Professional Documents
Culture Documents
September 2023
Chapter 1
System Fundamentals
Reasons for a new system
• Defining user roles and operational changes in the organisation: control, authority
and access
• Data Integrity: protect data from being lost, corrupted or hacked when
transitioning them from old to new system
• Privacy: the need to maintain security of data and prevent them from being
compromised
• Costs: the effectiveness of the change and the cost must be healthily balanced out
Legacy System and Mergers
• Legacy system is older IT equipment that has been suspended or made obsolete by
the rise of new equipments
• They can still work with the equipments that support its functionalities
• Business merger is when one company joins with another company in organisation
structure and operations, therefore causing data to be combined
• The two business integrate their operations, services, data and information
Problems in Mergers and Legacy
Systems
• Hardware compatibility: same equipment used on data?
• Data versions and conventions: same type of data and structure across?
• Letting someone outside the organisation deal with certain parts of its computer
system
• Drawbacks: lack of control (hard to fine tune to unique needs), security issues
Cloud Storage
• Apple Cloud, DropBox, Google Drive are used for personal needs, compared to
AWS or BitBucket for big softwares
• Drawback: slow retrieval, server farms pose environmental issues, privacy and
security concerns
Software as a Service (SaaS) Model
• A way of delivering applications over the internet as a service such that any
company or individual can make use of it to do their processing
• Microsoft Azure and AWS (Amazon Web Services) are common platforms for
SaaS
Old and new system running Can go back to old one if fail,
Lot of money, extra time and
Parallel Changeover together till new system fully backup available, compare
effort, employees get stressed
implemented and safe results for accuracy
• Methods that are used to make sure that system is performing as per expectations,
is accurate and precise with any computational results.
• General factors include: all outputs, criteria for success, analogous considerations
Types of testing
• Documents for a product that are provided to end-users to help them understand
and use it effectively and efficiently.
• Helps new users to get used to software, boosts speed of implementation, explains
sophisticated and unique features for productivity
• Understandability
• Environmental impact
• Efficiency
• Conciseness
Training Methods
• Self Instruction: users learn about the system at their own pace
• • Natural disaster
Hacking
• Data confusion
• Failover System: to takeover the system processing in case original system fails
• Deployment methods include online download, packaged CDs and DVDs, FOTA
(Firmware over the Air), Flash-stick
• Devices are linked together to establish a network by assuming the role of a client
(a device receiving data) or a server (a device giving data)
• Other important server computers include a router (that routes files and other data
from one place to another) and firewall (that authenticate IP addresses that access
computer or network)
Social and Ethical Issues
Social Issue - affects society Ethical issue - morality
• Organisational capabilities
• IT System Flowcharts
• Consideration factors
• Ergonomic - comfortable
• RAM - volatile, stores currently open programs, BIOS and OS loaded in here
• ROM - nonvolatile, stores the OS and BIOS, immutable, written just once
during creation
• A part of the computer that stores data and commands used over and over again
• Multimedia operations and other forms of frequently used data are stored in the
cache so that they are retrieved quicker
• Definition: storing data in a location for long period of time without deletion
• Some data is critical and must be stored. Persistent storage is necessary for this
What is an Operating System (OS)?
• Operating system is the collection of software programmes that run the computer
and its various hardware components, acting as an interface between these two
components
• High level operations are performed and seeable to the users - GUI processing,
WIMP
• Low level operations are instigated and run in the background - kernel, BIOS
Functions of the OS
• Memory management - to parcel out the memory in a fair and efficient manner
while obeying to prioritization commands such as interrupts by a process called
pagination (assign a page to each task and put one on sleep while executing
another)
• Hardware interfaces and peripherals - for device drivers that help create an
interface between computer processing and devices
Functions of the OS
• User Access Levels: which users can use the device and what kinds of access can
they have over the system
• Utilities: disk utility, colour utility to perform checks on computer for health or
colour detection (more geeky tasks)
• Byte - 8 bits
Data Representation Types
• There’s binary (obviously!)
• All of these can be represented using binary digits for final processing by the
CPU.
Hexadecimal Uses
• Colour Codes: in the form RR GG BB which each stands for Red, Green or Blue
and each digit ranging from 0 to 9 and A to F
• MAC Address: uniquely identities system on the network and is represented by the
format XX:XX:XX:YY:YY:YY where the first three pairs denote manufacturer
and second three pairs denote unique device
• ON = 1
• OFF = 0
• Network: A system in which multiple systems are connected to each other and
share information
• However networks vary vastly in terms of geographical span and use. Hence, it is
important to identify the most suitable kind of network connection based on the
situation.
• In exams, therefore, you may be asked to evaluate the pros and cons or
applicability of one or more different types of networks!
Types of Networks
Type Definition Components
LAN (Local Area Network) A network in a confined area Hub and Ethernet Cables
A network in a confined area without the Wireless Access Point and network
WLAN (Wireless LAN)
use of physical wires and/or cables segments
• They provide a common ground for building systems and interconnecting products
which would otherwise be impossible
• It also helps users expect some kind of performance and safety from the
components
Some common network standards
• Cables - CAT5 and CAT6
• Plugs, Terminals and Sockets - RJ45
• Hubs (signal broadcasters), routers (connectors), switches (path determiners)
• Gateway into a LAN (to enter)
• Network Cards (a passport for the computer in the internet world!)
• Wireless Broadcast Stations (send large amount of signals across WANs)
• Wireless Receivers (receive signals in order to connect computers wirelessly)
• Modems (modulator-demodulator)
Network Protocols
• A set of standards that provide preset ways to communicate and interact
• Controls flow of network by dictating ways of controlling traffic and prevent
overwhelming
• Prevents congestion of network by staggering data, re-directing network traffic and
flushing the network
• Prevent deadlock when the network grinds to a halt due to high congestion by
frequent ARQs (Automatic Repeat Requests)
• Data integrity is ensured by the correctness of data over its lifespan of transmission
using error checking algorithms like parity, checksum and
The OSI Model of Networking!
• Application: Provides the user the ability to interact with the network
• Presentation: data representation, encryption/decryption, compression/decompression
• Session: Management of session between applications (start, manage and close)
• Transport: Delivery and receiving of packets using TCP/IP protocols
• Network: Routes the data packets through which it is transmitted
• Link: Establish point-to-point data connection
• Physical: direct, point-to-point connection via hardware
TCP/IP Protocol
3. The packets are routed through different network lines using switches
4. The packets reach the user where it is reconstructed using the header provided
Advantages in Packet Switching
• Avoids congestion by using more than one route to make network faster
• Companies use VPNs in order to set up remote working conditions for employees
in a safe private network (called site-to-site VPNs) across different geolocations
• Individuals use VPNs in order to mask their identity on the internet and gain
access to complete data in resources by mimicking the identity of another device
on the web. It is also used for privacy purposes and safety.
Technology behind VPNs
• Hardware: Main server (such as your computer) and tunneling server (for VPN)
• Stagnant factors for network speed includes hardware and software protocols that
do not change and hence don’t affect transmission speed
Steps in data retrieval
1. Data requested is taken out of the server hard drive
2. Server has software that divides data into packets for switching
3. Server puts them into network access server for routing
4. Uses fibre optic, coaxial, satellite or twisted pair wires to transmit
5. Packets reach LAN of requester using gateway / parsing firewall
6. MODEM converts analogue signal to digital signal
7. The signal goes into a wireless router that converts the signal to modulated frequency
8. Frequency picked up by computer and reassembled to open the file!
Compression
• Compression is the process of making size of data files smaller
• Needed to avoid congestion, faster transmission and limit the data being
transferred to prevent overload
Choice of data transmission: media
• Wired OR Wireless?
• Twisted Pair (Ethernet) - short distance, very fast, cheap, , no EMI, less secure
• Coaxial Cables (TV lies) - short distance, very slow, cheap, no EMI, more secure
• Fibre Optic (General) - long distance, fast, expensive, most secure, no EMI
• Wireless (any place for mobiles) - very fast, huge distances, cheap, very low
security
Security on the Internet
• Passwords - known only to user, make complicated by symbols and numbers
• Biometrics - specific to every user, unique, hard to mimic
• User Accounts - divides each user’s work
• Permissions - allows only certain users to be able to do certain things
• Trusted list of MAC Addresses - only allows certain devices to engage in data
transmission
• Firewalls - black listing and white listing of computers for accessing data during
transmission
• Encryption - makes use of algorithm to convert data into non-understandable format
• 2FA - makes use of 2 or more of these methods for added security
Evaluation of the security methods
• Authentication (no extra H/W needed, managed by individuals, works well for good password
habits, brute force attack possible, password can be broken)
• Permissions (works well with system based computer, allows multiple user to access same
files, difficult to manage, potential corruption leading to data loss)
• MAC Address control (prevents security breach, traceability of offender device, spoofing
possible)
• Encryption (no extra H/W, impossible to decipher, inconsistency prone to hacks, can be found
eventually, slows things down)
• Firewalls (free, easy to implement, comprehensive, can be breached, slows internet traffic,
expensive)
Chapter 4
Computational Thinking and Problem
Solving
Operations of a Computer
• Fundamental Operations includes the below -
• Adding and subtracting data
• Comparing data
• Retrieving data
• Storing data
• Deleting data
• Compound Operations involves combining these fundamental operations together
to perform a more complicated task
Features of Computer Languages
• Fixed vocabulary: words and symbols are set with no variation if possible
• Unambiguous meaning: words and expressions can only be interpreted in one way
• Syntax Error: an error caused due to mistake in order of the words or expression
• The operations in modern high level language are more abstract than basic
operation (hides unnecessary processing)
• Abstraction in High Level Language >> Low Level Language >> Machine Code
Translation of code
• Compilers - create an executable file and produces log of errors (faster but harder
to debug or catch errors later)
• Interpreters - executes line by line to give physical output and stops for errors
instantly (one line at a time makes debugging easier, slower)
Key Programming Terms
• Constant: a memory location holding a static value that will not change
• Runtime error: when the program calls for an element that is not an index in the
array (such as -1 or 5 in the above case). This called “index out of bounds” in
JAVA
• .length function in arrays give the length of the array / number of elements in array
Collections
• A data structure in which elements are of several data types and values are linked
together
• Can dynamically change its size
• Methods include - .getNext, .isEmpty, .delete and so on
Sub-programmes
• Sub-programmes are those that compute small operations within a larger task
(such as taking # of students present to execute larger task of “Attendance”)
• The most important benefit for choosing dynamic structure over static is in order
to preserve memory space by initialising locations only when needed
Stacks - a dynamic data structure
• Stack: a data structure that contains elements that operate in a LIFO (Last in First
Out) method
• Items can be pushed onto the top of the stack or popped from the top of the stack
• Think of it like a stack of books. The last book kept is the first book your teacher
takes out to correct!
• In computing, errors in a program are stored by the IDE in a stack form and
unfinished methods that call store their remaining operations in a stack form too.
Stack Algorithms
• Push Method
• Pop Method
• Add X to stack[TOP]
• Return stack[TOP+1] which is the
new top element of stack
Queues - a dynamic data structure
• Queues are an implementation of a data structure that operate in a first-in-first-out
or FIFO manner
• Think of it like a queue in front of Apple on launch day, the first person who
comes there will be the first person to go in to purchase the new phone!
• Queuing is used in computing for non-critical tasks and to give all of them
equivalent priority.
Circular vs. Linear Queues
• Subsequent elements are added to this • The new “front” element is returned
index and “rear” is incremented on each
addition
Recursion
Return 1
Else
End if
End method
Tower of Hanoi - Complex Recursion
Chapter 6
Resources Management
Resources in Computing
• RAM: when used up, the virtual memory is used, which is much slower so all
applications become slow
• Storage: when internal storage is fully consumed, there is no more room to store
additional files and therefore an external device must be used which is much
slower
• Cache: overall functioning is slower when the cache server is not enough
• Processor: slow clock speed or lack of sufficient processors or cores causes all of
the processing to slow down and have a greater possibility of freezing
Resources in Computing
• RAM: when used up, the virtual memory is used, which is much slower so all
applications become slow
• Storage: when internal storage is fully consumed, there is no more room to store
additional files and therefore an external device must be used which is much
slower
• Cache: overall functioning is slower when the cache server is not enough
• Processor: slow clock speed or lack of sufficient processors or cores causes all of
the processing to slow down and have a greater possibility of freezing
Key terms
• Bandwidth: a range of frequencies within a given band used for transmitting signals
• Sound processor: a circuit that transforms digital audio signals into analogue sound
• Graphics processor: a circuit that transforms digital visual signals into analogue visuals
• Super computers: computers with high processing speeds mainly used in servers
• Mainframes: large storage devices that incorporate big servers
• Sublaptops: smaller laptops for on-the-go use
• PDAs: personal digital assistant
System resources at the limit!
• Multi-access user environment: more than one user is accessing the system at a
given point of time
• First In First Out (FIFO) - the first element that came in the system is the first
element to go out
• Shortest Job First (SJF) - based on the time taken to execute, the shortest task is
done first
• Priority Scheduling (PS) - based on any interrupt or priority signals for the tasks
that require immediate attention
• Last In First Out (LIFO) - the last element that came in will be the first element to
go out.
Paging
• A memory management technique in which CPU retrieves data from RAM in
same-size blocks called “pages”
• The pages are linked together in a map to their equivalent ram frames
• This is beneficial due to being able to accommodate large files, takes less time,
less tracking, if one frame corrupted, rest can be found, helps setup virtual
memory
• When RAM is full, some pages are loaded into a part of the hard drive called
virtual memory
Interrupts
• An instruction sent to CPU to stop current processes and address the priority of the
signal
• The interrupt register of the CPU holds the address of the highest priority interrupt
• Printer stuck interrupt and battery dead signals are examples of hardware interrupt
Polling
• Polling: System by which the CPU checks the various devices connected to it to
see if there are any requests or actions to be fulfilled and checks the readiness of
the system
• This is different from interrupt because it is casual, and polling is optional whereas
interrupts are mandatory to be fulfilled. Polling usually checks for any needs
whereas interrupts indicate criticality.
Specialised Operating Systems
• To help control specified hardware needs
• To make improvements
• Swap files in VMs are placeholders in hard drive for the VM to initiate as soon as
RAM space is out
• Hardware systems abstract information in this manner to make things much easier
to understand for human users.
Chapter 7
Control Systems
Microprocessors & Sensors
• Microprocessors incorporate the functions of the computer’s CPU on a single
integrated circuit. It accepts binary data as input, processes it according to
instructions stored and gives an output
• Sensors are input devices that measure physical quantities in analogue form
• ADC (Analog to Digital Converter) are devices that convert the analogue data from
sensors to digital form for microprocessor to intake
• Transducers are devices that will execute a physical action based on the above
processing
2. The analog data is received by ADC first and converted into digital signals
3. The ADC then sends this data across to the microprocessor that checks the data against
preset values and/or performs certain processing
4. The microprocessor then sends appropriate signal to the output transducer to execute a
particular action
6. The process is continuous and takes place until the system is terminated
General Notes
Inheritance v. Aggregation
• Aggregation is useful for modelling the real life situation of containment whereas
Inheritance is useful for modelling the real life situation of one entity being a more
specific type of another entity
• There can be more than 1 aggregation, but just one super class of inheritance