Professional Documents
Culture Documents
Analogue Data Digital Data: Denary: 2. Binary
Analogue Data Digital Data: Denary: 2. Binary
3. Hexadecimal
A base 16 numbering system Computers uses processors to perform
operations
Uses digits from 0-9 and A-F Processors uses logic gates (like AND, OR)
Units increases by power of 16 Logic gates gets inputs as only either 1 or 0
Each one hexadecimal digits equals 4 binary
digits
Number system conversions
Denary Binary Hexadecimal
198 128 64 32 16 8 4 2 1 8421 8421
1 1 0 0 0110 1100 0110
C 6
Hexadecimals advantages:
Shorter
Easier to read
Easier to search
Takes less space on screens
1
Eng. Omar Nabil THEORY REVISION
Sum: Complementary:
0 0 1 1 1 -128 64 32 16 8 4 2 1
+ + + + + Sum =0 no carry up
0 1 0 1 1 Sum = 1 no carry up If you have a negative number you will put 1
at -128 and then add the number to get the
value you need
= = = = + Sum = 0 carry up 1 128 64 32 16 8 4 2 1
0 1 1 0 1 Sum =1 carry up 1 0 1 1 1 0 1 1 1
If you need the same number in positive you
will make the ordinary change from denary to
binary
There is other way
1 0 0 0 1 0 0 1
Then change each 0 to be 1 and each 1 to be
0
0 1 1 1 0 1 1 0
Then add 1 to the right
0 1 1 1 0 1 1 1
2
Eng. Omar Nabil THEORY REVISION
AUDIO
EXAMPLE:
Analogue sounds cannot be understood by computers, a 32-second sound clip is recorded. The sound will be
so it should be converted to digital (discrete) values sampled 16000 times for a second. Each sample will be
using the ADC. Sound is represented as samples. Each stored using 8 bits. Calculate the file size in kilobytes?
;samples is represented as a unique binary number. ANSWER:
Binary bits are represented in order to form the audio
file.
(16000*8*32) / (8*1024) = 500KB
3. (ASCII) ‘q’ equals %77 Each character on a keyboard has a unique equivalent
hexadecimal, binary, and denary value saved in a
standard table called ASCII table.
Each hexadecimal value should be preceded by a % sign.
4. Error messages #E04 5. Memory dump 5A 2B C7 05
Format: .mp3 .jpeg .mp4 .txt/.doc - Created by recording software like sequencer or
microphone
Mp4: - Used when distributing music files
3
Eng. Omar Nabil THEORY REVISION
Explain how lossy compression reduce the size of an - Unnecessary sounds human ears can’t hear is
image file? removed
- A compression algorithm is used - Using perceptual music shaping
- The data is permanently removed - This will reduce sample size and sample
resolution
- The original file can’t be retrieved - Which will reduce audio size
- Unnecessary colors human eye can’t detect Explain how lossy compression reduces the size
is removed of a video file?
- This will reduce color depth and image - A compression algorithm is used
resolution
- Which will reduce image size - The data is permanently removed
4
Eng. Omar Nabil THEORY REVISION
5
Eng. Omar Nabil THEORY REVISION
Chapter 2
Data transmission
6
Eng. Omar Nabil THEORY REVISION
- Transmitting data in one direction - Transmitting data in both directions but not at the
same time
- Only (unidirectional) - Like walkie- talkie
- Like from a computer to a printer
-
Full duplex:
- Transmitting data in both directions simultaneously
- Like phone calls and video conferences
Serial: Parallel:
- Transmitting data one bit at a time over one single - Transmitting data multiple bits at a time over
wire multiple wires
- Works well over long distances - Works over short distances
- Cheaper than parallel as it uses one wire - Faster in transmission than serial
- Slower in transmission than parallel - Data may be corrupted over long distances
- Like universal serial bus (USB) - expensive to manufacture
- Data can be skewed
- Like integrated circuits (IC)
7
Eng. Omar Nabil THEORY REVISION
- The two values are compared - A +ve or -ve acknowledgment should be sent to
sender
- If they are not equal, then the data is corrupted - If no acknowledgment is sent, then data request is
sent again.
Encryption:
scrambling characters so that messages make no sense
(meaningless). Data before encryption is called plain text. An
encryption algorithm is used to encrypt data to be cypher
text. A key is used to encrypt data (it can be public or
private key). Encryption can either be symmetric or
asymmetric.
Symmetric encryption: uses the same one key to encrypt Asymmetric Encryption: uses two different keys (public
and decrypt a message and private key).
One key to encrypt and another to decrypt a message. It is
more secure than symmetric. Works slower than symmetric
due to complex operations of encryption and decryption.
Authentication: a process used to verify that the data
comes from a trusted source
Hardware
Computer Architecture: shows how a computer Stored program computer: A program is stored on
system is designed a secondary storage device like (HDD)
A computer consists of many components (units) that Data and instructions of the program are moved and
are used in the Fetch -Decode -Execute cycle like stored to main memory (RAM)
Memory -CPU -CU -I/O devices -Registers -Busses Data and instructions then fetched one by one from
memory to the processor to be executed
It is often referred to as Von Neumann Architecture
and it goes through 3 main stages: -
Register: a high-speed storage area within the Fetch: - getting the data from memory and pass it to
computer (CPU) the processor to be executed
PC (Program Counter) Contains address of next Decode: - the Control Unit checks if the I/O devices
instruction to be fetched from memory. are ready before passing it to the CPU
MAR (Memory Address Register) Contains Execute: - the CPU executes instructions with help of
address of current instruction in memory unit. ALU and ACC
8
Eng. Omar Nabil THEORY REVISION
Buses (pathways):
- Address bus: Carries addresses from the - Data bus: Carries data between processor,
processor to memory (Unidirectional) memory, and I/O devices (Bidirectional)
- Control bus: Carries signals to control all
activities within the computer (Uni and Bi)
Control Unit (CU): used to pass the signals from
operating system to other computer units.
CU sends signals to other components telling them
what to do
CU controls the flow of the whole cycle
CU has two registers PC and CIR
9
Eng. Omar Nabil THEORY REVISION
Embedded systems
Microcontrollers:
This has a CPU in addition to some RAM and
ROM and other peripherals all embedded
onto one single chip
Microprocessor:
Integrated circuit which only has a CPU on the
chip (there is no RAM, ROM or peripherals –
these need to be added)
System on chips (SoC):
This may contain a microcontroller as one of
its components (they almost always will
include CPU, memory, input/output (I/O)
ports and secondary storage on a single
microchip)
10
Eng. Omar Nabil THEORY REVISION
Input devices: a device that allows data to be entered into computer like keyboard
2D Scanner: converts paper hard copy into a digital 3D scanner: 3D scanners scan real life solid objects using
format to be stored in a computer lasers, light, radio waves or X-rays and produce a three-
dimensional image
- The 2D scanner shines a light onto the surface of a - The 3D scanner shines a laser or light over the
2D document using a scan head surface of the 3D solid object.
- The surface of the document is made up of pixels - It takes several 2D images from different points of
with different colors. the solid object.
- Reflected light is captured and sent to mirrors and - It records measurements of the dimension of the
lenses. object
- Then it is sent to a charge couple device CCD. - Measurements are converted to a digital file to
produce a 3D digital image.
- CCD is made up of many pixels, each pixel will
record the amount of light of color.
Applications: Applications:
- Reading Passports - Computed Tomography CT
- OCR Optical Character Recognition - X-Ray
- OMR - MRI
Barcode scanner/ reader: to read barcodes of QR code scanner/ reader: Quick Response code
products reader
- The barcode reader shines a red laser / light over - The OR code reader or a mobile shine a red laser /
the surface of a barcode. light over the surface of a QR code.
- The barcode surface is made of white and black - The surface of a QR code is composed of black
vertical lines with different thickness. squares on a white background.
- White lines reflect light and black lines reflects less - There are 3 large squares on borders for alignment
light.
- The barcode reader shines a red laser / light over - Black squares reflect less light.
the surface of a barcode.
- The reflected light is detected by sensors - Fach Square is represented as a binary value to form
a digital file.
- The data now in a digital format. - The QR code can link users to a website or any
advertisement
11
Eng. Omar Nabil THEORY REVISION
Applications: Applications:
1. Supermarket checkout (Reads barcodes to check 1. Advertising by mobile phones.
details)
2. Automatic stock control 2. Packaging
3. Track books on loan
4. Track bags
Pointing devices: Allows a user to navigate a computer Microphone: inputs analogue sound waves into a
system by controlling a pointer, There are two types of computer as digital signals
pointing devices, these are the Tracker ball and the Mouse
12
Eng. Omar Nabil THEORY REVISION
Capacitive: Infrared:
- Conductive layer. - invisible grid on screen
- An electric field is created across the screen. - the beam is broken when screen has been touched
- Sensors around screen monitor the electric field. - sensors detect the cut
- When finger touches screen, electric charge is - microprocessor calculates the position of touch
transferred to finger.
- Microprocessor calculates position of touch. - Allows multi-touching
- Allow multi-touching - Cannot be broken easily
- Cannot be broken easily - Good visibility
- Good visibility - Quick response
- Quick response - Allows not only bare fingers
- Allows only bare fingers - Expensive
Resistive:
- Uses multiple layers with two different materials
- When the top layer is touched, it transmits electric
current into bottom layer.
- Circuit is completed.
- Microprocessor calculates the point of contact.
- Cheap to manufacture
- Allows not only bare fingers
- No multi-touch
- broken easily & Poor visibility
- Slow response
Sensors:
input devices used to collect readings of physical properties like temperature
Data that is measured by a sensor is usually in analogue form
Why Sensors?
- Reliable - Reaches places where humans can't.
- Don't get tired
- Accurate
Examples :
Temperature: Measures temperature of water in washing Pressure: Measures weights / count of people or cars /
machines / fish tanks / air condition pressure of gas in pipelines
Infrared/ motion: Measures motion like automatic doors/ Light: Measures brightness in the environment like in green
intruders/ count people or cars houses / switch street lights
Gas: Measures pollution in water / checks CO2 PH (Acidity): Measures acidity levels in soil / water
pollution
13
Eng. Omar Nabil THEORY REVISION
Sound: Measures noise levels / leak detection Moisture / Humidity: Measures amount of water left in
clothes / monitors dampness levels.
Magnetic field: Counts cars to control traffic lights / ABS
Monitoring systems: just monitors the readings and Control systems: monitors readings and sends signal to a
alarms if readings are out of range Like: - Controlling Unit (ACTUATOR) to have an action incase if data
is out of range Like;-
3. The data is converted with an ADC 4. The microprocessor will compare this data against
the preset values.
(If the question gives you these values, you must use
them in your answer!)
Output devices: A device allows user view or hear data that has been entered into a computer.
✓ The beam is sent to a group of chromatic-coated mirrors
✓ Produced image quality is less than DLP
Inkjet printer: Laser printer:
Features Features
- Uses liquid ink filled in cartridge - Uses dry powdered ink filled in toner
- Suitable for low volume and high-quality printouts - Prints whole paper in one go
- Prints a paper line by line - Suitable for high-volume high-quality printouts
-Suitable for photographs - Suitable for documents
- Prints faster
- larger tray
Operation - make use of the properties of static electricity
- Inkjet printers have print heads which contain ink Operation
cartridges - Laser printers have print/ rotating drum which is given
- The stepper motor and the belt move the print heads a positive charge.
across the paper.
14
Eng. Omar Nabil THEORY REVISION
- The print head has Nozzles which is filled with ink. - A laser shines at parts of the drum that will require ink
- Nozzles sprays droplets of ink on the paper using two for the printing process
different technologies:- - The laser is removing the positive charge from certain
➢ Thermal bubble: generates heat so the ink areas of the drum.
starts evaporating. - The negatively charged sheet of paper is rolled over the
➢ Piezoelectrie: There is a crystal located at the drum.
back of each nozzle to vibrate. - The sheet goes through a fuser (heating rollers) to melt
the powder to fix it.
3D printer: 2D Cutter:
- Uses 3D images that is either scanned by a 3D scanner - 2D cutters uses high powered laser that cuts in X-y
or designed at CAD apps plane.
- Uses different materials to create the output as a solid - It can only recognize the face of the material.
object.
- The printer is filled with the material like plastic, 3D Cutter:
powdered metal, and paper - 3D cutters use high powered laser that cuts in X-y-z
- The 3D printer builds the objects layer by layer plane.
(additive manufacturing) - Creates a 3D object and 3D prototypes.
Applications - Uses 3D images that is either scanned by a 3D scanner
- prosthetic limbs or designed at CAD apps
- Fashion and Art - Material is loaded to the 3D cutter.
- Different types of material can be used.
- Uses infrared that produces extreme heat.
15
Eng. Omar Nabil THEORY REVISION
CRT (CCFL):
- Cathode ray tube
- Uses CCFL as a source of light
- Big and heavy
- Uses a lot of electricity
- Uses a lot of desk space
LCD: LED:
- Liquid crystal display - Liquid emitting diode
- Image is made up of pixels - Image is made up of pixels
- Each pixel has 3 filters R, G, B - Each pixel has 3 filters R, G, B
- LCD screen has backlit - LED screen has a backlit
- Liquid is shone through liquid crystals - The backlit is matrix of tiny LEDs to light the screen
- Shape of crystals can be changed on or off - Reaches maximum brightness immediately
- Better than CRT - Thinner and lighter
- Lightweight - Consumes less power than LCD
- Consume less power than CRT - No warmup to start
OLED:
- Organic liquid emitting diode
- Uses organic materials to create semi-conductors
- Flexible and curved screens
- No backlit
- Thinner and lighter
- Consumes less power than LED
- More flexible
16
Eng. Omar Nabil THEORY REVISION
- Stores start-up files to start the computer - Stores currently in use instructions, data,
(BIOS) and programs
- Permanent (nonvolatile) - Temporary (volatile)
- Contents of ROM cannot be altered or added - Contents removed when power is turned off
to
- Computer would not start-up without ROM - RAM can be read from and written to
Bios
- STATIC RAM (SRAM): uses flip-flops to store
data
- DYNAMIC RAM (DRAM): uses transistors to
store data
17
Eng. Omar Nabil THEORY REVISION
similarities between HDD and SSD: differences between HDD and SSD:
- both are secondary storage HDD
- both are not directly accessed by CPU - Has moving parts
- both are nonvolatile - Uses magnetic media to store media
- both storage large files permanently - Slower to access data
- both have read/write abilities - greater latency due to moving parts
- Heavier
- Has higher power consumptions
- Cheaper per unit of data
- Greater longevity
SSD
- has no moving parts
- uses memory chips to store data
- faster to access data than HDD
- has less latency as no moving parts
- lighter so reliable for portable devices
- lower power consumption
- More expensive per unit of data
- Lower longevity
18
Eng. Omar Nabil THEORY REVISION
how data is read from the optical storage media like CD?
- A red laser is used - Laser beam shines onto the surface of the CD
- The surface of CD is covered by one spiral track - The CD rotates to be read
- Data is represented on the track as pits and lands - Pits and lands represent binary values
- plugs directly into USB port - there is no need to waste memory with data that isn’t
being used (e.g. during error handling)
- direct transfer of data - it reduces the need to buy and install more expensive
RAM memory (although as mentioned earlier there are
limits to the value of doing this).
19
Eng. Omar Nabil THEORY REVISION
Advantage Disadvantage
- Client files stored on the cloud can be accessed at - If the client has a slow or unstable internet
any time from any device anywhere in the world connection , they would have many problems
provided internet access accessing or downloading their data
- There is no need for client to carry an external - Costs can be high if large storage capacity is required
storage device with them even use the same , it can also be expensive to pay for high download
computer to store and retrieve information data transfer limits with customer
- The cloud provides the user with remote back-up of - The potential failure of the cloud storage company is
data with obvious benefits to alleviate data loss always possible – this poses a risk of loss of all
backup data
20
Eng. Omar Nabil THEORY REVISION
Chapter 4
Software
General features of system software General features of application software
- set of programs to control and manage the - used to perform various applications (apps) on a
operation of computer hardware computer
- provides a platform on which other software - allows a user to perform specific tasks using the
can run computer’s resources
- required to allow hardware and software to - may be a single program (for example, Notepad) or a
run without problems suite of programs (for example, Microsoft Office)
- provides a human computer interface (HCI) - user can execute the software as and when they
require.
- controls the allocation and usage of
hardware resources.
EXAMPLE: operating system, compilers , linker , Example : spreadsheet, word processor , video editing ,
device driver ,
Utility software (utilities)
- virus checkers - defragmentation software
- disk contents analysis and repair - file compression and file management
- back-up software - security
- screensavers.
Virus checkers (anti-virus software)
anti-virus software work in different ways they
all have the following common features:
- they check software or files before they are any possible files or programs which are infected are put into
run or loaded on a computer quarantine which:
- anti-virus software compares a possible virus - allows the virus to be automatically deleted, or
against a database of known viruses
- they carry out heuristic checking – this is the - allows the user to make the decision about deletion
checking of software for types of behavior
- anti-virus software needs to be kept up to date since
new viruses are constantly being discovered
21
Eng. Omar Nabil THEORY REVISION
The Microsoft Windows environment offers the - a locally backed up copy of the file
following facilities using the back-up utility:
22
Eng. Omar Nabil THEORY REVISION
Operating system:
A software running in the background of a computer system. It allows communication between hardware and
software. It controls the components of the computer
Like Windows, Android, IOS, Linux
Operating System Features / functions:
Processor management: Processor (CPU) is a part User Accounts management: Operating system allows users
of a computer that executes/runs/ performs the to create many different accounts with protected passwords at
instructions and applications. one computer.
Provides a user interface (GUI): Like screens, Spooling management: Temporary storage of input or output
icons, lists, creating folders data for relatively slow Input and output devices to access it.
File utilities: Like (create, copy, paste, delete file) Provides Interrupt handling Routines: To deal with different
interrupts and handle it properly.
23
Eng. Omar Nabil THEORY REVISION
Disadvantages Disadvantages
- the user needs to learn a number of commands - this type of interface uses up considerably more computer
to carry out basic operations memory than a CLI interface
- all commands need to be typed in which takes - the user is limited to the icons provided on the screen
time and can be error-prone - needs an operating system, such as Windows, to operate,
- each command must be typed in using the which uses up considerable memory
correct format, spelling, and so on
Who would use each type of interface?
CLI: a programmer, analyst or technician; basically GUI: the end-user who doesn’t have or doesn’t need to have
somebody who needs to have a direct any great knowledge of how the computer works; a person who
communication with a computer to develop new uses the computer to run software or play games or
software, locate errors and remove them, initiate stores/manipulates photograph
memory dumps
Describe what is meant by a BIOS and state its BIOS software and BIOS settings are different. Describe the
function. What is the task of a BIOS when a computer different types of memory needs for both the software and its
is first powered up? settings. In your explanation state why both types of memory
are used.
- The BIOS tells the computer where the storage - The BIOS is often referred to as firmware. Firmware is
device that holds the operating system can be defined as a program that provides low level control for
found devices
- it then loads the part of the operating system - The BIOS program is stored in a special type of ROM, called
that is needed and executes it. an EEPROM (Electrically Erasable Programmable ROM).
- The BIOS is often referred to as firmware. - EEPROM is a flash memory chip, which means its contents
Firmware is defined as a program that provides remain even when the computer is powered down.
low level control for devices.
High level language Low level language
Benefits of writing code in Benefits of writing code in
- closer to human language so it is easier and - run faster as it works directly on registers of CPU
faster to read, write, and understood - shorter code so it requires less storage (RAM)
- easier and faster to debug errors - suitable for drivers’ software
- portable and independent of a specific platform - access hardware
- has built-in functions to save time of writing the
code
Drawbacks of writing code in Drawbacks of writing code in
- takes more time to be executed (translated) - takes time to written
- takes time to be tested
- specific hardware (machine dependent, not portable)
Example of a code Example of a code
IF Num > 0 THEN LDA A
OUTPUT “positive” INC A
END IF STA Sum
24
Eng. Omar Nabil THEORY REVISION
Languages Languages
- python - Assembly
- C++ - Machine language
- Java
- VB
Translators Translators
Compiler and interpreter Assembler
25
Eng. Omar Nabil THEORY REVISION
Internet: interconnected network of networks Internet protocol (IP) address: a unique network to identify
location of a device on internet
URL uniform resource locator: equivalent to the IP - It is located by the network/ISP
address and commonly used by users - Can be public or private IP
protocol://website address/path/file name - It can be static or dynamic
- The protocol is usually either http or https. - Can be used in place of URL
- The website address is: - 32 binary bits divided into 4 groups
• domain host (www), - 4 denary number (each number is from 0 to 255) like
• domain name (website name), 192.168.1.1
• domain type (.com, .org, .net, .gov, for
example),
• and sometimes country code (.uk, .de, .cy, for
example)
26
Eng. Omar Nabil THEORY REVISION
Hypertext markup language (HTML): a markup Hypertext transfer protocol (http): a protocol that governs
language used to design webpages transmission of data between web browsers and webservers
- Uses tags to format webpage content translated without encryption.
by web browser - Https uses encryption algorithms to protect data during
- Consists of structure and presentation transmission
- HTML structure to design page layout like - https uses wither SSL or TLS certificate
position of each component - websites that’s uses https is indicated by https:// and a
- HTML presentation to design page format and closed padlock
style like colors/font of each component
protocol: a set of rules that is agreed by the sender webserver: a computer that contains webpages and it has a
and recipient while transmitting data static IP address
webpage: a collection of web document written in website: a collection of many linked webpages
HTML
web browser: a collection of many linked webpages
27
Eng. Omar Nabil THEORY REVISION
Cookies
• Cookies are small files or code stored on a • Every time a user visits a website, it checks if it has set
user’s computer. cookies on their browser before.
• They are sent by a web server to a browser • There are two types of cookies:
on a user’s computer. o session cookie
• Each cookie is effectively a small look-up o persistent (or permanent) cookie.
table containing pairs of (key, data) value
Session cookies Persistent (permanent) cookies
- Session cookies are used, for example, when - Persistent cookies remember a user’s log in details (so that
making online purchases. They keep a user’s they can authenticate the user’s browser).
items in a virtual shopping basket. - They are stored on the hard drive of a user’s computer until
- This type of cookie is stored in temporary the expiry date is reached or the user deletes it.
memory on the computer, doesn’t actually - These cookies remain in operation on the user’s computer
collect any information from the user’s even after the browser is closed or the website session is
computer and doesn’t personally identify a user. terminated.
- Hence, session cookies cease to exist on a user’s - Their advantage is that they remove the need to type in
computer once the browser is closed or the login details every time a certain website is visited.
website session is terminated.
- the uses of (persistent) cookies:
- allow the website to remember users’ passwords, email
addresses and invoice details
- serve as a memory, enabling the website to recognize users
every time they visit it
28
Eng. Omar Nabil THEORY REVISION
- Blockchain is a decentralized database. - Whenever a new transaction takes place, a new block is
- All the transactions of networked members created:
are stored on this database. - A new hash value is created each time a new block is
- Essentially, the blockchain consists of a created.
number of interconnected computers - This hash value is unique to each block and includes a
- All transaction data is stored on all timestamp, which identifies when an event actually
computers in the blockchain network. takes place.
- Whenever a new transaction takes place, all - We will now consider what happens when a chain of
the networked computers get a copy of the blocks is created.
transaction -
- therefore it cannot be changed without the
consent of all the network members.
- This effectively removes the risk of security
issues such as hacking. Blockchain is used in
many areas, such as:
o cryptocurrency (digital currency)
exchanges
o smart contracts
29
Eng. Omar Nabil THEORY REVISION
30
Eng. Omar Nabil THEORY REVISION
Phishing: a legitimate looking email sent to user, the Pharming: a malicious code installed on user’s computer
user should open the email to be directed to a fake without the user’s knowledge to redirect user to a fake website.
website, without the user’s knowledge the threat To steal personal information.
(malware) will then be downloaded at the user’s
computer to steal personal information. How to prevent pharming
How to prevent phishing - use firewalls (to monitor incoming and outcoming
- use spam filter (to store unwanted emails) requests)
- use firewalls (to monitor incoming and - use anti-malware (to scan for and delete malwares)
outcoming requests) - don’t open untrusted websites
- use anti-malware (to scan for and delete
malwares)
- do not open emails from unknown sources
31
Eng. Omar Nabil THEORY REVISION
Social engineering
the three most common ones to exploit are:
- fear – the user is panicked into believing their
computer is in immediate danger and isn’t given
time to logically decide if the danger is genuine or
not; fear is a very powerful emotion that can
easily be exploited by a cybercriminal
- curiosity – the user can be tricked into believing
they have won a car or they find an infected
memory stick lying around; their curiosity gets
the better of them and they give their details
willingly to win the car (for example, credit card
details to pay for delivery or road tax) or they are
curious who the memory stick belongs to;
without thinking clearly, their curiosity gets the
better of them and the damage is done
- empathy and trust – a real belief that all genuine-
sounding companies can be trusted, therefore
emails or phone calls coming from such
companies must be safe; a dangerous
assumption that the cybercriminal can exploit
fully.
Authentication refers to the ability of a user to prove who they are. There are three common
factors used in authentication:
Passwords and user names: How to make password protected :
- Passwords are used to restrict access to data or - run anti-spyware software to make sure that your
systems. passwords aren’t being relayed back to whoever put the
- They should be hard to crack and changed spyware on your computer
frequently to retain any real level of security. - change passwords on a regular basis in case they have
- Passwords can also take the form of biometrics come into the possession of another user, illegally or
accidentally
- passwords should not be easy to crack (for example, your
favorite color, name of a pet or favorite music artist);
passwords are grouped as either strong (hard to crack or
guess) or weak (relatively easy to crack or guess)
- strong passwords should contain:
• at least one capital letter – at least one numerical
value
• at least one other keyboard character (such as @, *,
&, etc.)
• an example of a strong password would be:
Sy12@#TT90kj=0
• an example of a weak password would be: GREEN
32
Eng. Omar Nabil THEORY REVISION
33
Eng. Omar Nabil THEORY REVISION
- Check out the spellings in the email and in Accidental loss of data
the links; Causes:
- Carefully check the tone used in the email - human errors
message • delete file
- There are five things to look out for: • overwrite a file
• The email address itself - physical damage (earthquake)
• The tone of the email and bad spelling of - power failure
words - hardware failure
• Misspelling of domain names in a link - software crash
• Suspicious links how to prevent:
- use backup files
• make a copy of data to another device
- use power generators
- save data regularly
- set data to read only
- use correct shutdown procedures
34
Eng. Omar Nabil THEORY REVISION
SSL: secure socket layer protocol Examples of where SSL would be used:
- a protocol encryption certificate - online banking and all online financial transactions
- used to establish an encrypted link between a - online shopping/commerce
web server and a browser - when sending software out to a restricted list of users
- uses either symmetric/asymmetric encryption - sending and receiving emails
- uses public and private keys to encrypt data - using cloud storage facilities
- intranets and extranets (as well as the internet)
- Voice over Internet Protocols (VoIP) when carrying out
video chatting and/or audio chatting over the internet
- used in instant messaging
- faster than a human operator to take any necessary - expensive to set up in the first place and needs
action considerable testing
- much safer - cyberattacks no matter how good the system
- the process is more likely to run under optimum - maintenance which can be expensive
conditions
- it is less expensive
35
Eng. Omar Nabil THEORY REVISION
Manufacture of paracetamol
How application work
- a number of sensors that send their data back to a
central computer
- The computer consults its database to ensure both
processes are operating within correct parameters
- Any necessary action is taken by the computer
- send signals to the appropriate actuator to operate
pumps, valves, heaters, stirrers or pistons to ensure both
processes can operate without any human intervention
- much faster than a human operator to take any - expensive to set up in the first place and needs
necessary action considerable testing
- much safer - always possible for a set of conditions to occur that
- the process is more likely to run under optimum were never considered during testing
conditions - automated systems always need enhanced
- in the long run, it is less expensive maintenance which can be expensive
- more efficient use of materials - cyberattacks no matter how good the system
- higher productivity
- more consistent results
Self-parking cars
- allows the same number of cars to use fewer parking - over-reliance on automated systems by the
spaces driver
- avoids traffic disruption in cities
- cars can fit into smaller spaces
36
Eng. Omar Nabil THEORY REVISION
- fewer dents and scratches to cars - faulty/dirty sensors or cameras can send false
- safer system since sensors monitor all objects, data/images to the on-board computer which
including young children could lead to a malfunction
- very consistent results - kerning of wheels is a common problem since the
sensors may not pick-up low Krebs
- expensive option that doesn’t really save the
driver any money
- requires additional maintenance to ensure it
always functions correctly.
37
Eng. Omar Nabil THEORY REVISION
Weather (stations)
Sensors: How it works
- thermometer (to measure temperature) - The data from sensors is all sent to a microprocessor
- anemometer (to measure wind speed) - any calculations are then done (for example, calculate hours of
- hygrometer (to measure humidity) daylight, actual rainfall and wind direction).
- barometer (to measure air pressure) - The data from the sensors and the calculated values are then
- level sensor (to measure rain fall) stored on a central database
- light sensor (to measure hours of daylight). - reports are sent out automatically every five minutes to pilots in
the vicinity of the airport.
- The only part of the weather station that needs to use actuators is
the ‘tipping bucket rain gauge’.
Lighting system in a house
How it works
- As it becomes dark
- the light sensor value will change
- the microprocessor will send signals to the interface to
control the array of LED lights around the garden
- Data from the infrared sensor would also be used
38
Eng. Omar Nabil THEORY REVISION
- control light sources automatically - expensive to set the system up in the first place
- a reduced energy consumption - if wireless connections chosen (for safety reasons),
- wireless connections can be chosen which are much - they can be less reliable than
safer
- longer bulb life
- possible to program new light displays for various
occasions
How it works
- The level sensors measure how much liquid is being
added from ‘A
- this data is sent to a microprocessor
- r. Readings are also sent to the microprocessor from a
colorimeter next to vessel ‘B’
- The microprocessor controls the opening and closing of
the tap in ‘A
- this is done by sending signals to an actuator that
operates the tap
39
Eng. Omar Nabil THEORY REVISION
Characteristics of a robot
Ability to sense their surroundings: Have a degree of movement:
• this is done via sensors • they can make use of wheels, cogs,
• sensors allow a robot to recognize pistons, gears to carry out functions
its immediate environment and gives such as turning, twisting, moving
it the ability to determine things backwards
microprocessor or computer. • they are mechanical structures made up
of many parts
• they contain many electrical
components to allow them to function
• can make use of end effectors
Programmable: Autonomous cars and buses
• they have a ‘brain’ known as a Microprocessors process the data received
controller that determines the from cameras and sensors and send
action to be taken to perform a signals to actuators to perform physical
certain task actions, such as:
• controllers are programmable to • change gear
allow the robots to do certain • apply the brakes
tasks. • turn the steering wheel.
40
Eng. Omar Nabil THEORY REVISION
41
Eng. Omar Nabil THEORY REVISION
42
Eng. Omar Nabil THEORY REVISION
Narrow AI – this occurs when a machine has superior General AI – this occurs when a machine is similar (not
performance to a human when doing one specific task superior) in its performance to a human doing a specific task
Strong AI – this occurs when a machine has superior Machine learning – this is the science of training computers
performance to a human in many tasks with sample data so that they can go on to make predictions
about new unseen data, without the need to specifically
program them for the new data.
43
Eng. Omar Nabil THEORY REVISION
Rules base a collection of inference rules used to draw distributed control system (DCS) – a powerful computer
conclusions system programmed to monitor and control a complex
process without the need for human interaction
adaptive cruise control – the use of sensors, actuators accelerometer – a sensor that measures acceleration and
and microprocessors to ensure that a vehicle keeps a safe deceleration and that can detect, for example, the orientation
distance behind another vehicle of a device
robotics – the branch of (computer) science that robot – a mechanical device that can carry out tasks
encompasses the design, construction and operation of normally done by humans
robots
autonomous – able to operate independently without any WebCrawler/search bot – a software robot that roams the
human input internet scanning websites and categorising them; often used
by search engines
chatbots – a pop-up robot on a website that appears to end-effector – an attachment to a robot arm that allows it
enter into a meaningful conversation with a web user to carry out a specific task, such as spray painting
LiDaR – a contraction of light detection and ranging; the use drone – a flying robot that can be autonomous or operated
of lasers to build up a 3D image of the surrounding using remote control; a drone can be used for reconnaissance
or deliveries
web scraping – a method of obtaining data from websites machine learning – a sub-set of AI in which algorithms are
trained and learn from past experiences and examples
attribute – something that defines the objects stored in a knowledge base – a repository of facts which is a collection
knowledge base of objects and attributes
inference rules – rules used by the inference engine and in inference engine – a kind of search engine used in an expert
expert systems to draw conclusions using IF statements system which examines the knowledge base for information
that matches the queries
explanation system – part of an expert system which expert system – a form of AI that has been developed to
informs the user of the reasoning behind its conclusions and mimic a human’s knowledge and expertise
recommendations
artificial intelligence (AI) – a collection of rules and data cognitive – relating to the mental processes of the human
which gives a computer system the ability to reason, learn brain involved in acquiring knowledge and understanding
and adapt to external stimuli through thought, experiences and input from the five senses
phenotyping – the process of observing the physical
characteristics of a plant to assess its health and growth
44
Eng. Omar Nabil THEORY REVISION
45