Chapter1 Notes
Chapter1 Notes
CONTENTS
Unit 4 Software
1
Uses of Binary System
➔ To process data in logic gates/transistors
➔ To store data in registers
➔ To process data on the computer
Used in counting and Used to store data in registers Used in MAC addresses, IP
calculation in daily life and process data in logic gates addresses, HTML colour
and computers codes, error codes, etc.
Has fewer digits for the same Has more digits for the same Has fewer digits for the same
value value value
How and why is hexadecimal used as a beneficial method of data
representation?
➔ Used in colour codes, error codes and IP & MAC addresses
➔ Easily understandable
➔ Easier to debug
➔ Takes less space on the screen
2
Data Conversions
- Binary to Denary
➔ Convert 11101110 to denary
128 64 32 16 08 04 02 01
1 1 1 0 1 1 1 0
- Denary to Binary
➔ Method #1: Subtracting with the largest possible
power of 2. Convert 142 to Binary
142 - 128 = 14 - 8 = 6 - 4 = 2 - 2 = 0
DIV MOD
142 0
71 1
35 1
17 1
8 0
4 0
2 0
1 0
0 1
142 = 10001110
3
- Binary to Hexadecimal
Convert 101111100001 to hexadecimal
➔ (Break into sets of 4)
➔ 1011 1110 0001
➔ B E 1
➔ 101111100001 = BE1
- Hexadecimal to Binary
Convert 45A to binary
4 5 A
- Hexadecimal to Denary
Convert 45A to denary
256 16 1
4 5 A
➔ (256 x 4) + (16 x 5) + (10 x 1)
➔ 1024 + 80 + 10
➔ 1114
(since A = 10)
- Denary to Hexadecimal
Convert 2004 to hexadecimal
DIV MOD
16 2004 4
16 125 13
16 7 7
➔ 2004 = 7D4
➔ (Since 13 = D)
4
Binary Addition & Overflow Concept
➔ Add 126 and 26 in binary
➔ 126 = 10100010
➔ 62 = 00011010
➔ (126 + 62 = 188)
CARRY 1
1 0 1 0 0 0 1 0
+ 0 0 0 1 1 0 1 0
SUM 1 0 1 1 1 1 0 0
128 64 32 16 08 04 02 01
1 0 1 1 1 1 0 0
➔ Overflow error is the result of carrying out a calculation that produces a value too
large for the computer’s allocated word size. Example:
(110 + 222 = 332; an 8-bit register can store a maximum value of 255)
.
CARRY 1 1 1 1 1 1 1
110 0 1 1 0 1 1 1 0
222 1 1 0 1 1 1 1 0
SUM 0 1 0 0 1 1 0 0
➔ The extra carry in the answer indicates that overflow error has occurred. The answer
is greater than 255.
➔ Overflow error occurs when the value is greater than the maximum value of the register
5
Logical Binary Shifts
A Left Logical Shift of one position moves each bit to the left by one. The
vacant least significant bit (LSB) is filled with zero and the most
significant bit (MSB) is discarded.
If no 1’s are lost (number is doubled) multiplied by 2
A Right Logical Shift of one position moves each bit to the right by one.
The least significant bit is discarded and the vacant MSB is filled with
zero.
If no 1’s are lost (number is halved) divided by 2.
➔ Each shift left is equivalent to multiplying the binary number by 2n (where n is the
number of places shifted)
➔ Each shift right is equivalent to dividing the binary number by 2n (where n is the
number of places shifted)
➔ Examples:
If the leftmost 1 bits are lost while shifting to the left, an error will occur because the limit
of the maximum number of left shifts possible will have been exceeded
If the rightmost 1 bits are lost while shifting to the right, an error will occur because the
limit of the maximum number of right shifts possible will have been exceeded
6
Fig. 1 Logical Shift by one bit
1 0 0 1 0 0 1 1
10010011 = -128 + 64 + 16 + 2 + 1 = -45
7
➔ Negative denary numbers to binary numbers in two's complement format
binary)
10111100 (Invert all the values)
Add 1 in the inverted binary value
CARRY
1 0 1 1 1 1 0 0
+ 1
SUM 1 0 1 1 1 1 0 1
-128 64 32 16 08 04 02 01
1 0 1 1 1 1 0 1
10111101 = -128 + 32 + 16 + 8 + 4 + 1 = -67
English language only English language only, with Multiple languages and
some non-English symbols symbols
Uses less bits per character Relatively uses less bits per Uses more bits per character
character
8
➔ The accuracy of a sound file increases with greater sample rates and sampling
resolutions, but so does the file size
➔ Nibble = 4 bits
➔ Byte = 8 bits
- Data Compression
➔ Exists to reduce file size
➔ File size needs to be reduced so that it:
↳ Uses less bandwidth
↳ Uses less storage
↳ Has a shorter transmission time
9
➔ Lossy file compression is a compression technique that does not allow the original
file to be reconstructed. Common lossy file compression algorithms include MPEG-3
(MP3), MPEG-4 (MP4) and JPEG.
➔ JPEG reduces the colour depth and image resolution. Extra colour shades are
removed as they are unnoticeable by eyes.
➔ MP3 & MP4 reduce the sample rate and sampling resolution. They remove the sounds
that are out of the hearing range of a human ear and, if two sounds are playing
simultaneously, eliminate the softer one.
➔ Lossless file compression is a compression technique that reduces the file size
without any permanent loss of data
➔ Common algorithms include Run-Length Encoding (RLE)
➔ It can reduce the file size by:
↳ Using a lossless compression algorithm
↳ Identifying repeating patterns
↳ Indexing the patterns…
↳ …storing the indexes in a table/database
↳ …with the index and the pattern
10
Unit 2: Data Transmission
Types and methods of Data transmission
- Data Packets
➔ Data that is sent over long distances is usually broken up into data packets or datagrams
➔ Why is it broken down? It makes the process of sending data much easier, as it's
easier to control compared to a long, continuous stream of data
➔ Each packet is sent towards the same destination through different routes
➔ One issue of splitting data into packets is the reassembling of data because
when it finally reaches the destination, they are not in the sequence they were
originally sent
11
Benefits Drawbacks
Re-routing to overcome failed or busy Errors can occur during real-time streaming
routes is easy to do
- Data transmission
➔ The three factors that are considered by the communication protocol for the
transmission of data are:
↳ direction of data transmission
↳ method of data transmission
↳ data synchronisation
12
Serial Data Transmission Parallel Data Transmission
One bit at a time over a single wire/channel Several bits of data are sent down several
wires/channel
Works well over long distances Works well over short distances
It is less expensive due to fewer hardware Parallel ports require more hardware,
requirements making them more expensive to implement
than serial ports
Used if the amount of data being sent is Used when input/output operations needs
relatively small to be programmed
➔ When a device is plugged into computer using a USB port, the computer
automatically detects the device, recognizes it and loads the appropriate device
driver (if the computer already has the respective device’s driver downloaded)
➔ If the driver is not downloaded, the computer will look for it and download it
13
Advantages of USB Disadvantages of USB Port
- Parity Checks
➔ Checks the number of 1-bits in a byte
➔ There are two types of parity: EVEN, which means there is an even number of
1-bits and ODD, which means there is an odd number of 1-bits
➔ The parity bit is the leftmost bit, where either 0 or 1 is added according to the
parity being used
➔ If even parity is used and the number of 1s are odd, 1 will be added in parity bit
➔ If even parity is used and the number of 1s are even, 0 will be added in parity bit
➔ If odd parity is used and the number of 1s are even, 1 will be added in parity bit
➔ If odd parity is used and the number of 1s are odd, 0 will be added in parity bit
➔ The parity used is decided between the sender and receiver. This helps to compare
the data before sending and after receiving it.
➔ If there is a change in the parity post-transmission, then an error has occurred
14
- Example:
(Even parity
used) Sender:
0 1 0 1 1 1 0 0
Receiver:
0 1 0 0 1 1 0 0
Here, the number of 1-bits is even at the sender's side, but odd at the receiver's side.
Hence, an error occurred.
➔ There are some cases where the number of 1-bits adds up to the correct
parity on both sides, but the actual number of 1-bits is different when compared.
- Example:
(Odd parity
used) Sender:
0 1 1 1 0 0 0 0
Receiver:
0 1 1 1 0 1 1 0
Here, there are 3 1-bits at the sender's side, but 5 at the receiver's side. This is still an
error but it won’t be identified, as both still have odd parity. This is a transposition
error.
15
An example of a parity block. Even parity is used. Column 1 is a parity byte.
Byte 1 1 0 1 0 0 1 1 0
Byte 2 1 0 1 0 1 1 0 0
Byte 3 1 0 1 0 1 1 1 1
Byte 4 1 0 1 1 0 1 1 1
Byte 5 1 0 1 0 0 0 1 1
Byte 6 0 0 1 0 1 0 0 0
Byte 7 0 0 1 0 0 1 0 1
Byte 8 1 0 1 1 0 0 1 0
Byte 9 1 0 1 1 0 1 0 0
Parity 1 0 1 1 1 1 1 0
Byte
- Checksum
➔ Data is sent in blocks along with an additional value, the checksum
➔ Checksum is a calculated value from the block of data being sent
➔ Calculation is done using an agreed algorithm which is agreed upon by both
the sender and receiver
➔ Checksum is sent the end of the block of data during transmission
➔ The receiver once again calculates the checksum from the data, and sees if
the new value is the same as the previous checksum or not
➔ If the new value is not the same, then an error has occurred. The receiver
sends a request to the sender to resend the data.
16
- Echo Check
➔ Data is first sent to the receiver who returns the data to the sender
➔ Here, the sender checks if any error, with the help of the original file, has
occurred in the data. If so, the data is re-sent.
➔ It is not very reliable, as it is unknown if the error occurred when data was
sent to the receiver or when the data was sent back to the sender
➔ So, it just checks if the data was transmitted correctly or not and does not tell when
the error occurred
- Check Digits
➔ A check digit is the final digit included in a code
➔ Calculated after other digits’ calculation
➔ Used on barcodes of products such as International Standard Book Numbers
(ISBN) and Vehicle Identification Numbers (VIN)
➔ Check digits are used to identify any errors in data entry which might’ve been
caused by mistyping or miss scanning a barcode
➔ There are two methods of generating a check digit: ISBN 13 and Modulo-11
17
Symmetric and Asymmetric Encryption
- Purpose of encryption
➔ Encryption decreases the chance of data being intercepted by a hacker or, in this
case, an eavesdropper
➔ Encryption alters the data so that it is not understandable to anyone but those
who are authorised to view it
- Symmetric Encryption
➔ Uses a single encryption key for both encryption and decryption
➔ There is risk of security, as the key is still sent to the receiver beforehand
and can be obtained by hackers
- Asymmetric Encryption
➔ Uses two keys: public key and private key
➔ Overcomes the security issue that was in symmetric encryption
➔ Public key is available for everyone
➔ Private key is known to the computer user/receiver only
➔ Both types of key are needed to encrypt and decrypt
➔ The keys are generated using a hashing algorithm
➔ Person A will first generate a matching pair of keys, which will be stored on their computer
➔ A will send their public key to Person B, who actually wishes to send a document to A
➔ B will use the public key to encrypt the document and send it back to A
➔ A will use the private key to decrypt the document
18
Unit 3: Hardware
Computer Architecture
➔ Von Neumann architecture was introduced in the mid-1940s by John von Neumann.
➔ It had the following main features:
↳ concept of a CPU
↳ CPU could directly access the memory
↳ storage of programs and data by computer memories
↳ stored programs were made up of instructions that had to be followed or executed
in a sequential order
19
➔ The RAM holds all the data and programs needed by the CPU
➔ RAM is also often referred to as the Immediate Access Store or IAS
➔ The CPU takes data and programs held in the Hard Disc Drive or backing store, and
puts them in the RAM temporarily
➔ Why? Read/write operations work faster when carried out on the RAM rather than on
the Hard Disc Drive since there are no moving parts in RAM
3) Registers
➔ The registers in our syllabus are:
CIR Current Instruction Register Stores the current instruction being decoded
and executed
- Memory
➔ Computer memory is made of a number of partitions
➔ Each partition has an address with its content
➔ The address will uniquely identify every location in the memory and the contents will
be binary values stored in each location
➔ In a READ operation, the memory address of the contents that are to be read aer
copied to the MAR. This sends a READ signal to the computer memory, and it will put
the contents of that specific address into the MDR.
➔ In a WRITE operation, the memory content is first written into the MDR to be stored.
A WRITE signal will be sent to the computer, and then the memory location’s
address is written into the MAR.
20
- Fetch-Decode-Execute Cycle
➔ To carry out a set of instructions, the CPU first fetches some data and instructions from
memory and stores them in suitable registers. The address and data bus are used in
this.
➔ Once fetched, each instruction needs to be decoded before being executed
➔ This cycle is known as Fetch-Decode-Execute or FDE cycle
1 PC contains the address of the memory location of the next instruction that has to be
fetched
2 The memory address of the instruction is copied to MAR from the PC. The address bus is
used here
3 The contents/ instructions/data at the memory location or address in the MAR are
temporarily copied in the MDR from memory (RAM) using the data bus
4 The contents or instructions of the MDR are then copied and placed in CIR
5 The PC is incremented by 1. This means the next instruction is ready to be copied and
decoded.
7 The CPU sends out signals through the control bus to the respective components (e.g
Arithmetic and Logic Unit) of the computer to execute the instruction, if required
21
1) Clock Speed
➔ Is very important for a CPU’s performance capabilities
➔ Refers to the number of electrical pulses that the clock inside the CPU can produce each
second. Usually measured in Hz or GHz.
➔ Increasing the clock speed can increase the processing speed as more instructions
than before will be addressed in the same time
➔ One issue of increasing the clock speed is overclocking. It can lead to serious un-
synchronisation of operations, causing the computer to glitch and crash. It will also
cause serious overheating of the CPU.
2) Cores
➔ More cores will improve overall computer performance
➔ Each core includes an ALU, CU and registers
➔ Many computers are either dual core or quad core. Many operations are
carried out simultaneously.
➔ More cores lower the need of increasing the system clock speed
➔ However, this causes the time taken for the CPU to communicate with each core to
increase, as more cores are added
3) Cache
➔ Use of cache memory can also improve CPU performance
➔ Cache memory is located in the CPU itself, and hence has much faster data access
time than RAM
➔ It allows for faster data access as it stores the instructions and data that needs to be
accessed frequently, improving CPU performance
➔ When a CPU wishes to read the memory, it will first check the cache, and then move
on to the main memory/RAM if the required data isn't there
➔ The larger the cache memory size, the better the CPU performance
22
- Instruction Set
➔ A set of common instructions have been developed by processor manufacturers so
that CPUs operate as efficiently as possible
➔ This instruction set is a list of all the commands that can be processed by a CPU
➔ The instructions, called operations, are in machine code and are the most basic
types of commands that computers can process
➔ These operations can ensure that the control unit and arithmetic logic unit can carry
out their respective jobs easily
- Embedded Systems
➔ Embedded systems are built into devices to carry out specific tasks. They run on
firmware and do not have additional peripherals.
➔ Embedded systems have a microprocessor, either analogue or digital input, a user
interface and output
23
Benefits Drawbacks
Small in size and easy to fit in devices Can be difficult to upgrade certain devices to
new technology
Dedicated to only one task and therefore have a Interface appears simple, but it can still be more
simple interface and system confusing for people
Can be controlled remotely using a mobile Difficult to upgrade and troubleshoot; cause
phone or remote control devices to be thrown away rather than fixed
Fast reactions to changing inputs Throwing away can start a "throw away" culture
among users who will often discard the devices
when they become out of date
Input Devices
24
1 A barcode scanner emits a red laser on LED in the barcode
2 The black and white parts of the barcode reflect light differently (The black parts reflect little
to no light, whereas the light parts reflect almost all of it)
2) QR codes
➔ QR codes are a type of barcode made up of a matrix of filled-in dark squares
on a light background
➔ They hold considerably more information than traditional barcodes
➔ QR codes are more complex due to the increased data capacity and the use of small
squares, known as pixels
➔ The three large squares in three corners of the QR code are for alignment, and the
remaining corner is for the camera angle and size
➔ QR codes are used for advertising products, accessing websites, phone numbers,
and storing boarding passes electronically at airports and train stations
➔ QR codes are being updated to frame QR codes that include advertising logos, but the
software needed for this isn't free
25
1 Point a phone camera towards the QR code
2 The app will process the image taken by the camera by converting it into a readable format.
3 White squares reflect more light while black squares reflect less light
5 Data will be read and necessary action will be taken by the phone (e.g. Redirects to a
website, phone app will be opened if a telephone number was within the QR code
3) Digital Cameras
➔ Modern digital cameras can connect to a computer system via USB or Bluetooth
➔ Cameras are controlled by an embedded system and perform tasks like adjusting
shutter speed, focusing on the image, operating the flash gun, adjusting the aperture
size, adjusting the image size, and removing red-eye
➔ When an image is taken, light passes through the lens onto a light-sensitive cell
made up of millions of tiny sensors acting as photodiodes
➔ The sensors are called pixels, which make up the image
➔ The image is converted into tiny electric charges using Charged Coupled Device
(CCD) and passed through an ADC to form a digital image array
➔ The ADC converts the electric charges from each pixel into levels of brightness
➔ The sensors also measure colour, which produces another binary pattern. Most
cameras use a 24-bit RGB system
➔ The file size is determined by the number of pixels, and image quality depends on
the device used, the resolution, the levels of light, and the storage type of the image
4) Keyboard
➔ Most common method/input device used for data entry
➔ it can be physical: connected to a device through a USB connection or Bluetooth, or
it can be virtual, like on a touch screen
26
1 There is a circuit board at the base of the keys, composed of conductive layers with an
insulating layer present between them.
2 A character key is pressed. Now, as there is a gap between the conductive layers right below
the character; the conductive layers touch each other when the character is pressed. This
completes a circuit.
3 When the circuit is completed, the CPU/microprocessor determines which character’s key was
pressed
4 CPU refers to an index file to identify which character key was pressed by the user
5 Each character on the keyboard has a corresponding ASCII value, which also has a binary
value
6 This binary value can be processed by the CPU to, for example, show up on the screen
5) Microphones
➔ Are either build-in or connected through a USB or Bluetooth connection
➔ A microphone converts sound waves into an electric current
➔ Current is converted into a digital format to be processed by the computer
➔ How does a microphone work?
2 The diaphragm in the microphone picks up the air vibrations and starts to vibrate itself
3 A copper coil is wrapped around the cone and is connected to the diaphragm
4 When the diaphragm vibrates, the cone moves in and out, causing the coil to move forwards
and backwards
5 The coil's movement causes the it to cut the magnetic field around the permanent magnet,
changing magnetic flux
27
6) Optical Mouse
➔ Captures 1500 images per second using tiny cameras
➔ Works on any surface with the help of a red LED and a CMOS sensor
➔ CMOS generates electric pulses that represent the red light and sends them to a
digital signal processor (DSP)
➔ The DSP calculates the coordinates of the mouse based on the changes in image
patterns and sends them to the computer
➔ An optical mouse has no moving parts and is more reliable, with no dirt traps or
special surface requirements
➔ A wired mouse doesn’t have the problem of continuous signal loss as it has a
direct USB connection, is cheaper to operate, and has fewer environmental
issues (as compared to a wireless mouse)
7) 2D Scanners
➔ Input devices that are used to convert paper documents to digital form
➔ How does a 2D scanner work?
1 The cover of the scanner is opened, a document is placed on the glass panel, and the cover is
closed
3 The document is moved from side to side, and then advanced slightly, until the whole
document is scanned
5 The reflected image is sent to a lens using a series of mirrors; the lens focuses the image of
the document
6 The focused image now falls on a CCD (Charge Coupled Device). This converts light into
electric current.
(a CCD is made up of thousands of light-sensitive pixels. Each pixel creates an electric charge
when light falls on it)
➔ Applications of 2D scanners:
↳ Used to read passports at airports
↳ Make use of OCR (Optical Character Recognition) technology to produce digital images
that represent the passport pages
28
↳ The person's image on the passport is scanned and stored in JPEG format and another
picture is taken of the person
↳ Both pictures are compared using a face recognition software, which will tell if the
pictures belong to the same person or not
8) 3D Scanners
➔ Scans solid, 3D objects in x, y, z directions
➔ Produces a digital image which represents the solid object that was scanned
➔ Scanned images are then either used in a CAD (Computer Aided Design) and/or
sent to a 3D printer, which will produce a working model of the scanned image
➔ Application of 3D scanning:
↳ Computed Tomographic (CT) scanners
↳ Used to create a 3D image of the solid object
↳ Based on tomography technology, in which the whole image is build upon the
series of very thin ‘slices’. All these slices come together to form an image. X-rays
are used.
↳ Have other names, such as MRI (Magnetic Resonance Imaging), which uses radio
frequencies to build the slices, and SPECT (Single Photon Emission Computed
Tomography), which uses gamma rays
9) Touch Screens
➔ The common types of touch screen technologies are:
29
➔ The coordinates of the touch
are calculated by the
microprocessor
Resistive ➔ Good resistance to dust and water ➔ Low touch sensitivity; need to
➔ Can be used with bare fingers, press harder for it to register
gloved, and a stylus touch
➔ Easier to manufacture ➔ Poor visibility in strong sunlight
➔ Cheaper to manufacture/buy ➔ Vulnerable to scratches
➔ More weatherproof and cracks
➔ Screen is less likely to shatter ➔ Low quality
➔ Does not support multitouch
30
Output Devices
1) Actuators
➔ An actuator is a mechanical or electromechanical device that is used to perform an action
➔ It also converts electrical energy into mechanical energy
➔ Actions can include ‘start’, ‘stop’, ‘close’, ‘open’, ‘pull’, ‘push’, and more,
depending on the machine they are present in and work they are required to do
2) Light Projectors:
➔ Projector are used to project computer outputs onto larger sized screens or whiteboards
➔ There are two common types of light projectors: DLP and LCD
1 A bright white light passes through a condensing lens and then through the colour filters
2 White light is split into the primary colours - red, blue and green - through which the projector
creates a lot of colours
3 It then passes through a shaping lens and falls on the DMD chip
31
5 The light then passes through the lens and the image is projected on the screen
1 A strong beam of white light is generated from an LED or bulb that is present inside the
projector
2 The beam of light travels to a group of chromatic-coated mirrors, which are also known as
dichromic mirrors
3 The light is reflected back at different wavelengths, corresponding to red, green and blue light
components
4 These three light components will pass through three LCD screens and subsequently produce
three monochromatic images
5 These images will be combined together using a prism; this produces a fully coloured image
6 The image passes through the projector lens and falls on the screen
32
➔ The disadvantages of LCD projectors are:
↳ contrast ratios are not as good as DLP projectors
↳ longevity is lower than DLP projectors
↳ LCD panels are organic, and hence turn yellow over the passage of time
3) Inkjet Printer
➔ Usually have a print head (consists of nozzles that sprays ink droplets), ink cartridge/s,
a stepper motor and belt, and a paper feed
➔ Ink droplets are produced using two different technologies; thermal bubble and piezoelectric
➔ Here is how inkjet works:
2 Printer driver makes sure that the data is in a format that is understandable for the printer
device
3 A check is made by the driver to see the printer's status (out of ink/paper, busy, etc.)
4 Data from the document is sent to the printer, where it is stored in the printer buffer, a
temporary memory location
6 As the sheet of paper is fed through the printer, the print head moves side to side across the
paper printing text or image
7 At the end of each full pass of the print head, the paper is advanced very slightly in order to
allow the next line to be printed
8 If there are more pages, the process will repeat (from paper being added) and will continue
until the printer buffer is empty
9 Once the printer buffer is empty, printer sends an interrupt to the computer's CPU; this is the
request for more data to be sent to printer and will continue until the whole document is printed
➔ Inkjet printers are usually used for printing one-off photos or when few pages of
good quality, colour printing is needed
33
4) Laser Printer
➔ Use dry powder
➔ Uses static electricity to print text and images
➔ Prints the whole document in one go
➔ Usually prints monochrome documents but also supports coloured printing
➔ Here is how laser printer works:
2 Printer driver makes sure that the data is in a format that is understandable for the printer
device
3 A check is made by driver to see printer's status (out of ink/paper, busy, etc)
4 Data from the document is sent to the printer where it is stored in the printer buffer
5 The printing drum is positively charged, and when it rotates, a laser beam scans it, removing
the positive charge and leaving negatively charged areas that match the document or image
that needs to be printed
7 A paper, which is negatively charged in the areas where there needs to be text/images, is
rolled onto the drum
8 The ink sticks onto the paper, producing an exact copy of the document
9 To prevent the paper sticking to the drum, the electric charge of the paper is removed after
one rotation of the drum
10 The paper then goes through fusers, which are a set of heated rollers, and this causes the
ink to melt and stick permanently on the paper
11 A discharge lamp removes all the electric charge from the drum to ready it for the next print.
34
➔ Often used when many documents are needed to printed (mass printing)
➔ Advantages:
↳ Larger toner cartridge and paper trays
↳ Can print in high volumes
↳ Can print very quickly
➔ Disadvantages:
↳ Larger footprint
↳ Need time to warm up
↳ Toner cartridges are expensive to buy
5) 3D Printers
➔ Produces 3D objects
➔ The mechanism is primarily based on inkjet and laser technologies
➔ The object is made layer by layer, using materials such as powdered resin, metal, ceramic, etc.
➔ There are two types of 3D printing: direct 3D and binder 3D printing
➔ Binder 3D printing is almost the same as direct 3D, but it uses two passes
➔ The first pass sprays powdered material
➔ The second pass sprays binder or glue to form a solid layer
2 The final design is imported to a special software that turns it into a format understandable by
the 3D printer
5 The printer builds the object layer by layer (0.1mm thick layer)
35
7 The object is removed from the printer and taken away to prepare
6) LED screens
➔ A screen is made up of tiny lights emitting diodes (LEDs)
➔ LED screens are not a frontlit display
➔ Each LED is either red, green or blue and are controlled to create different colours
➔ Used for outdoor displays
➔ The display is made up of pixels that are arranged in a matrix
➔ Each pixel has red, green, and blue colour filters
➔ The RGB filters are mixed to create different colours
➔ Light is shone at the pixels and an image is formed
➔ Diffusers may be used to distribute light evenly
7) LCD screens
➔ Made up of tiny liquid crystals
➔ These crystals make up an array of pixels that are affected by changes in applied electric fields
➔ For LCDs to work, backlighting is needed
➔ Backlighting is done using LED technology, this was previously done using CCFL
➔ CCFL stands for Cold Cathode Fluorescent Lamp
➔ Using LED gives a very good contrast, sharpness and brightness range
➔ Using LED consumes very little power
➔ LEDs last indefinitely
➔ The display is made up of pixels that are arranged in a matrix
➔ Each pixel has red, green and blue colour filters that can be mixed to create different colours
➔ LEDs are arranged behind the display and light is shone at the it, forming an image
➔ The pixels can turn on or off/transparent or opaque when their shapes are changed
36
➔ When an electric field is applied to electrodes, they give off light. So, no backlighting is needed
➔ OLEDs make it possible to make very thin screens that can bend as well
9) Loud Speakers
➔ Produce sound
➔ How a loudspeaker produces sound:
1 The sound file on a computer is converted to sound when it data is converted from digital to
analogue using a DAC (Digital to Analogue Convertor)
2 It is then passed through an amplifier to increase the current before reaching the coil
3 There is a coil of wire wrapped around an iron core, positioned close to a strong magnet; the
current flows through that coil and becomes an electromagnet
4 As the electric current through the coil of wire varies, the induced magnetic field in the iron
core also varies. This causes the iron core to be attracted towards the permanent magnet and
vibrate as the current varies.
5 Since the iron core is attached to a cone (made of paper or a thin synthetic material), it starts
to vibrate, producing sound waves
Sensors
➔ Sensors are input devices that measure physical data (e.g: temperature, light, etc.)
from their surroundings
37
➔ In cars to detect fast deceleration
and apply airbags in case of an
accident
Flow Measure the rate of flow of a gas ➔ Measures gas flow in pipes
or liquid ➔ Measures water flow in
underground pipes
Infra-red (Active) Detects movement when a beam ➔ Security alarm system in which
of infra-red radiation being given intruder breaks the infra-red beam
out is broken (the radiation levels
being detected by it decrease)
Infra-red (Passive) Measures heat radiation given off ➔ Security alarm system in which
body heat is detected
Level Measure the level of, for example, ➔ Automatic plant watering system,
liquids in a container where plants are watered util the
water in the tank reaches a certain
level
Moisture Measures water levels in, for ➔ Monitoring moisture level of soil
example, soil present in a greenhouse
➔ Baking
38
nuclear reactor
➔ Gaming
Data Storage
39
Directly accessible by the CPU Not directly addressable by the CPU
Examples: RAM, ROM and cache memory All are non-volatile devices
Primary Memory
➔ Part of the computer memory accessible directly from the CPU
➔ Includes RAM and ROM memory chips
- RAM
➔ RAM has the following features:
↳ can be written to or read from; is editable
↳ used to store data, files, parts of applications which are currently in use, etc.
↳ it is volatile (its contents are lost when it is powered off)
↳ the larger the size, the faster the computer’s performance
↳ never runs out of memory; it just becomes slow as more data is entered
➔ Applications:
↳ programming of routines
↳ addition of new routines
➔ There are two types of RAM: DRAM and SRAM
DRAM SRAM
➔ A DRAM (Dynamic RAM) chip consists of ➔ SRAM (Static RAM) makes use of flip flops
transistors and capacitors to store each bit of data
➔ Capacitors hold bits of information (0 or 1) ➔ Doesn't need to be refreshed constantly
➔ Its advantages over DRAM are:
↳ faster
40
➔ A transistor is a switch; it allows the circuitry ↳ makes use of memory cache
of the chip to read the capacitor and/or
change its value
➔ Needs to be refreshed constantly (every
15 microseconds)
➔ Its advantages over SRAM are:
↳ much less expensive to manufacture
↳ consume less power
↳ have a higher memory capacity
- ROM
➔ Memory data cannot be changed or written to
➔ They are non-volatile
➔ Are permanent memories
➔ Contents can only be read
➔ Store BIOS (Basic Input Output System) or start up instructions
➔ Applications:
↳ storing factory settings
↳ storing "start-up" routines
↳ storing of set routines
Secondary Storage
➔ Known as off-line storage as well
➔ Not directly addressable by the CPU
➔ Non volatile
➔ Stores more data than primary memory, but the data access time is longer than that
for primary memory
➔ Three types of secondary storage technologies: magnetic, solid state, optical
41
➔ Read-write heads made of electromagnets read or write data to the platters by
controlling magnetic fields to determine binary values.
➔ Platters can be made of various materials, and have multiple surfaces with data stored
in sectors and tracks
➔ Are cheaper per unit of data stored
➔ HDDs have slower data access times compared to RAM due in latency
➔ Fragmentation of data can occur, leading to degraded performance, but
defragmentation software can consolidate fragmented sectors
➔ Removable HDDs can be connected using a USB port, and are useful for backup or
transferring files between computers
42
➔ Connect to computer through USB ports
➔ Small and lightweight; suitable for transferring files between computers
➔ Can be used as small back-up devices for music or photo files, for example
6) Virtual Memory
➔ Virtual memory compensates for the limited physical memory (RAM) in a computer
➔ It creates an illusion of more memory by using space on the hard drive as additional RAM
➔ Programs can run even if there isn't enough physical memory to hold all required data
➔ ‘Pages’ of data that are not currently required are moved to secondary storage, freeing
up space for new pages on RAM
43
➔ Swapping data between RAM and secondary storage is known as paging
➔ Virtual memory can slow down a computer's performance but prevents crashes
that may be caused by memory shortage
➔ The operating system manages virtual memory, deciding which pages to swap in and out of
RAM
➔ Virtual memory is essential for running multiple programs or large programs that
require more memory than available RAM
7) Cloud Storage
➔ Cloud storage stores data on remote servers accessed through networks, mainly the internet
➔ It can be categorised into public, private, and hybrid cloud models based on
ownership and management
➔ Public cloud storage is offered by third-party providers and available for public use
➔ Private cloud storage is dedicated infrastructure managed by an organisation,
while hybrid combines public and private models
➔ Cloud storage providers offer various pricing models to cater to different user needs
Advantages and disadvantages of using cloud storage instead of storing data locally
Advantages Disadvantages
Can be accessed from anywhere in the world Not a suitable storage solution for people with
using a network, typically the internet poor network connections
The user will not need to buy off-line storage Data may be lost if the storage servers of the
devices and keep them in safe places cloud storage provider are damaged by, for
example, a flood, or subject to cyber attacks
Allow for almost unlimited data storage Can be expensive if a lot of data needs to be
stored
The user does not have to worry about damage Does not preserve the confidentiality of data as
to storage devices (both internal and off-line) employees of the service providing company
may engage in misconduct
Network hardware
44
➔ They are made up of the manufacturer code and the serial code
➔ There are two types of MAC addresses:
↳ LAA (Locally Administered MAC Address)
↳ UAA (Universally Administered MAC Address)
- Structure
➔ MAC addresses are made up of six groups of two hex digits (8 bits)
➔ They are created from the manufacturer code and the serial code
MM-MM-MM-SS-SS-SS
AF-9C-61-23-5B-17
IPv4 IPv6
Allows for a small number of routers Allows for a considerably larger number of routers and
45
and devices on a network at a given devices on a network at a given time
time
Example: Example:
254.28.69.42 A69F:236B:CCCC:34D1:7E45:3428:89F0:0001
➔ IP addresses can be static or dynamic
- Static IP addresses
➔ These IP addresses, as the name dictates, never change
➔ Suitable for websites, online databases, etc.
- Dynamic IP addresses
➔ These addresses change whenever the device logs on to the internet
➔ A new IP address is assigned to the device by a DHCP (Dynamic Host Configuration
Protocol) server each time
➔ Suitable for users of the internet (dynamic IP addresses help maintain privacy)
Differences Similarities
Has a serial code and a Does not have a manufacturer Both are unique
manufacturer code or serial code
Rarely changes (can be Can be static or dynamic Both are used to identify
UAA or LAA) devices on a network
- Routers
➔ Routers are devices that are a part of a network and perform many different functions
➔ They assign IP addresses
➔ They send data to a specific destination on a network using the IP address in the data packet
➔ Routers also allow networks to communicate by taking data in one format from a
network and converting it to a format understood by another network
➔ They can connect a local network to the internet (a LAN to a WAN)
46
Unit 4: Software
System Software
Application Software
➜ Software that provides the services the user requires
➜ Can be executed according to the user’s needs
➜ Enable a user to perform specific actions
➜ Examples: Control and measuring software, games, photo/video editing software, apps, etc
Provides a platform for other software to run on; Runs on the system software; dependent
independent
Used for the control and operation of computer Used to perform specific actions
hardware
Installed when an operating system is installed Installed according to the user’s needs
on a computer
A user cannot communicate with the computer Application software is not required to enable
without system software the user to communicate with the computer
Intermediary between the computer hardware Intermediary between the system software and
47
and the computer programs the user
- Operating System
➜ Software that enables a computer to function correctly
➜ Allows the user to communicate with the computer easily
➜ Software running in the background of a computer
- Managing Files
➜ Manages the allocation and storage of files
➜ Ensures memory allocation for a file by reading it from the secondary storage and
loading it into the RAM
➜ Performs actions like renaming, closing, deleting, editing, etc. of files
➜ Maintains access levels (i.e: making files accessible to only those who have the
authority to view/edit them)
- Handling Interrupts
➜ Uses the ISR (Interrupt Service Routine) to service interrupts
➜ Determines the priority of interrupts
➜ Pauses and stores data of current tasks before managing any interrupt received
- Providing An Interface
➜ Enables a user to communicate with the computer easily by providing an HCI
48
- GUI (Graphical User Interface)
➜ A user clicks on icons on the computer screen to perform specific actions
➜ Is very easy to use
➜ Clicking on a specific file, for example, will open up that file
➜ Better for users that do not need to perform any technical operations, do not
have a lot of knowledge of computers, or only need to perform actions like
gaming, video editing, etc.
- Managing Memory
➜ Manages the primary memory and the secondary storage
➜ Allows data to moved between the RAM and the secondary storage
➜ Ensures two different processes do not try to access the same memory location
➜ Keeps a record of all the memory locations
- Managing Multitasking
➜ Enables the computer to perform multiple functions at once
➜ Allocates hardware resources to each task according to its priority
➜ Resources are allocated to each task for a specific time limit
49
➜ Allows each user to customise their account settings
Interrupts
➜ A signal sent from a device or software to the microprocessor
➜ Interrupts cause the microprocessor to pause its current task
➜ They are generated when there is an error, a new task has to be performed, etc.
➜ Used to deal with vital tasks/issues
➜ Enable multitasking
➜ Examples of software interrupts: division by zero and two processes trying to access
the same memory location
➜ Examples of hardware interrupts: paper jam in a printer, pressing a key on a
keyboard, and moving a mouse
➜ The ISR (Interrupt Service Routine) is used to service interrupts
➜ Interrupts are serviced according to their priorities; each interrupt has different levels of priority
➜ When interrupts are serviced, action is taken by sending signals to the respective
components of the computer
50
Types Of Programming Languages
- High-Level Languages
➜ Programming languages that are closer to the English language
➜ Resemble the natural language
➜ One line of code can produce multiple machine code commands
➜ Need to be translated into machine code instructions using a translator, like
compilers and interpreters
➜ User-friendly
➜ Examples: Python, Java, C++, Visual Basic, etc.
Advantages Disadvantages
Machine independence/portable
- Low-Level Languages
➜ Programming languages that can be machine code or assembly language
➜ Structurally similar to the computer processor’s instructions
➜ They relate to the specific hardware and architecture of a computer
➜ Example: Assembly language
51
Advantages Disadvantages
- Assembly language
➜ A low-level language that uses mnemonics
➜ Programs written in assembly language can be converted into machine code, using a
translator called assembler
- Translators
➜ Convert programs written in high level languages or low level assembly language to
machine code
➜ Examples: Compiler, interpreter, assembler
- Compilers
➜ Translate a program written in a high level language all in one go and produce an
executable file of machine code instructions
➜ Produce an error report, instead of an executable file, for the whole code if errors are present
➜ Mainly used in the end, when the final program is developed and ready for translation
- Interpreters
➜ Translate and execute a program written in a high level language line-by-line
➜ Stop execution at the point where an error is found
➜ Mainly used when developing and writing a program
52
Translator Advantages Disadvantages
Compiler Produces an executable file which can Takes longer to write, develop
be stored for use anywhere and debug programs using a
compiler
Functions
- Code Editor
➜ Allows a program to be written and edited without the need for a separate window, or
changing the software each time it needs to be edited
➜ Speeds up the program writing and development process
- Run-Time Environment
➜ Allows a program to run on a computer, even if it cannot be run on it
➜ Loads applications and runs them on it
➜ Provides all the necessary functionality for the program to run
➜ This includes interfaces to physical parts of the hardware, user interactions, and
software components
➜ Allows the programmer to test the program while it is running
53
- Translator
➜ Have built in translators - compilers and interpreters
➜ Interpreters can be used during development of the program for debugging
➜ Compilers can be used to translate the program when it is fully complete
- Error-diagnostics
➜ Errors like syntax errors are often underlined in red, or pointed out in some other way
➜ Provides automatic error-detection
➜ Ensures that the program is error-free
- Auto-completion
➜ A context-aware feature that offers case-sensitive prompts with text completion for
variable and constant names and reserved words
➜ Helps avoid typos and other mistakes
➜ Reduces the need to memorise all variable, constant, etc. names
- Auto-correction
➜ Automatically corrects any errors found in the program
➜ Corrects syntax errors, misspelt words, etc. using algorithms
- Prettyprinting
➜ Application of various stylistic formatting conventions
➜ Colour codes the program (e.g: red for variables, blue for constants, etc.)
➜ Lays it out in a meaningful and attractive way
➜ Makes it easier to understand and read
54
Unit 5: Internet and its Uses
The Internet and World Wide Web (WWW)
Users can send and receive emails Web resources are accessed by web browsers
Allows online interaction (audio, text, or video) Uniform Resource Locators (URLs) are used to
specify the location of web pages
Makes use of IP (Internet Protocols) and TCP http(s) protocols are written using HTML
(Transmission Control Protocol) (HyperText Markup Language)
https://www.mojza.org/computer_science
55
➔ The protocol is usually https or http
➔ Website address is:
↳ Protocol (https)
↳ Domain name (www.mojza.org)
- Domain host (www.)
- Domain name (mojza)
- Domain type (.org)
- Country code (may or may not be included)
↳ File name (computer_science)
- Web browsers
➔ Web browsers are software that allow a user to access and display web pages on
device's screen
➔ Browsers translate/interpret/render the HTML and show the result in its respective
form, such as audio, video and more
➔ A browser has the following features:
↳ has a home page
↳ stores users’ favourite websites/web pages as bookmarks
↳ keeps a history of websites visited by the user/stores users’ history
↳ has the ability to allow the user to navigate forwards and backwards through websites
already opened / web tabs navigation
↳ multiple websites can be opened at once/web tabs
↳ make use of cookies
↳ data is stored as cache
↳ make use of JavaScript
↳ has an address bar
56
- Retrieval and Location of Web Pages
➔ To retrieve web pages, your browser needs to know the IP address of the websites
➔ The DNS (Domain Name Server) is responsible for finding the IP address of a
domain name given in the URL
➔ URLs and DNS eliminate the need for users to memorise the IP addresses of websites
➔ The DNS contains a database of URLs with their respective IP addresses
➔ Here is how a DNS, browser, http/s, web server, and HTML are used to locate and
retrieve web page/s:
1 The user opens their browser and types in the URL in the search bar
2 The browser sends the URL to the DNS using https protocol and requests its IP address
3 If the DNS server finds the IP address of the entered URL, it will send it back to the user's
computer
4 If DNS server (1) cannot find the IP address of the entered URL, it will send a request to
DNS server (2) to find the IP address. If found, the (2) will send it to (1), which will then
send it to the user's browser
5 The browser sends the IP address to the web server of the website
7 HTML files are sent from the web server to the browser
8 The browser interprets the HTML files and displays the web pages on the user's computer
- Cookies
➔ Cookies are small files or codes stored on a user's computer
➔ They are sent by a web server to the browser on the user's computer
➔ The cookies contain information, like the user's preferences
➔ Cookies allow the tracking of users
➔ Collected data can also be used to customise the web page according to their preferences
57
➔ There are two types of cookies:
↳ Session cookies
↳ Persistent cookies
Exist on a user's computer only till the browser Exist until the users themselves delete them or
is closed or the website session is terminated the cookies’ expiry dates pass
Used during online purchases (storing items in Store the user's preferences, log in details and
an e-cart) more
Digital Currency
- Digital Currency
➔ Digital currency is currency that exists only in digital form
➔ It has no physical form, unlike notes, coins, and more
➔ It is an accepted form of currency to pay for goods and services just like cash, debit cards, etc.
➔ It can also be transferred between various accounts when carrying out transactions
➔ It works through online banks, such as PayPal, or smartphone apps, such as Apple Pay
➔ Digital currency can also be exchanged into physical currency
➔ Digital currency relies on the central banking system
➔ The issue with centralisation (central banking system) is that it is difficult to
maintain confidentiality and security; however, this can be overcome using
decentralisation
58
- Blockchaining
➔ Blockchain is a decentralised database
➔ Blockchain, in its basic form, is a digital ledger, that is a time-stamped series of
records that cannot be altered
➔ All transactions of networked members are stored in this database
➔ Blockchain consists of a number of interconnected computers, but they are not
connected to the central server (this is decentralisation)
➔ All data on transactions is stored on all computers in the blockchain network
➔ Whenever a new transaction takes place, all computers get a copy of it; therefore, it
cannot be changed without the consent of all network members
➔ This removes the risk of hacking
➔ Blockchain is used in many areas, such as politics, cryptocurrency exchanges,
education and more
2 A new hash value is created upon the creation of the block through a cryptographic
algorithm; the hash value is unique
3 The block contains this hash value, the hash value of the previous block, a timestamp (time
at which the transaction took place), and details of the transaction (e.g. name of
sender/receiver, amount of money, etc.)
4 Since it contains the value of the previous block, and the one before it also contains the
value of the previous block, and so on, all the blocks are ‘connected’
5 If a hacker, for example, tries to change the details of the previous block, its hash value will
change and the next block won’t contain its hash value
7 Changing all the blocks quickly, before the tampering can be discovered, is prevented
by proof-of-work
8 It takes ten minutes to fill the necessary proof of work for each block prior to adding it to the
chain (these are also supervised by blockchain miners)
59
Cyber Security
➔ Data can be corrupted or deleted, either through accidental damage or malicious acts
➔ The cyber threats that are included in 2023 syllabus are:
↳ Brute force attack
↳ Data interception
↳ Distributed Denial of Service (DDoS) attacks
↳ Hacking
↳ Malware (includes viruses, worms, trojan horse, spyware, adware and ransomware)
↳ Phishing
↳ Pharming
↳ Social Engineering
- Data Interception
➔ Data interception is a form of stealing data by tapping into a wired or
wireless communication link
➔ The intent of the hacker is to compromise privacy or to obtain confidential information
➔ Wired interception can be carried out using a packet sniffer
➔ Packet sniffers examine data packets being sent over a network
➔ The intercepted data is then sent back to the hacker
➔ Wireless interception can be carried out through wardriving, also known as
Access Point Mapping
➔ Using this method, data can be intercepted using an antenna, a GPS device, a laptop
and some software, while sitting outside the victim’s house or building
➔ The intercepted signals can then reveal personal data to the hacker, often without the
user being aware
➔ Safety precautions:
↳ Use a WEP (Wired Equivalency Privacy) encryption protocol and a firewall
↳ Avoid using public WiFi connectivity in public places, as data is not encrypted and
thus, susceptible to interception
60
- Distributed Denial of Service (DDoS) attacks
➔ A Denial of Service (DoS) attack is an attempt at preventing the users from accessing
part of a network, usually an internet server
➔ It is often temporary, and may be a very damaging act or a large breach of security
➔ A server can only handle a finite number of requests, so, the attacker sends out
thousands of spam requests to prevent the server from servicing the requests
➔ The server may not respond to the genuine requests of users, and may even crash; this
is called denial of service
➔ In a Distributed Denial of Service attack, spam traffic or requests are send out from
different computers using bots, which makes it hard to block the attack
➔ Signs a user can recognise if they get hit with a DDoS attack:
↳ slow network performance
↳ inability to access certain websites
↳ large amounts of spam emails
- Hacking
➔ It is the act of illegally gaining access to a computer system without the owner’s permission
➔ This can lead to identity theft or the gaining of personal information: data can be
deleted, passed on, corrupted or changed
➔ Hacking can be prevented by:
↳ the use of firewalls
↳ setting frequently changed strong passwords
↳ anti-hacking software
↳ intrusion-detection software
61
- Malware
➔ There are many forms of malware, all of them are important for the 2023, 2024
and 2025 syllabus exams. So, we will study all of them in detail.
1) Viruses:
➔ Viruses are programs or program code that can copy themselves with the intention of
deleting or corrupting files, and also cause computer malfunctioning
➔ Viruses need an active host. An active host is a functioning software that a virus can
affect by either attaching itself to the code or altering the code itself.
➔ The active host program on the target computer or an operating system is already
infected before the virus attack itself. So the virus is a trigger.
➔ Viruses are often sent in forms of email attachments, reside on the infected
website, or the infected software program downloaded on the target user's computer.
➔ Viruses need an end-user to initiate it
2) Worms
➔ Worms are stand-alone type of malware that can self-replicate
➔ These don't need an active host
➔ Their intention is to spread and corrupt the computers and whole networks
➔ Worms remain inside the applications which enables them to move throughout networks
➔ Worms replicate without targeting specific files as they rely on security failures within networks
➔ Worms can come as message attachments and even if only one user opens it, it will
corrupt the whole network
➔ Worms don't need an end-user to be initiated and spread
62
3) Trojan Horse
➔ It is a malware program disguised as an authentic, legitimate software
➔ Though it looks authentic, it includes malicious instructions embedded in it in place of
the actual software
➔ The intention is to cause harm and either extract personal information of the
user through spyware, or corrupt files, etc.
➔ Trojan horse malwares need to have an end-user to initiate it, and hence are
usually sent as email attachments, downloaded from an infected/third party website or
pop ups
4) Spyware
➔ It is a software that gathers the user’s information by monitoring the user's
activities on their computer
➔ Once gathered, the information is sent back to the attacker who had originally sent the spyware
➔ The information gathered usually consists of web browser searches and any personal
information (e.g: passwords) the user has stored and entered
5) Adware
➔ It is the least harmful malware
➔ Its aim is to engage users with advertisements or click on them
➔ It often appears as pop-ups/advertisements on websites
➔ Though it does not pose a threat to the user’s data, it shows that there is a
weakness in the computer's security
➔ It is also hard to remove as the user cannot know which ad is harmful or not
➔ It can hijack the browser and create its own default search requests
63
6) Ransomware:
- Phishing
➔ Its aim is to obtain personal information from the user
➔ It occurs when the attacker sends legitimate-looking emails to the users
➔ The emails contain attachments or links that, when clicked, open a fake website on
the user's browser, where it asks the user to enter personal information
➔ The email can look as if it came from a real, genuine employee of a bank or service provider
- Pharming
➔ It is malicious code installed on the user's computer
➔ The code directs the user to a fake website (that appears authentic) when a
legitimate URL is entered in a browser
➔ The user is encouraged to enter their personal details, like password, credit card number, etc.
➔ No action is needed to initiate it
➔ The attacker, who originally created the code, does this easily gain access to
the user's information
64
➔ The safety precautions are:
↳ use of anti-virus software which will warn the user
↳ advanced, up-to-date browsers can warn the user
↳ look for a🔒or https in the URL on the address bar
↳ use of firewall
↳ don't open suspicious websites
↳ check if the website has authentic SSL certificates
↳ use ad-blockers and anti-malware program
↳ check the spellings of the website; a dash is usually added in the original name to
make it appear legitimate
- Social Engineering
➔ It occurs when the attacker creates a social situation that often leads to a
potential victim dropping their guard
➔ Involves manipulation of people into breaking their normal security procedures and
stopping computer security
➔ There are 5 threat types common in social engineering:
1) Instant Messaging: links are embedded into instant messages such as software upgrades
2) Scareware: pop-up messages which claims that the user's computer is infected with
virus and that an urgent need of anti-virus download is needed
3) Emails: genuine looking emails are sent to a user, who opens them and is sent
to a fake website
4) Baiting: the attacker leaves a malware-infected memory stick somewhere where
it can be found, and the finder plugs it into their computer unconsciously downloading
malicious software
5) Phone Calls: the attackers calls the user, pretending to be an employee of a bank
or service provider, and asks the user for details
➔ This exploits certain human emotions which include: fear, curiosity, empathy and trust
Access Levels
➔ A method of protection which is often used in huge user systems
➔ Users are assigned different levels of access depending on the role they have. This
means it controls the behaviour and access of users.
➔ It works in a hierarchical way
➔ Restricts user to data according to their role
65
➔ An example of this can be a Discord server, where admins have access to all
channels and the ability to make more, for example, whereas normal users don’t
➔ A system can have admin, member, and guest level accesses
Anti-Malware
➔ Due to danger of theft and corruption of data, companies have anti-malware and
anti-virus installed on their network.
➔ This protects the devices and the data on the network.
➔ There are two types of anti-malware: anti-virus and anti-spyware
- Authentication
➔ This type of security authenticates the user; it makes the user prove that they are
authorised for accessing data, for example
➔ There are various ways for authentication, such as passwords, biometrics, and
two-step verification
66
Passwords Biometrics Two-Step Verification
67
➔ Infected emails can have subtle spelling mistakes, such as Gogle, Amazonn, etc.
➔ The emails also often have a tone that rushes the receiver into performing an action
➔ Emails often come from accounts with @gmail; real organisations will not have
@gmail in their email account
➔ In case of a link shared in the email, check if it has only http (and not https), and
destinations other than what the email was about
- Firewalls
➔ A firewall can be either software or hardware
➔ It sits between the user's computer and an external network and filters information in
and out of the computer
➔ They're the primary defence to any computer system to help protect it from hacking,
malware, phishing and pharming
➔ The main tasks of firewall are to examine the traffic between the user's computer and
the public network
➔ Firewall sets up a criteria which can block access to certain websites
➔ Allowed website/traffic are a part of the whitelist
➔ Blocked websites/traffic are a part of the blacklist
➔ Firewall also check whether the incoming and outgoing data meets the given criteria
➔ If it doesn’t, the firewall blocks the traffic
- Privacy settings
➔ Privacy settings are the controls available on web browsers, social networks and other
websites that are designed to limit who can access and see a user's personal profile.
➔ Examples: "Do not track" setting, allowing a payment method to be saved, safer
browsing, location sharing on apps switched off, etc.
- Proxy Server
➔ Proxy servers act as an intermediate between a user and web server
➔ Features of proxy server are:
↳ allows internet traffic to be filtered; it is possible to block access to a website if
necessary (such as parental control)
68
↳ if DDoS attack is made, it only damages the proxy server, as the user’s IP address is hidden.
Hence, it protects the user from hacking, DDoS and more
↳ directs invalid traffic away from web servers
↳ keeps users' IP addresses a secret
↳ it acts like a firewall
➔ How it works:
↳ The user's browser sends a request so that it can connect with the required website
↳ The browser then requests that the web server authenticate itself
↳ The web server responds by sending a copy of its SSL certificate to the user's browser
as well as an encryption key (An SSL certificate is a digital certificate which is used to
authenticate a website and enables it to be authenticated)
↳ If the browser can authenticate this certificate, it sends a message back to the web
server to allow the communication to begin
↳ Once this message is received, the web server acknowledges the web browser, and
two-way, encrypted transmission takes place
➔ Examples of the usage of SSL: online banking, shopping, sending and receiving
emails, instant messaging
69
Unit 6:Automated Technologies
Automated Systems
➔ An automated system is a combination of software and hardware that is designed
and programmed to work automatically without the need of any human intervention
with the use of sensors, microprocessors and actuators.
Industrial Applications
70
Advantages Disadvantages
Much faster in taking the necessary action than Some conditions, that weren't considered during
a human testing, may occur; hence, there is a need of a
supervisor
The process is more likely to run under optimum Needs considerable testing
conditions since any small changes needed can
be identified very quickly, and action taken
2) Manufacture of Paracetamol
➔ Data from the sensors (motion, temperature, pressure, etc.) is sent to the
microprocessor and converted from analogue to digital data using an ADC
➔ If the data is beyond or below the preset values, the appropriate action is taken
➔ The microprocessor sends a signals to an actuator to, for example, reduce the
amount of an ingredient being added
➔ If the data are according to the pre-set values, no action will be taken
➔ This process is continuous
➔ Though no supervisor is needed, one can still be appointed in case of emergencies
Advantages Disadvantages
Much faster in taking the necessary action than Some conditions, that weren't considered during
a human testing, may occur; hence, there is a need of
a supervisor
The process is more likely to run under optimum Need considerable testing
conditions since any small changes needed can
be identified very quickly, and action taken
71
Transport Applications
1) Self-parking cars
➔ The driver goes along a row of parked cars
➔ On-board sensors and cameras send data to the microprocessor, where it is
converted from analogue to digital
➔ This allows the microprocessor to gauge if there is a parking space available
➔ If there is, the microprocessor sends a signal to the loudspeaker or monitor to inform
the driver that there is a vacant space available for parking
➔ The driver then selects auto-parking and the on-board automated system takes over
➔ The microprocessor sends signals to actuators, which are used to operate the
steering rack, brakes and throttle
➔ This allows the car to fit into its parking space automatically, without the driver’s intervention
➔ This process is continuous and will keep working until the car is either parked,
or isn’t in auto-parking mode
Advantages Disadvantages
Allows the same number of cars to use fewer Over-reliance can cause deskilling
parking spaces
Avoids traffic disruption (manual cars take more Need to be clean all the time, as dirty sensors
time to park, hence creating a roadblock) or camera can send incorrect data/images to
the microprocessor, leading to errors
Cars can fit into smaller spaces Kerbing of wheels is a common problem since
the sensors may not pick-up low kerbs
Fewer dents and scratches to cars, which saves Expensive option that doesn’t really save the
money for repairs driver any money
Safer system, since sensors monitor all objects Requires additional maintenance to ensure it
functions correctly at all times
72
➔ It calculates the distance by measuring the time taken between the emission and
return of the signals
➔ There are two scenarios:
↳ If the vehicle is too near, the microprocessor will send signals to the actuators to
apply the breaks and/or reduce the throttle
↳ If the vehicle is too far, the microprocessor will check if the current car speed is
equal to the pre-set value of the cruising speed. If it is not, it will send signals to the
actuators to increase the throttle.
➔ The whole process is continuous and while keep working until the adaptive cruise
control setting is turned off
Advantages Disadvantages
Agriculture Applications
73
Advantages Disadvantages
Reduces labour costs as only a supervisor is Increased need of looking over the water
needed channels to ensure the system works properly
and no overwatering, for example, occurs
Better and efficient control of the irrigation Expensive to set up, and high cost of
process maintenance
Better use and control of precious resource If set up in a rural area, finding a technician who
(which, in this case, is water) can be a challenge
Faster and and more accurate response Can get hacked, or any virus can cause issues
Weather Applications
1) Weather stations
➔ These are designed to save labour and to gather information from remote regions or
where there is a constant need of weather data. These stations usually have a
microprocessor, storage/database, battery and a wide range of sensors.
↳ thermometer sensor
↳ anemometer/ wind speed sensor
↳ hygrometer/humidity sensor
↳ barometer/air pressure
↳ level sensor/rainfall
↳ light sensor
➔ All the data collected by the sensors is sent to the microprocessor where it is
converted from analogue to digital data using an ADC and any required calculations
are done
➔ The sensors' data and the calculations are then stored in the database/storage
➔ Reports are sent if needed
➔ The only time actuators are used in this system is when the rain fall is to be
calculated in a specific time limit. This is known as the 'tipping bucket rain gauge'.
➔ This process is continuous
74
Advantages Disadvantages
Gaming Applications
➔ Gaming devices have sensors which help to provide the user as much as realism as
possible. The sensors that can be used are:
↳ accelerometer
↳ proximity sensor
↳ pressure sensor
↳ motion sensor
Advantages Disadvantages
Gives more realism to the game; more Any issues with the sensors will cause issues
immersive gaming experience while playing the game
75
Lightning Applications
Advantages Disadvantages
Science Applications
➔ Sensors that can be used:
↳ level sensor
↳ temperature sensor
↳ pressure sensor
↳ gas sensor
↳ pH sensor
76
- Titration using burette A and conical flask B
➔ Level sensors input data and send it to the microprocessor, measuring how much liquid
is added from A
➔ It is converted from analogue to digital data using an ADC
➔ Readings from the pH sensor, measuring the pH of the solution in ‘B’, are also
sent to the microprocessor
➔ When the value of the readings from the pH sensor are equal to 7 (i.e: the solution
has been neutralised), the microprocessor sends a signal to the actuator to close the
tap of burette A
➔ This process is continuous and will keep working until the experiment ends or the
system is turned off
Advantages Disadvantages
Less dangerous (humans will not be exposed to Less flexible than when humans perform
accidental explosive reactions, poisonous experiments
gases, etc.)
Robotics
➔ Robotics is a branch of computer science that incorporates the design,
construction and operation of robots
➔ Examples: factory equipment, drones, and domestic robots
Characteristics of a robot
↳ electronic components, such as actuators, sensors, and microprocessors
↳ mechanical structure or framework
↳ programmable
➔ There are two types of physical robots (software robots are not physical, working bots):
↳ Independent robots:
- have no direct human control (are autonomous)
- can replace human activity totally (no human intervention required)
77
↳ Dependent robot
- has human control
- can temporarily replace human activity
- Robots in Industries
➔ Have sensors and end-effectors
➔ They're programmed to do a specific task
➔ They either have a built-in microprocessor or are connected to a computer system
Advantages Disadvantages
Are capable of working in conditions that may Can find it difficult to do ‘non-standard’ tasks
be hazardous to humans
Are less expensive in the long run (since there Can lead to higher rates of unemployment
will be fewer salaries to pay)
Are more productive than humans Factories can now be moved to anywhere in the
world where operation costs are lower (leading,
again, to unemployment in some countries)
Are more consistent and almost accurate Are expensive to buy and set up in the first
place
Are best used for repetitive tasks and hence Needs high maintenance
make less mistakes
- Robots in Transport
➔ Include buses, trains, aeroplanes and more
➔ They are autonomous due to the use of sensors, microprocessors and actuators,
which help them to carry out tasks efficiently and accurately at a faster rate
78
- Buses and cars
Advantages Disadvantages
Better for the environment since vehicles will The risk of hacking and viruses is always
operate more efficiently present
- Trains
Advantages Disadvantages
Increases the safety, since human error is The system doesn’t work well with very busy
removed services
Reduces the running costs Security risks are increased; hence, CCTV
cameras need to be used
79
- Aeroplanes
Advantages Disadvantages
Improves safety since human error is removed High capital costs and operational costs
(Most of the advantages and disadvantages are the same, with the exception of a few)
- Robots in Agriculture
➔ In agriculture, robots are mainly used for:
↳ harvesting of crops/picking vegetables and fruit
↳ phenotyping (the process of observing physical characteristics of a plant in order to
assess its health and growth)
↳ seed-planting and fertiliser distribution
↳ grass mowers/cutters
↳ weeding, pruning and harvesting
➔ All of these devices use sensors and cameras to go around obstacles; they can
even be programmed to ‘go to sleep’ if the weather turns bad
80
Advantages Disadvantages
Faster at harvesting —
Increases yield —
- Robots in Medicine
➔ Can be used in surgical procedures, making them more safe, accurate, and cost-friendly
➔ Can be used for monitoring patients as nurse bots
➔ Disinfecting of rooms and operating theatres can be done by robots
➔ Can take blood samples from patients decreasing the risks of infection, human error,
and make it time-friendly for doctors and nurses
➔ Prosthetic limbs are also robots
81
Advantages Disadvantages
Free up doctors and nurses for other tasks that High cost of maintenance
require more skill
- Robots in Domestic
➔ Used for household chores
➔ Autonomous household robots:
↳ autonomous vacuum cleaners
↳ autonomous grass cutters (mowers)
↳ personal assistants
Advantages Disadvantages
Reduces costs by decreasing the need for May need extra maintenance
cleaners, for example
- Robots in Entertainment
➔ Used for different purposes such as:
↳ robots dressed as cartoon characters to entertain and interact with visitors in amusement parks
↳ music festival robots used for visual effects, monitor lighting and camera robots, to
take pictures
82
↳ robots are used to shoot scenes during movie production
↳ humanoid robots can perform stunts during movie production
↳ used to shoot scenes with a precision, speed and coordination that isn’t humanly impossible
Advantages Disadvantages
Artificial Intelligence
➔ Artificial intelligence (AI) is a branch of computer science that deals with the
simulation of intelligent behaviours by a computer
➔ Characteristics of AI:
↳ Collecting data
↳ Stores rules for using the data
↳ The ability to reason
↳ The ability to learn
↳ The ability to adapt
↳ The ability to change its own rules
↳ The ability to change its own data
83
➔ There are two types of AI (only these are to be studied):
↳ Expert System
↳ Machine Learning
- Expert System
➔ A type of AI that has been developed to mimic human knowledge and experiences
➔ Has a knowledge base, and inference engine, and interface, and a rules base
➔ Uses knowledge and inference to solve problems or answer questions that would
normally require a human expert
Advantages Disadvantages
Results are consistent Can give very cold responses, that may not be
suitable in certain medical situations
Have the ability to store vast amounts of ideas They are only as good as the information/facts
and facts entered into the system
84
- User
interface
Note: Diagram to be added.
- Inference Engine
➔ The main processing element
➔ Acts like a search engine examining the knowledge base for information or data that
matches with the user's answers
➔ Is the problem-solving part as it makes use of inference rules present in the rules base
- Knowledge base
➔ Repository of facts
➔ Stores all the available authentic knowledge and information about an area/areas of expertise
➔ Collection of objects and their attributes
- Rules base
➔ Contains the inference rules
➔ rules are used by the inference engine to draw conclusions
➔ Follows logical thinking, which often includes "IF" statements
85
Machine Learning
➔ It is a type of AI which has the ability to automatically learn and adapt to its own
processes and/or data
➔ Possible for the system to make predictions or even take decisions based on previous scenarios
➔ Offers fast and accurate outcomes due to its very powerful processing capability
➔ Has the ability to manage and analyse considerable volumes of complex data
➔ An example:
A robot needs to find its way through different puzzles. Each puzzle has a series of paths that the
robot needs to follow to find its way to the end of the puzzle. The puzzle contains dead ends and
obstacles, so the robot needs to decide which way to go. The robot’s program will use artificial
intelligence (AI).
The robot will use machine learning. It will adapt to deal with data provided to it. Data would be
about its location so that it does not follow the same route that may lead to a dead end. Data
would be about common and repeated obstacles and would allow the robot to take appropriate
reaction(s). It would store successful actions as well, as it would allow it to understand what’s
more likely to work at a certain condition.
They are machines that are capable of The aim is to make machines that learn from
thinking exactly like humans data acquisition, and solve new problems
from past experience
86
These notes for Computer Science
(2210/0478) have been prepared by
Team Mojza, covering the content for Acknowledge
GCE O levels and IGCSE 2023-25
syllabus. The content of these notes has ments
been prepared with utmost care. We
apologise for any issues overlooked; Authors:
factual, grammatical or otherwise. We Fasiha Raza
hope that you benefit from these and Hasan
find them useful towards achieving your Nawaz
goals for your Cambridge examinations. Zoella
Ahmad
If you find any issues within these
notes or have any feedback, please Proof-
contact us at [email protected]. readers:
Anas Asim
Hadiya
Farrukh
Hasan
Nawaz
Zoella
Ahmad
Designers:
Fasiha Raza
88