Professional Documents
Culture Documents
1
Command words
The table below includes command words used in the assessment for this syllabus. The use of
the command word will relate to the subject context. Make sure you are familiar with these.
Command What it means
word
Analyse examine in detail to show meaning, identify elements and the relationship
between them
Assess make an informed judgement
Calculate work out from given facts, figures or information
Comment give an informed opinion
Compare identify/comment on similarities and/or differences
Complete add information to an incomplete diagram or table
Consider review and respond to given information
Contrast identify/comment on differences
Define give precise meaning
Demonstrate show how or give an example
Describe state the points of a topic/give characteristics and main features
Develop take forward to a more advanced stage or build upon given information
Discuss write about issue(s) or topic(s) in depth in a structured way
Draw draw a line to match a term with a description
Evaluate judge or calculate the quality, importance, amount, or value of something
Examine investigate closely, in detail
Explain set out purposes or reasons/make the relationships between things
evident/provide why and/or how and support with relevant evidence
Give produce an answer from a given source or recall/memory
Identify name/select/recognise
Justify support a case with evidence/argument
Outline set out main points
2
Predict suggest what may happen based on available information
Sketch make a simple freehand drawing showing the key features, taking care over
proportions
State express in clear terms
Suggest apply knowledge and understanding to situations where there are a range of
valid responses in order to make proposals
Summarise select and present the main points, without detail
Write write an answer in a specific way
Binary – base two number system based on the values 0 and 1 only.
Bit – abbreviation for binary digit.
Hexadecimal – a number system based on the value 16 (uses the denary digits 0 to 9 and the letters A to F).
Memory dump – contents of a computer memory output to screen or printer.
ASCII code – coding system for all the characters on a keyboard and control codes.
Character set – a list of characters that have been defined by computer hardware and software. It is necessary
to have a method of coding, so that the computer can understand human characters.
3
1. DATA REPRESENTATION Example use of binary
1.1 Binary Systems > A register is a group of bits, often
depicted as:
> The binary system is based on the
number 2 o 10010111
> Made up of 1s and 0 > Robotics
4
1.4 Use of the Hexadecimal System
> Examples:
o defining colours in Hypertext Markup
Language (HTML)
o Media Access Control (MAC) addresses
o Assembly languages and machine code
o Debugging
Memory Dumps
> Hexadecimal is used when developing
new software or when trying to trace
errors
> Memory dump is when the memory
contents are output to a printer, monitor.
Assembly code and machine code (low
level languages) Computer memory is
machine code/ assembly code Using
hexadecimal makes it easier, faster, less
error prone to write code compared to
binary.
> Using machine code (binary) takes a long
time to key in values and prone to errors
1.5 Error Checking
Parity Checking
> Parity checking is used to check weather
data has been changed or corrupted
following transmission from one device to
another
5
Even and ODD , In Even Parity check > Stored as a series of demands but no
number of ones are even. actual music notes
> A byte of data is allocated a parity bit > Uses 8-bit serial transmission
(asynchronous)
o Systems that use even parity have an
even number of 1-bits > Each MIDI command has a sequence of
bytes:
o Systems that use odd parity have an odd
number of 1-bits o First byte is the status byte – informs the
MIDI device what function to preform
Automatic Repeat Request (ARQ)
o Encoded in the status byte is the MIDI
> ARQ is another method to check if data
channel (operates on 16 different
has been transmitted correctly
channels)
> It uses and acknowledgement (message
> Examples of MIDI commands:
sent by the receiver indicating that data
has been received correctly) o Note on/off: indicates that a key has
been pressed
Checksum
o Key pressure: indicates how hard it has
> Checksum is another way to see if data
been pressed (loudness of music)
has been transmitted correctly
> Needs a lot of memory storage
> Data is sent in blocks and an additional
value sent at the end of the block MP3
Echo check > Uses technology known as Audio
Compression to convert music and other
> When data is sent to another device, this
sounds into an MP3 file format
data is sent back again to the sender
> This compression reduces the normal file
> The sender compares the two sets to
size by 90%
check if any errors occurred
o Done using file compression algorithms
> Not reliable
which use Perceptual Music Shaping
1.6 File types o Removes sounds that human ear cannot
Musical Instrument Digital Format (MIDI) hear properly
6
> Use lossy format as the original file is lost 2. COMMUNICATION &
following the compression algorithm
INTERNET TECHNOLOGIES
MP4
2.1 Transmission of Data
> This format allows the storage of
multimedia files rather than just sound > Asynchronous data transmission refers to
data being transmitted in an agreed bit
> Music, videos, photos and animations pattern
can be stored
o Data bits are grouped together & sent
> Videos, could be streamed without losing with control bits
any real discernible quality Joint
Photographic Experts Group (JPEG) o This means the receiver of the data
knows when the data starts and ends,
> JPEG is a file formats used to reduce prevents data getting mixed up
photographic file sizes
> Synchronous data transmission is a
> Reducing picture resolution is changing continuous stream of data (not in discrete
the number of pixels per centimetre groups like asynchronous)
> When photographic file undergoes o Ensures that the sender and receiver are
compression, file size is reduced synchronized with each other
> JPEG will reduce the raw bitmap image o Faster method
by a factor between 5 and 15
2.2 Serial & Parallel Transmission
1.7 Lossless and Lossy File Compression
> Serial data transmission is when data is
Lossless File Compression sent one bit at a time over a single wire
> All the data bits from the original file are o Works well over long distances
reconstructed when the file again is
uncompressed o Data transmitted at a slower rate (USB)
> Important for files where loss of data > Parallel data transmission is when data
would be disastrous (spreadsheet) several bits (1 byte) are sent down several
wires at the same time
Lossy File Compression
o Works well over short distance
> The file compression algorithm
eliminates unnecessary bits of data like o Faster method (internal components use
MP3 and JPEG formats parallel for high speed)
> Impossible to get original file back once 2.3 Simplex, Half-duplex and Full-duplex
compressed > Simplex data transmission is in one
direction only (e.g. computer to printer)
7
> Half-duplex data transmission is in both > To remove risk:
directions but not at the same time (e.g.
o Firewalls
phone conversation where only one
person speaks) o Strong passwords/ user IDs
> Full-duplex data transmission is in both o Use of anti-hacking software
directions simultaneously (e.g. broadband
connection on phone line)
> Difference between hacking and cracking
2.4 Universal Serial Bus (USB)
o Hacking breaks into computer system to
> USB is an asynchronous serial data
steal data
transmission method
o Cracking is where someone edits a
> USB consists of:
program code, malicious
o Four-wire shielded cable
Viruses:
o Two wires used for power and earth
> Program that can replicate itself with the
o Two wires used in data transmission intention of deleting or corrupting files,
cause computer malfunction
ADVANTAGES DISADVANTAGES
> Effect:
Automatically detected
o Can cause computer to crash
Only fit one way, prevents incorrect
connections o Can delete or corrupt files/data
Maximum cable length is about 5 metres > To remove risk:
Different data transmission rates o Install anti-virus software
Transmission rate is less than 500 mb/sec o Don’t use software from unknown
sources
2.5 Security Aspects
o Be careful when opening emails from
Hacking
unknown
> The act of gaining illegal access to a
Wardriving:
computer system
> The act of locating and using wireless
> Effect:
internet connections illegally
o Leads to identity theft, gaining personal
> Effects:
information
o Possible to steal internet time
o Data can be deleted, changed or
corrupted o Possible to hack into wireless network
and steal user’s password
8
> To remove risk: > Used when writing and developing pages
o Use complex passwords > Mark-up language is used in the
processing
o Firewalls
> Html use <tags> to bracket piece of codes
Spyware:
> Different intensity of colours is
> Software that gathers info by monitoring
determined by its hexadecimal value
key presses on the user’s keyboard and
info is sent back Media Access Control (MAC)
> Effects: > MAC address refers to a number which
uniquely identifies a device on the internet
o Access to all data entered
> Refers to the network interface card
o Software is able to install other spyware,
(NIC) which is part of the device
read cookie data
> Usually made up of 48 bits shown as six
> To remove risk:
groups of hexadecimal digits
o Use of anti-spyware software
> NN:NN:NN:DD:DD:DD
o Use a mouse to select characters from
o (NN:NN:NN) first half is the identity
passwords rather than typing them
number of the manufacturer of the device
2.6 Internet Principles of Operation
o (DD:DD:DD) second half is the serial
> Internet Service Protocol: These are number of the device
companies that provide user with access to
> Types of MAC Address:
the internet
o Universally Administrated MAC Address
Internet Protocol (IP) Address
(UAA)
> Each device on the internet is given a
o Locally Administrated MAC Address
unique address known as the IP address
(LAA)
> 32-bit number written in the form:
o UAA is the most common type set by the
109.108.158.1
manufacturer
> IP address gives the location of a device
on the internet whereas the MAC address > Reasons to change MAC address using
identifies the device connected to the LAA
internet
o To ensure they follow the correct
> IP address changes, MAC address formula
remains unchanged
o To bypass MAC address filter on a router
HTML (HyperText Mark-up Language) or a firewall
9
o To get past certain types of network Computer Architecture
restrictions Web addresses
> Address bus – unidirectional
> Each character on the keyboard has its
Used to carry memory addresses.
own ASCII code
> Data bus – bi-directional
> Can be represented using hexadecimal or
decimal values Used to carry data between memory unit
control unit and ALU
> Hexadecimal addresses are used in the
address of files or webpages as a security > Control bus – unidirectional and bi-
figure directional.
> Takes longer to type in URL but Carries all control instructions.
advantage is that you are unlikely to fall
> Processor: The processor contains the
into the trap of copying a fake website
Arithmetic and Logic Unit (ALU)
Cookies
> Control Unit: The control unit controls
> A packet of information sent by a web the operation of the memory, processor
server to a web browser and input/output devices
> Generated each time the user visits the The Fetch-Execute Cycle
website
1. PC contains address of the next
> Every time a user visits a website, instruction to be fetched
cookies will have collected some key
2. This address is copied to the MAR via
information about the user
the address bus
> They are able to carry out user tracking
3. The instruction of the address is copied
and maintain user preferences
into the MDR temporarily
> Cookies are pieces of data
4. The instruction in the MDR is then
> Information gathered by cookies doesn’t placed in the CIR
contain personal information
5. The value in the PC is incremented by 1,
3. HARDWARE & SOFTWARE pointing the next instruction to be fetched
6. The instruction is finally decoded and
then executed
10
> The image is converted into an electronic > The 2D photograph in the passport is also
form which can be stored in the computer scanned and stored as jpeg image
o Document is placed on a glass panel > The passenger’s face is also
photographed using a digital camera and
o A bright light illuminates the document
compared using face recognition software
o A scan head moves across the document
> Key parts of the face are compared
until the whole page is scanned. And image
(distance between eyes, width of nose)
of the document is produced and sent to a
lens using a series of mirrors Barcode readers/scanners
o The lens focuses the document image > A barcode is a series of dark and light
parallel lines of varying thicknesses
o The focused image now falls onto a
charge couple device (CCD) which consists > The numbers 0 -9 are each represented
of a numbers of integrated circuits by a unique series of lines
o Software produces a digital image from > The left and right hand sides of the
barcode are separate using guard bars
> Optical Character Recognition (OCR) is a
software which converts scanned > Allows barcode to be scanned in any
documents into a text file format direction
> If the original document was a o Barcode is read by a red laser or red LED
photo/image, then the scanned image
o Light is reflected back off the barcode;
forms an image file such as JPEG
dark areas reflect little light which allows
Three-dimensional Scanners the bars to be read
> 3D scanners can scan solid objects and o Reflected light is read by sensors
produce a three- dimensional image (photoelectric cells)
> Scanners take images at several points, x, o Pattern is generated which is converted
y and z (lasers, magnetic, white light) to digital
> The scanned images can be used in Quick Response (QR) Codes
Computer Aided
> Another type of barcode is the QR codes
Design (CAD) or to a 3D printer to produce
> Made up of a matrix of filled in dark
a working model
squares on a light
Application of 2D Scanners at an Airport:
background
> Make use of (OCR) to produce digital
> Can hold more storage (7000 digits)
images which represent the passport pages
> Advantages of QR codes:
> Text can be stored in ASCII format
11
o No need for the user to write down • There is usually a scroll button which speeds
website address up the process of moving through a document
12
o Used for opening, closing and minimising o Have the same pointing/cursor control
software capability as a mouse
o Used for grouping, moving and deleting files o Used in applications where the user has a
o Useful when editing images (e.g. controlling disability (RSI)
the size and position of the image)
o Used in a control room environment,
o Used for controlling the position of a pointer where it is faster than a mouse to navigate
on the screen to allow: through process screens and more robust
▪ Selection from a menu
than a mouse
there is no separate mouse, aiding portability o They take less desk space than mice since
they are stationary
o They can be used when no flat surfaces are
available • Disadvantages
• Disadvantage o Tracker balls are not supplied with the
o People with limited hand/wrist movement computer as standard, so they are more
can find touchpads hard to use expensive
o It can be more difficult to control the pointer o User may need training since they are
when compared to a mouse not standard equipment
o They are more difficult when doing Microphones
operations such as
> Used to input sound to a computer
‘drag and drop’
> When a microphone picks up sound, a
Tracker Ball diaphragm vibrates producing an electric
• Tracker ball is like a mouse except that it signal
has a ball on the top of the device > The signal goes to a sound card and is
• Users control the pointer on the screen converted into digital values and stored in
by rotating the ball computer
• Uses
13
> Voice recognition, voice is detected and o There is some artistry lost since clever
converted into digital software corrects errors in the
photographs
Digital Cameras
o The resolution is not yet as good as
• Photographs are stored in memory
traditional cameras
• They can be easily transferred to a
o Images often need to be compressed to
computer using a USB
reduce the amount of memory used
• Uses
o It is possible to fill up computer memory
o Digital cameras can produce photographs very quickly with several photos of the
for direct transfer to a computer or to print same subject (to find the perfect snap
out shot)
o Digital cameras allow short video clips to Microphone
be produced
• Can be connected directly to a computer
o Photographs can be uploaded directly
• Sounds can be inputted and manipulated
into application software such as word
processor • Uses
14
o Sound files can use up a lot of computer o Signals are then sent out which are
memory interpreted by a microprocessor,
determine where screen was touched
o Voice recognition software isn’t as
accurate as typing in manually Sensors
Touchscreens > Devices which read or measure physical
properties
> Capacitive (medium cost tech)
> Data needs to be converted to digital
o Made up of many layers of glass
> Analogue to Digital Converter (ADC)
o Creating electric fields between glass
converts physical values into digital
plates in layers
Control of Street Lighting
o When top layer of glass is touched,
electric current changes > Light sensor sends data to the ADC
o Co-ordinates where the screen was > Digitises data and sent to the
touched is determined by an on-board microprocessor
microprocessor
> Microprocessor samples data every
> Infra-red heat (expensive) minute
o Use glass as the screen material > If data from sensor < value stored in
memory:
o Needs warm object to carry an input
operation o Signal sent from microprocessor to street
lamp
> Infra-red optical (expensive)
o Lamp switched on
o Uses glass as screen material
3.4 Output Devices
o Uses an array of sensors (grid form)
PRINTERS:
o Point of contact is based on which grid
co-ordinate is touched Inkjet Printers
> Resistive (inexpensive) > Used to print one-off pictures and
documents
o Upper layer of polyester, bottom layer of
glass 1. Data from document sent to printer
driver
o When the top polyester is touched, the
top layer and bottom layer complete a 2. Printer driver ensures data is in correct
circuit format
3. Check made by printer driver that
chosen printer is available
15
4. Data is sent to printer, stored in a 7. Discharge lamp removes all electric
temporary memory (printer buffer) charge from the drum, ready to print next
page
5. Sheet of paper is fed; sensor detects if
paper is available in paper tray 3D Printers
6. Print head moves across paper printing > Used for models of cars
text/image, four ink colours sprayed in
exact amount > Produce solid objects that work
7. Paper is advanced so next line is printed > Built up layer by layer, using powdered
resin, ceramic powder
8. Repeated until buffer is empty
> A design is made using Computer-aided
9. Once it is done, printer send an interrupt Design (CAD)
to the processor (request for more data to
3D Printer
be sent)
• A new type of printer that produces solid 3D
Laser Printers models using modified inkjet technology called
> Used to print flyers, high quality tomography
6. Paper finally goes through a fuser (set of o The powders used can often be ground up
and reused
heated rollers); heat melts the ink so it is
permanent
16
o Physical scale models are produced with o Automatic washing machines (to make the
working parts, which gives a better idea of drum rotate)
how the product will look
o Cookers (to switch on fans)
• Disadvantages
o Water pumps in central heating systems
o Expensive to buy
o Automatic greenhouses to open windows
o Slow at producing their output and switch on fans
o Product is sometimes a little rough, often o Used to control robot arms in the industry
further work needs to be done
o Operate fans, disk drives and DVD drives in
computers
> 3D laser cutters can cut; glass, crystal, o Used in cookers and microwave ovens to tell
metal, wood the operator when the cooking process is
complete
Actuators Heaters
17
> Used in many control applications applications (Computer Aided
involving sensors and devices (ADC and Design/Manufacturing)
DAC) • Disadvantages
the colour perceived by the eye • The screen is made up of thousands of tiny
pixels which are made up of transistors
• Uses controlled by a microprocessor
o Primary output device for computers, user • Each pixel has three transistors-red, green or
can blue; the intensity of each determines the
immediately see what they are typing in colour of the pixel seen.
o Produce higher quality images than TFT o Integral part of laptop computers
monitors • Advantages
o Angle of viewing is better than a TFT monitor o Lightweight, so no weight hazards like CRT
o They work with light pens in CAD and CAM monitors
18
o Less glare produced than in CRT monitors; o High power consumption
also emit
o Slow response time
less radiation
• Note: Old LCD monitors used CCFL (cold
o Consume much less power and generate less cathode
heat
fluorescent lamp) technology to light up the
than CRT monitors screen.
o Angle of viewing is critical, image appears • Front layer made from liquid crystal diodes;
unclear if viewed slightly from the side grouped
o This is an issue if several people are looking together to form pixels (RGB or RGBY-more
at the screen at the same time vivid colours)
o They cannot yet be used with light pens, • For the image to show up on-screen a light
source of LED
backlight is used.
IPS/LCD Monitor
• Advantages (over LCD monitors):
• Front layer made from liquid crystal diodes;
grouped o Lighter and thinner
19
o Smartphones DVD or television) use multimedia projectors
User-friendly and Intuitive Constant usage o e.g. when looking at a video clip on the
results in the screen getting dirty; visibility and internet,
sensitivity decreases
everybody can see the video on the large
Multimedia Projector screen rather
• The image from the source is magnified and o Setting up projectors can be a little difficult
projected onto a large screen
Laser Printer
• The devices usually work with a remote
• Produce very high-quality hard copy output
control, but can also use virtual mouse
technology – cordless PC mouse (has a laser • Print rate per page is fast if many pages are
pointer) being printed
o It is then possible to direct the presentation • Rely on large buffer memories – the
without being tied to the computer
data for the whole document is stored before
o Most multimedia projectors take input from pages can be printed out
various types of video format e.g. PAL, NTSC or
SECAM • Uses
20
o Quality is consistently high o LEDs consume very little power
o Toner cartridges last for a long time; laser > Before LEDs, LCD monitors were backlit
printers can be a cost-effective option if colour using CCFL
outputs are not required
> CCFL uses two fluorescent tubes behind
• Disadvantages
the LCD screen which supplies the light
o Expensive to buy source
o Only fast if several copies are being made LIGHT PROJECTORS:
o Colour laser printers tend to be expensive to > Two common types of light projectors:
run since four cartridges are needed as well as
diffuser kits, etc. o Digital Light Projector (DLP)
o LEDs sharpens image (higher resolution), > White light splits into primary colours
CCFL has yellow tint LCD Projectors
o LEDs improve colour image > Older technology than DLP
o Monitors using LED are much thinner
than CCFL
21
Laser
Printer
9 to prevent the paper sticking to the drum, the electric charge on the paper is removed
after one rotation of the drum
10 the paper goes through a fuser (a set of heated rollers), where the heat melts the ink so
that it fixes permanently to the paper
11 a discharge lamp removes all the electric charge from the drum so it is ready to print the
next page
22
Ink-jet Printer
3 check is made by the printer driver to ensure that the chosen printer is available to
print (is it busy? is it off-line? is it out of ink? and so on)
4 data is sent to the printer and stored in a temporary memory known as a printer buffer
5 a sheet of paper is fed into the main body of the printer. A sensor detects whether
paper is available in the paper feed tray – if it is out of paper (or the paper is jammed),
an error message is sent back to the computer
6 as the sheet of paper is fed through the printer, the print head moves from side to side
across the paper printing the text or image. The four ink colours are sprayed in their
exact amounts to produce the desired final colour
7 at the end of each full pass of the print head, the paper is advanced very slightly to
allow the next line to be printed. This continues until the whole page has been printed
8 if there is more data in the printer buffer, then the whole process from stage 5 is
repeated until the buffer is empty
9 once the printer buffer is empty, the printer sends an interrupt to the processor in the
computer, which is a request for more data to be sent to the printer. The process
continues until the whole of the document has been printed
23
Sensor Example applications
temperature • control a central heating system
• control/monitor a chemical process
• control/monitor temperature in a greenhouse
light • switch street lighting on at night and off during the day
• monitor/control light levels in a greenhouse
• switch on car headlights when it gets dark
24
Examples of monitoring Examples of control
• monitoring a patient in a hospital for vital signs • turning street lights on at night and
such as heart rate, temperature, and so on turning them off again during daylight
• checking for intruders in a burglar alarm system • controlling the temperature in a central
• checking the temperature levels in a car engine heating/air conditioning system
• monitoring pollution levels in a river • controlling the traffic lights at a road
junction
• operating anti-lock brakes on a car
when necessary
• controlling the environment in a
greenhouse
25
RAM ROM
• small in size and therefore easy to • difficult to upgrade devices to take advantage of new
fit into devices technology
• relatively low cost to make • troubleshooting faults in the device becomes a
• usually dedicated to one task, specialist task
making for simple interfaces and • although the interface can appear to be simple, in
often no requirement of an reality it can be more confusing (changing the time
operating system on a cooker clock can require several steps, for
• consume very little power example)
• very fast reaction to changing input • any device that can be accessed over the internet is
(operate in real time) also open to hackers, viruses, and so on
• with mass production comes • due to the difficulty in upgrading and fault finding,
reliability devices are often just thrown away rather than being
repaired (wasteful)
26
> A powerful beam of white light is > As RAM becomes full, the processor has
generated from a bulb to continually access the hard drive to
overwrite old data on RAM with new data
> This beam of light is then sent to a group
of chromatic-coated mirrors; these reflect Read Only Memory (ROM)
the light back at different wavelengths
> Features of ROM
> When the white light hits the mirrors, the
o Non-volatile/permanent memories
reflected light has wavelengths
(contents remain even when ROM is
corresponding to red, green and blue
turned off)
> These three different light pass through
o Used to store start up instruction (basic
three LCD screens; these screens show the
input/output systems)
image to be projected as millions of pixels
in grayscale o Data/contents of a ROM chip can only be
read, cannot be changed
> When the coloured light passes through
the LCD screens, a red, green and blue SECONDARY STORAGE:
version of the grey image emerges
Hard Disk Drives (HDD)
> Finally, the image passes through the
> Data is stored in a digital format on the
projector lens onto the screen
magnetic surface of the disks (platter)
> Number of read/write heads can access
3.5 Memory, Storage Devices & Media all of the surfaces of the disk
PRIMARY MEMORY: > Each platter will have two surfaces which
can be used to store the data
Random Access Memory (RAM)
> Data is stored on the surfaces in sectors
> Features of RAM
and tracks
o Volatile/temporary memory (contents
> HDD have very slow data access
lost if RAM is turned off)
compared to RAM
o Used to store; data, files
3.1 Magnetic Backing Storage Media
o It can be written to or read from and the Fixed Hard Disks/Drives
contents from the memory can be changed
• Available on all computers and is the main
> Larger the size of the RAM, faster the method used for data storage
computer will operate
• Uses a read/write head to write and read
> RAM never runs out of memory, data from it
continues to run slow
• Disk surface coated in magnetic film, storage
is done by altering binary codes to 1s or 0s
27
• Uses • Read and written by read/write head
28
• Read only memory – cannot be overwritten o Once burned (and finalized) they are like
ROM
• Data is stored as a series of pits and lands
formed by a laser beam etching the surface at • Disadvantages
manufacturing stage
o Can only be reordered once
• Uses
o Not all CD/DVD players and can read CD-R
o Store music files and software.
CD-RW/DVD-RW
o Very large storage capacity and are used to
• ‘RW’ means that these disks are re-writable
store films.
media can
• Advantages
be written over several times
o Holds more data than floppy disks
• Unlike CD-R/DVD-R they don’t become ROMs
o Less expensive than hard disk drives
• The recording layer uses a special phase-
• Disadvantages changing metal alloy
o Data transfer rate and data access time are • The alloy can switch between crystalline and
slower amorphous
29
o Possible to accidentally overwrite o Very large capacities
30
• Used primarily as removable storage devices • Otherwise called pen drive/memory
and are collectively known as flash memory stick/USB stick
Solid State Drives • Can store several GBs of data and use solid
state technology
• Supports reading/writing data & maintains
stored data in a permanent state even without • Connected to a computer through USB port
power and power
• Functions much like a hard drive but to operate drawn from host computer
different tech
• Some expensive software increasingly uses
• Built with an array of semiconductors that these storage
form its memory and operated using an
methods as a form of security
integrated circuit
• Uses
• Uses
o Used to transport files between computers
o Used to store operating systems and working
data o Used as a security device – a dongle – to
prevent software piracy
o Used for storing application software
• Advantage
o Used in file servers for computer networks
o Very compact and portable media
• Advantages
o Very robust
o Faster than hard disks because they do not
need to ‘spin up’ the disk • Disadvantage
o Robust because no mechanical parts o Not possible to write protect the data and
files
o Read performance is fast even when data
fragmented o Small physical size and are easy to lose.
o Less susceptible to data loss o Lower storage capacity than hard disk
o Lighter, quieter and require less power than
hard disks
Solid-State Storage (SDD)
• Disadvantages
> No moving parts and all data is received
o More expensive than hard disks
at the same time (not like HDD)
o Have a smaller capacity than modern hard
> Store data by controlling the movement
disks
of electrons within NAND chips, as 1s and
o Lower number of write cycles causing 0s
performance to diminish over time
> Non-volatile rewritable memory
Flash Drives
> Benefits of using SDD rather than HDD:
31
Compiler Interpreter
The end user only needs the executable code, The end user will need to purchase a
therefore, the end user benefits as there is no compiler or an interpreter to translate the
need to purchase a compiler to translate the source code before it is used.
program before it is used.
The developer keeps hold of the source code, so it The developer relinquishes control of the
cannot be altered or extended by the end user, source code, making it more difficult to
therefore, the developer benefits as they can charge charge for upgrades and alterations. Since
for upgrades and alterations. end users can view the source code, they
could potentially use the developer’s
intellectual property.
Compiled programs take a shorter time to execute An interpreted program can take longer to
as translation has already been completed and the execute than the same program when
machine code generated may have been optimised compiled, since each line of the source
by the compiler. code needs to be translated before it is
executed every time the program is run.
Compiled programs have no syntax or semantic Interpreted programs may still contain
errors. syntax or semantic errors if any part of
the program has not been fully tested,
these errors will need to be debugged.
The source program can be translated on one type Interpreted programs cannot be interpreted
of computer then executed on another type of on one type of computer and run on another
computer. type of computer.
A compiler finds all errors in a program. One error It is easier to develop and debug a
detected can mean that the compiler finds other program using an interpreter as errors
dependent errors later on in the program that will not be can be corrected on each line and the
errors when the first error is corrected. Therefore, the program restarted from that place,
number of errors found may be more than the actual enabling the programmer to easily
number of errors. learn from any errors.
Untested programs with errors may cause the Untested programs should not be able to
computer to crash. cause the computer to crash.
The developer needs to write special routines in Partial results can be viewed during
order to view partial results during development, development, enabling the developer to
making it more difficult to assess the quality of make informed decisions about a section
particular sections of code. of code, for example whether to continue,
modify, or scrap and start again.
End users do not have access to the source code and If an interpreted program is purchased,
the run-time libraries, meaning they are unable to make end users have all the source code and
modifications and are reliant on the developer for the run-time libraries, enabling the
updates and alterations. program to be modified as required
without further purchase.
32
o More reliable (no moving parts) > Very small, lightweight suitable from
transferring files
o Considerably lighter (suitable for laptops)
> Small back-up devices for photo, music
o Lower power consumption
> Solid state so need to be treated with
o Run much cooler than HDDs
care
o Very thin
3.6 High- & Low-Level Languages
o Data access if faster than HDD
High-Level Languages
> Drawback – questionable longevity
> Easier to read and understand as the
(20GB per day)
language is closer to human language
OFF-LINE STORAGE
> Easier to write in shorter time
CD/DVD Disks
> Easier to debug at the development stage
> Laser (red) light is used to read and write
> Easier to maintain once in use
data in the surface of the disk
Low-Level Languages
> Use a thin layer of metal alloy to store
data > Refer to machine code
> Both systems use a single, spiral track > Binary instructions that computer
which runs from the centre of the disk to understands
the edge
TRANSLATORS:
> DVD uses Dual-Layering which increases
> A program must be translated into binary
the storage capacity (two individual
before a computer can use it
recoding layers)
> Types of translators; Compiler,
Blu-ray Disks
Interpreter and Assembler
> Uses blue laser to carry out read and
Compiler
write operations
> Translates a program written in high-
> Wavelength of laser light is less than CD
level language into machine code
and DVD (stores up to five times more data
than DVD) > Used without compiler
> Automatically come with secure > Executable file of machine code
encryption (prevent piracy and copyright produced
infringement)
> One high-level language translated into
> Used as back-up systems several machine code instructions
USB Flash Memories > Used for general use
33
Interpreter > The programmer is the alerted to the
place in the program where error was
> Executes a high-language program a
found
statement at a time
> The error is corrected and interpretation
> No executable file of machine code
continues
produced
4. SECURITY
> One high-level language program
statement may require several machine > Need to keep data safe from accidental
code instructions to be executed damage, including corruption and human
errors
> Cannot be used without interpreter
> Need to keep data safe from malicious
> Used when program is being developed
actions, including unauthorized viewing,
Assembler deleting, copying and corruption
> Translates a low-level language program
into machine code
> Executable file of machine code
produced
> One low-level language translated into
one machine code instructions 4.1 Firewalls & Proxy Servers
> Can be used without assembler > A firewall sits between the user’s
computer and an external network
> Used for general use
(internet) and filter information in and out
Syntax Errors: of the computer
> When program is being compiled, if any > Tasks carried out by firewall:
syntax errors are found no translated
o Examining ‘traffic’
program is produced
o Checking weather incoming or outgoing
> Instead, a list of all errors in program is
data meets criteria
produced
o If data fails the criteria, the firewall
> Programmer corrects program and
blocks ‘traffic’
recompiles
o Firewall can keep a list of all undesirable
> When a program is being interpreted, the
IP addresses
interpreter preforms the action until
syntax error is found o Helping to prevent viruses or hackers
entering the user’s computer
34
> Proxy servers act as an intermediary o If not secure, browser will display an
between the user and a web server open padlock
> Functions of proxy servers: Transport Layer Security (TLS)
o Allowing the internet ‘traffic’ to be > Form of protocol that ensures the
filtered security and privacy of data between
devices and users when communicating
o By using cache, they can speed up access
over the internet
to information from a website
> Designed to provide encryption,
o Keeping the user’s IP address secret
authentication and data integrity in a more
> Acting as a firewall effective way than SSL
4.2 Security Protocols > Possible to extend TLS by adding new
authentication methods
Secure Sockets Layer (SSL)
4.3 Encryption
> Type of protocol that allows data to be
sent and received securely over the > Used to protect data in case it has been
internet hacked
> When a user logs onto a website, SSL > Doesn’t prevent hacking, makes data
encrypts the data meaningless
35
Authentication o Creator of malicious code can gain
personal data; bank account
> Authentication is used to verify that data
come from a trusted source o Can lead to fraud or identity theft
> Works with encryption to strengthen > To remove risk:
internet security
o Some anti-spyware can identify and
> Passwords: usually a user id/name and remove pharming code from hard drive
password are
o User should be alert
used to log on to systems
Denial of Service Attacks (DoS)
> Digital Signatures: public key encryption;
> An attempt at preventing users from
ensure an electronic document is authentic
accessing part of a network
> Biometrics: relies on the unique
> Usually temporary but may be damaging
characteristics of human beings
(fingerprint scans, retina scans) > Attacker me be able to prevent user
from:
4.4 Phishing, Pharming & DoS
o Accessing their emails
Phishing:
o Accessing websites
> Creator sends out a legitimate-looking
email; as soon as recipient clicks on link, o Accessing online services
user is sent to a fake website
4.5 Applications
> Effect:
> Ways bank protect their costumers from
o Creator of email can gain personal data; online fraud
bank account
o Banks use 10/12-digit code unique to the
o Can lead to fraud costumer
> To remove risk: o May be asked to input three random
numbers from a four-digit PIN
o Many ISPs filter out phishing emails
o Some use a hand-held device into which
o User should be cautious
a customer inserts their card. Device will
Pharming generate an eight-digit code which the
customer types into web page
> Malicious code installed on a user’s hard
drive or on the web server, code will o Some ask to key in parts of their
redirect the user to a fake website passwords using drop-down boxes (using a
mouse)
> Effect:
36
5. ETHICS • Standard form: 4 numbers e.g.
194.106.220.19
> A set of principles set out to regulate the
use of computers • Alphanumeric form:
• protcol://web address/path/filename
> Software source code can be freely Internet Service Provider (ISP)
accessed and modified as required • These are companies that provide users with
access to the internet
> Run, copy, change or adapt free software
(e.g. Scribus, Abiword) • Provider in return for these services is
charged a monthly or annual fee
> Possible to distribute modified versions
of software to friends and family • After paying this fee, a username and
password are issued which can be used to
Freeware connect to the internet.
> A software a user can download from the
internet free of charge
Extra mile with MAK:
> Once it has been downloaded, there are
2 E-Safety
no fees associated (e.g. Adobe, Skype)
• E-safety refers to the safety of data and
> Subject to all copyright laws User is not personal
allowed to study, modify code
information while using the internet.
Shareware: Trial version, with limited
• E-safety is required to make sure a user’s
features and limited time period.
personal information is not made vulnerable
and even leaked to hacker’s for e.g., which can
lead to identity fraud, bank A/C issues, etc.
Some more important points
Personal Data
Uniform Resource Locator (URL)
• Any data regarding a living person who can
• Web browsers use URLs to retrieve files be identified
• They are multiple ways of locating on the against the data or the data along with any
internet other information.
37
o Full Name • To keep personal data safe, one must:
o Damages to personal property • Open emails from known sources, and do not
click on an emails wit hyperlinks without
o Kidnapping (if kidnappers get access to the confirming with the sender of the email. Think
victim’s before opening an email from an unknown
address. person, never send any other sensitive
information (picture in school uniform, credit
o Etc. card PIN, etc.)
• To prevent the above, it is essential that • Ask their ISP to eanble email filtering to
personal data is protected. classfy spam mails as spam.
• Personal data can be leaked intentionally Social Media Safety
and unintentionally. Electronic data is at risk
due to: hacking, viruses, spyware, phishing, • Blcok and report users who seem suspicous
pharming, Smishing, vishing, ransomware1 , or use inappropriate language
spam, moderated and un-moderated forums, • Never use you real name, only use a
cookies, etc. nickname
• If a student shares a photograph of • Use appropraite language
themselves in their school uniform on social
media, then paedophiles, child predators, • Do not enter private chat rooms, as users can
kidnappers, etc. can physically reach the lure you
student. This should not be done
into giving personal inforamtion by seeming
A malicious program that encrypts data on a too nice.
computer system and demands for a ransom
• Do not meet anyone off the internet for the
to provide and decrypt the data
first time on
Internet Safety
38
your own, or atleast speak to a trusted adult o Have a backup of data in case of damage
first.
o Firewalls User IDs
• Do not missue images (of someone to
• To log on to a network, a user must type in a
blackmail them, for e.g.)
user ID
• Respect the confidentiality of other users
• User ID assigns user privilege once user logs
Online Games in
• Similar measures apply to that taken when • The top-level privilege for a network is an
using social media. administrator:
• Additionally, players should be careful about: o Able to set passwords and delete files from
server etc.
o In-game violence
• User privilege may only allow to access their
o Cyber bullying
own work area
o Keeping their webcams off (other potentially
Passwords
dangerous players have direct access to your
image) • After typing in user ID, the user will be
requested to type in their password
o Predators may use voice masking technology
to lure a user to reveal their age, sex etc. • Generally, it is a combination of letters and
numbers
o Cyber-attacks involving viruses, ransomware,
etc. • Passwords are shown as stars (***) so
nobody overlooking can see it
8.3 Security of Data
• Many systems ask for password to be typed
Hacking
in twice as a verification check, in case of input
• Hackers are people who get into your errors
computer system without having the rights. It
• To help protect the system, user has a finite
can lead to corruption or loss of data or a data
number of attempts
breach
• If password is forgotten, administrator must
o Some prove that a system is vulnerable -
reset it
maybe
• If password is forgotten on a website, it will
employed to test (ethical hacking)
be sent to your e-mail
o Some want to steal data
Biometric Data
o Alter or destroy data
• Uses features of the human body unique to
o For fun or a challenge every individual, such as fingerprints, retina,
iris, face and voice
• Prevention:
recognitions. It is used in authentication
o Protect with authentication techniques (user techniques as it is very difficult / impossible to
ID and password, etc.) replicate.
39
ADVANTAGES DISADVANTAGES o Web browser requests that the web server
identifies itself
• Usernames and passwords don’t have to be
remembered o Web server responds by sending a copy of its
SSL certificate
• Almost impossible to replicate body parts.
o Web browser checks if certificate is authentic
• Somebody else can’t gain access, like with a
stolen card o Sends signal back to web browser
• They can’t be forgotten, like a card o Starts to transmit data once connection is
established
• The readers are expensive
o If not secure, browser will display an open
• Damages in fingerprints can
padlock
deny access
Features of a Secure Web Page
• Some people worry about their personal
• Webpage URL: If the webpage is secure, it
information being stored
will start with ‘https’ instead of ‘http’.
Digital Certificate
• Padlock sign Phishing
• A digital certificate is an electronic passport
• Phishing is a fraudulent operation involving
used in the security of data sent over the
the use of emails
internet.
• The creator sends out a legitimate looking
• They can be attached with mails so that the
email hoping
receiver can
to gather personal and financial information
know that the mail is sent from a trusted
from the recipient of the email
source.
• The message appears to be from a legitimate
Secure Socket Layer (SSL)
source (e.g. a famous bank)
• Type of protocol that allows data to be sent
• When the user clicks on the link they are sent
and received
to a spoof
securely over the internet
website
• When a user logs onto a website, SSL
• They will be asked for personal info e.g.
encrypts the data
credit card details, PINs
• https or padlock in the status bar
• This could lead to identity theft
• When user wants to access a secure website:
• ISPs attempt to filter out phishing emails
o User’s web browser sends a message, so it
Pharming
can
• Pharming is a scam in which malicious code is
connect with required website which is
installed on a computer hard disk or a server
secured by SSL
40
• This code can misdirect users to fraudulent • Do not download random .exe (executable
websites file formats), .php, .bat, .com etc.
o Once infected, the virus sends user to a fake • Banks and organisations will never ask for a
website that looks identical to the one they PIN to be entered on website like this.
wanted to visit
Effects of phishing, pharming and Smishing on
o Personal info. from the user’s computer can a user:
be picked up by the pharmer/hacker
• Personal and sensitive information is lost,
o Anti-spyware, anti-virus software or anti- which can be
pharming software can be used to identify this
used for previously stated purposes.
code and correct the corruption
Moderated & Unmoderated Forums
Smishing
Online forums are places on the internet
• An attempt to extract a user’s confidential
where people
information via SMS (short message service) by
tricking the user into downloading a Trojan can join discussions on almost any topic and
horse (a virus that masks itself). also add their
41
• There will be no spams or rude and offensive • Used to protect sensitive data e.g. banking
comments details
• It is often necessary to put a legitimate email o Only download from reputable sites
address
The threats of using credit cards online and
into a contact list to ensure wanted emails are prevention:
not filtered out by mistake Encryption
• Key logging/spywares: records the keys
• The conversion of data to code by encoding it pressed on a keyboard.
• Done by using encryption software o Can be used to obtain credit card details,
passwords and personal information.
• Since data is encoded, it appears
meaningless to a hacker o Use virtual keyboards to type in password.
• Necessary to use decryption software to • Bogus sites: sites that look exactly like the
decode the data original sites, but aren’t.
42
o They can steal your card details and personal • The company providing the storage may go
information when you make purchases. out of business. In this case what has to be
done to the data will have to be considered.
o Always type in URLs, sometimes links in the
mails can be of bogus sites. • The company providing the storage will have
to put in all its efforts and safety measures in
• Phishing, pharming and Smishing:
order to keep your
o They trick you to reveal card and personal
data safe.
details as responses to messages or mails.
• If the company providing the storage doesn’t
o Open attachments only from trusted sources.
backup your data, you may lose it in case of
o Install anti-spyware software. power cuts or fires, etc. Firewalls
• Hacking into secure sites to obtain the • A firewall sits between the user’s computer
details: and an external network (internet) and filter
information in and out of the computer
o Encrypting the details will make it of no use
to the hacker. • Tasks carried out by firewall:
• Can be forgotten
43
FINGERPRINT SCANS FACE RECOGNITION
• Intrusive
• Damages will
prevent access
SIGNATURE RECOGNITION
• Non-intrusive
RETINA SCANS
• Very intrusive
IRIS RECOGNITION
• Very intrusive
44
45