You are on page 1of 45

O Level Computer Science

Paper 1 Revision Guide for Quick Revision


By MAK

1
Command words
The table below includes command words used in the assessment for this syllabus. The use of
the command word will relate to the subject context. Make sure you are familiar with these.
Command What it means
word
Analyse examine in detail to show meaning, identify elements and the relationship
between them
Assess make an informed judgement
Calculate work out from given facts, figures or information
Comment give an informed opinion
Compare identify/comment on similarities and/or differences
Complete add information to an incomplete diagram or table
Consider review and respond to given information
Contrast identify/comment on differences
Define give precise meaning
Demonstrate show how or give an example
Describe state the points of a topic/give characteristics and main features
Develop take forward to a more advanced stage or build upon given information
Discuss write about issue(s) or topic(s) in depth in a structured way
Draw draw a line to match a term with a description
Evaluate judge or calculate the quality, importance, amount, or value of something
Examine investigate closely, in detail
Explain set out purposes or reasons/make the relationships between things
evident/provide why and/or how and support with relevant evidence
Give produce an answer from a given source or recall/memory
Identify name/select/recognise
Justify support a case with evidence/argument
Outline set out main points

2
Predict suggest what may happen based on available information
Sketch make a simple freehand drawing showing the key features, taking care over
proportions
State express in clear terms
Suggest apply knowledge and understanding to situations where there are a range of
valid responses in order to make proposals
Summarise select and present the main points, without detail
Write write an answer in a specific way

Binary – base two number system based on the values 0 and 1 only.
Bit – abbreviation for binary digit.
Hexadecimal – a number system based on the value 16 (uses the denary digits 0 to 9 and the letters A to F).
Memory dump – contents of a computer memory output to screen or printer.
ASCII code – coding system for all the characters on a keyboard and control codes.
Character set – a list of characters that have been defined by computer hardware and software. It is necessary
to have a method of coding, so that the computer can understand human characters.

Name of memory size Equivalent denary value (bytes)


1 kilobyte (1 KB) 1 000
1 megabyte (1 MB) 1 000 000
1 gigabyte (1 GB) 1 000 000 000
1 terabyte (1 TB) 1 000 000 000 000
1 petabyte (1 PB) 1 000 000 000 000 000

Name of memory size Number of bytes Equivalent denary value (bytes)


1 kibibyte (1 KiB) 210 1 024

1 mebibyte (1 MiB) 220 1 048 576

1 gibibyte (1 GiB) 230 1 073 741 824

1 tebibyte (1 TiB) 240 1 099 511 627 776

1 pebibyte (1 PiB) 250 1 125 899 906 842 624

3
1. DATA REPRESENTATION Example use of binary
1.1 Binary Systems > A register is a group of bits, often
depicted as:
> The binary system is based on the
number 2 o 10010111
> Made up of 1s and 0 > Robotics

> Digital instruments


> Counting systems
1.2 Measurement of the Size of Computer
1.3 Hexadecimal
Memories
> Closely related to the binary system
> A binary digit is referred to as a BIT, 8 > Hexadecimal is a base 16 system
bits is a byte
> Numbers 0 to 9 and letters A to Fare used
> Byte is used to measure memory size to represent
NAME OF MEMORY SIZE each hexadecimal digit
NO. OF BITS EQUIVALENT DENARY VALUE > A =10, B = 11, C = 12, D = 13, E = 14, F = 15

o Separate into two nibbles (4 bits)


o Convert nibbles to denary
o Change denary numbers to hex if needed
(e.g. 10 = A)
84218421
01100001
=6=1
hex value 61

Converting Hexadecimal to Binary


> To convert hex value 6C
o Change hex value to denary numbers
(e.g. 12 = C)
o Separate hex value and convert to 4 bit
binary value

4
1.4 Use of the Hexadecimal System
> Examples:
o defining colours in Hypertext Markup
Language (HTML)
o Media Access Control (MAC) addresses
o Assembly languages and machine code
o Debugging

Memory Dumps
> Hexadecimal is used when developing
new software or when trying to trace
errors
> Memory dump is when the memory
contents are output to a printer, monitor.
Assembly code and machine code (low
level languages) Computer memory is
machine code/ assembly code Using
hexadecimal makes it easier, faster, less
error prone to write code compared to
binary.
> Using machine code (binary) takes a long
time to key in values and prone to errors
1.5 Error Checking

Parity Checking
> Parity checking is used to check weather
data has been changed or corrupted
following transmission from one device to
another

There are two types of Parity Checks

5
Even and ODD , In Even Parity check > Stored as a series of demands but no
number of ones are even. actual music notes
> A byte of data is allocated a parity bit > Uses 8-bit serial transmission
(asynchronous)
o Systems that use even parity have an
even number of 1-bits > Each MIDI command has a sequence of
bytes:
o Systems that use odd parity have an odd
number of 1-bits o First byte is the status byte – informs the
MIDI device what function to preform
Automatic Repeat Request (ARQ)
o Encoded in the status byte is the MIDI
> ARQ is another method to check if data
channel (operates on 16 different
has been transmitted correctly
channels)
> It uses and acknowledgement (message
> Examples of MIDI commands:
sent by the receiver indicating that data
has been received correctly) o Note on/off: indicates that a key has
been pressed
Checksum
o Key pressure: indicates how hard it has
> Checksum is another way to see if data
been pressed (loudness of music)
has been transmitted correctly
> Needs a lot of memory storage
> Data is sent in blocks and an additional
value sent at the end of the block MP3
Echo check > Uses technology known as Audio
Compression to convert music and other
> When data is sent to another device, this
sounds into an MP3 file format
data is sent back again to the sender
> This compression reduces the normal file
> The sender compares the two sets to
size by 90%
check if any errors occurred
o Done using file compression algorithms
> Not reliable
which use Perceptual Music Shaping
1.6 File types o Removes sounds that human ear cannot
Musical Instrument Digital Format (MIDI) hear properly

> Storage of music files o Certain sounds are removed without


affecting the quality too much
> Communications protocol that allows
electronic musical instruments to interact
with each other > CD files are converted using File
Compression Software

6
> Use lossy format as the original file is lost 2. COMMUNICATION &
following the compression algorithm
INTERNET TECHNOLOGIES
MP4
2.1 Transmission of Data
> This format allows the storage of
multimedia files rather than just sound > Asynchronous data transmission refers to
data being transmitted in an agreed bit
> Music, videos, photos and animations pattern
can be stored
o Data bits are grouped together & sent
> Videos, could be streamed without losing with control bits
any real discernible quality Joint
Photographic Experts Group (JPEG) o This means the receiver of the data
knows when the data starts and ends,
> JPEG is a file formats used to reduce prevents data getting mixed up
photographic file sizes
> Synchronous data transmission is a
> Reducing picture resolution is changing continuous stream of data (not in discrete
the number of pixels per centimetre groups like asynchronous)
> When photographic file undergoes o Ensures that the sender and receiver are
compression, file size is reduced synchronized with each other
> JPEG will reduce the raw bitmap image o Faster method
by a factor between 5 and 15
2.2 Serial & Parallel Transmission
1.7 Lossless and Lossy File Compression
> Serial data transmission is when data is
Lossless File Compression sent one bit at a time over a single wire
> All the data bits from the original file are o Works well over long distances
reconstructed when the file again is
uncompressed o Data transmitted at a slower rate (USB)

> Important for files where loss of data > Parallel data transmission is when data
would be disastrous (spreadsheet) several bits (1 byte) are sent down several
wires at the same time
Lossy File Compression
o Works well over short distance
> The file compression algorithm
eliminates unnecessary bits of data like o Faster method (internal components use
MP3 and JPEG formats parallel for high speed)

> Impossible to get original file back once 2.3 Simplex, Half-duplex and Full-duplex
compressed > Simplex data transmission is in one
direction only (e.g. computer to printer)

7
> Half-duplex data transmission is in both > To remove risk:
directions but not at the same time (e.g.
o Firewalls
phone conversation where only one
person speaks) o Strong passwords/ user IDs
> Full-duplex data transmission is in both o Use of anti-hacking software
directions simultaneously (e.g. broadband
connection on phone line)
> Difference between hacking and cracking
2.4 Universal Serial Bus (USB)
o Hacking breaks into computer system to
> USB is an asynchronous serial data
steal data
transmission method
o Cracking is where someone edits a
> USB consists of:
program code, malicious
o Four-wire shielded cable
Viruses:
o Two wires used for power and earth
> Program that can replicate itself with the
o Two wires used in data transmission intention of deleting or corrupting files,
cause computer malfunction
ADVANTAGES DISADVANTAGES
> Effect:
Automatically detected
o Can cause computer to crash
Only fit one way, prevents incorrect
connections o Can delete or corrupt files/data
Maximum cable length is about 5 metres > To remove risk:
Different data transmission rates o Install anti-virus software
Transmission rate is less than 500 mb/sec o Don’t use software from unknown
sources
2.5 Security Aspects
o Be careful when opening emails from
Hacking
unknown
> The act of gaining illegal access to a
Wardriving:
computer system
> The act of locating and using wireless
> Effect:
internet connections illegally
o Leads to identity theft, gaining personal
> Effects:
information
o Possible to steal internet time
o Data can be deleted, changed or
corrupted o Possible to hack into wireless network
and steal user’s password

8
> To remove risk: > Used when writing and developing pages
o Use complex passwords > Mark-up language is used in the
processing
o Firewalls
> Html use <tags> to bracket piece of codes
Spyware:
> Different intensity of colours is
> Software that gathers info by monitoring
determined by its hexadecimal value
key presses on the user’s keyboard and
info is sent back Media Access Control (MAC)
> Effects: > MAC address refers to a number which
uniquely identifies a device on the internet
o Access to all data entered
> Refers to the network interface card
o Software is able to install other spyware,
(NIC) which is part of the device
read cookie data
> Usually made up of 48 bits shown as six
> To remove risk:
groups of hexadecimal digits
o Use of anti-spyware software
> NN:NN:NN:DD:DD:DD
o Use a mouse to select characters from
o (NN:NN:NN) first half is the identity
passwords rather than typing them
number of the manufacturer of the device
2.6 Internet Principles of Operation
o (DD:DD:DD) second half is the serial
> Internet Service Protocol: These are number of the device
companies that provide user with access to
> Types of MAC Address:
the internet
o Universally Administrated MAC Address
Internet Protocol (IP) Address
(UAA)
> Each device on the internet is given a
o Locally Administrated MAC Address
unique address known as the IP address
(LAA)
> 32-bit number written in the form:
o UAA is the most common type set by the
109.108.158.1
manufacturer
> IP address gives the location of a device
on the internet whereas the MAC address > Reasons to change MAC address using
identifies the device connected to the LAA
internet
o To ensure they follow the correct
> IP address changes, MAC address formula
remains unchanged
o To bypass MAC address filter on a router
HTML (HyperText Mark-up Language) or a firewall

9
o To get past certain types of network Computer Architecture
restrictions Web addresses
> Address bus – unidirectional
> Each character on the keyboard has its
Used to carry memory addresses.
own ASCII code
> Data bus – bi-directional
> Can be represented using hexadecimal or
decimal values Used to carry data between memory unit
control unit and ALU
> Hexadecimal addresses are used in the
address of files or webpages as a security > Control bus – unidirectional and bi-
figure directional.
> Takes longer to type in URL but Carries all control instructions.
advantage is that you are unlikely to fall
> Processor: The processor contains the
into the trap of copying a fake website
Arithmetic and Logic Unit (ALU)
Cookies
> Control Unit: The control unit controls
> A packet of information sent by a web the operation of the memory, processor
server to a web browser and input/output devices
> Generated each time the user visits the The Fetch-Execute Cycle
website
1. PC contains address of the next
> Every time a user visits a website, instruction to be fetched
cookies will have collected some key
2. This address is copied to the MAR via
information about the user
the address bus
> They are able to carry out user tracking
3. The instruction of the address is copied
and maintain user preferences
into the MDR temporarily
> Cookies are pieces of data
4. The instruction in the MDR is then
> Information gathered by cookies doesn’t placed in the CIR
contain personal information
5. The value in the PC is incremented by 1,
3. HARDWARE & SOFTWARE pointing the next instruction to be fetched
6. The instruction is finally decoded and
then executed

3.3 Input Devices


3.2 Computer Architecture &
SCANNERS:
Fetch Execute Cycle
Two-dimensional Scanners:
> Used to input hard-copy documents

10
> The image is converted into an electronic > The 2D photograph in the passport is also
form which can be stored in the computer scanned and stored as jpeg image
o Document is placed on a glass panel > The passenger’s face is also
photographed using a digital camera and
o A bright light illuminates the document
compared using face recognition software
o A scan head moves across the document
> Key parts of the face are compared
until the whole page is scanned. And image
(distance between eyes, width of nose)
of the document is produced and sent to a
lens using a series of mirrors Barcode readers/scanners
o The lens focuses the document image > A barcode is a series of dark and light
parallel lines of varying thicknesses
o The focused image now falls onto a
charge couple device (CCD) which consists > The numbers 0 -9 are each represented
of a numbers of integrated circuits by a unique series of lines
o Software produces a digital image from > The left and right hand sides of the
barcode are separate using guard bars
> Optical Character Recognition (OCR) is a
software which converts scanned > Allows barcode to be scanned in any
documents into a text file format direction
> If the original document was a o Barcode is read by a red laser or red LED
photo/image, then the scanned image
o Light is reflected back off the barcode;
forms an image file such as JPEG
dark areas reflect little light which allows
Three-dimensional Scanners the bars to be read
> 3D scanners can scan solid objects and o Reflected light is read by sensors
produce a three- dimensional image (photoelectric cells)
> Scanners take images at several points, x, o Pattern is generated which is converted
y and z (lasers, magnetic, white light) to digital
> The scanned images can be used in Quick Response (QR) Codes
Computer Aided
> Another type of barcode is the QR codes
Design (CAD) or to a 3D printer to produce
> Made up of a matrix of filled in dark
a working model
squares on a light
Application of 2D Scanners at an Airport:
background
> Make use of (OCR) to produce digital
> Can hold more storage (7000 digits)
images which represent the passport pages
> Advantages of QR codes:
> Text can be stored in ASCII format

11
o No need for the user to write down • There is usually a scroll button which speeds
website address up the process of moving through a document

o QR codes can store website addresses • Uses

Digital Cameras o Used for opening, closing and minimising


software
> Controlled by microprocessor which
o Used for grouping, moving and deleting files
automatically adjusts the shutter speed,
focus the image, etc. o Useful when editing images (e.g. controlling
the size and position of the image)
> Photo is captured when light passes
through the lens onto a light sensitive cell o Used for controlling the position of a pointer
on the screen to allow:
> Cell is made up of pixels
▪ Selection from a menu
> Number of pixels determines size of the
▪ Selecting an icon
file
▪ Scrolling up/down and right/left
Keyboards
• Advantages
> Connected to computer with a USB
connection or by wireless connection o Faster to select an option by a mouse than a
keyboard
> Each character has an ASCII value and is
o Enables rapid navigation through
converted into a digital signal
applications and the internet
> Slow method
o Mice are small and don’t take much area
> Prone to errors • Disadvantages
Pointing devices o People with restricted hand/wrist movement
> Mouse/trackball can find it hard to operate a mouse

o Easily damaged and can easily be clogged up


o Traditional; mechanical ball, connected
with dirt
by USB port
o They are hard to use if there is no flat surface
> Modern type; red LEDs to detect available
movement.
Touchpad
Mouse
• Touchpads are used in many laptop
• An example of a pointing device computers as a pointing device
• The ball underneath the mouse is used to • The pointer is controlled by the user moving
detect movement their finger on the touchpad
• The left button is for selecting by double on it • Uses
and the right is to bring drop-down menus

12
o Used for opening, closing and minimising o Have the same pointing/cursor control
software capability as a mouse
o Used for grouping, moving and deleting files o Used in applications where the user has a
o Useful when editing images (e.g. controlling disability (RSI)
the size and position of the image)
o Used in a control room environment,
o Used for controlling the position of a pointer where it is faster than a mouse to navigate
on the screen to allow: through process screens and more robust
▪ Selection from a menu
than a mouse

▪ Selecting an icon • Advantages

• Advantages o Tracker balls don’t need the same fine


control as a mouse
o Faster to select an option by a touchpad than
a keyboard o People with limited hand/wrist
movement find easier to use than a mouse
o Enables rapid navigation through
applications and the internet o The pointer can be positioned more
o Since the touchpad is integrated into laptop accurately on the screen than with a
computer, mouse

there is no separate mouse, aiding portability o They take less desk space than mice since
they are stationary
o They can be used when no flat surfaces are
available • Disadvantages
• Disadvantage o Tracker balls are not supplied with the
o People with limited hand/wrist movement computer as standard, so they are more
can find touchpads hard to use expensive

o It can be more difficult to control the pointer o User may need training since they are
when compared to a mouse not standard equipment
o They are more difficult when doing Microphones
operations such as
> Used to input sound to a computer
‘drag and drop’
> When a microphone picks up sound, a
Tracker Ball diaphragm vibrates producing an electric
• Tracker ball is like a mouse except that it signal
has a ball on the top of the device > The signal goes to a sound card and is
• Users control the pointer on the screen converted into digital values and stored in
by rotating the ball computer

• Uses

13
> Voice recognition, voice is detected and o There is some artistry lost since clever
converted into digital software corrects errors in the
photographs
Digital Cameras
o The resolution is not yet as good as
• Photographs are stored in memory
traditional cameras
• They can be easily transferred to a
o Images often need to be compressed to
computer using a USB
reduce the amount of memory used
• Uses
o It is possible to fill up computer memory
o Digital cameras can produce photographs very quickly with several photos of the
for direct transfer to a computer or to print same subject (to find the perfect snap
out shot)
o Digital cameras allow short video clips to Microphone
be produced
• Can be connected directly to a computer
o Photographs can be uploaded directly
• Sounds can be inputted and manipulated
into application software such as word
processor • Uses

• Advantages o Microphones are used to input


speech/sounds to be used in various
o Easier to produce better quality
applications
photographs than with a tradition camera
o They are used in voice recognition
o Easier and faster to upload photographs
software- for
to a computer
conversion of speech into text, and
o There is no need to develop film and
recognition of commands
print out
photographs (saves paper and no longer
needs the chemicals to produce • Advantages
photographs from films)
Faster to read in text than to type it using a
o Easy to delete an image from the keyboard
memory if it’s not satisfactory
o Possible to manipulate sound in real time
o The memory card can store several using special software
hundred photographs
o If used in a voice activation system, this
• Disadvantages has the advantage of improving safety
o The camera user needs to be computer • Disadvantages
literate to use the camera properly

14
o Sound files can use up a lot of computer o Signals are then sent out which are
memory interpreted by a microprocessor,
determine where screen was touched
o Voice recognition software isn’t as
accurate as typing in manually Sensors
Touchscreens > Devices which read or measure physical
properties
> Capacitive (medium cost tech)
> Data needs to be converted to digital
o Made up of many layers of glass
> Analogue to Digital Converter (ADC)
o Creating electric fields between glass
converts physical values into digital
plates in layers
Control of Street Lighting
o When top layer of glass is touched,
electric current changes > Light sensor sends data to the ADC
o Co-ordinates where the screen was > Digitises data and sent to the
touched is determined by an on-board microprocessor
microprocessor
> Microprocessor samples data every
> Infra-red heat (expensive) minute
o Use glass as the screen material > If data from sensor < value stored in
memory:
o Needs warm object to carry an input
operation o Signal sent from microprocessor to street
lamp
> Infra-red optical (expensive)
o Lamp switched on
o Uses glass as screen material
3.4 Output Devices
o Uses an array of sensors (grid form)
PRINTERS:
o Point of contact is based on which grid
co-ordinate is touched Inkjet Printers
> Resistive (inexpensive) > Used to print one-off pictures and
documents
o Upper layer of polyester, bottom layer of
glass 1. Data from document sent to printer
driver
o When the top polyester is touched, the
top layer and bottom layer complete a 2. Printer driver ensures data is in correct
circuit format
3. Check made by printer driver that
chosen printer is available

15
4. Data is sent to printer, stored in a 7. Discharge lamp removes all electric
temporary memory (printer buffer) charge from the drum, ready to print next
page
5. Sheet of paper is fed; sensor detects if
paper is available in paper tray 3D Printers
6. Print head moves across paper printing > Used for models of cars
text/image, four ink colours sprayed in
exact amount > Produce solid objects that work

7. Paper is advanced so next line is printed > Built up layer by layer, using powdered
resin, ceramic powder
8. Repeated until buffer is empty
> A design is made using Computer-aided
9. Once it is done, printer send an interrupt Design (CAD)
to the processor (request for more data to
3D Printer
be sent)
• A new type of printer that produces solid 3D
Laser Printers models using modified inkjet technology called
> Used to print flyers, high quality tomography

• Very thin layers of fine powder (plaster,


> Use dry powder ink (toner) and static
resin, starch) are bonded together as a 3D
electricity to produce text and images
model is slowly built up
> Prints the whole page in one go • Items produced are known as prototypes
1. (steps 1-4 same as inkjet) • Uses
2. Printing drum is given a positive charge; o Used to produce prototypes which work
as the drum rotates, a laser beam is from CAD packages, photograph images,
scanned across it removing the positive stored drawings etc.
charge leaves negatively charged areas
o Scale models are produced in colour before
which match the text/image the real thing is manufactured
3. Drum is then coated with positively o The ultimate objective is to produce organic
charged toner, it only sticks to negatively objects using this layering technology (such as
charged parts of the drum replacement human organs)
4. A negatively charged sheet is rolled over • Advantages
the drum
o Save a lot of money, other methods of
5. Toner on the drum now sticks to the making prototypes are very time consuming
paper to produce copy of page and expensive

6. Paper finally goes through a fuser (set of o The powders used can often be ground up
and reused
heated rollers); heat melts the ink so it is
permanent

16
o Physical scale models are produced with o Automatic washing machines (to make the
working parts, which gives a better idea of drum rotate)
how the product will look
o Cookers (to switch on fans)
• Disadvantages
o Water pumps in central heating systems
o Expensive to buy
o Automatic greenhouses to open windows
o Slow at producing their output and switch on fans

o Product is sometimes a little rough, often o Used to control robot arms in the industry
further work needs to be done
o Operate fans, disk drives and DVD drives in
computers

2D and 3D Cutters Buzzers

• Switched on or off by the actuator


> 3D cutters can recognise objects in x, y, z
direction • Uses

> 3D laser cutters can cut; glass, crystal, o Used in cookers and microwave ovens to tell
metal, wood the operator when the cooking process is
complete

o Used in burglar alarm systems to warn if


Actuators intruders are present

Actuators Heaters

• A type of controlling device • Actuators are connected to switches which


turn the
• Transducers that are used to take signals
from a heater on or off

computer and convert them into some form of • Uses


motion o Used in automatic washing machines,
e.g. operating motors, pumps, switches and cookers and central heating systems
valves o Used in automatic greenhouses to control
• Digital signals are sent from the computer to the temperature Lights
an actuator to operate a device • The actuator is connected to the switch that
• Conversion of the digital signal to analogue is turns the lights on or off
required first (using a DAC) Motors • Uses
• Turned on or off by the actuator o Security lights
• Uses o Used in greenhouses to control the lighting
o Used in many domestic appliances conditions

17
> Used in many control applications applications (Computer Aided
involving sensors and devices (ADC and Design/Manufacturing)
DAC) • Disadvantages

Loudspeakers/Headphones o Tend to be heavy, weight hazard if not


supported
> Sound is produced by passing the digital
data through a DAC then through amplifier properly
and then emerges from loudspeaker o Run very hot, can cause fires if left
unattended –
> Produced by voltage differences vibrating
a cone in the speaker at different especially if they are old
frequencies o Consume more power than TFT monitors
CRT Monitor o They can flicker, this leads to headaches and
• Cathode Ray Tube monitors eyesight

• Least expensive type of monitor, becoming problems with prolonged use


rarer as TFT TFT Monitor
monitors take over
• Thin Film Transistor monitors
• Come in various sizes • Taking over from CRT monitors as the main
• Picture created is made up of tiny dots (red output device
green or • The progress in TFT technology is one of the
blue), the intensity of the colour of the dot reasons for the rapid development of laptop
determines computers

the colour perceived by the eye • The screen is made up of thousands of tiny
pixels which are made up of transistors
• Uses controlled by a microprocessor
o Primary output device for computers, user • Each pixel has three transistors-red, green or
can blue; the intensity of each determines the
immediately see what they are typing in colour of the pixel seen.

o Used with light pens to allow designs to be • Uses


created on screen o Primary output device for computers, user
• Advantages can immediately see what they are typing in

o Produce higher quality images than TFT o Integral part of laptop computers
monitors • Advantages
o Angle of viewing is better than a TFT monitor o Lightweight, so no weight hazards like CRT
o They work with light pens in CAD and CAM monitors

18
o Less glare produced than in CRT monitors; o High power consumption
also emit
o Slow response time
less radiation
• Note: Old LCD monitors used CCFL (cold
o Consume much less power and generate less cathode
heat
fluorescent lamp) technology to light up the
than CRT monitors screen.

• Disadvantages LED Monitor:

o Angle of viewing is critical, image appears • Front layer made from liquid crystal diodes;
unclear if viewed slightly from the side grouped

o This is an issue if several people are looking together to form pixels (RGB or RGBY-more
at the screen at the same time vivid colours)

o They cannot yet be used with light pens, • For the image to show up on-screen a light
source of LED

backlight is used.
IPS/LCD Monitor
• Advantages (over LCD monitors):
• Front layer made from liquid crystal diodes;
grouped o Lighter and thinner

together to form pixels (RGB or RGBY-more o Longer life


vivid colours)
o Lower power consumption
• Receive analogue and digital signals,
o Greater contrast and more vivid colour
although most
o Relatively more robust
modern projectors only work with digital
inputs • Disadvantages:
• IPS (In-plane switching) is the technology o Glare gives viewers headaches
used in LCD
o Images too sharp, so can cause eye strain
monitors.
Touch Screen
• Advantages:
• Automatic selection without a pointing
o Colour can be seen accurately from different device
viewing
• Uses:
angles
o Automatic teller machines
o No lightening on touching
o EFTPOS (electronic fund transfer point of
• Disadvantages: sales)
o Expensive o PDA

19
o Smartphones DVD or television) use multimedia projectors

o Public information points • Advantages

ADVANTAGES DISADVANTAGES o Enables many people to see a presentation


rather than all of them crowded around a
Faster data entry Limited options
small computer screen
Easy to choose options
o Avoids the need for several networked
Frequent usage can lead to RSI, etc. computers

User-friendly and Intuitive Constant usage o e.g. when looking at a video clip on the
results in the screen getting dirty; visibility and internet,
sensitivity decreases
everybody can see the video on the large
Multimedia Projector screen rather

• Receive analogue and digital signals, than logging on to several computers


although most modern projectors only work
• Disadvantages
with digital inputs
o Images can sometimes be fuzzy
• The signal source is usually from a computer,
television, or DVD player o Expensive to buy

• The image from the source is magnified and o Setting up projectors can be a little difficult
projected onto a large screen
Laser Printer
• The devices usually work with a remote
• Produce very high-quality hard copy output
control, but can also use virtual mouse
technology – cordless PC mouse (has a laser • Print rate per page is fast if many pages are
pointer) being printed
o It is then possible to direct the presentation • Rely on large buffer memories – the
without being tied to the computer
data for the whole document is stored before
o Most multimedia projectors take input from pages can be printed out
various types of video format e.g. PAL, NTSC or
SECAM • Uses

• Uses o Used where noise levels need to be kept low


e.g. in an office
o Used for training presentations (allows the
whole audience to see the images from a o The best option for fast, high quality, high
computer) volume printing

o Also used for advertising presentations • Advantages


(shown at exhibitions, shopping malls etc.) o Printing is fast for high volumes, slightly
o Home cinema systems (projecting the images faster than inkjet if only a few pages are to be
from a printed

o Can handle very large print jobs

20
o Quality is consistently high o LEDs consume very little power
o Toner cartridges last for a long time; laser > Before LEDs, LCD monitors were backlit
printers can be a cost-effective option if colour using CCFL
outputs are not required
> CCFL uses two fluorescent tubes behind
• Disadvantages
the LCD screen which supplies the light
o Expensive to buy source
o Only fast if several copies are being made LIGHT PROJECTORS:
o Colour laser printers tend to be expensive to > Two common types of light projectors:
run since four cartridges are needed as well as
diffuser kits, etc. o Digital Light Projector (DLP)

o Produce ozone and volatile organic o LCD Projector


compounds
> Projectors are used to project computer
because of their printing method and type of output onto larger screens/interactive
toner/ink used whiteboards
o These have been linked to health hazards in Digital Light Projectors (DLP)
the office
> Uses millions of micro mirrors
> the number of micro mirrors and the way
LCD and LED Monitors they are arranged on the DLP chip
> Front layer of monitor is made up of determines the resolution of the image
Liquid Crystal > When the micro mirrors tilt towards the
Display (LCD), these tiny diodes are light source they are on
grouped together in threes as pixels (LCD > When the micro mirrors tilt away from
doesn’t emit any light) the light source they are off
> LCD monitors are back lit using Light > This creates a light or dark pixel on the
Emitting Diode projection screen
(LED) because: > A bright white light source passes
o LEDs reach their maximum brightness through a colour filter on its way to the
immediately DLP chip

o LEDs sharpens image (higher resolution), > White light splits into primary colours
CCFL has yellow tint LCD Projectors
o LEDs improve colour image > Older technology than DLP
o Monitors using LED are much thinner
than CCFL

21
Laser
Printer

Stage Description of what happens


1 data from the document is sent to a printer driver
2 printer driver ensures that the data is in a format that the chosen printer can understand
3 check is made by the printer driver to ensure that the chosen printer is available to
print (is it busy? is it off-line? is it out of ink? and so on)
4 data is sent to the printer and stored in a temporary memory known as a printer buffer
5 printing drum given a positive charge. As this drum rotates, a laser beam scans across it
removing the positive charge in certain areas, leaving negatively charged areas which
exactly match the text/images of the page to be printed
6 drum is coated with positively charged toner (powdered ink). Since the toner is
positively charged, it only sticks to the negatively charged parts of the drum
7 negatively charged sheet of paper is rolled over the drum
8 toner on the drum sticks to the paper to produce an exact copy of the page sent to the
printer

9 to prevent the paper sticking to the drum, the electric charge on the paper is removed
after one rotation of the drum
10 the paper goes through a fuser (a set of heated rollers), where the heat melts the ink so
that it fixes permanently to the paper
11 a discharge lamp removes all the electric charge from the drum so it is ready to print the
next page

22
Ink-jet Printer

Stage Description of what happens


1 data from the document is sent to a printer driver
2 printer driver ensures that the data is in a format that the chosen printer can understand

3 check is made by the printer driver to ensure that the chosen printer is available to
print (is it busy? is it off-line? is it out of ink? and so on)
4 data is sent to the printer and stored in a temporary memory known as a printer buffer
5 a sheet of paper is fed into the main body of the printer. A sensor detects whether
paper is available in the paper feed tray – if it is out of paper (or the paper is jammed),
an error message is sent back to the computer
6 as the sheet of paper is fed through the printer, the print head moves from side to side
across the paper printing the text or image. The four ink colours are sprayed in their
exact amounts to produce the desired final colour
7 at the end of each full pass of the print head, the paper is advanced very slightly to
allow the next line to be printed. This continues until the whole page has been printed
8 if there is more data in the printer buffer, then the whole process from stage 5 is
repeated until the buffer is empty
9 once the printer buffer is empty, the printer sends an interrupt to the processor in the
computer, which is a request for more data to be sent to the printer. The process
continues until the whole of the document has been printed

23
Sensor Example applications
temperature • control a central heating system
• control/monitor a chemical process
• control/monitor temperature in a greenhouse

moisture/humidity • control/monitor moisture/humidity levels in soil/air in a greenhouse


• monitor dampness levels in an industrial application (for example,
monitor moisture in a paint spray booth in a car factory)

light • switch street lighting on at night and off during the day
• monitor/control light levels in a greenhouse
• switch on car headlights when it gets dark

infrared/motion • turn on windscreen wipers on a car when it rains


• detect an intruder in a burglar alarm system
• count people entering or leaving a building

pressure • detect intruders in a burglar alarm system


• check weight (such as the weight of a vehicle)
• monitor/control a process where gas pressure is important

acoustic/sound • pick up noise levels (such as footsteps or breaking glass) in a burglar


alarm system
• detect noise of liquids dripping from a pipe

gas (such as O2 or • monitor pollution levels in a river or air


CO2) • measure O2 and CO2 levels in a greenhouse
• check for CO2 or NO2 leaks in a power station

pH • monitor/control acidity/alkalinity levels in soil


• monitor pollution in rivers

magnetic field • detect changes in in cell phones, CD players, and so on


• used in anti-lock braking systems in motor vehicles

24
Examples of monitoring Examples of control

• monitoring a patient in a hospital for vital signs • turning street lights on at night and
such as heart rate, temperature, and so on turning them off again during daylight
• checking for intruders in a burglar alarm system • controlling the temperature in a central
• checking the temperature levels in a car engine heating/air conditioning system
• monitoring pollution levels in a river • controlling the traffic lights at a road
junction
• operating anti-lock brakes on a car
when necessary
• controlling the environment in a
greenhouse

25
RAM ROM

• temporary memory device • permanent memory device


• volatile memory • non-volatile memory device
• can be written to and read from • data stored cannot be altered
• used to store data, files, programs, part of OS • sometimes used to store BIOS and other
currently in use data needed at start up
• can be increased in size to improve
operational speed of a computer

Pros of embedded systems Cons of embedded systems

• small in size and therefore easy to • difficult to upgrade devices to take advantage of new
fit into devices technology
• relatively low cost to make • troubleshooting faults in the device becomes a
• usually dedicated to one task, specialist task

making for simple interfaces and • although the interface can appear to be simple, in
often no requirement of an reality it can be more confusing (changing the time
operating system on a cooker clock can require several steps, for
• consume very little power example)
• very fast reaction to changing input • any device that can be accessed over the internet is
(operate in real time) also open to hackers, viruses, and so on
• with mass production comes • due to the difficulty in upgrading and fault finding,
reliability devices are often just thrown away rather than being
repaired (wasteful)

26
> A powerful beam of white light is > As RAM becomes full, the processor has
generated from a bulb to continually access the hard drive to
overwrite old data on RAM with new data
> This beam of light is then sent to a group
of chromatic-coated mirrors; these reflect Read Only Memory (ROM)
the light back at different wavelengths
> Features of ROM
> When the white light hits the mirrors, the
o Non-volatile/permanent memories
reflected light has wavelengths
(contents remain even when ROM is
corresponding to red, green and blue
turned off)
> These three different light pass through
o Used to store start up instruction (basic
three LCD screens; these screens show the
input/output systems)
image to be projected as millions of pixels
in grayscale o Data/contents of a ROM chip can only be
read, cannot be changed
> When the coloured light passes through
the LCD screens, a red, green and blue SECONDARY STORAGE:
version of the grey image emerges
Hard Disk Drives (HDD)
> Finally, the image passes through the
> Data is stored in a digital format on the
projector lens onto the screen
magnetic surface of the disks (platter)
> Number of read/write heads can access
3.5 Memory, Storage Devices & Media all of the surfaces of the disk
PRIMARY MEMORY: > Each platter will have two surfaces which
can be used to store the data
Random Access Memory (RAM)
> Data is stored on the surfaces in sectors
> Features of RAM
and tracks
o Volatile/temporary memory (contents
> HDD have very slow data access
lost if RAM is turned off)
compared to RAM
o Used to store; data, files
3.1 Magnetic Backing Storage Media
o It can be written to or read from and the Fixed Hard Disks/Drives
contents from the memory can be changed
• Available on all computers and is the main
> Larger the size of the RAM, faster the method used for data storage
computer will operate
• Uses a read/write head to write and read
> RAM never runs out of memory, data from it
continues to run slow
• Disk surface coated in magnetic film, storage
is done by altering binary codes to 1s or 0s

27
• Uses • Read and written by read/write head

o Used to store operating systems and working • Uses


data
o Application where batch processing is used
o Used for storing application software
o Used as a backup media
o Real time systems and online systems used
• Advantages
fixed hard drives
o Generally, less expensive and very robust
o Used in file servers for computer networks
technology
• Advantages
o Data transfer rate is fast
o Very fast data transfer rate and fast access
• Disadvantages
times to data
o Access time is very slow
o Have very large memory capacities
o When updating another tape is needed
• Disadvantages
Memory Cards
o Can be easily damaged
• A form of electrically erasable programmable
o They lack portability
read only
Portable & Removable Hard Disks/Drives
memory (EEPROM)
• Like fixed hard disks but are usually
• Uses
connected via universal serial bus
o Used to store photos on digital cameras
• Uses
o Mobile phones use them as memory cards
o Can be used as backup systems to prevent
loss of data o Used in MP3 players to store music
o Can be used to transfer data, files and o Used as a backup in hand held devices
software between computers
• Advantages
• Advantages
o Very compact
o Data access time and transfer rate is very fast
o Very robust
o Large memory capacities
• Disadvantages
o Can be used to transfer information between
computers o Very expensive per Gb of memory when
compared to hard drive disks
• Disadvantages
o Has a finite life in terms of the number of
o Can be easily damaged times they can be read from/written to.
Magnetic Tapes & Drives 3.2 Optical Backing Storage Media
• Thin strip of plastic which is coated in a CD-ROM/DVD-ROM
magnetic layer

28
• Read only memory – cannot be overwritten o Once burned (and finalized) they are like
ROM
• Data is stored as a series of pits and lands
formed by a laser beam etching the surface at • Disadvantages
manufacturing stage
o Can only be reordered once
• Uses
o Not all CD/DVD players and can read CD-R
o Store music files and software.
CD-RW/DVD-RW
o Very large storage capacity and are used to
• ‘RW’ means that these disks are re-writable
store films.
media can
• Advantages
be written over several times
o Holds more data than floppy disks
• Unlike CD-R/DVD-R they don’t become ROMs
o Less expensive than hard disk drives
• The recording layer uses a special phase-
• Disadvantages changing metal alloy

o Data transfer rate and data access time are • The alloy can switch between crystalline and
slower amorphous

CD-R/DVD-R (non-crystalline) phases, thus changing its


reflectivity to light, depending on the laser
• The letter ‘R’ means the disc is recordable
beam power
only once and then it becomes ROM
• Spots are produced which can be read by a
• Use a thin layer of an organic dye as the
laser
recording media
• System allows data to be written, erased and
• DVDs also use an additional silver alloy or
re-written many times
gold reflector
• Uses
• Laser beam produces heated spots and
unheated spots o CD-RWs and DVD-RWs are used to record
radio and television programs
• Uses
o They are used in closed circuit television
o They are used for home recording of music
(CCTV) systems
(CD-Rs) and films (DVD-Rs)
• Advantages
o They are used to store data for later use
o Can be re used many times
o Used in applications where it is necessary to
prevent the deletion or over-writing of o Different file formats can be used each time
important data
o Less wasteful than R format since files or
• Advantages data can be added at a later stage

o Cheaper than RW disks • Disadvantages

o Relatively expensive media

29
o Possible to accidentally overwrite o Very large capacities

DVD-RAM o Ability to read and write data at the same


time
• Recent addition to optical media group
• Disadvantage
• Unlike other CD and DVD formats, DVD-
RAMs have several discrete concentric tracks o DVD-RAMS are not as compatible as R or
rather than a single spiral track RW, many systems will not recognize this
format
• Gives them advantage that writing, and
reading can occur at the same time o More expensive than DVD-RW

• Makes it possible to watch an already Blu-Ray Discs


recorded
• Uses
television program at the same time as a
o Blu-ray disks are used in home video
different program is being recorded
consoles
• Recording layer is made from similar phase-
o Used for storing and playing back films
changing material to that used in RW
technology o PCs can use this technology for data storage
or backing up hard drives
• Shiny and dull marks represent data to a
computer o Camcorders can use this media to store film
footage
where they are interpreted
• Advantage
• Uses
o Very large storage capacity
o DVD-RAMs are used in recording devices
such as o Data transfer rate is very fast
satellite receivers to allow simultaneous o Data access speed is faster than with other
recording and playback optical media
o They are used in camcorders to store films • Disadvantage
• Advantages o Disks are relatively expensive
o Have a long life (30 years) o Blu-ray disks still have encryption problems
o Can be re written on more than the DVD- 3.3 Solid State Backing Storage
RWs
• Solid state systems control the movement of
(100,000 times) electrons within a microchip: if the transistor
conducts a current, this is equivalent to a 1,
o Very reliable as they have built in verification
otherwise it is a 0
software to ensure accuracy of data
• Have no moving parts, consume much less
o Access is very fast
power and are extremely robust
o No need to finalize the disk

30
• Used primarily as removable storage devices • Otherwise called pen drive/memory
and are collectively known as flash memory stick/USB stick

Solid State Drives • Can store several GBs of data and use solid
state technology
• Supports reading/writing data & maintains
stored data in a permanent state even without • Connected to a computer through USB port
power and power

• Functions much like a hard drive but to operate drawn from host computer
different tech
• Some expensive software increasingly uses
• Built with an array of semiconductors that these storage
form its memory and operated using an
methods as a form of security
integrated circuit
• Uses
• Uses
o Used to transport files between computers
o Used to store operating systems and working
data o Used as a security device – a dongle – to
prevent software piracy
o Used for storing application software
• Advantage
o Used in file servers for computer networks
o Very compact and portable media
• Advantages
o Very robust
o Faster than hard disks because they do not
need to ‘spin up’ the disk • Disadvantage
o Robust because no mechanical parts o Not possible to write protect the data and
files
o Read performance is fast even when data
fragmented o Small physical size and are easy to lose.
o Less susceptible to data loss o Lower storage capacity than hard disk
o Lighter, quieter and require less power than
hard disks
Solid-State Storage (SDD)
• Disadvantages
> No moving parts and all data is received
o More expensive than hard disks
at the same time (not like HDD)
o Have a smaller capacity than modern hard
> Store data by controlling the movement
disks
of electrons within NAND chips, as 1s and
o Lower number of write cycles causing 0s
performance to diminish over time
> Non-volatile rewritable memory
Flash Drives
> Benefits of using SDD rather than HDD:

31
Compiler Interpreter
The end user only needs the executable code, The end user will need to purchase a
therefore, the end user benefits as there is no compiler or an interpreter to translate the
need to purchase a compiler to translate the source code before it is used.
program before it is used.

The developer keeps hold of the source code, so it The developer relinquishes control of the
cannot be altered or extended by the end user, source code, making it more difficult to
therefore, the developer benefits as they can charge charge for upgrades and alterations. Since
for upgrades and alterations. end users can view the source code, they
could potentially use the developer’s
intellectual property.

Compiled programs take a shorter time to execute An interpreted program can take longer to
as translation has already been completed and the execute than the same program when
machine code generated may have been optimised compiled, since each line of the source
by the compiler. code needs to be translated before it is
executed every time the program is run.

Compiled programs have no syntax or semantic Interpreted programs may still contain
errors. syntax or semantic errors if any part of
the program has not been fully tested,
these errors will need to be debugged.

The source program can be translated on one type Interpreted programs cannot be interpreted
of computer then executed on another type of on one type of computer and run on another
computer. type of computer.

A compiler finds all errors in a program. One error It is easier to develop and debug a
detected can mean that the compiler finds other program using an interpreter as errors
dependent errors later on in the program that will not be can be corrected on each line and the
errors when the first error is corrected. Therefore, the program restarted from that place,
number of errors found may be more than the actual enabling the programmer to easily
number of errors. learn from any errors.

Untested programs with errors may cause the Untested programs should not be able to
computer to crash. cause the computer to crash.

The developer needs to write special routines in Partial results can be viewed during
order to view partial results during development, development, enabling the developer to
making it more difficult to assess the quality of make informed decisions about a section
particular sections of code. of code, for example whether to continue,
modify, or scrap and start again.

End users do not have access to the source code and If an interpreted program is purchased,
the run-time libraries, meaning they are unable to make end users have all the source code and
modifications and are reliant on the developer for the run-time libraries, enabling the
updates and alterations. program to be modified as required
without further purchase.

32
o More reliable (no moving parts) > Very small, lightweight suitable from
transferring files
o Considerably lighter (suitable for laptops)
> Small back-up devices for photo, music
o Lower power consumption
> Solid state so need to be treated with
o Run much cooler than HDDs
care
o Very thin
3.6 High- & Low-Level Languages
o Data access if faster than HDD
High-Level Languages
> Drawback – questionable longevity
> Easier to read and understand as the
(20GB per day)
language is closer to human language
OFF-LINE STORAGE
> Easier to write in shorter time
CD/DVD Disks
> Easier to debug at the development stage
> Laser (red) light is used to read and write
> Easier to maintain once in use
data in the surface of the disk
Low-Level Languages
> Use a thin layer of metal alloy to store
data > Refer to machine code
> Both systems use a single, spiral track > Binary instructions that computer
which runs from the centre of the disk to understands
the edge
TRANSLATORS:
> DVD uses Dual-Layering which increases
> A program must be translated into binary
the storage capacity (two individual
before a computer can use it
recoding layers)
> Types of translators; Compiler,
Blu-ray Disks
Interpreter and Assembler
> Uses blue laser to carry out read and
Compiler
write operations
> Translates a program written in high-
> Wavelength of laser light is less than CD
level language into machine code
and DVD (stores up to five times more data
than DVD) > Used without compiler
> Automatically come with secure > Executable file of machine code
encryption (prevent piracy and copyright produced
infringement)
> One high-level language translated into
> Used as back-up systems several machine code instructions
USB Flash Memories > Used for general use

33
Interpreter > The programmer is the alerted to the
place in the program where error was
> Executes a high-language program a
found
statement at a time
> The error is corrected and interpretation
> No executable file of machine code
continues
produced
4. SECURITY
> One high-level language program
statement may require several machine > Need to keep data safe from accidental
code instructions to be executed damage, including corruption and human
errors
> Cannot be used without interpreter
> Need to keep data safe from malicious
> Used when program is being developed
actions, including unauthorized viewing,
Assembler deleting, copying and corruption
> Translates a low-level language program
into machine code
> Executable file of machine code
produced
> One low-level language translated into
one machine code instructions 4.1 Firewalls & Proxy Servers
> Can be used without assembler > A firewall sits between the user’s
computer and an external network
> Used for general use
(internet) and filter information in and out
Syntax Errors: of the computer
> When program is being compiled, if any > Tasks carried out by firewall:
syntax errors are found no translated
o Examining ‘traffic’
program is produced
o Checking weather incoming or outgoing
> Instead, a list of all errors in program is
data meets criteria
produced
o If data fails the criteria, the firewall
> Programmer corrects program and
blocks ‘traffic’
recompiles
o Firewall can keep a list of all undesirable
> When a program is being interpreted, the
IP addresses
interpreter preforms the action until
syntax error is found o Helping to prevent viruses or hackers
entering the user’s computer

34
> Proxy servers act as an intermediary o If not secure, browser will display an
between the user and a web server open padlock
> Functions of proxy servers: Transport Layer Security (TLS)
o Allowing the internet ‘traffic’ to be > Form of protocol that ensures the
filtered security and privacy of data between
devices and users when communicating
o By using cache, they can speed up access
over the internet
to information from a website
> Designed to provide encryption,
o Keeping the user’s IP address secret
authentication and data integrity in a more
> Acting as a firewall effective way than SSL
4.2 Security Protocols > Possible to extend TLS by adding new
authentication methods
Secure Sockets Layer (SSL)
4.3 Encryption
> Type of protocol that allows data to be
sent and received securely over the > Used to protect data in case it has been
internet hacked
> When a user logs onto a website, SSL > Doesn’t prevent hacking, makes data
encrypts the data meaningless

> https or padlock in the status bar Symmetric Encryption


> When user wants to access a secure > A secret key which can be a combination
website: of characters
o User’s web browser sends a message so > If this key is applied to a message, its
it can connect with required website which contents is changed
is secured by SSL
> One key is needed to encrypt a message
o Web browser requests that the web and another key is needed to decrypt a
server identifies itself message
o Web server responds by sending a copy > Increasing the length of the key increases
of its SSL certificate the strength of the encryption
o Web browser checks if certificate is Plain text and Cypher Text
authentic
> Plain text is the normal representation of
o Sends signal back to web browser data before it goes through an encryption
algorithm
o Starts to transmit data once connection
is established > Cypher text is the output from an
encryption algorithm

35
Authentication o Creator of malicious code can gain
personal data; bank account
> Authentication is used to verify that data
come from a trusted source o Can lead to fraud or identity theft
> Works with encryption to strengthen > To remove risk:
internet security
o Some anti-spyware can identify and
> Passwords: usually a user id/name and remove pharming code from hard drive
password are
o User should be alert
used to log on to systems
Denial of Service Attacks (DoS)
> Digital Signatures: public key encryption;
> An attempt at preventing users from
ensure an electronic document is authentic
accessing part of a network
> Biometrics: relies on the unique
> Usually temporary but may be damaging
characteristics of human beings
(fingerprint scans, retina scans) > Attacker me be able to prevent user
from:
4.4 Phishing, Pharming & DoS
o Accessing their emails
Phishing:
o Accessing websites
> Creator sends out a legitimate-looking
email; as soon as recipient clicks on link, o Accessing online services
user is sent to a fake website
4.5 Applications
> Effect:
> Ways bank protect their costumers from
o Creator of email can gain personal data; online fraud
bank account
o Banks use 10/12-digit code unique to the
o Can lead to fraud costumer
> To remove risk: o May be asked to input three random
numbers from a four-digit PIN
o Many ISPs filter out phishing emails
o Some use a hand-held device into which
o User should be cautious
a customer inserts their card. Device will
Pharming generate an eight-digit code which the
customer types into web page
> Malicious code installed on a user’s hard
drive or on the web server, code will o Some ask to key in parts of their
redirect the user to a fake website passwords using drop-down boxes (using a
mouse)
> Effect:

36
5. ETHICS • Standard form: 4 numbers e.g.
194.106.220.19
> A set of principles set out to regulate the
use of computers • Alphanumeric form:

• protcol://web address/path/filename

o Where; Protocol is usually http


> Plagiarism is when a person takes
another person’s idea/work and claims it o Site address consists of: computer name,
as their own domain name, domain type, and country code

5.1 Types of Softwares o Path is the web page

Free Software o Filename is the item on the page

> Software source code can be freely Internet Service Provider (ISP)
accessed and modified as required • These are companies that provide users with
access to the internet
> Run, copy, change or adapt free software
(e.g. Scribus, Abiword) • Provider in return for these services is
charged a monthly or annual fee
> Possible to distribute modified versions
of software to friends and family • After paying this fee, a username and
password are issued which can be used to
Freeware connect to the internet.
> A software a user can download from the
internet free of charge
Extra mile with MAK:
> Once it has been downloaded, there are
2 E-Safety
no fees associated (e.g. Adobe, Skype)
• E-safety refers to the safety of data and
> Subject to all copyright laws User is not personal
allowed to study, modify code
information while using the internet.
Shareware: Trial version, with limited
• E-safety is required to make sure a user’s
features and limited time period.
personal information is not made vulnerable
and even leaked to hacker’s for e.g., which can
lead to identity fraud, bank A/C issues, etc.
Some more important points
Personal Data
Uniform Resource Locator (URL)
• Any data regarding a living person who can
• Web browsers use URLs to retrieve files be identified
• They are multiple ways of locating on the against the data or the data along with any
internet other information.

• Examples of personal data:

37
o Full Name • To keep personal data safe, one must:

o Home Address o Not give unknown people (on the internet)


personal information or send pictures of
o Banking details (A/C no, pin, etc.)
oneself to them.
o Medical history (suffered from depression,
o Maintain privacy settings to control which
etc.)
cookies are on their computer
o Personal data like ethnic origin, political
o Use learner friendly search engines and
views, criminal activity, mental health history,
websites recommended by your educational
o Sexual orientation and religion can be used institution, e.g. MAK.org
to blackmail victims of data breaches
o The website being accessed is from a trusted
• If personal data is leaked (data breach), the source,
following can occur:
or has a padlock symbol/ https protocol (s for
o Identity theft secure):

o Bank fraud Email Safety

o Damages to personal property • Open emails from known sources, and do not
click on an emails wit hyperlinks without
o Kidnapping (if kidnappers get access to the confirming with the sender of the email. Think
victim’s before opening an email from an unknown
address. person, never send any other sensitive
information (picture in school uniform, credit
o Etc. card PIN, etc.)
• To prevent the above, it is essential that • Ask their ISP to eanble email filtering to
personal data is protected. classfy spam mails as spam.
• Personal data can be leaked intentionally Social Media Safety
and unintentionally. Electronic data is at risk
due to: hacking, viruses, spyware, phishing, • Blcok and report users who seem suspicous
pharming, Smishing, vishing, ransomware1 , or use inappropriate language
spam, moderated and un-moderated forums, • Never use you real name, only use a
cookies, etc. nickname
• If a student shares a photograph of • Use appropraite language
themselves in their school uniform on social
media, then paedophiles, child predators, • Do not enter private chat rooms, as users can
kidnappers, etc. can physically reach the lure you
student. This should not be done
into giving personal inforamtion by seeming
A malicious program that encrypts data on a too nice.
computer system and demands for a ransom
• Do not meet anyone off the internet for the
to provide and decrypt the data
first time on
Internet Safety

38
your own, or atleast speak to a trusted adult o Have a backup of data in case of damage
first.
o Firewalls User IDs
• Do not missue images (of someone to
• To log on to a network, a user must type in a
blackmail them, for e.g.)
user ID
• Respect the confidentiality of other users
• User ID assigns user privilege once user logs
Online Games in

• Similar measures apply to that taken when • The top-level privilege for a network is an
using social media. administrator:

• Additionally, players should be careful about: o Able to set passwords and delete files from
server etc.
o In-game violence
• User privilege may only allow to access their
o Cyber bullying
own work area
o Keeping their webcams off (other potentially
Passwords
dangerous players have direct access to your
image) • After typing in user ID, the user will be
requested to type in their password
o Predators may use voice masking technology
to lure a user to reveal their age, sex etc. • Generally, it is a combination of letters and
numbers
o Cyber-attacks involving viruses, ransomware,
etc. • Passwords are shown as stars (***) so
nobody overlooking can see it
8.3 Security of Data
• Many systems ask for password to be typed
Hacking
in twice as a verification check, in case of input
• Hackers are people who get into your errors
computer system without having the rights. It
• To help protect the system, user has a finite
can lead to corruption or loss of data or a data
number of attempts
breach
• If password is forgotten, administrator must
o Some prove that a system is vulnerable -
reset it
maybe
• If password is forgotten on a website, it will
employed to test (ethical hacking)
be sent to your e-mail
o Some want to steal data
Biometric Data
o Alter or destroy data
• Uses features of the human body unique to
o For fun or a challenge every individual, such as fingerprints, retina,
iris, face and voice
• Prevention:
recognitions. It is used in authentication
o Protect with authentication techniques (user techniques as it is very difficult / impossible to
ID and password, etc.) replicate.

39
ADVANTAGES DISADVANTAGES o Web browser requests that the web server
identifies itself
• Usernames and passwords don’t have to be
remembered o Web server responds by sending a copy of its
SSL certificate
• Almost impossible to replicate body parts.
o Web browser checks if certificate is authentic
• Somebody else can’t gain access, like with a
stolen card o Sends signal back to web browser

• They can’t be forgotten, like a card o Starts to transmit data once connection is
established
• The readers are expensive
o If not secure, browser will display an open
• Damages in fingerprints can
padlock
deny access
Features of a Secure Web Page
• Some people worry about their personal
• Webpage URL: If the webpage is secure, it
information being stored
will start with ‘https’ instead of ‘http’.
Digital Certificate
• Padlock sign Phishing
• A digital certificate is an electronic passport
• Phishing is a fraudulent operation involving
used in the security of data sent over the
the use of emails
internet.
• The creator sends out a legitimate looking
• They can be attached with mails so that the
email hoping
receiver can
to gather personal and financial information
know that the mail is sent from a trusted
from the recipient of the email
source.
• The message appears to be from a legitimate
Secure Socket Layer (SSL)
source (e.g. a famous bank)
• Type of protocol that allows data to be sent
• When the user clicks on the link they are sent
and received
to a spoof
securely over the internet
website
• When a user logs onto a website, SSL
• They will be asked for personal info e.g.
encrypts the data
credit card details, PINs
• https or padlock in the status bar
• This could lead to identity theft
• When user wants to access a secure website:
• ISPs attempt to filter out phishing emails
o User’s web browser sends a message, so it
Pharming
can
• Pharming is a scam in which malicious code is
connect with required website which is
installed on a computer hard disk or a server
secured by SSL

40
• This code can misdirect users to fraudulent • Do not download random .exe (executable
websites file formats), .php, .bat, .com etc.

without their knowledge • Users should when being redirected to other


websites.
• Phishing requires an email to be sent to
every person who has been targeted, while • Therefore, technology enables unauthorised
pharming does not require emails to be sent users to
out to anyone
gain access to otherwise inaccessible
• Pharming can target a larger group of people information.
more easily
• If a person on the internet is asking for
• How pharming works: personal information, or to meet in real life or
acting suspicious, they should be reported to
o A hacker will infect the computer with a
cyber security agencies, or one’s
virus, either
parents/guardians.
by sending an email or installing software on
• Websites/pop-ups can be made to mimic
their
legitimate ones, or seem too good to be true,
computer when they first visit their website for e.g.lotrei.net instead of lottery.com

o Once infected, the virus sends user to a fake • Banks and organisations will never ask for a
website that looks identical to the one they PIN to be entered on website like this.
wanted to visit
Effects of phishing, pharming and Smishing on
o Personal info. from the user’s computer can a user:
be picked up by the pharmer/hacker
• Personal and sensitive information is lost,
o Anti-spyware, anti-virus software or anti- which can be
pharming software can be used to identify this
used for previously stated purposes.
code and correct the corruption
Moderated & Unmoderated Forums
Smishing
Online forums are places on the internet
• An attempt to extract a user’s confidential
where people
information via SMS (short message service) by
tricking the user into downloading a Trojan can join discussions on almost any topic and
horse (a virus that masks itself). also add their

• It is phishing via SMS. Preventing Phishing, views.


Pharming & Smishing
• There are two types of forums:
• User education
MODERATED FORUMS UNMODERATED
• Set up anti-malware and anti-spyware FORUMS
software
• Has a moderator who checks comments
• Enabling protocols such as SPF and DKIM before they are posted

41
• There will be no spams or rude and offensive • Used to protect sensitive data e.g. banking
comments details

• No diversions from the topic • Encryption keys are complex algorithms


which makes
• Highly secure due to moderation
codes almost unbreakable
• No moderator who checks the comments
Computer Viruses
• Spams, rude and offensive comments
present • It is a malicious program that replicates itself
and is
• Diversions from topic are possible
designed to cause harm to a computer system.
• Personal information can be obtained from
They
you
spread through downloadable files, external
• Not secure due to lack of moderation
store media (e.g. pen drives, etc.)
Spam
o May cause the computer to crash
• Spam is electronic junk mail and is a type of
o Loss of files, corruption of the data
advertising from a company sent out to a
target mailing list • Viruses infect computers through email
attachments, illegal software or downloaded
• Harmless but can clog up networks and slow
files
them down
• Prevention of Viruses
• It is more of a nuisance than a security risk
o Anti-virus software - Detects and then
• Many ISPs are good at filtering out spam, and
removes or isolates and use firewalls
prevent the user from getting these spam
emails. o Do not use illegal software

• It is often necessary to put a legitimate email o Only download from reputable sites
address
The threats of using credit cards online and
into a contact list to ensure wanted emails are prevention:
not filtered out by mistake Encryption
• Key logging/spywares: records the keys
• The conversion of data to code by encoding it pressed on a keyboard.

• Done by using encryption software o Can be used to obtain credit card details,
passwords and personal information.
• Since data is encoded, it appears
meaningless to a hacker o Use virtual keyboards to type in password.

• This technique prevents illegal access o Install anti-spyware software.

• Necessary to use decryption software to • Bogus sites: sites that look exactly like the
decode the data original sites, but aren’t.

42
o They can steal your card details and personal • The company providing the storage may go
information when you make purchases. out of business. In this case what has to be
done to the data will have to be considered.
o Always type in URLs, sometimes links in the
mails can be of bogus sites. • The company providing the storage will have
to put in all its efforts and safety measures in
• Phishing, pharming and Smishing:
order to keep your
o They trick you to reveal card and personal
data safe.
details as responses to messages or mails.
• If the company providing the storage doesn’t
o Open attachments only from trusted sources.
backup your data, you may lose it in case of
o Install anti-spyware software. power cuts or fires, etc. Firewalls

• Hacking into secure sites to obtain the • A firewall sits between the user’s computer
details: and an external network (internet) and filter
information in and out of the computer
o Encrypting the details will make it of no use
to the hacker. • Tasks carried out by firewall:

o Use strong passwords. o Examining ‘traffic’

o Use firewalls. o Checking weather incoming or outgoing data


meets criteria
• Tapping into wireless networks:
o If data fails the criteria, the firewall blocks
o Always use a password controlled Wi-Fi since ‘traffic’
it is
o Firewall can keep a list of all undesirable IP
relatively hard to tap into a secured Wi-Fi. addresses
*ALL PREVENTION TECHNIQUES WRITTEN o Helping to prevent viruses or hackers
HERE ALSO APPLY FOR THE THREATS IN entering the user’s computer
GENERAL (NOT SPECIFIC T CREDIT CARDS) *
Methods of Internet Security
Cloud Storage
AUTHENTICATION
• Your data is stored remotely and not on your
computer, METHOD

so you don’t have control over the physical


security of
ADVANTAGES DISADVANTAGES
your data.
PASSWORDS
• Some of the data stored may be personal
• Inexpensive as nothing other than a
data which are open to hackers, and have to
computer is required
be encrypted in order to prevent hackers from
obtaining them. • Can be easily hacked

• Can be forgotten

43
FINGERPRINT SCANS FACE RECOGNITION

• Highly recognized everywhere • Non-intrusive

• Very high accuracy • Relatively inexpensive

• Easy to use • Affected by changes in lighting, person’s


hairstyle, age and spectacles
• Relatively low storage requirement

• Intrusive

• Damages will

prevent access

SIGNATURE RECOGNITION

• Non-intrusive

• Very little time to identify

• Relatively low Expensive

• Problems occur if sign is not consistent

• High error rate (one in 50)

RETINA SCANS

• Very high accuracy

• No known way to replicate a person’s retina

• Very intrusive

• Relatively slow to verify retina scans

• Very expensive to install and set up

IRIS RECOGNITION

• Very high accuracy

• Verification time is usually less than 5


seconds

• Very intrusive

• Lot of memory needed for storage

• Very expensive to install and set up

44
45

You might also like