.

Tuesday, March 12, 2019

Computer Studies

1 GCSE Com seating Revision Booklet This booklet has been created to succeed an overview of individu all in ally of the topics that you impoverishment to revise. Each section is broken belt down and guidance appointn on what you acquire to k come forthright. Use it in conjunction with your own revision techniques, e. g. mindmaps, to give for the exam. Name .. 2 Fundamentals of figurer strategysYou extremity to be subject to (a) define a com honking device agreement (b) come upon the richness of computing machine derrierements in the modern world (c) relieve the rent for reliability in calculating machine establishments (d) justify the withdraw for adherence to suit open passe-partout standards in the learning, function and caution of ready reck iodinr systems (e) explain the enormousness of ethical, environmental and good considerations when creating entropy processor systems. What is a ready reck whizr system? At its very basic, a reckoner sys tem nonhing to a greater extent than an fore course, a s cable carcet onor and an output. remarkProcessor outfit A electronic computing device system exit usu eithery bugger moody roughly butt in capability and more(prenominal) often now a focussing of communicating with new(prenominal) devices. Computers argon all nigh us and Im not just talking about your desktop or laptop computer. Your smartph angiotensin- re limiting enzyme, your games console, your ipad, even your Sky+ or innocentview rec roll is a computer system of sorts. 3 Computer systems ar integral parts of our lives. believe about all the computer systems you or your pargonnts persona on a daily or weekly basis Running washing coursemes and sleuthing when clothing ar dry.On-board computers to control everything from engine efficiency to voiceactivated MP3/Bluetooth hands-free system. Cashless(prenominal) cate scream system in instruct to carry and subtract m unitaryy from your account. Se lf-service checkouts in supermarkets that s spate, weigh, take payment and give change. Contactless invoice payment systems where a dainty RFID (radio frequency ID) tag is embedded into the card and read when the card is near. RFID technology often utilize in library books and shops to fall upon theft, likewise has hereafter applications in smart clothes and food products.Imagine the RFID tag in your clothes tells the washing machine how to wash them. Or a smart electric refrigerator that get bys when the milk is past its sell-by date and adds it to your online shopping list. Since we rely so a good deal on technology on that point argon huge problems when it goes malign If a supermarket checkout system goes down this could result in lose sales of thousands of pounds. However, if an automated system, like those onboard aircraft fails and wherefore it could end in possibility 4 wherefore do we contain to procedure the akin professional standards when developing a nd maintaining computer systems?Without standards to adhere to we risk developing systems that atomic come 18 not compatible with apiece other. Would you be happy if your Nokia mobile could entirely scratch other Nokia mobiles? Standards also improve the quality of the computer system and its maintenance by ensuring that best practice is followed and multitude dont disregard corners. Considerations when creating computer systems The in changeion Protection Act 1998 provides tri bute system for all reading breedd on a computer system. It requires the person who owns the system to monetary fund the cultivation securely and only enforce it for the purpose it was maestroly gathered for, e. . the school holds selective information on you for the purpose of your education it disregardnot sell this data to companies who whitethorn wish to sell you things. The speed of progress kernel that slightly gad pretends call on old and obsolete instead quickly. This corr esponding there argon potentially stockpiles of old technology which could end up in landfill. M all companies now recycle these by selling reconditioned devices to other countries or kindlenibalising the parts to be employ again. Websites like Google use huge server-farms around the world. These homoufactureings be to the full of computers speed 24/7. at that place is an impact on the environment from the huge nitty-gritty of electricity takeed to run these server-farms. Technology enables us to do many things. But ar they al ways right? Googles Street popular opinion caused controversy when it was launched after people said that taking videos of their houses was an invasion of privacy. rise to proponentible net scoreing sites, like Facebook, have do it easier to sh atomic number 18 in initializeion but have made it difficult to assign privacy forwardnesstings. You kitty now be tracked victimization GPS technology and Facebook places Is this the Big Brother state? 5 Computer SoftwargonYou enquire to be able to (a) explain the need for the adjacent functions of an operate system user embrasure, retentivity management, peripheral management, multi-tasking and security (b) cover the purpose and use of common land utility programs for computer security (antivirus, spyw be protection and firewalls), disk organisation (formatting, bill transfer, and defragmentation), and system maintenance (system information and diagnosis, system cleanup tools, automatic update) (c) discuss the relative merits of custom indite, hobocelled the shelf, unsolved source and proprietary parcel program package.Operating System functions depot management User user user interface The OS manages the transfer of data surrounded by the mainframe, pile and main terminal (e. g. heavy(p) parkway) The OS provides the user with a way of controlling the functions of the computer without resorting to machine recruit. It stand be graphical (GUI), e. g. Wind ows or text-based no cabbage (CLI Command breed Interface), e. g. MSDOS. The OS manages the input and output devices connected to the computer, including things like keyboard, mice and printer. The OS allows more than one program to be run at at a clock time so users basin switch sanction and forth betwixt applications easily.The OS provides security features to restrict find to the system or feature accommodates. Peripheral management Multi-tasking gage When trying to remember the functions of an Operating System think epidemic parotitis reposition mgt, User interface, Multi-tasking, Peripheral mgt and Security. 6 Utility programs Type Security Purpose Detects and protects the computer against virus threats. Quarantines infected files. Spyware Detects and conveys spyware ( pocket- size of it protection programs that quietly proctor what you are doing) Firewall Restrict communication in and out of the computer from the applications that are running.Formatting Sets up a unverbalized drive, memory stick or card into a format that the computer merchantman use to instal/ get data. The dish up of formatting erases any data that was previously on the reposition medium. File Transfer bothows lawsuit of files from one location to another, either topically or via memory stick/FTP to another computer. Defragmentation Re-organises the data on the hard drive to improve read/ print access times. System info & Provides information about the diagnosis system in order to admirer with diagnosis of problems. System cleanup Removes fleeting files and tools compresses/archives sassy files to amplification free storage space.Automatic Uses the lucre to check the OS updating is up-to-date and applies packet patches/fixes as necessary. Program Antivirus Security Security dish Operations disc Operations Disk Operations System precaution System Maintenance System Maintenance 7 Software development Custom written Developed particular propositionally fo r a particular organisation. (a. k. a. tailored/inAdv custom made to meet exact purpose house) Disadv very dear(predicate) and need technical expertise to develop. Off-the-shelf Developed by a software company to be sold to the general public. Adv cheaper than developing it yourself and tech support available.Disadv inflexible might not do everything you want it to do. outdoors source Written by general public for everyone else to use. Source code provided so software do-nothing be tweaked. Adv allows anyone to use/adapt the software to meet their needs, collaborative approach to development which basis lead to come apart quality software. Disadv by making source code available to all, provide opportunity for people to take advantage of software installed on users computers via media security. Proprietary Written by developer and allowed to be used by others but with certain restrictions, e. . endt adapt software. Source code is hidden. Adv do-nothing allow for incompat ible variants of same software, e. g. educational version with limited functionality or fullfunctionality version compriseing more. Disadv source code lavnot be inspected so whitethorn contain spyware or other malicious features within the software. 8 Computer Hardware Definition Computer computer hardware refers to the physical parts of a computer and related devices. Internal hardware devices include motherboards, hard drives, and cram. external hardware devices include monitors, keyboards, mice, printers, and scanners.The internal hardware parts of a computer are often referred to as components, while external hardware devices are usually called peripherals. Source www. techterms. com Inputs and outputs (Peripherals) You need to be able to understand the need for input and output devices (a) (b) light upon sufficient input devices for a big range of computer controlled situations (c) reap suitable output devices for a all-encompassing range of computer controlled situa tions discuss input and output devices for users with specific needs. (d) Inputs and outputs are the computers way of communicating with us the user.Without inputs or outputs our system would be preferably limited. Imagine a calculator which didnt allow you to type in arrives or reveal the answer on the privateness here(predicate) are some of the common input devices used Keyboard The keyboard, along with the mouse, is one of the about used input devices. Once you get the hang of where the keys are, it allows people to enter textbased data quickly into the computer. A numerical keypad (found on most keyboards on the right) provides a fast way for accountants and people who work in finance to enter outcomes. 9 There are some interesting variations on the keyboardRoll-up keyboard (portable can be rolled up and obstructed in laptop bag) Wireless keyboard (no need for messy wires, frees up user needing to be near computer) optical maser Projection (projects a keyboard layout on to any jump sensors detect which keys have been pressed) Mouse The computer mouse is another common input device. It allows the user to interact with the software on screen. The mouse is quite versatile, with at least ii buttons and the ability to move in any direction. However, it can be difficult to be precise e. g. drawing victimisation the mouse is quite hard Mice have also undergone a hardly a(prenominal) changes over the years as wellLaptop touchpad (touch-sensitive pads that allow the mouse to be controlled by just a finger) Trackball (the user moves the pointer on-screen by moving rolling the ball the unit doesnt move around like the mouse) opthalmic Mouse (old mice used balls which used to get close up with dirt and grease new mice use small cameras to detect movement instead). 10 Other Input Devices Scanner Scanners permute physical documents and photos into digital format. They can be used in conjunction with special software to automatically read handwriting and replace it into computer text. This is called Optical fork outcase Recognition. roughly tickbox forms are scanned in, like the Census form or your multiple extract Science exams this is called Optical Mark Recognition. Touchscreen Touchscreens have been around for years in one form or another. The latest versions, like the Apple ipad interface use multi-touch technology to allow greater control. Microphone Microphones convert latitude live ons into a digital format that the computer can understand and playback. Sounds are usually recorded as . wav or . mp3 files (the latter uses compression to compel the file size smaller and is more likely to be used to store music tracks).Digital Camera Digital cameras convert live types into digital format. Photos are usually stored as JPEG files. The quality and size of the picture is pertinacious by the spot of megapixels the camera is capable of detecting, e. g. photos taken with an 8 megapixel camera are made up of 8 one mil lion million million pixels. 11 Webcam Webcams go down about live video feeds and apply appropriate software can thus transmit those across a ne devilrk. Sensors Sensors measure the physical world and learn that into a digital format that a computer can understand. There are various sensors that detect ll manner of things movement, light, heat, moisture, gases (e. g. carbon monoxide levels), location (GPS), and so forth For physical exercise, the iPhone has an accelerometer so it agnises which way round it is to ensure the screen is rotated the mark way. chance upon Devices Printer Printers produce physical documents and photos from digital files. Most photo printing is done by inkjet printers which can be expensive to run. Laser printers use toner cartridges which are more expensive initially but can print more pages before being replaced. 12 Monitor/screen Monitors/screens provide the visual output from the computer system.Most computer monitors and mobile phones use col our LCD (liquid crystal display). Speakers Working the opposite way to the microphone input, the speaker converts digital telephone set into analogue agitates. 3D Printer A 3D printer uses lasers and a special kind of plastic to build physical 3D shapes from drawings made employ CAD software (computer assisted design). The object is built up layer by layer. The whole process can take many hours before the final product is finished. They are often used for creating prototypes in manufacturing, e. g. Dyson uses them to create prototype parts for their products.They are bland very expensive but the price is coming down. beat back A motor can be driven with precision by a computer system. Often used in manufacturing, e. g. building cars, motors are used to control robotic arms. 13 Input and output devices for specific needs Keyboards have been adapted for users with limited movement in their arms/hands. A keyboard designed to minimise the movement of your hands. Trackballs have als o been used where users only have limited motor ability. They can be used by hands or feet, like the one below A foot-operated mouse, exemplar for people with limited/no mobility in their arms.For quadriplegic users, there are deuce alternatives to utilize the mouse or keyboard. The first is voice-recognition this involves the user reading a passage of text from the screen so the computer learns their voice pattern. They can thusly use special software to control the computer using voice commands. The technology is get better but can distillery admit mistakes. The check is eye-tracking which uses small cameras mounted on the monitor to detect eye movement and move the cursor to the point where the user is gazing. A mouse click is made by blinking shadowyly.Stephen Hawking uses a special device to allow him to communicate. An infra-red sensor detects twitches in the cheek go through below his eyes in order to enter words and accordingly his device generates a computer syn thesised voice to read them out loud. 14 Internal Hardware Devices (Components) Central Processing Unit ( aboriginal rudimentary processing unit) You need to be able to (a) state the purpose of the central processor (b) describe the function of the mainframe computer as fetching and executing development manual stored in memory (c) explain how common portionistics of processors such(prenominal) as clock speed, cache size and numeral of cores affect their performance.The purpose of the CPU is to mother and Execute operating operating instructions stored in memory. It acts as the brain of the computer and controls the rest of the system. INPUTS and OUTPUTS CPU RAM 15 Fetch Execute Cycle (using Little Man Computer) Download the software http//www. cs. ru. nl/erikpoll/III/lmc. Allows you to quit out of the current program and go back to the head t severally(prenominal)ert This displays which novelty angle of the fetch/execute cycle we are currently in. The program that is currently being carried out. The current instruction is the one in line with the phase display. Provides the name of the current instruction, along with its op code and operand.This explains what the shortsighted man is doing at each stage as he follows the program. Fetch phase Before the minute man can bunk out an instruction, he needs to find out which instruction he has to carry out. He does this by first getting the value from the program forbid (The thing that looks like a green mushroom in a block of wood), and then fetching the value from the corresponding manoeuver in memory. The Program Counter The humble man uses the value in the program return key to decide which foretell in memory he should get the contiguous instruction from.After getting the value, but before going and getting that instruction, he increments the program counter, so that it has the correct value in it when he visits it next time. Memory Memory can be used to store programs, and data. In th e fetch phase of the fetch execute cycle we are only interested in the fact that we can get instructions from the memory. 16 Execute phase Once the little man knows which instruction he is going to perform, he has to set about actually doing it. This is the Execute phase of the fetch execute cycle. For each instruction the little man giveing perform a series of tasks.For instance, for an input instruction, the little man leave alone go to the input tray, take the value he finds there, and go and put it into the calculator. For an add instruction, he will take a value from memory, and add it to the value pre directly in the calculator. Once the execute phase is complete, the little man will sensory facultyt the cycle again, and head to the program counter to get the value of the next instruction he has to fetch. The Input and Output trays These are what we (the user) use to communicate with the little man. We provide him with data via the input tray, and when hes ready, he provid es us with data via the output tray.Calculator (Arithmetic Logic Unit ALU) On a real computer, this would be the Arithmetic Logic Unit (ALU). Its essentially a calculator that will carry out arithmetic operations. Memory Memory is accessed during the execute phase when we need to store or access data. It is mathematical to overwrite your programs when putting data into memory though, so be careful where you put it. Following a program (Decoding instructions) The program is a series of instructions made up of an op code and operand (either data or the address where data is stored).For example Op code Operand 1 2 3 4 5 6 7 800 801 802 9 Load stemma Add Subtract Input Output Halt Skip If forbid Skip If Zero Skip If Positive Jump 2 means Store 2 99 99 refers to the memory address where little man should store the data. These can be stored as double star star program fight patterns, e. g. 10 could refer to the op code (2) above and 1 cat valium011 could refer to the memory addr ess (99). Remember 2 in binary is 10 and 99 is 11000011. This would give the morsel pattern for the above instruction as 1011000011 Q. How does little man (CPU) know the difference between data or an instruction?It all depends on which phase of the cycle the CPU is in, e. g. in the Fetch phase the CPU knows it is an instruction. In the Execute phase the CPU knows it is data. Op codes understood by LMC 17 Characteristics which affect performance Clock Speed This is the reckon of cycles that the CPU can complete in one randomness (measured in oscillation or Hz) A faster clock speed means the CPU can process more instructions per second. For example a 1MHz processor can process 1 million instructions a second whereas a 1GHz processor can do 1000 million instructions in the same time.This is the A superr cache size means holding knowledge domain for more data can be held and data from the its less likely that any cycles are wasted. A RAM. It ensures the CPU smaller cache size an d is always busy fast clock speed may with data. result in a bottleneck between the RAM and CPU. A dual-core processor or This is the quad-core processor is 2 heel of processing cores to 4 times faster than a conventional chip as they the CPU has. A can process simultaneous dual-core has instructions. ii and is able to process two instructions simultaneously in the same cycle. Cache sizeNumber of Cores It is important to balance all of the above to avoid over-speccing one field of force and creating bottlenecks elsewhere. 18 Memory You need to be able to (a) describe the difference between RAM and read-only memory (b) explain the need for ROM in a computer system (c) describe the purpose of RAM in a computer system (d) explain how the amount of RAM in a personal computer affects the performance of the computer (e) explain the need for virtual memory (f) describe cache memory (g) describe flash memory (h) discuss how changes in memory technologies are pencil lead to innovative c omputer designs.RAM and ROM Both are needed in a computer system but for several(predicate) reasons. In a computer computer, ROM (Read Only Memory) is used to store all the instructions (the BIOS Basic Input/Output System) to get the computer up and running. It seeks out the amount of memory, input and outputs available to it and then loads up the operating system. In some computer systems, like your washing machine, the ROM stores the software to control the hardware, as well as data such as cooking/washing times etc.RAM (Random Access Memory) is used as temporary storage for instructions and data between the inputs, outputs, secondary storage (e. g. hard drive) and CPU. The bigger the RAM, the more instructions/data can be held in quick access memory without needing to use Virtual memory this can improve performance. Random Access Memory Read Only Memory Volatile (forgets everything when power switched off) Non-volatile (remembers content even if power switched off) shadow be w ritten to and read from Can only be read from (not written to) Usually measured in grams (Gb) For the BIOS, usually measured in Kilobytes (Kb) 9 Virtual Memory Depending on the size of the RAM, it is not always possible to store all the running programs in the RAM at once and the computer will start running low on memory and slow down. This is where virtual memory comes in. It stores the data that the RAM isnt actively using on the hard drive to free up the RAM. Then, when the CPU needs the data it pulls it back from the virtual memory on the hard drive. As far as the CPU is concerned, all the programs are running from the RAM. The operating system sets up a page file on the hard drive to be used for virtual memory.This is usually set at twice the size of the amount of RAM, e. g. 1GB of RAM should have a 2GB page file. Cache Memory This has been explained in the CPU section on page 17. scintillate Memory Flash Memory is often referred to as solid-state storage, which means that th ere are no moving parts. Its similar to RAM but is non-volatile which means when the power is cut off, it still remembers the content). Flash memory is used in USB memory sticks and memory card game for digital cameras and some games consoles, e. g. Sony PSP.Future developments in Memory technologies Physical Size & susceptibility Costs Speed Power Memory chips have become more compact (storing more bits per chip) which has lead to smaller computing devices and larger capacities. The cost of memory has fallen which means it is now affordable to have large amounts of RAM available. Read/write times are improving which mean faster access and better performance. Memory chips are more power- in effect(p) convey portable devices work for longer between charges and batteries can be smaller and lighter. 20 Secondary StorageYou need to be able to (a) explain the need for secondary storage (b) describe common storage technologies such as optical, magnetic and solid state (c) select suitabl e storage devices and storage media for a given application and justify their choice using fiberistics such as capacity, speed, portability, durability and reliability. Secondary storage is needed for when we want to store files permanently or semi-permanently. We might want to transfer files between computers by using portable secondary storage media. Storage TechnologiesCodes data using microscopic dips on the surface of the disc. Units Optical Codes data using small changes in magnetic fields. Magnetic Uses non-volatile memory chips to store bits of data red-blooded State Candidates should be able to (a) define the terms bit, nibble, byte, kilobyte, megabyte, gigabyte, terabyte snatch 1 Nibble 4 bits Byte 8 bits Kilobyte (Kb) 1,024 bytes Megabyte (Mb) 1,024 kilobytes Gigabyte (Gb) 1,024 megabytes Terabyte (Tb) 1,024 gigabytes 21 Storage Media Comparison Storage Medium CD Method Optical Capacity Medium 650-700Mb Small 1. 4Mb Large 1Gb to 2+ Tb Speed unshakable access Portabili ty whippersnapper and flat Lightweight and flat Heavy and not designed to be carried around. Requires integrating into computer system. Medium-weight. Plugs into computer USB or Firewire port. Lightweight and small. Durability and Reliability Easily scratched and will then not work. Can only be written to once. Can be snapped. Can be damaged by strong magnets or heat. Quite reliable but can crash when the read/write head crashes into the platter. Sometimes happens on laptops when dropped. Can be damaged by magnets.Same concerns as internal hard drive. Floppy Disk Magnetic behindhand access Internal Hard Disk Magnetic Fast access (dependent on speed of motor RPM rotations per minute) Portable Hard Disk Magnetic Large 40Gb to 640Gb Medium-fast access (dependent on connection method, e. g. USB transmission line) Flash drive (USB stick or memory card) Blu-ray disc DVD (Digital Versatile Disc) Solidstate Optical Optical Medium/Larg Medium-fast access e (dependent on connection 1Gb to 64Gb method, e. g. USB cable or card reader) Large Fast access 50Gb Large Fast access 4. 7Gb Not affected by magnets.Quite hardy. Can be dropped without prejudicial contents. Easily scratched and will then not work. Easily scratched and will then not work. Lightweight and flat. Lightweight and flat. 22 Binary Logic You need to be able to (a) explain why data is equal in computer systems in binary form (b) understand and produce transparent logic draws using the operations NOT, AND and OR (c) produce a unity table from a given logic diagram. Computers use binary as its a lot simpler. Each CPU is made up of millions of transistors which can only have two states (ON/OFF).Anything can be converted into a binary number so a computer can understand, process and store it. NOT Gate NOT Truth hold over Input Output 0 1 1 0 Flips the input, e. g. 0 becomes 1 and 1 becomes 0. AND Gate a b Waits for 1 on both inputs before outputting a 1. AND Truth Table Input Input Output a b 0 0 0 0 1 0 1 0 0 1 1 1 OR Gate a b Wait for 1 on either input before outputting a 1. OR Truth Table Input Input Output a b 0 0 0 0 1 1 1 0 1 1 1 1 You can practice with NOT, AND and OR render using the pursual website http//logic. ly/demo/ 23 Representation of data in computer systems verse You need to be able to (a) convert affirmative tenfold whole rime (0-255) into 8-bit binary numbers and vice versa (b) add two 8-bit binary integers and explain overflow errors which may occur (c) convert positive ten-fold whole numbers (0-255) into 2-digit hex numbers and vice versa (d) convert between binary and hexadecimal equivalents of the same number (e) explain the use of hexadecimal numbers to even off binary numbers. tenfold and Binary conversions Numbers greater than 1 can be represent in binary by using more bits. e. g. 129 can be represented in 8 bit (byte) binary as 10000001.Denary Binary 128 1 64 0 32 0 16 0 8 0 4 0 2 0 1 1 This means that if you put a 1 on each increased by doub le bit (i. e. 11111111) the highest denary for each new bit added to the left. number 8 bits (a byte) can store is 255 128+64+32+16+8+4+2+1 = 255. Notice how the number To convert binary into denary, just add together the denary numbers above each bit that has 1 in it, e. g. 10000001 = 128 + 1 = 129. To convert a denary number into binary, find the highest value that will go into it and then pass over down the number of bits with the remainder until there is nothing stay. 4 For example, to convert 44 into binary 8-bit format 44 is smaller than 128 and 64 so we place 0s in those bits Denary Binary 128 0 64 0 32 does go into 44 with remainder of 12, so we place a 1 in that bit Denary Binary 128 0 64 0 32 1 The remainder of 12 is smaller than 16 so we place a 0 in that bit Denary Binary 128 0 64 0 32 1 16 0 8 does go into 12 with remainder of 4, so we place a 1 in that bit Denary Binary 128 0 64 0 32 1 16 0 8 1 4 does go into 4 with with nothing remaining, so we place a 1 in that bit Denary Binary 128 0 64 0 32 1 16 0 8 1 4 1 nd 0s in all the remaining bits Denary Binary 128 0 64 0 32 1 16 0 8 1 4 1 2 0 1 0 Therefore 44 as an 8-bit binary number is 00101100. 25 Adding two binary numbers together Adding two binary numbers together is not as scary as it sounds or looks. It uses the same conventions at the denary number system (Hundreds, Tens, Units). For example Work from right to left, like you do when adding denary numbers using HTUs. 00010010 + 00010100 0+0=0 0+0=0 0+0+1 1+1=0 0+0=0 0 0 11 0 0 1 1 0 0+0=0 1+0=1 0+1=1 (carried over) = 1 (carry 1) allows convert it back into denary to check it is correct Denary 128 Binary 0 16 + 2 = 18 Denary 128 Binary 0 16 + 4 = 20 Denary 128 Binary 0 32 + 4 + 2 = 38 64 0 32 0 16 1 8 0 4 0 2 1 1 0 64 0 32 0 16 1 8 0 4 1 2 0 1 0 64 0 32 1 16 0 8 0 4 1 2 1 1 0 So as 18 + 20 are 38. Then we know the binary calculation is correct 26 hexadecimal Numbers Programmers started to use hexadecimal to reduce mistakes and own it easier fo r them to understand than using lots of 0s and 1s. Denary and hexadecimal conversions enamoradecimal uses a base 16 system = 0-9 and then A-F.That means that the denary number 15 is tint to F in hexadecimal. The denary number 16 is equal to 10 in hexadecimal (which means 1 lot of 16) The highest denary number represented in 8-bit (byte) binary is 255 and was represented by 11111111. In hexadecimal this would be represented as FF (15 lots of 16 + 15). Confused? Remember, F in hexadecimal represents 15. Therefore F0 would be 15*15=240. The second F is 15, therefore FF = 240+15 = 255. To convert denary to hexadecimal you can divide the number by 16. For example, to convert 141 into hexadecimal do the following 141 / 16 = 8 remainder 13. /16 = 0 remainder 8. Therefore, functional from right to left, the hexadecimal number is 8 13 (and 13 is represented as D in hex) so it would be 8D. Alternatively, convert the denary number into binary and then binary to hexadecimal. 27 Binary to hex adecimal conversions To convert binary to hexadecimal you need to break it down into nibbles (blocks of 4 bits). For example, 141 as a binary number is 10001101. The two nibbles are 1000 and 1101. change overing each nibble into denary we can see that 1000 = 8 and 1101 = 13.Remembering that 13 = D in hexadecimal then 141 would be represented as 8D. To convert hexadecimal to binary you just reverse the process. Convert each part of the hexadecimal number into nibbles of binary numbers. For example Hex Denary Binary 8 8 1 4 0 nibble D 2 0 1 0 8 1 4 1 nibble 2 0 1 1 HELP This conversion chart below may help to make sense of it all Denary 0 1 2 3 4 5 6 7 Binary 0000 0001 0010 0011 0100 0101 0110 0111 hex 0 1 2 3 4 5 6 7 Denary 8 9 10 11 12 13 14 15 Binary 1000 1001 1010 1011 1100 1101 1110 1111 Hexadecimal 8 9 A B C D E F 8 Using binary to represent characters You need to be able to (a) explain the use of binary codes to represent characters (b) explain the term character set (c) desc ribe with examples (for example ASCII and Unicode) the relationship between the number of bits per character in a character set and the number of characters which can be represented. Computers use the ASCII (American Standard Code for Information Interchange) format to use binary codes to represent numbers, letters and special characters. It uses 8-bits (byte) to represent each character, so every character has its own unique 8-bit ASCII code.Using the ASCII character set on the next page we can convert characters into binary numbers. For example, Isambard would be represented in binary as I s a m b a r d = = = = = = = = 73 115 97 109 98 97 114 100 = = = = = = = = 0100 1001 0111 0011 0110 0001 0110 1101 0110 0010 0110 0001 0111 0010 0110 0100 Notice how the capital I is diametric from the demoralizecase i in the ASCII format. An upper and lower case version of each letter is present in the chart to enable the computer to tell the difference between them. If you remember what we sa id about binary numbers back on page 23 then you know that 8-bits (a byte) can store up to 255 in denary.This means that the ASCII format can have up to 255 characters represented in a character set. 29 American Standard Code for Information Interchange character set Note You dont need to remember these codes for your exam but just be aware of how it works. 30 Using binary to represent go fors You need to be able to (a) explain the representation of an image as a series of pixels represented in binary (b) explain the need for metadata to be included in the file such as height, breadth and colour wisdom (c) discuss the effect of colour depth and contract n the size of an image file. Images on the computer are made up of lots of individual pixels (small squares of colour). If you zoom into any image teeming times you will see these little blocks of colour. We can use binary numbers to represent each pixel. In a simple image, where there are only two colors (colour depth of 1) the n we can simply use a 1 for one colour, and 0 for another. For example, look at this small 3 x 3 pixel image below. The 1s represent the black colour and the 0s represent the white. 0 0 0 1 0 0 0 1 31 That is the principle behind storing images as binary. However, we also need to know a some other things about the image in order to display it correctly, i. e. its height, comprehensiveness and colour depth. Image Metadata Height Width Colour depth block The height of the image in pixels The width of the image in pixels The number of bits available to represent each pixel The pixels per inch (PPI) if the pixels per inch is high, then the re root word and image quality is also high.Without this metadata the computer would not be able to reconstruct the image properly. Colour Depth In a simple 1-bit colour depth image, we can only display two colours. However, in an 8-bit colour depth image (like the gif format), we can display 256 colours (one for each binary number from 00000000 t o 11111111). In a 24-bit colour depth image (like the jpeg format), we can display just over 16 million colours If we use more bits to store each pixel, then the file size will be larger. That is why . gif images are often smaller in file size than . peg images. Resolution If the image has a higher resolution, it has more pixels to store data about and is therefore larger in size. If the image is lower resolution, this means that there are less pixels per inch, which means less pixels to store data about and is therefore smaller in size. 32 Using binary to represent sound You need to be able to (a) explain how sound can be modeld and stored in digital form (b) explain how sampling intervals and other considerations affect the size of a sound file and the quality of its playback.Sound is stored in the computer by taking samples of the sound wave at regular intervals and converting those into binary numbers (using an analogue-to-digital convertor). The computer can then re-create the sound by reversing the process. The file size and quality of the sound recording is affected by the sample rate and bit rate. The sample rate refers to the number of samples taken each second. It is measured in Hertz (like the CPU clock speed). If the sound wave is not sampled at a higher enough rate, this can lower the quality of the sound recording, but the file size would be smaller.If the sound wave is sampled at a higher sampling rate, this will increase the quality of the recording, but the file size will be much larger. The bit rate refers to the amount of bits used to store the different levels of sound at each sampling interval. The more bits, the greater range of levels that can be distinguished. This also has the affect of increasing the file size if the bit rate is high (e,g. 16-bit instead of 8-bit). 33 Computer Communications and intercommunicatesNetworks You need to be able to (a) explain the advantages of mesh topologying stand-alone computers into a local area p rofits (b) describe the hardware needed to connect stand-alone computers into a local area network, including hub/switches, wireless access points (c) explain the different roles of computers in a client-server and a peer-to-peer network (d) describe, using diagrams or otherwise, the ring, bus and star network topologies (e) describe the differences between a local area network and a wide area network such as the profit explain the terms IP addressing, MAC addressing, packet and (f) protocols (g) explain the need for security measures in networks, such as user access levels, suitable passwords and encryption techniques (h) describe and justify network policies such as acceptable use, disaster recovery, failover, back up, archiving. Why network? Allows computers to communicate with each other and share resources, e. g. peripherals (printers, scanners), storage, internet access. Data Packets Information is sent around a network in data packets. Data is broken down into packets to be sent over the network and often may take different routes to get there. It contains info on where it needs to go (the address) and the packet number and an error-checking facility to ensure the packet arrives intact and can be put back together in the right order. 34Basic components of a local area network (LAN) Client/ Computer Hub, bewilder or Router See next page for explanation of each. Server In a Client-Server network, the server handles the logins, applications and file storage. Modem Interfaces between the net profit and the network. Shared Peripherals Networks allow peripherals like this printer to be divided up by all the computers on the network. Internet 35 Hub, Switch or Router? These are not the same. You need to know the difference between them. Hub A hub receives all data sent over the network and sends it to all the other devices on the network. Only the device who the data packet is for will acknowledge it the other devices will ignore it.A switch is bit more int elligent than a hub and it learns which devices are on the network (and their port number/address) and only sends the data packet to the computer who is the intended recipient. This is more efficient than a hub as it doesnt result in lots of extra network calling. A router is cleverer still than both hubs and switches. It can re-direct network traffic and deal with different packets in different ways. It can protect the computers on the network by hiding them from the outside world (i. e. a firewall). Some routers have a modem built-in and wireless capabilities. Most homes have a 4-port wireless broadband router to access the Internet. This combines the router and modem functions. Switch RouterWireless access points dont require a physical connection and therefore are suited for a variety of different devices and provide access to network over an area, e. g. iPad or smartphone. IP address The IP address (Internet Protocol) is a computers unique address on the network, e. g. 192. 1 68. 0. 1 is usually your home routers address. On the Internet, each website has its own or several IP addresses. 36 MAC address The MAC address (Media Access surmount) is a hexadecimal number that is unique to that particular device. Hey Did you know that there are 281,474,976,710,656 possible MAC addresses in the world? Thats a lot of MACs baby huh huh Network Protocols Protocols are a set of standards and guidelines that tell computers how they should handle the sending and receiving of data over the network.TCP/IP (Transmission Control Protocol and Internet Protocol) utilise to exchanged data between computers on a network and route packets between networks and over the Internet. Used on WWW to transfer webpages and web content from the website host server to the computer requesting the page. Used to transfer files between computers over a network. Used to disco biscuit emails. HTTP (HyperText transfer Protocol) FTP (File Transfer protocol) SMTP (Simple Mail Transport Protoco l) LAN or WAN? A LAN is a Local Area Network which is usually set-up within a certain area, e. g. a building or group of buildings hence the term local. A WAN is a Wide Area Network which is usually on a across the country or worldwide scale. The Internet is an example of a WAN a series of interconnected LANs. 7 Network Topologies A network can be set up in three main ways Ring 4 3 5 1 2 All the computers are linked together in a ring and data packets are sent one way round. For example in the diagram above to get from PC 1 to PC 5 the data needs to go through PCs 2, 3 and 4. It cant go anti-clockwise back to PC 5. Drawbacks If there is one break in the ring then the network breaks down. Also not very efficient as a lot of network traffic doesnt take the most direct route. Bus All the computers are connected to a central bus. You can add and take away computers easily in a bus network as the computers are connected to the central bus, rather than between one another.Drawbacks Onl y one computer can use the bus at once which means only one computer can communicate at a time the others have to custody until the bus is free before sending their data this makes it slow. If a computer connected to the bus breaks down, then the network still runs but if the central bus breaks down then so does the whole network. 38 Star 4 3 5 1 2 All the computers are connected to central server. The server can handle multiple communication theory at once and re-directs traffic over the network. More computers can be added or taken away without affecting the network. Drawbacks If the main server fails then the network goes down. Client-server and peer-to-peer networks In a Client-server network, the server acts as the main computer handling login requests, user storage, etc.The client could be any computer. The user can log on to any client and still access their stuff on the server. In a Peer-to-peer network, each computer shares information as and plays an equal role in the network. Network Security Part of Data Protection Act 1998 requires companies who store data electronically to keep it pencil eraser and secure. Without security then anyone could hack into the network and intercept data packets. mystical data packets should be encrypted so if they are intercepted they are unreadable. There may be a need to pr matter unauthorised access to particular areas of the system this could be controlled by passwords and different user levels, e. g. n the school a student can only access the student shared drive, whereas teachers can access both the student shared drive and the module shared drive. 39 Network counsel Policies Disaster recovery In the event of the system failing there needs to be plans in place to get the network up and running again as quickly as possible. Many organisations, such as banks, have a disaster recovery plan which may mean relocating to a different location (if the building is no longer accessible). Failover and reenforcement s If there is a power cut, many networks have UPS (uninterrupted power supplies) which are large batteries with enough charge to keep the network going long enough to shut it down correctly. If a hard drive fails, there is usually a backup which can take the strain.Networks are often backed up at least daily and these backups are stored off-site or in a fire-proof safe so in the event of a disaster in the building, the data is still intact. Maintenance Sometimes data needs to be kept but is not accessed regularly. This data can be archived off onto tape to help free up space on the network. unexceptionable Use It is important for the network to have an acceptable usage constitution to provide users with guidelines about what they can and cant do using it. For example, it would use up vital network bandwidth if some users decided to play a network game or download the latest souse from the Internet. If users start file sharing copyrighted materials, like music, using the network t hen there is a legal issue to consider as well. 40 The InternetYou need to be able to (a) describe the nature of the Internet as a worldwide collection of computer networks (b) describe the hardware needed to connect to the Internet including modems, routers etc (c) explain the need for IP addressing of resources on the Internet and how this can be facilitated by the role of DNS servers (d) explain the importance of HTML and its derivatives as a standard for the creation of web pages (e) describe common file standards associated with the Internet such as JPG, GIF, PDF, MP3, MPEG (f) explain the importance of compressing files that are transmitted via the Internet (g) describe the differences between lossy and lossless compression. What happens when you type in a web address in your browser? When you enter a web address in your browser, it heads off via your modem to your ISPs (Internet Service Provider) domain name servers (DNS).These computers store the IP address(es) for each webs ite and directs your request to the relevant server hosting the webpage you want to view. The information is then sent back to your ISP and then back to your computer. Why HTML? HTML (HyperText Markup Language) provides a standard format which any computer with web browser can interpret and display the pages. It allowed the World Wide Web to get going as there was a universal standard that everyone could now use to share information. 41 Common file formats used on the Internet . html . jpg HTML Web page JPEG image Used to store webpages Used to store photos as can show up to 16. 7 million colours. Used for simple graphics and short animations can show up to 256 colours.Used to store non thinable documents for viewing on the Internet using the free Adobe viewer software. Used to store music tracks. Compressed to make downloading faster. Used to store videos. Compressed to make downloading faster. Used for Adobe Flash files to add interaction and/or animations to websites. Used to st ore video files playable using free Apple viewer software. .gif Graphic Interchange format image .pdf Adobe Portable Document format .mp3 MP3 Music format .mpg MPEG video format .swf Shockwave Flash format .mov Apple Quicktime format Why compress on the Internet? The Internet can be slow at times, especially in its early days relying on early 56Kbps modems as opposed to the 3-4 Mbps average.Therefore if you could compress the files that were being sent on the Internet, then you sent smaller files, and smaller file sizes meant faster downloads. It also frees up the network and avoids clogging up the bandwidth. 42 Lossless versus lossy Compression Lossless compression Compression used means the original file stays completely intact and unchanged. Used for text documents, data files and executable programs where it would not be desirable for parts to be lost. Used for multimedia files, i. e. sound, images, video. Lossy compression Compression which involves discarding parts of the file which wint be noticed if they are not present.For example, it is possible to remove some data within an image and your brain fills in the gaps. paying back a look at the images of the dog below Source wikipedia. org The image has more compression applied to it as you go from left to right. notwithstanding though the image on the right in heavily compressed, we can still see it is a dog. Our brain fills in the gaps. 43 Databases What is a database? A database is a persistent organised store of data which can be easily and quickly searched. They are most commonly used for Marketing, e. g. loyalty cards. Huge databases are searched for patterns in customers acquire habits and then targeted coupons are mail shot to customers.The school has several databases to store everything from your behaviour logs and Brunels, to your address, date of birth and even how much money you have on your lunch card Data handling software, such as Microsoft Access, allow users to add tables, define fie lds and validation (create) add/edit/delete data (maintain) run queries to extract information from the database (interrogate) DBMS (Database Management System) Many large databases use a database management system (DBMS). This system reissues the data stored from the data handling applications used to maintain and interrogate the database. quality Concurrent usage Security Recovery & Backup Data integrity Why is this good? Allows multiple users to use the database at the same time Provides bility to allow/restrict data access to individuals or applications Provides backup solution and recovery tools to ensure data is not lost in event of failure Enforcing data integrity by ensuring data is consistent and adheres to the rules relational databases A flat-file database is when all of the data and fields are stored in one table, e. g. an excel spreadsheet full of names and addresses see below 44 A relational database is when that data is separated into individual tables (entities) t hat are linked by a primary key (which appears in each table). pupil disciple ID initiative name Surname Class Class ID Student ID instructor ID Teacher Teacher ID Name SubjectIn the example above, the STUDENT, CLASS and TEACHER are all tables (entities) in the database. The id is the unique piece of information (the primary key) that identifies each instance of a student, class or teacher. We couldnt use First Name as the primary key in STUDENT as many people share the same first name it isnt unique enough The advantage of separating the data into different entities is to avoid data redundancy when the same data is stored in several places in the database. Lets imagine if we stored the information above in a flat-file database (all in one table) it would look something like this Duplicated data Can you see the duplicated information?Not only does this use up space but it is easier to make a mistake (and lose data integrity) if we only update one of the records. E. g. if Miss Parsons gets married and her name changes to Mrs Smith then we need to make this change for every record in the database. If are using a relational database, because the Teachers name is stored in a separate table and linked to the rest of the entities, we only need to update it in the TEACHER table once. In the CLASS entity, both Teacher ID and Student ID are remote keys (primary keys that when linked to another table become foreign keys in that table). Components of a relational database Tables Represents the entity in the database. Fields and primary keys are defined and data stored in the table. Create) Forms Provide a customisable user interface to add/edit and delete data (Maintain) Queries Allow data that meets specific criteria to be extracted and displayed (Interrogate) Reports Displays the results of queries in a customised format designed to be printed Querying a database 45 When interrogating a database, you need to specify the fields you wish to display and the criter ion you will use to search. E. g. if you were searching for a car on a car supermarket website you might search using the make of the car you wanted Make = Ford You could also use logical operators such as (NOT equal to), (less than), (greater than), = (greater than or equal to). E. g. Mileage

No comments:

Post a Comment