Uses of Hexadecimal :
-Mac addresses ->
- Static/Non-changing
- Unique, can be used to identify a device
- Set by manufacturer
- First part is the manufacturer ID, second part is the serial ID
-IP addresses ->
- Volatile/Changes every time you connect to a new network
- Set by router
- 32 bits
-Uniform Resource Locator -> a way to locate a website without an IP address
-ASCII Codes -> used to represent characters
-HTML colour codes
-Error messages
-Locations in the memory
-Debugging
-Assembly Language
File size :
1 byte = 8 bits
1 kilobyte = 1000 bytes
1 megabyte = 1000 kilobytes
1 kibibyte = 1024 bytes
1 mebibyte = 1024 kibibytes
Image representation :
-File size and image quality increases when colour depth and resolution increases
-Colour Depth x Resolution
-Colour Depth -> is the number of bits used to represent each colour
-Resolution -> is the number of pixels in the image
Compression :
-Compression exists so ->
- Less bandwidth is required
- Less storage space is occupied
- Transmission time is shortened
-Lossy -> Reduces the file size without permanent loss of data
-Lossless -> Reduces the file size by permanently removing data, e.g. reducing resolution or
colour depth, reducing sample rate or resolution
Data Transmission :
-Data is broken down into packets which contain ->
- Packet header -> destination address, packet number, originator’s address
- Payload
- Trailer
-Packets can take any route -> The path is controlled by the router
-Packets can arrive in any order -> When the last packet has arrived, they are reordered
-Data can be transmitted in many ways ->
- Serial
- Parallel
- Simplex
- Duplex
- Half-Duplex
-USB (Universal Serial Bus) ->
- USB allows both half-duplex and full-duplex data transmission
- Connections can only fit one way, avoiding incorrect connections +
- Can support different transmission rates +
- No external power source required +
- USBs are backward compatible +
- Supports maximum cable length of 5m -
- Very old USBs may not work now -
- Latest models are still slower than other connections (ex. Ethernet) -
Error detection :
-Checksum -> The number of bits is counted up and the numeric is transmitted with the data.
The receiver can see this number and whether it is matching the amount of data being
received.
-Parity Check -> A parity bit (1 or 0) is added to make the overall parity odd or even. For
example, if the parity is even, all 8 bits in the byte should add up to an even number. The last
bit is decided to ensure that the parity is met.
-Check Digit -> A calculation is performed to the data and a check digit is added. Once the data
is sent and received, the computer performs the same calculation again. If the value is the
same, transmission is successful, if it is not, there is an error.
-Echo Check -> With echo check, when data is sent to another device, this data is sent back
again to the sender. The sender’s computer compares the two sets of data to check if any
errors occurred during the transmission process.
-ARQ -> When a device detects an error with a packet, it automatically sends a request to
resend the packet. There is a limit of ARQ requests that can be sent.
-ISBN 13 ->
Calculation 1 –
1 add all the odd numbered digits together
2 add all the even numbered digits together and multiply the result by 3
3 add the results from 1 and 2 together and divide by 10
4 take the remainder, if it is zero then use this value, otherwise subtract the
remainder from 10 to find the check digit.
Calculation 2 – Re-calculation (Including check digit)
1 add all the odd numbered digits together, including the check digit
2 add all the even number of digits together and multiply the result by 3
3 add the results from 1 and 2 together and divide by 10
4 the number is correct if the remainder is zero.
Encryption :
-Asymmetric -> use of private and public keys
-Symmetric -> use of a mutual key
Computer architecture :
-The CPU’s parts include
- ALU (Arithmetic Logic Unit) -> performs arithmetic (+,-, shifting) and logic (AND/OR)
- CU (Control Unit) -> reads and interprets instructions
- Clock -> produces signal timings
-The RAM holds all the data and programs needed to be accessed by the CPU.
-There are many registers with different functions
- CIR -> (Current Instruction Register) this register stores the current instruction being
decoded and executed
- ACC -> (Accumulator) this register is used when carrying out ALU calculations; it stores
data temporarily during the calculations
- MAR -> (Memory Address Register) this register stores the address of the memory
location currently being read from or written to
- MDR -> (Memory Data Register) this register stores data which has just been read from
memory or data which is about to be written to memory
- PC -> (Program Counter) this register stores the address where the next instruction to
be read can be found
-There are three types of busses
- Control Busses (Bidirectional)
- Address Buses (Unidirectional)
- Data Busses (Bidirectional)
-The Fetch-Decode-Execute Cycle has these steps
Fetch : the next instruction is fetched from the memory address currently stored in the MAR
and the instruction is stored in the MDR. The contents of the MDR are then copied to the
Current Instruction Register (CIR). The PC is then incremented (increased by 1) so that the
next instruction can then be processed.
Decode : The instruction is then decoded so that it can be interpreted in the next part of the
cycle.
Execute : The CPU passes the decoded instruction as a set of control signals to the appropriate
components within the computer system. This allows each instruction to be carried out in its
logical sequence.
Input & Output devices :
Input Device Examples:
- Barcode Scanners - Microphone
- Digital Camera - QR code scanner
- Keyboard - Touch Screen
- Mouse - 2D and 3D scanners
Output Device Examples:
- Actuators - LCD Projector
- Projectors (DLP) - LCD Screen
- Inkjet Printer - Speaker
- Laser Printer - 3D Printer
- LED
Data Storage :
-Primary Storage : Primary memory is the part of the computer memory which can be
accessed directly from the CPU; this includes random access memory (RAM) and Readonly
memory (ROM) memory chips
- RAM -> It is volatile, files can be read and written.
- ROM -> It is permanent, files can only be read
-Secondary Storage :
- Magnetic -> Magnetic storage uses platters which are divided into tracks and sectors.
Data is read and written using electromagnets
- Optical -> Optical storage uses lasers to create and read pits and lands
- Solid State -> (Flash memory) uses NAND or NOR technology. Transistors are used as
control gates and floating gates
-Virtual Memory : Cloud storage is a method of data storage where data is stored on remote
servers.
Network Hardware :
-NIC (Network Interface Card) -> Allows the user access to a network (for example, the
internet) It is usually a part of the hardware that contains the MAC address
Software :
-System Software -> provides the services that the computer requires, including operating
system and utility software.
-Application Software -> provides the services that the user requires
-Operating System ->
- Manages files - Manages multitasking
- Handles interrupts - Provides a platform for running
- Provides an interface applications
- Manages peripherals and drivers - Provides system security
- Manages memory - Manages user accounts
-Hardware, Firmware and Operating System ->
- Applications are run on the operating system
- The operating system is run on the firmware
- The bootloader (firmware) is run on the hardware
-Interrupts ->
- Software interrupts include division by zero and two processes trying to access the
same memory location
- Hardware interrupts include pressing a key on the keyboard and moving the mouse
Types of Languages :
High Level Language -> Easier to read, write and understand as statements are near to
English. It is easier to debug and is portable.
Low Level Language -> Examples include Machine Code (Made of Binary) and Assembly
Language (Which needs to be translated to Machine Code)
Compiler -> A compiler translates the whole code at once before executing it, producing an
executable file. A compiler provides an error report for the whole code if errors are detected.
Used for the final program.
Interpreter -> An interpreter translates and executes the code line-by-line. An interpreter
stops execution when an error is found. Used for developing.
Uses of The Internet :
Cookies ->
- Saving personal details
- Tracking user preferences
- Holding items in an online shopping cart
- Storing Login details
Digital Currency -> A digital currency is one that only exists electronically.
- Blockchain, in its basic form, is a digital ledger, that is a time-stamped series of records
that cannot be altered
Cyber Security :
-Cyber Attacks -Methods of Prevention
- DDoS - Access Levels
- Brute-Force Attack - Anti-Malware
- Malware (Viruses, worms, etc) - Authentication
- Hacking - Checking the URL
- Data interception - Firewalls
- Pharming (Infected Websites, etc) - Privacy Settings
- Phishing (Fake emails, etc) - Proxy Servers
- Social Engineering - SSL Security protocols
Automated Systems & Robotics :
Automated Systems -> Sensors, microprocessors and actuators can be used in collaboration to
create automated systems
Robots -> a mechanical structure or framework containing: electrical components, such as
sensors, microprocessors and actuators. They are programmable.
Artificial Intelligence -> AI is a branch of computer science dealing with the simulation of
intelligent behaviours by computers
Expert Systems -> Expert systems have a knowledge base, a rule base, an inference engine and
an interface
Machine Learning -> Machine learning is when a program has the ability to automatically
adapt its own processes and/or data