Professional Documents
Culture Documents
Information collected from all post-2016 (1) & 2017 (2) Marking Schemes - Joyous#4286
(-) - Appears once or twice || (*) - Appears frequently || ( **) - Appears a lot, Should know!
One (1) byte per character Four (4) bytes per character
Standardized
◈ Bitmap Image; (*--)
An image of pixels where each pixel has one color and the color is stored as a
binary number.
◈ Vector Graphic Logo; (-)
Series of geometric shapes & lines; A drawing list with commands to create each
individual object and the attributes for it.
○ Benefit; (*-)
1. Logo can be enlarged without pixelating because instructions to create
a logo is stored.
2. Smaller file size as only coordinates and calculations are stored.
3. Image is recalculated using equations and commands with each
adjustment.
◈ Sampling; (-)
Amplitude of the analogue sound wave is recorded at set intervals.
◈ Sampling Rate; (*-)
Number of samples per unit time.
~
Increase would mean more samples → larger file size (and vice versa)
P1
Information collected from all post-2016 (1) & 2017 (2) Marking Schemes - Joyous#4286
(-) - Appears once or twice || (*) - Appears frequently || ( **) - Appears a lot, Should know!
P2
Information collected from all post-2016 (1) & 2017 (2) Marking Schemes - Joyous#4286
(-) - Appears once or twice || (*) - Appears frequently || ( **) - Appears a lot, Should know!
Real-Time On-Demand
P3
Information collected from all post-2016 (1) & 2017 (2) Marking Schemes - Joyous#4286
(-) - Appears once or twice || (*) - Appears frequently || ( **) - Appears a lot, Should know!
◈ Benefit of wireless network over wired network;
(-)
Benefit Drawback
P4
Information collected from all post-2016 (1) & 2017 (2) Marking Schemes - Joyous#4286
(-) - Appears once or twice || (*) - Appears frequently || ( **) - Appears a lot, Should know!
◈ Network Interface Card (NIC); (-)
Enables the servers to connect to the (company) network.
◈ Public Switched Network Telephone (PSTN); (-)
PSTN consists of many different types of communication lines; duplex data
transmission; communication passes through different switching centers.
◈ IP Address; (-)
Gives each device on a network an identifier; each address is unique within the
network; Allows a device to send data to the correct destination.
◈ Need for IPv6 Addresses; (-)
Number of IP addresses needed will exceed the number available using IPv4.
◈ Benefits of Private IP Addresses; (-)
1. Improved security because IP addresses are not available outside the network.
2. Reduces number of public IP addresses required.
3. Only the router has a public IP address and is visible externally.
◈ URL converted to IP; (*-)
URL is parsed to obtain the Domain name which is sent to the nearest Domain
Name Server (DNS) → DNS name resolver searches the database of Domain
names and matching IP addresses to provide a rest → If Domain name is found,
the IP address is returned, otherwise the request is forwarded to a higher level
DNS → If still not found then an error message is generated.
◈ Accessing a web page without DNS; (-)|
Enter the IP address directly
◈ Benefit & Drawback of Dedicated Lines;
(-)
Benefit Drawback
Improved security
◈ Copper Cable; (-)
Carries data as electrical signals and can consist of a twisted pair.
◈ Fiber-Optic Cables; (-)
Uses a bundle of glass threads to transmit data as light.
P5
Information collected from all post-2016 (1) & 2017 (2) Marking Schemes - Joyous#4286
(-) - Appears once or twice || (*) - Appears frequently || ( **) - Appears a lot, Should know!
○ Benefits and Drawbacks; (--)
Benefit Drawback
P6
Information collected from all post-2016 (1) & 2017 (2) Marking Schemes - Joyous#4286
(-) - Appears once or twice || (*) - Appears frequently || ( **) - Appears a lot, Should know!
◈ Clock Speed; (-)
Clock sends out a number of pulses in a given time interval. Each processor
instruction takes a certain number of clock cycles to execute. The higher the
clock frequency, the faster the execution time for the instruction.
P7
Information collected from all post-2016 (1) & 2017 (2) Marking Schemes - Joyous#4286
(-) - Appears once or twice || (*) - Appears frequently || ( **) - Appears a lot, Should know!
Volatile Non-volatile
P8
Information collected from all post-2016 (1) & 2017 (2) Marking Schemes - Joyous#4286
(-) - Appears once or twice || (*) - Appears frequently || ( **) - Appears a lot, Should know!
Information collected from all post-2016 (1) & 2017 (2) Marking Schemes - Joyous#4286
(-) - Appears once or twice || (*) - Appears frequently || ( **) - Appears a lot, Should know!
screen, the charge transfers to the finger and the sensors at the corners detect
the change. The point of contact is registered and the coordinates are calculated.
◈ Laser Printer; (-)
Revolving drum is given an electric charge → Laser beam scans back and forth
across the drum discharging certain points → Drum is coated with oppositely
charged toner which rolls over electro-statically charged paper → ‘pattern’ on the
drum is transferred to the paper which is passed through the fuser to seal the
image. → The electric charge is removed from the toner and excess toner is
collected.
◈ Inkjet Printer; ( )
○ Print Head; (-)
Print head contains a large number of very small nozzles; ink is fed to
each nozzle from a reservoir; print head fires droplets of ink onto the
paper; print head moves horizontally across the paper.
○ Stepper Motor; (-)
Stepper motor is connected to the print head by a belt and moves the
print head across the paper; it parks the print head assembly when not in
use and also turns the rollers that provide the paper feed.
◈ 3D Printer; (-)
Object is designed using Computer Aided Software (CAD) software → Software
splits object into splices → Data about the splices is sent to the printer → Solid
plastic is melted and transferred to the nozzle → Stepper motor moves the
nozzle into position → Nozzle extrudes the molten plastic → Layer is completed
→ Fan cools the layer → Steps are repeated for each subsequent layer.
◈ Microphone; (--)
Incoming sound waves cause vibrations of the diaphragm → Moves a coil past
the magnet. → An electrical signal is produced
◈ External Speaker; (--)
Electric current is sent to the speaker and passes through a coil → Current in the
coil creates an electromagnetic field → Changes in audio signal causes direction
of electric current to change to determine polarity of the electromagnet →
Electromagnet is repelled by, or attracted to the permanent magnet → Movement
of the coil causes the diaphragm to vibrate which creates sound waves.
○ Components; (-)
Diaphragm; coil of wire; spider / suspension; magnet; basket; dust cap;
outer frame
P10
Information collected from all post-2016 (1) & 2017 (2) Marking Schemes - Joyous#4286
(-) - Appears once or twice || (*) - Appears frequently || ( **) - Appears a lot, Should know!
P11
Information collected from all post-2016 (1) & 2017 (2) Marking Schemes - Joyous#4286
(-) - Appears once or twice || (*) - Appears frequently || ( **) - Appears a lot, Should know!
P12
Information collected from all post-2016 (1) & 2017 (2) Marking Schemes - Joyous#4286
(-) - Appears once or twice || (*) - Appears frequently || ( **) - Appears a lot, Should know!
◈ Relative Addressing; (-)
A number is added to the base address to give the actual address.
◈ Indexed Addressing; (--)
The contents of the index register are added to operand to give the actual
address.
◈ Direct Addressing; (-)
Operand is the address where the data is stored.
◈ Indirect Addressing; (-)
Operand is an address that holds another address where the data is stored.
◈ Immediate Addressing; (-)
Operand is the actual value to be loaded
◈ Absolute Addressing; (-)
Operand is a numeric address
◈ Symbolic Addressing; (-)
Operand is a word/symbol
◈ Machine Independent; (-)
Program can be translated to run on any processor or platform.
◈ How is Java Source Code translated; (-)
Uses a two-step translation process where code is translated first into
intermediate code using the java compiler. The bytecode is finally interpreted by
the Java Virtual Machine.
Chapter 7: System Software
◈ Operating System; (--)
Provides an interface between user and hardware; hardware unusable without
one; provides software platform
◈ Utility Program; (-)
Additional program that helps to maintain or configure the system.
◈ Library Program; (-)
Provides a ready-built routine that can be imported into a program.
P13
Information collected from all post-2016 (1) & 2017 (2) Marking Schemes - Joyous#4286
(-) - Appears once or twice || (*) - Appears frequently || ( **) - Appears a lot, Should know!
P14
Information collected from all post-2016 (1) & 2017 (2) Marking Schemes - Joyous#4286
(-) - Appears once or twice || (*) - Appears frequently || ( **) - Appears a lot, Should know!
Same DLL file can be used in DLL must be present at run-time
multiple programs at same time otherwise there is an error
P15
Information collected from all post-2016 (1) & 2017 (2) Marking Schemes - Joyous#4286
(-) - Appears once or twice || (*) - Appears frequently || ( **) - Appears a lot, Should know!
◈ Interpreter over Compiler; (--)
Easier debugging because errors can be corrected in real-time; Parts of program
can be tested; any change is seen immediately
◈ Features of Bitmapped Graphics Software;
(--)
Feature Description
Red Eye Reduction Reduces red light reflected from human eyes
◈ Features of Sound Editing Software;
(*)
Feature Description
Fading Change the volume of a section of the sound for
it to get louder or quieter
◈ Process Management; (*)
Manages the scheduling of processes by allowing multi-tasking, ensuring fair
access, and handling priorities. Manages resources required by the processor
and prevents any interference between them.
P16
Information collected from all post-2016 (1) & 2017 (2) Marking Schemes - Joyous#4286
(-) - Appears once or twice || (*) - Appears frequently || ( **) - Appears a lot, Should know!
○ Tasks; (*)
Resource management; scheduling of processes; resolution of conflicts
when two or more processes require the same resource.
◈ Memory Management; (*)
Handles allocation of memory to processes and ensures a fair usage. Organizes
and makes use of virtual memory while keeping processes separate.
○ Tasks; (*)
Allocates RAM to programs; keeps track of allocated and free memory
locations; handles virtual memory; memory protection prevents a process
from accessing memory not allocated to it.
◈ Peripheral Management Tasks; (*)
Installation of device driver software, Managing interrupts from device, Sending
control signals to the device, Control of buffers, Management of queues.
◈ Security Management; (--)
Provides user accounts and passwords. Ensure privacy of data
○ Tasks; (*)
Sets up user accounts; authenticates; implements access rights;
automatic backup; system restore / roll back; prevents unauthorized
access
◈ File Management Tasks; (--)
Specifies tasks that can be performed on files; maintains and creates directory
structures; provides file naming conventions; controls access to files
◈ Printer Management Tasks; (-)
Installs printer driver; sends data to the printer to print; receives and handles
error messages from the printer.
◈ Secondary Storage Management; (*)
Storage space divided into file allocation units, allocating space to particular
files, providing file naming conventions, controlling access
◈ Interrupt Processing; (-)
Handles the signals sent when the attention of the processor is required
elsewhere.
◈ Software Platform; (-)
Provides an environment within which the programs can be run.
P17
Information collected from all post-2016 (1) & 2017 (2) Marking Schemes - Joyous#4286
(-) - Appears once or twice || (*) - Appears frequently || ( **) - Appears a lot, Should know!
P18
Information collected from all post-2016 (1) & 2017 (2) Marking Schemes - Joyous#4286
(-) - Appears once or twice || (*) - Appears frequently || ( **) - Appears a lot, Should know!
◈ Privacy; (*)
Keep data confidential so it is only seen by authorized personnel.
◈ Password // Biometrics; (-)
Prevents unauthorized access
◈ User Accounts; (--)
User has a username and password; Access to resources can be limited for each
account; Prevents unauthorized access to the system
◈ Firewall; (*)
All incoming and outgoing traffic goes through a firewall that blocks signals that
do not meet requirements; Keeps a log of signals; Applications can have network
access restricted
◈ Anti-Malware; (--)
Scans for malicious software and quarantines any that is found; Scans can be
scheduled at regular intervals
◈ Auditing; (-)
Logs all actions or changes to the system in order to identify any unauthorized
use.
◈ Parity Check; (--)
Each byte of data has a parity bit and there is another additional parity byte sent
with vertical parity. Each row and column must have an even/odd number of 1s. If
there is an error, it can be identified by the intersection of the incorrect row and
column.
◈ Check Sum; (-)
Calculation is done on a block of data and the result is transmitted with the data.
Calculations are repeated at the receiving end and results are compared. If
different, then an error has occurred.
Chapter 9: Ethics and Ownership
◈ Ethics; (-)
System of moral principles based on philosophical or religious views that guide
behavior and decision making.
P19
Information collected from all post-2016 (1) & 2017 (2) Marking Schemes - Joyous#4286
(-) - Appears once or twice || (*) - Appears frequently || ( **) - Appears a lot, Should know!
P20
Information collected from all post-2016 (1) & 2017 (2) Marking Schemes - Joyous#4286
(-) - Appears once or twice || (*) - Appears frequently || ( **) - Appears a lot, Should know!
P21
Information collected from all post-2016 (1) & 2017 (2) Marking Schemes - Joyous#4286
(-) - Appears once or twice || (*) - Appears frequently || ( **) - Appears a lot, Should know!
Schema Description
P22
Information collected from all post-2016 (1) & 2017 (2) Marking Schemes - Joyous#4286
(-) - Appears once or twice || (*) - Appears frequently || ( **) - Appears a lot, Should know!
○ Stages;
(--)
Stage Description
Selection Line of code executed in a fixed order // Testing a
condition to determine the sequence of execution
P23
Information collected from all post-2016 (1) & 2017 (2) Marking Schemes - Joyous#4286
(-) - Appears once or twice || (*) - Appears frequently || ( **) - Appears a lot, Should know!
◈ Comments; (-)
Explain the functionality of the code
◈ Indentation; (-)
Easier to identify block of code
Chapter 12: Stepwise Refinement and Structure Charts
◈ Features of a Structure Chart; (*--)
-P arameters passed between modules
- Module Iteration
- Module Selection
- Module Sequence
- Module heirarchy
◈ Stepwise Refinement; (*--)
Breaking down a problem into smaller steps until it is easier to solve and be
programmed from.
~
Increases the level of detail of the algorithm
Chapter 13: Programming and Data Representation
◈ Bubble Sort Algorithm; (--)
Reduces the number of items to be checked by one after each pass. Use of a flag
variable which stops the outer loop after no swaps made in the inner loop and
resets again before the start of inner loop. Set again if swap is made.
○ Effectiveness; (-)
Prevents unnecessary iterations through the array
◈ Advantage of 1D Array; (-)
- Same data type using a single identifier
- Access of individual elements
- Easier to search data and understand it
◈ Advantages of built-in functions; (-)
- Saves development time
- Pre-compiled and tested
- Available to all programs
P24
Information collected from all post-2016 (1) & 2017 (2) Marking Schemes - Joyous#4286
(-) - Appears once or twice || (*) - Appears frequently || ( **) - Appears a lot, Should know!
◈ Types of Loop;
(-)
Loop Description
Pre-Condition
◈ Storing Data in File over Array; (-)
Retain data when the computer shuts down or the program ends.
◈ File Modes;
(-)
Mode Description
WRITE
◈ Use of parameters with subroutines; (-)
Pass values to and from subroutines; produce reusable code; avoid global
variables; avoid recursions
Chapter 14: Structured Programming
◈ Advantages of Subroutines; (*-)
1. Code can be called from multiple places
2. Code can be independently tested and debugged
3. Change only needs to be made once if the subroutine task changes
4. Reduces unnecessary program lines
5. Enables sharing of development between programmers
◈ Use of Subroutines; (-)
Makes a more manageable and understandable solution
◈ Use of Parameters in Subroutines; (-)
- Pass values to/from the subroutine
- Produce reusable code
P25
Information collected from all post-2016 (1) & 2017 (2) Marking Schemes - Joyous#4286
(-) - Appears once or twice || (*) - Appears frequently || ( **) - Appears a lot, Should know!
P26
Information collected from all post-2016 (1) & 2017 (2) Marking Schemes - Joyous#4286
(-) - Appears once or twice || (*) - Appears frequently || ( **) - Appears a lot, Should know!
built in functions
P27
Information collected from all post-2016 (1) & 2017 (2) Marking Schemes - Joyous#4286
(-) - Appears once or twice || (*) - Appears frequently || ( **) - Appears a lot, Should know!
◈ White-box Testing; (--)
Tests every path through the algorithm.
◈ Black-box Testing; (-)
Data is chosen to test that the program does what it is supposed to.
○ Errors revealed; (-)
Run-time; Logical; incorrect algorithm
◈ Program Errors;
(*-)
Error Description
Information collected from all post-2016 (1) & 2017 (2) Marking Schemes - Joyous#4286
(-) - Appears once or twice || (*) - Appears frequently || ( **) - Appears a lot, Should know!
- Documentation
- Implementation
- Maintenance
○ Features that assist in cycle; (-)
- Context-sensitive prompts
- Dynamic syntax checking
- Pretty Printing
- Formatting
- Single-stepping; Allow program statements to be executed one at a time
- Breakpoints; Stop the program at a specific statement
- Watch window; Monitor value of variables as program is run
- Text Editor
- Compiler / Interpreter
P29