You are on page 1of 8

Paper 1

features of a word processor - A program to manipulate, store and format text


entered from a keyboard and providing a printout of it.

purpose of software documentation


1. It is important if you are working with other people, so that they can
comprehend your code more easily, and remove future bugs.
2. Will be easier for future developers to understand your code.
3. Will allow you to learn from your mistakes because you won't repeat them if
they are written.

binary tree traversal -

Paging - It is a role of the operating system for which a program thinks it has the
whole memory (this is called logical memory) . This memory can have any position in the
physical memory or disc memory. A page table of this memory is stored. The virtual
memory takes place when ram is not enough for the program so part of a program is
stored in the disc, hence the virtual memory is created.
parallel running

Parallel Direct Pilot Phased

- Both systems work at - Risky because the old - Used in large companies - Changeover is splitted
the same time. system is unplugged and with different sites into steps
- Low risk because the the new is plugged at the - Limited risk because - Allows for users to learn
outcomes of both systems same time. just one of the sites how to use the system
can be seen. - Users need to be trained changes the system - Low risk
- The change of system - Risk of not functioning - Other sites might follow
can be inverted easily. if the system works
- Expensive because both
need to be maintained

autonomous agents - are entities operating on behalf of an owner with a degree of


autonomy and minimal to no interference from its owner. These agents follow
algorithms supplied by the owner to achieve some desired goals. An example would be
a robot or an antivirus software that searches viruses in the computer. They do not
have complete control over their environments.

CPU
MAR (memory address register) - register that stores the address of the ram of the
current instruction being executed.

MDR (memory data register) - register that stores the data or instruction of the current
task being executed.
CU (control unit) - Handles the loading of new commands into the cpu and the decoding of
these demands.

Bubble sort - Every element of a set of data is compared to the next, if they are not
in the correct order they are swapped. This is done in a cycle until an entire pass or
cycle is completed without any swap.

Boolean Logic -

role of a router - A router is a networking device that accepts packets of data, reads
their destination address and distributes them across networks, according to a routing
table or routing policy. A router identifies the destination of messages and sends them
via an appropriate route and is used to forward data packets between networks.

impact on transmission speeds - Transmission speeds are measured in bps (bits per
second). The theoretical speed a media can reach is called bandwidth, while the actual
transfer rate is called throughput and can be affected by interference, traffic,
number of requests and amount of errors in the transmission.
Factors that affects speed of data transmission:
1. Bandwidth of the network
2. Speed of storage devices
3. Interference
4. Malicious software
5. Number of user connected and demand for data exchange
6. Amount of data lost in transmissions

internet security -

Algorithms -
usability - refers to how much the user finds useful the product.

Complexity Effectiveness Efficiency Error Learnability Memorability Readability Satisfaction

Amount of The How much The amount of How easy it is How much a How fast it is Attitude of a
effort to find performance effort is error and the to learn how user requires to read user towards
a solution of the system. needed to time to solve to use a to start using through a part the system.
accomplish a those errors. certain software of the system.
goal. system. again after a
period of time
of not use.

accessibility - refers to the potential of a service, product, device or environment to


meet the needs of as many individuals as possible. High accessibility can meet the
needs of many users, the opposite for low accessibility. Hence high accessibility means
that also eg disabled people can use the program.

OS
1. Functions: software that controls computer hardware, provides services for
software in the computer, intermediary between hardware and software.
2. Peripheral communication: consent to these external hardware devices to
communicate with software, hence manage drivers, polling etc.
3. Memory management: how memory is divided between programs, and checks
that two programs do not interfere with each other. Segmentation, paging,
virtual memory etc.
4. Resource monitoring and multitasking: Efficient allocation of resources
between the programs being run. Multitasking does not actually happen but the
operating system makes it looks as if it was happening.
5. Networking: os manages interactions with networks and allows sharing of
resources.
6. Disk access and data management: os needs to manage how data is stored and
accessed in the memory of the computer, checking that programs don’t
overwrite each other. It also coordinates exchange of data from primary to
secondary memory.
7. Security: Authentication to the computer, log files to keep trace of the activity
of a user in a computer system.

Ethical issues -
- Reliability is how well a system functions.
- Integrity refers to the completeness and accuracy of the data.
- Inconsistency if the information is unique, for example if the data is duplicated in a database
it is referred to as inconsistent.
- Security refers to the protection of the system from unauthorized access.
- Authenticity refers to the user that provides its identity of who gains access to the system.
- Privacy is the ability to control how the data is shared.
- Anonymity is how well your user is authenticated.
- Intellectual property is how the data and information contained in a system are unique and
not copied or plagiarized.
- The digital divide and equality of access is the fact that not all countries have access to the
same resources online due to lack of infrastructure or because of rules.
- Surveillance is the monitoring of individuals with or without their consent, which brings to
debate privacy and anonymity.
- Globalization and Cultural diversity decreases due to the internet and how fast information is
shared on the internet.
- IT Policies are rules set by different entities such as governments, public authorities or
business that must be followed.
- Standards and Protocols are predefined technical rules developers and companies should
follow.
- People and machines are interconnected therefore the excessive or unethical use of
machines can have a serious social impact.
- Digital Citizenship covers the appropriate behaviors that everyone should follow when using
the internet.

Sensors - Used to gain information from the environment, so that the system can then
make decisions based on these inputs.

Accuracy Range Resolution

Determines whether the GIves the acceptable Determines what is the


measurement converted range of the physical smallest change of a
into digital signal is quantity within which the physical quantity a sensor
accurate. sensor may acquire can read, for example it
readings, for example a can read a change of 0.1
sensor is able to measure degrees or can only sense 1
from -30 degrees to 60 degree change.
degrees.

transducers - Are used to transform physical quantities into electrical signals and vice
versa which allows a system to read the environment and also send inputs in the
environment.

Polling & interrupts - Polling is when the OS verifies at certain time intervals the
functionality of a peripheral device. Interrupts are signals from a program within the
computer that causes it to stop the current task and decide what to do next based on
the importance of the current and following task. This is done by the interrupt
manager.
stacks and queues -
queue methods -

Construct algorithms -
tracing algorithms -

You might also like