteboards through beams.

Types of Projectors

  • Digital Light/LCD

  • Digital Light Projectors have higher quality contrast, but can be better suited for dusty enviroments, uses single microchip and have fewer grey elements.

  • Liquid Crystal Displays have limited contrast and require better colour definition, generating fewer image problems.

  • Lasers

    • Printers operate using powder, and are used to produce solid objects on a computer with additive printing and direct printing.

Input-Output Devices

-Speakers -Sound from a PC needs a digital to analogue converter (DAC) which turns them into sound with cones. -Sound/Lights -Sensors, are input devices that constantly send signals that are in the range of parameters (pH, temp) - Temperatures is read by sending signals by electricity - Moistures are read by water -Humidity can read water - Lights provide an output of sound while working in connections.

Memory

  • RAM and ROM, and has Primary vs Secondary status. The main aspects of information are as follows: -Primary- Used for RAM and Direct operations being made -RAM comes in DRAM with lower speeds and SRAM at higher speeds and is more costly vs disc -Secondary, however is non-volatile and is not a volatile type of storage. -It is best at data preservation. These external factors may be CD to DVD-ROM or hard discs. HD discs are used for sectors and tracks, storing different quantities of bytes and data in their sectors. Information read needs to be in contiguous fashion for processing. - SSD which controls electron movement and are reliable with chips.

Media

  • CD &DVD need light to work the system and read with data and can allow reading, are dual layering types, blue rays are used and with this speed allows for the usage of new systems and formats and allow encryption. CD is single layered system but with a spiral for track information, and also uses different lasers for various operations.

Memory

  • Virtual
    • This is RAM when files are exceeded is when virtual memory in file data starts to be used more effectively. In short its used all areas with data and makes up for the best of information possible because its constant and is used effectively.
  • Cloud
    • Used by lots of computer systems, is a service where most data is provided off or in one server and is used easily. Server types exist on these kinds of systems, or on storage levels of clouds if on more quantity.

The Internet and Its Uses

Main Objectives

  • To cover use with the internet, its objectives, the uniform resource tools and the means to access content and see the web. It also touches the internet and its devices and security and currency.

Internet

  • The ability to use or deliver data from email devices online with protocols; provides audio and video transfer to other elements.
  • World Wide Web, used to access data for all devices, uses HTML coding and requires web browsers to work.

URLs

Web pages (often simply referred to as 'browsers') are software that allow users to access and display web pages or play multimedia from websites on their devices.

Transfering HTTP/HTTPS

is an aspect for following a series of rules such that files can be moved and work and be secured over network access.

Browsers

Operate and interpret HTML coding and also support the use of storing fav websites (or store history). Browsers can open many webpages as well during any operation.

Retrieval

Web server or local address to find its IP addresses and access pages, as a result computers can be found and be coded during runtime.

Cookies

These have access on browser activity. They then have two options - session cookies are temporal and don't obtain identity, with persistent cookies offering to have log-ins and more for more usage and access of specific items. They come in many options as well, often being online transactions or preference types.

What is a cookie? are smaller data or information for all users. It then has a variety of types and more based on time and usage.

Security

For digital types, security for devices and more for different systems and means of security to attack different attacks, for example:

  • Attacks using brute force method and data intercepting to be of note.

  • Attacks using DDoS in such actions to lead to phishing for social usage and hacking that could spread with Malware to effect a key database. Mitigation to secure the system. In short, all should be reviewed in terms of firewall access.

Malware

This can contain multiple viruses that are known to spread and needs codes just as trojan horses effect and effect security, it also exists with spyware so security is a must have. Encryption to the codes.

Pharming attacks for more security is used, as its also very useful when determining any malicious actions on hand can be mitigated when the use of protection of passwords is a must. Biometric features can then become an authentication.

Automatic updating occurs when things are activated over the PC during checks for those things so nothing wrong can carry the devices.

Firewalls Proxies

Check or Examine "traffic" and block certain issues while being sure to stop things such as hacking. Proxies may see when a user first makes a request.

Proxies can be set to filter website blocks while keeping user access separate. To secure devices more for various elements, Secure sockets layer, has better encoding during the process when its run with HTTPS or the green padlock being used.

It then has a digital authentication and the secure connections are run on everything.

Privacy

Finally, control over safety is had with use levels for users and better account integrity. With malware prevention for systems and better firewalls, it would stop unwanted code or programs over computer systems and its related code to secure and guard all aspects of each connection at whatever level you make something for an ethical standpoint.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Use Quizgecko on...
Browser
Browser