Unit 2 - Revision Guide
Unit 2 - Revision Guide
Content
Components
A computer system can comprise many elements.
Other components might include:
• video camera Monitor
• microphone
• software
• speakers
• hard discs
• memory
• processor Mouse
• scanner
• printer. A typical computer
system comprising
hardware and software. Keyboard
PC Multi-functional
Copyright © 2017. Pearson Education Limited. All rights reserved.
Tasks involving mobility General purpose computing and communication tasks Printing, copying, scanning, faxing,
stapling and emailing.
Health logging, Social communications, Web server, Network server,
sat nav/compass, office tasks, email client, email server, network security,
remote data entry, video player, media controller, SOHO server and security, network policies, cloud server,
mobile communications browser, diary, editor database manager communications server, dbms
Briefly describe the differences between mobile devices, personal computers and servers.
50
Steve, Farrell. Revise BTEC National Computing Revision Guide, Pearson Education Limited, 2017. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/cavc-ebooks/detail.action?docID=6709856.
Created from cavc-ebooks on 2022-02-10 08:11:38.
Unit 2
Had a look Nearly there Nailed it!
Content
Internal components
Each internal component of a computer has a purpose, a set of features and a specific use.
Compatibility –
Factors to consider
Does it match other Timescale – lead time,
components? Will it implementation time
run with desired OS
Form – length, width,
and other software?
depth, weight, style
Cover the image above and try to recall from memory five internal components of a computer and their purpose.
51
Steve, Farrell. Revise BTEC National Computing Revision Guide, Pearson Education Limited, 2017. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/cavc-ebooks/detail.action?docID=6709856.
Created from cavc-ebooks on 2022-02-10 08:11:38.
Unit 2 Had a look Nearly there Nailed it!
Content
Process
Utility and application
Input Output
software
Input Output
devices CPU devices
Operating system
A typical computer
system comprising
hardware and software. AMR OMR Disks, etc. Store
Input devices
Input devices operate in several ways, e.g. via a direct keypress, a pointer or audio.
Direct key Pointers Audio Visual Sensors Electronic
press Magnetic
Input Keyboards Mouse Microphone Camera Environmental Receivers
hardware Specialised Trackpad Telephone Motion sensor Biometric Readers
(examples) keypads Stylus handset Object sensor GPS
Discrete Tablet Gaze sensor
buttons Touchscreen Scanner:
biometric
Specialist ATM Mobile device Voice control OMR, OCR, Security, alarms Security
uses EPOS screens for data Voice data ANPR, EPOS IOT Payments
(examples) entry and control entry Barcode Satellite MICR
scanning navigation
Technologies A button Combines Analogue audio Light is A sensor Data is
selects a detecting is converted captured by an captures received in a
particular relative positions to digital array of light analogue data known format
operation in on-screen with using an ADC sensors. These and converts and translated
context. This is a button-type and then are converted it into digital into the
converted to a press to invoke a processed and/ into binary (using a required
digital (binary) command at the or stored. patterns for specialised ADC) format for the
code. selected range processing or to process and application.
or (x,y) position. storage. store as binary
data.
between:
• a faster speed of response • improved ease of use through ergonomics/form
• a more accurate response/resolution factor
• more controllability/smoothness • making it configurable
• more feedback/feel • using the most appropriate interface/
connector.
• automation/accuracy
Car manufacturers face very critical decisions regarding input devices for even apparently simple user systems, such
as audio, which is commonly a microprocessor based system. Consider how each of the input features above could
positively affect the system’s performance and thus the car user’s safety.
52
Steve, Farrell. Revise BTEC National Computing Revision Guide, Pearson Education Limited, 2017. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/cavc-ebooks/detail.action?docID=6709856.
Created from cavc-ebooks on 2022-02-10 08:11:38.
Unit 2
Had a look Nearly there Nailed it!
Content
speakers headphones
relays, motors,
switches actuators
Audio
Control
that updates quickly causing fewer drop-outs • Form factor and connectivity – it is vital that
or obvious buffering is very desirable. the output device is compatible with the target
computer system.
• Automation – the more a device can be
automated to deal with what it is processing
A maternity hospital is considering upgrading its obstetric ultrasound output facilities (for scanning women
in pregnancy). They currently use a standard 2D monochrome monitor with a small photo printer which prints
directly from the screen.
Write short notes on desirable features of an upgraded output system.
53
Steve, Farrell. Revise BTEC National Computing Revision Guide, Pearson Education Limited, 2017. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/cavc-ebooks/detail.action?docID=6709856.
Created from cavc-ebooks on 2022-02-10 08:11:38.
Unit 2 Had a look Nearly there Nailed it!
Content
Storage
The features of storage devices affect their performance and the performance of a computer system.
54
Steve, Farrell. Revise BTEC National Computing Revision Guide, Pearson Education Limited, 2017. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/cavc-ebooks/detail.action?docID=6709856.
Created from cavc-ebooks on 2022-02-10 08:11:38.
Unit 2
Had a look Nearly there Nailed it!
Content
Parity (p1, p2…) makes one very large Can write to both parity information for every 4
Data stripe storage volume at same time items of data
Disk 1 2 3 1 2 1 2 3 4 5
1 2 3 1 1 1 2 3 4 P1(1–4)
4 5 6 2 2 5 6 7 P2(5–8) 8
3 3 9 10 p3(9–12) 11 12
4 4
CJ Jones Services runs a local cloud-based backup service for businesses located in its office block using a NAS with
a RAID 1 system. One of its clients has suggested that a RAID 5 system is better.
Discuss this view for this particular business.
55
Steve, Farrell. Revise BTEC National Computing Revision Guide, Pearson Education Limited, 2017. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/cavc-ebooks/detail.action?docID=6709856.
Created from cavc-ebooks on 2022-02-10 08:11:38.
Unit 2 Had a look Nearly there Nailed it!
Content
User interface
Single-user single-tasking
Device Kernel System
On early computers a task had drivers Boot/loader utilities
to be shut down before another (registry) Basic
Process
could run. I/O CPU
Hardware manager Application
system
software
Memory Storage
Single-user multi-tasking manager manager Security
Large systems such as those used by Very fast processing with totally predictable
the Met Office run OS like Unix and response to inputs is essential. Embedded systems,
MVS and share processing power for example, in medicine, robotics, planes, cars
amongst a number of users. (e.g. ABS, satnav), and NAS devices run on a RTOS.
Device drivers
Device drivers extend the kernel of the OS to allow it to work with any device from any manufacturer.
To work with a particular OS the device designer will map the particular OS calls (interrupts) to the
individual hardware commands of the device.
The basic operating system may know how to control a number of devices (e.g. keyboard, mouse) at a
basic level, but device drivers add extra functionality (e.g. mouse gestures).
SuperMouse has introduced a mouse that allows touch ID and haptic feedback as well as all the normal mouse
functionality. It wants it to be used on Windows and Apple equipment.
What operating system component will it create to do this and how will it work?
56
Steve, Farrell. Revise BTEC National Computing Revision Guide, Pearson Education Limited, 2017. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/cavc-ebooks/detail.action?docID=6709856.
Created from cavc-ebooks on 2022-02-10 08:11:38.
Unit 2
Had a look Nearly there Nailed it!
Content
Disks
Booting Executing
Parts of the kernel are on ROM chips which are After ‘booting’, the OS can now operate fully
loaded into running memory immediately after the by responding to events generated by the CPU,
system is turned on and the Power On Self Test software or devices, handled as interrupts.
(POST) is passed. The BIOS (basic input output
system) and the boot system are loaded and Interrupts
executed to pull in the rest of the kernel and the
device drivers, user interface and system utilities. Devices CPU Software
Interrupt Exception/trap Software
request – IRQ interrupt
Interrupt
Processes flow diagram
Processes can be in three states:
waiting to be scheduled, running or
Copyright © 2017. Pearson Education Limited. All rights reserved.
Blocked
Process
A
57
Steve, Farrell. Revise BTEC National Computing Revision Guide, Pearson Education Limited, 2017. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/cavc-ebooks/detail.action?docID=6709856.
Created from cavc-ebooks on 2022-02-10 08:11:38.
Unit 2 Had a look Nearly there Nailed it!
Content
P9
only crash that one application.
P10 To access system resources (to
P11 App C print, store, display, etc.) they
P12 must issue a system call (using a
P13 system interrupt) which the OS
P14 makes available for this purpose
OS
P15
code rather than access the device
P16 memory directly.
What advantages derive from the operating system presenting the file system in a logical manner rather than
showing the exact manner in which the data is stored?
58
Steve, Farrell. Revise BTEC National Computing Revision Guide, Pearson Education Limited, 2017. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/cavc-ebooks/detail.action?docID=6709856.
Created from cavc-ebooks on 2022-02-10 08:11:38.
Unit 2
Had a look Nearly there Nailed it!
Content
Gibber Amps is building a new electronic guitar effects box for its amplifiers, which simulates six famous amplifiers,
adds 20 audio effects, equalisation and volume. It will have a guitar lead input socket and output socket to the
amp. It will have a small colour touchscreen to control the I/O and effects.
Discuss which type of user interface would be most suitable for a guitarist during a gig.
59
Steve, Farrell. Revise BTEC National Computing Revision Guide, Pearson Education Limited, 2017. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/cavc-ebooks/detail.action?docID=6709856.
Created from cavc-ebooks on 2022-02-10 08:11:38.
Unit 2 Had a look Nearly there Nailed it!
Content
VBA, etc.
efficient algorithms or fast processing
compatible file structures
enriches the user’s life or makes it simpler Bespoke, e.g. controlling new smart
warehouse, very large e-commerce solution,
takes full advantage of available hardware and OS international banking system, woodcutting
tried and tested, easy to use. program for timber sash production factory
ITForA is a charity that collects old PCs and rebuilds them to be sent to Africa.
Justify three applications that the charity could use to help administer the business and three utilities that they could
use whilst rebuilding and testing the PCs.
60
Steve, Farrell. Revise BTEC National Computing Revision Guide, Pearson Education Limited, 2017. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/cavc-ebooks/detail.action?docID=6709856.
Created from cavc-ebooks on 2022-02-10 08:11:38.
Unit 2
Had a look Nearly there Nailed it!
Content
A design studio intends to update the computer systems in the office, which currently run on a proprietary
operating system with illustration and design software and standard office software. Its software house has
suggested it uses Linux with OSS which it will install and maintain.
State two reasons why the studio should consider this.
61
Steve, Farrell. Revise BTEC National Computing Revision Guide, Pearson Education Limited, 2017. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/cavc-ebooks/detail.action?docID=6709856.
Created from cavc-ebooks on 2022-02-10 08:11:38.
Unit 2 Had a look Nearly there Nailed it!
Content
P Performance I Implementation
timescales,
testing migration
Spec Price
The spec of the product, whether hardware The price or value (cost versus benefit) of a
or software, is clearly important and must be product and of implementing it is also crucial.
weighed up. The spec will include ensuring the Consider all of the value factors: Will it make users
product does not cause any security issues; more productive? Does it meet all of the user
that the performance of the product is what requirements? What are the costs and timescales for
is required (e.g. a hard disk has sufficient the implementation or integration of the product?
capacity and speed for dealing with 100 000 What is the cost compared to the the budget? Is it
sales a day); that the CPU is sufficiently easy to use and/or within the users’ experience or will
fast for games playing; that the product is there be training needs?
efficient and effective (e.g. that the OS is
capable of handling 20 users on five tasks Remembering ‘spec v price’ will be useful when
each simultaneously; that the webserver can
Copyright © 2017. Pearson Education Limited. All rights reserved.
62
Steve, Farrell. Revise BTEC National Computing Revision Guide, Pearson Education Limited, 2017. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/cavc-ebooks/detail.action?docID=6709856.
Created from cavc-ebooks on 2022-02-10 08:11:38.
Unit 2
Had a look Nearly there Nailed it!
Content
Design of systems
Copyright © 2017. Pearson Education Limited. All rights reserved.
63
Steve, Farrell. Revise BTEC National Computing Revision Guide, Pearson Education Limited, 2017. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/cavc-ebooks/detail.action?docID=6709856.
Created from cavc-ebooks on 2022-02-10 08:11:38.
Unit 2 Had a look Nearly there Nailed it!
Content
Data processing
Hardware and software play a role in data collection.
BioNRG uses an OMR reader to scan in the following How does this form improve on customers telling
forms collected in from its customers every 3 months. operators their reading on the phone? How could you
improve it?
BioNRG Gas meter reading form
Customer number: 1873944
Name = R. Black
Postcode = FT10 9JW
64
Steve, Farrell. Revise BTEC National Computing Revision Guide, Pearson Education Limited, 2017. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/cavc-ebooks/detail.action?docID=6709856.
Created from cavc-ebooks on 2022-02-10 08:11:38.
Unit 2
Had a look Nearly there Nailed it!
Content
The data-processing functions perform a variety of actions on data as shown in the schematic.
Convert Report
Converting is the change of the data from Reports are the standard means of displaying or
one form to another. This is a particularly printing the output of the data-processing system.
useful when aggregating, categorising or Data-processing software allows the user to specify
comparing items that were originally in the layout and format of the report in great detail,
different formats. tailored to its precise usage.
Web stores use conversion, for example, The same basic information could be used, for example,
to display prices in different currencies or for an order confirmation, an invoice and a delivery
shoe sizes in different country standards. note.
BioNRG is a new clean energy supplier. It has about 100 000 customers from whom it collects gas usage
information every month.
Describe an example of how it might use each of the data-processing functions (analyse, aggregate, sort, convert and
report) in its monthly cycle.
65
Steve, Farrell. Revise BTEC National Computing Revision Guide, Pearson Education Limited, 2017. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/cavc-ebooks/detail.action?docID=6709856.
Created from cavc-ebooks on 2022-02-10 08:11:38.
Unit 2 Had a look Nearly there Nailed it!
Content
Approaches to computer
architecture
The Von Neumann architecture is a common architecture and the basis of much modern computing.
instruction to be fetched – incremented automatically unless system the more specialised the
a jump instruction is executed, when it is overwritten. architecture can be.
General purpose registers: for general CPU use. When a
program is interrupted, for example, the state of the current
registers can be saved in general purpose registers.
Steve, Farrell. Revise BTEC National Computing Revision Guide, Pearson Education Limited, 2017. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/cavc-ebooks/detail.action?docID=6709856.
Created from cavc-ebooks on 2022-02-10 08:11:38.
Unit 2
Had a look Nearly there Nailed it!
Content
The number of steps in the execute phase depends on the opcode and operands in the CIR:
• If a jump then the address part of CIR is copied to the PC ready for the next cycle.
• If an address is in operand part of CIR it is copied to MAR and then the opcode executed.
• If data is to be moved to or from memory then it is copied into MDR.
67
Steve, Farrell. Revise BTEC National Computing Revision Guide, Pearson Education Limited, 2017. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/cavc-ebooks/detail.action?docID=6709856.
Created from cavc-ebooks on 2022-02-10 08:11:38.
Unit 2 Had a look Nearly there Nailed it!
Content
Alternative architectures
There are alternatives to the Von Neumann architecture.
Harvard architecture
Instruction GOTO ADDRESS GOTO ADDRESS
RAM GET INSTRUCTION GET DATA
Applications Harvard Data RAM
(instructions CPU GOTO ADDRESS (data only)
only) WRITE DATA
The Harvard architecture splits instructions from data thus avoiding the Von Neumann bottleneck, but at
the expense of more difficult coding. Different bus widths can be optimised for data and instructions. In
practice it is very useful where there is a heavy processing load on a throughput of data such as for an
embedded CPU, early mobile phones, a graphics processing unit (GPU) or digital signal processor (DSP).
CP CP
Output emulating cycle by issuing different instructions to different
game console CP CP execution units (such as an ALU or FPU) which are used in
Quad core combination with pipelines to achieve a form of parallelism.
Emulation
CPUs of one type can emulate a CPU of another,
using emulator software to translate all instructions
and data and I/O requests between the source and Virgame is a new start-up that has been asked by
target systems. More powerful chips can emulate a smartphone company if it is possible to write an
less powerful ones quite successfully. A perfect emulator for a Sony Playstation 4, with its multi-
emulator, if it existed, would allow all programs core processor architecture that will run on its
and devices used on the one system to be used phone that uses superscalar architecture.
on the other, albeit more slowly because of the Describe why this is not feasible, giving two reasons.
processing overhead for the translation.
68
Steve, Farrell. Revise BTEC National Computing Revision Guide, Pearson Education Limited, 2017. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/cavc-ebooks/detail.action?docID=6709856.
Created from cavc-ebooks on 2022-02-10 08:11:38.
Unit 2
Had a look Nearly there Nailed it!
Content
Parallel computing
Parallel computing allows a computer system to run multiple tasks at the same time.
Multi-threading Multi-tasking
Task 1 Scheduler
A single application is broken down into multiple The computer system is running multiple tasks
operations or threads which can be executed at the same time. In a single core (non-parallel)
in parallel. If one thread is stalled, for example processor this is achieved by switching between
waiting for input, any threads that are not tasks in an efficient and transparent manner. In a
blocked can carry on. Multi-threading can be multiple CPU or multi-core system the processes
implemented in parallel on multiple CPUs or using can be running in parallel, still controlled by a
pipelining on a superscalar single CPU. scheduler.
State the implications of a large data centre, such as Google’s at Berkeley in the USA, using a cluster approach for the
computer architecture.
69
Steve, Farrell. Revise BTEC National Computing Revision Guide, Pearson Education Limited, 2017. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/cavc-ebooks/detail.action?docID=6709856.
Created from cavc-ebooks on 2022-02-10 08:11:38.
Unit 2 Had a look Nearly there Nailed it!
Content
(kB)
1 0 0 1 0 1 1 1
Megabyte one million or 220
Take the BCD number 1001 0111 (MB) kB
Stage 1: 1001 = 9, 0111 = 7 Gigabyte one billion or 230
Stage 2: 9 * 10 + 7 (GB) kB
The denary number is therefore 97. Terabyte one or 240
(TB) thousand
GB
Petabyte one or 250
(PB) thousand
1 How many wires are there in a 32 bit address bus? TB
2 How many different colours can be represented
by 24 bit colour?
70
Steve, Farrell. Revise BTEC National Computing Revision Guide, Pearson Education Limited, 2017. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/cavc-ebooks/detail.action?docID=6709856.
Created from cavc-ebooks on 2022-02-10 08:11:38.
Unit 2
Had a look Nearly there Nailed it!
Content
Translate each set of 4 bits in turn (from left to Translate each denary digit into its binary
right) from binary to denary. equivalent.
MSB LSB MSB LSB
8 4 2 1 Answer Denary 8 4 2 1
1 0 0 1 9 1 0 0 0 1
1 0 0 0 8 2 0 0 1 0
0 1 0 1 5 5 0 1 0 1
Copyright © 2017. Pearson Education Limited. All rights reserved.
0 0 1 1 3 6 0 1 1 0
The answer in denary is 9853. 125610 = 0001 0010 0101 0110
Perform the following conversions, showing your workings: It is conventional to puts bits into
(a) binary to denary: 1010 0001, 1111 1111 groups of 4 to make bit patterns
(b) denary to binary: 52, 148 easy to read, thus 111111 (63) will
usually be written as 0011 1111.
(c) BCD to denary: 1000 0010 0001 0001, 0101 0000
(d) denary to BCD: 92, 255
71
Steve, Farrell. Revise BTEC National Computing Revision Guide, Pearson Education Limited, 2017. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/cavc-ebooks/detail.action?docID=6709856.
Created from cavc-ebooks on 2022-02-10 08:11:38.
Unit 2 Had a look Nearly there Nailed it!
Content
NOTE: 1 1 carry
0 1 1 1 1 1 1 1 127 –a – b:
1 0 0 0 0 0 1 0 130 + 1 1 0 1 0 1 0 1 −43
0 0 0 0 0 0 0 1 257 1 1 1 0 0 1 1 1 −25 +
1 1 1 1 1 1 1 1 0 1 1 1 1 0 0 −68
carry 1 0 1 1 1 carry
The answer is 1 if 1 byte word with an overflow of 1. This final 1 in the carry row is an overflow bit and can
If 2 bytes then 1 = 256 be discarded here.
Perform the following sums using two’s complement arithmetic, showing your workings:
(a) 24 − 12, (b) 127 − 125, (c) −2 − 1, (d) 8 + 9, (e) 127 + 3, (f ) 0000 0010 + 1000 0001
72
Steve, Farrell. Revise BTEC National Computing Revision Guide, Pearson Education Limited, 2017. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/cavc-ebooks/detail.action?docID=6709856.
Created from cavc-ebooks on 2022-02-10 08:11:38.
Unit 2
Had a look Nearly there Nailed it!
Content
Floating point numbers cannot represent IEEE format allows for different sizes of floating
all floating point numbers with total point number depending on the precision
precision (e.g. 10/3). required, for example, single, double extended.
(a) Normalise 1200.00 and 80 000 and write the answers in E notation.
(b) Multiply them together in E notation, showing your workings.
73
Steve, Farrell. Revise BTEC National Computing Revision Guide, Pearson Education Limited, 2017. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/cavc-ebooks/detail.action?docID=6709856.
Created from cavc-ebooks on 2022-02-10 08:11:38.
Unit 2 Had a look Nearly there Nailed it!
Content
Text representation
Text, as with every other type of data, is represented by binary in a computer system as a character
set, where each character is represented by its own binary code.
The letter A in UTF-8 and ASCII is represented by the denary number 65 (0100 0001) and lower case a by 97
(0110 0001).
What is ‘Computer’ in denary and binary ASCII?
74
Steve, Farrell. Revise BTEC National Computing Revision Guide, Pearson Education Limited, 2017. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/cavc-ebooks/detail.action?docID=6709856.
Created from cavc-ebooks on 2022-02-10 08:11:38.
Unit 2
Had a look Nearly there Nailed it!
Content
Image representation
Images can be represented by bitmaps and vectors.
Vector graphic of
a house design
All images when displayed are displayed as bit Vector graphics are stored as a set of
maps, though they may be stored as compressed instructions that the vector software uses to
bitmaps or as vector images. Each pixel of a bit create the image as a bit map. They are suitable
map has a colour. When all the pixels are displayed for illustrations and line drawings, but not for
together the clarity of the final image depends on photographic type images. For example:
the size of the image versus the resolution and • rectangle (x1, y1, x2 ,y2, colour)
the colour bit depth. • triangle (x1, y1, h1, type, colour).
A bit map is stored as the height × width × The image is stored very economically as it can
colour depth. For example, a 100 × 100 bit map be stored as essentially a textual program and can
using 24 bit colour will take 10 000 × 3 (30 k) be recreated 100% accurately at larger and larger
bytes to store without compression. Images sizes as the image is remapped every time it is
stored as bit maps do not scale well, as can be scaled. It can also be plotted very accurately on a
seen from the extract of the photo above. high resolution plotter.
Sample/bit depth
Bit depth is the number of bits used to specify a colour. 1 is for monochrome.
True colour is now expressed in 24 bits (8 bit red, 8 bit green and 8 bit
blue). The more bits used the better quality the image will be, but at the
expense of storage.
JSD has to create a 20” × 20” colour poster at 300 dpi for a new CAD package with a CAD drawing and advertising
text overlaid over a photo of a large house and garden
1 How many pixels will the final image require? 2 What file type will be required for the web version?
75
Steve, Farrell. Revise BTEC National Computing Revision Guide, Pearson Education Limited, 2017. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/cavc-ebooks/detail.action?docID=6709856.
Created from cavc-ebooks on 2022-02-10 08:11:38.
Unit 2 Had a look Nearly there Nailed it!
Content
Stack Queue
A stack is used for storing requests that need A queue is a list of jobs waiting to be processed
to be handled (e.g. a stack of bills that need (e.g. a printer queue or a queue at a bank).
to be paid). Characteristics of a queue include:
Characteristics of a stack include: • A queue is a first in first out structure.
• A stack is a last in first out structure. • It grows and shrinks as required.
• It grows and shrinks as required. • The front and back of the queue are visible.
• Only the top is visible at any time. • Two operations are possible: enqueue and
• Two operations are possible: push and pop. dequeue.
TIDE EDIT Enqueue Dequeue
Pop Push
‘m’ m a e r t S ‘S’
T The characters ‘E’,‘D’,‘I’,‘T’ Stream Stream
are pushed onto the
I stack one at a time.
They are popped off the Keyboard
D Items are put onto the queue at the buffer
stack in reverse order
back (enqueue) and are taken off the
(‘T’,‘I’,‘D’,‘E’).
E front in the same order (dequeue).
The characters ‘S’,‘t’,‘r’,‘e’,‘a’,‘m’
erse are put into the queue and are taken
Stack of letters to rev off later in exactly the same order.
List Array
A list is a flexible collection of items An array is an indexed (numbered normally)
(e.g. a shopping list). sequence of items of the same type.
Class list 0 1 2 3 4
1001 Sian Bing
Times Courier Arial Palatino Georia Font[2] is Arial
1002 Sam Carrot
1006 Susi Devon
1007 Alex Handy 1007 Alex Handy Looking up font[2]
1009 Zoe Meades
Inserting into a list of Characteristics of an array include:
students • Arrays are usually fixed in size.
• Every item is immediately accessible.
Characteristics of a list include: • Items can be read using the index number.
• It can grow and shrink as required. • Items can be added using the index number.
Copyright © 2017. Pearson Education Limited. All rights reserved.
• It has a first item, next items, and a last • Sorting an array can be complex.
item.
• Items can be unordered or ordered. The index in an array
• Items can be added to or removed from The index is the ‘key’ to the array
lists. Print (Font[3]) prints out ‘Palatino’.
• Lists can be searched and sorted. Font[2]=Helvetica changes Arial to Helvetica.
An operating system, for a single user computer system, will normally send print State which data structure
jobs to the printer to be printed in the order they are requested. Explain which you would use and say why.
data structure would be best used for the processes.
76
Steve, Farrell. Revise BTEC National Computing Revision Guide, Pearson Education Limited, 2017. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/cavc-ebooks/detail.action?docID=6709856.
Created from cavc-ebooks on 2022-02-10 08:11:38.
Unit 2
Had a look Nearly there Nailed it!
Content
• can waste storage space if the number of data Address 1024 1025 1026 1027 1028
items stored is less than amount allocated for
• normally stores data in consecutive memory Access to an array is provided very quickly as
locations data stored sequentially.
myArray[n] is at myArray + (n*size)
• sorting slow as involves moving data in cells.
(if storing an array of 2 byte integers at address
10 000, myArray[4] is at address 10 008)
Steve, Farrell. Revise BTEC National Computing Revision Guide, Pearson Education Limited, 2017. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/cavc-ebooks/detail.action?docID=6709856.
Created from cavc-ebooks on 2022-02-10 08:11:38.
Unit 2 Had a look Nearly there Nailed it!
Content
Elements Elements
7 9 10 7 8
14 13 15 11 12
78
Steve, Farrell. Revise BTEC National Computing Revision Guide, Pearson Education Limited, 2017. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/cavc-ebooks/detail.action?docID=6709856.
Created from cavc-ebooks on 2022-02-10 08:11:38.
Unit 2
Had a look Nearly there Nailed it!
Content
Cost in £ T 2 2 = 2 3 4
T S D S 3 Transpose 3
2 3 4 D 4 4
T
Total revenue
Jan Feb Mar Jan Feb Mar Jan Feb Mar
67 82 80 39 39 49 106 121 129 Multiply 2 3 4 * 12 14 15 = 67 82 80
5 6 6
7 9 8
Calculate:
10 5 20
1 2 3 20 10 40
30 15 60
Show your workings.
79
Steve, Farrell. Revise BTEC National Computing Revision Guide, Pearson Education Limited, 2017. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/cavc-ebooks/detail.action?docID=6709856.
Created from cavc-ebooks on 2022-02-10 08:11:38.
Unit 2 Had a look Nearly there Nailed it!
Content
Sender Receiver
Ground station Receivers
channel.
Point D
General Hospital uses a pager system to call on-call doctors in the event of an emergency. They can use a walkie
talkie or mobile phone to ring in.
What types of channels are in use in these cases?
80
Steve, Farrell. Revise BTEC National Computing Revision Guide, Pearson Education Limited, 2017. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/cavc-ebooks/detail.action?docID=6709856.
Created from cavc-ebooks on 2022-02-10 08:11:38.
Unit 2
Had a look Nearly there Nailed it!
Content
Types of transmission
Data transmission can be parallel or serial, synchronous or asynchronous.
Parallel Serial
1 1 01 1 1 00 0001 0001 10 10 1 1 01 01 1 1 00 1 1
Parallel Serial transmission
0100 0001 0100 0001
transmission over one line
over 32 lines
Serial transmission only requires, in theory, one
of a data bus
transmission line. The data is sent over 1 bit at a
1 1 01 1 1 00 0001 0001 10 10 1 1 01 01 1 1 00 1 1 time.
Parallel transmission is sending data over a Serial transmission is much more common than
number of lines at once. It is very fast but suffers parallel over anything but very short distances.
more from noise and it is difficult to synchronise Although serial transmission only transmits data
parallel lines over longer distances so is typically 1 bit at a time rather than 8, 16, 24, 32 or even
only used over very short distances. 64 it is much cheaper to implement than parallel.
Common uses are for: It is able to be used over much longer runs than
parallel transmission without error and thus can
• computer buses • HDMI cable be pushed a good deal faster over more than
• computer to display • short printer cables. very short distances.
cable
Synchronous Asynchronous
Asynchronous communication is more flexible as
Parity Stop Data Start it only needs to be synched when transmitting.
0 1 100 0001 1 0 1 100 0001 1 Each word includes a start bit to signal the start,
and an end bit to signal the end of the word, and
100 0001 parity if that has been agreed.
A data word with start, The receiver samples the dat
a (on the data
stop and parity bit bus) at every clock pulse (on
the control bus).
Handshaking
Communication speed
Handshaking is the first part of a
communication between two devices. Bit rate The speed at which data is
It is the process by which two transmitted in bps.
communication devices agree the protocols Baud The number of times a signal changes
they will use to communicate: per second – often intermixed with
Copyright © 2017. Pearson Education Limited. All rights reserved.
• speed they can both work at (bps) bps but not quite the same.
• synchronous or asynchronous Bandwidth The maximum possible bit rate of
• half duplex or full duplex the medium – quoted by broadband
sellers when average bps can be a
• data coding (e.g. ASCII) good deal lower.
• error handling (e.g. parity)
bps Bits per second.
• compression.
Steve wants to send HDMI (HDMI is a parallel cable) between a TV in the garden shed and a satellite decoder in the
front room, about 30 metres away, but his cable does not work.
Explain this.
81
Steve, Farrell. Revise BTEC National Computing Revision Guide, Pearson Education Limited, 2017. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/cavc-ebooks/detail.action?docID=6709856.
Created from cavc-ebooks on 2022-02-10 08:11:38.
Unit 2 Had a look Nearly there Nailed it!
Content
Packets
Sequence
A network packet is the unit of
Stop!
data transmitted in a packet- Checksum User data Source Destination
switched network. It is also
0100 0001 1 0100 0001 0100 0001 1 152.12.2.1 155.12.2.1
sometimes called a datagram. It is
typically about 1–2 kilobytes. Trailer Payload Header
B C D F
E G
Different packets can take entirely different routes See page 86 for more details
Links
through the network from device A to device G. on checksum handling errors.
Copyright © 2017. Pearson Education Limited. All rights reserved.
Steve, Farrell. Revise BTEC National Computing Revision Guide, Pearson Education Limited, 2017. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/cavc-ebooks/detail.action?docID=6709856.
Created from cavc-ebooks on 2022-02-10 08:11:38.
Unit 2
Had a look Nearly there Nailed it!
Content
Substitution ciphers
Plaintext A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Offset 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
Ciphertext D E F G H I J K L M N O P Q R S T U V W X Y Z A B C
Plaintext S E C R E T M E S S A G E
T A N K T A N K T A N K T
Offset 18 0 12 9 18 0 12 9 18 0 12 9 18
Ciphertext L E P B X T Z O L S N Q X
K’
Encryption stages using key ‘TAN
• Frequency analysis
A letter ‘F’: the starting letter
• Looking for patterns in the message or
A denary number ‘3’: the amount to shift by key
Encrypt the plaintext ANT using a standard Caesar cipher with a binary key of 0000 0011. You are advised to show
your working.
83
Steve, Farrell. Revise BTEC National Computing Revision Guide, Pearson Education Limited, 2017. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/cavc-ebooks/detail.action?docID=6709856.
Created from cavc-ebooks on 2022-02-10 08:11:38.
Unit 2 Had a look Nearly there Nailed it!
Content
Encryption in modern
computer systems
Modern computer systems either make use of symmetric key encryption or public key encryption.
Secret key
ID, Credit card number, ID, Credit card number,
Expiry date, CVV, Amount, Expiry date, CVV, Amount,
Encrypted data
Date Date
Encryption Decryption
algorithms algorithms
DES encryption (56 bit) was for many years the US government standard for encryption. This has
now been cracked. Now 64 bit, 128 bit and 256 bit encryption are commonly used. The current
government standard is AES 256 bit which is regarded as uncrackable given today’s technology.
Many types of application software allow ‘locked’ versions of files such as documents to be saved and shared with
other users. A password then has to be used to unlock the file before it can be edited or modified.
What form of encryption is this? Why is this not suitable when transmitting the file over a WAN?
84
Steve, Farrell. Revise BTEC National Computing Revision Guide, Pearson Education Limited, 2017. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/cavc-ebooks/detail.action?docID=6709856.
Created from cavc-ebooks on 2022-02-10 08:11:38.
Unit 2
Had a look Nearly there Nailed it!
Content
Compression
Compression is the process of reducing the number of bytes in a file to make it faster to transmit and/or
take less storage space.
JPEG compression removes information by: • Lossy formats try to lose data that do not
• averaging pixel colour values over a block in make a good deal of difference to humans,
such a way that humans do not notice a large though there is some compromise between
degradation in quality quality and compression. It is possible to
• removing metadata such as lens, f-stop, location lose very high and very low frequency sound
etc. without suffering much loss of quality, as
most humans cannot hear these sounds.
The JPEG compression algorithm allows a trade-
An MP3 file will store a file in about 8 to
off between quality and compression. Very high
11 times less space than a CD whilst still
compression is possible with a larger loss in quality.
sounding near identical to the original user.
Explain why it is possible generally to compress text more than images or sounds in a lossless manner.
85
Steve, Farrell. Revise BTEC National Computing Revision Guide, Pearson Education Limited, 2017. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/cavc-ebooks/detail.action?docID=6709856.
Created from cavc-ebooks on 2022-02-10 08:11:38.
Unit 2 Had a look Nearly there Nailed it!
Content
Error detection
Communication channels can be ‘noisy’, which can cause signals to be altered in transmission. Error
detection attempts to deal with this by noticing when an error has occurred. Methods used to detect
errors are outlined below.
Repetition Redundancy
data received Parity bit/word
0100 0011 0100 0001 0100 0011 Raw data XX Checksum/check digit
0100 0001 0100 0001 0100 0011 Cyclic redundancy check
The simplest form of error detection relies on Other forms of error detection rely on attaching
repetition. The same data is transmitted twice. If extra information to the raw data which is
it is not the same then it is an error and it can be calculated using an algorithm.
requested again. This is the basis of a good deal
of form verification.
Are 9781903133781 and 9781405868052 valid ISBN13 numbers? Show your workings.
86
Steve, Farrell. Revise BTEC National Computing Revision Guide, Pearson Education Limited, 2017. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/cavc-ebooks/detail.action?docID=6709856.
Created from cavc-ebooks on 2022-02-10 08:11:38.
Unit 2
Had a look Nearly there Nailed it!
Content
Error correction
When errors are detected when receiving data, error correction is the means of dealing with them.
Commonly used error correction systems are outlined below.
identify the position in the whole data and ecc conditions are good enough the FEC codes will
bits of the error. That is, for 16 bits total of be good enough to keep the channel running, but
data + ecc, 4 bits (24) are needed. if conditions gets too bad then the system can
request a repeat. This is very effective but at the
expense of a slower throughput.
87
Steve, Farrell. Revise BTEC National Computing Revision Guide, Pearson Education Limited, 2017. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/cavc-ebooks/detail.action?docID=6709856.
Created from cavc-ebooks on 2022-02-10 08:11:38.
Unit 2 Had a look Nearly there Nailed it!
Content
Boolean logic
Boolean logic is at the heart of all computers. All circuits are designed using logic and made using some
form of logic gates. Boolean algebra can be used to simplify circuits.
The seven main logic gates, algebraic terms and truth table
INPUTS AND OR NOT NAND NOR XOR XNOR
Inputs to gate
B
Note: It is possible to simplify this circuit. B.C
C C
88
Steve, Farrell. Revise BTEC National Computing Revision Guide, Pearson Education Limited, 2017. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/cavc-ebooks/detail.action?docID=6709856.
Created from cavc-ebooks on 2022-02-10 08:11:38.
Unit 2
Had a look Nearly there Nailed it!
Content
Simplifying expressions
When creating circuits it is often useful to simplify the circuit or change it to use the gates available.
Boolean algebra and truth tables can be used to achieve this.
A+A=A A.A=A
Both the same as: A
A + ~A = 1 A . ~A = 0
De Morgan’s theorem
(NOT A) OR (NOT B) = A NAND B (NOT A ) AND (NOT B) = A NOR B
A+B=A.B A A.B=A+B A
= =
B B
A B C D C OR D A B C D C AND D
A B NOT A NOT B A NAND B A B NOT A NOT B A NOR B
0 0 1 1 1 0 0 1 1 1
0 1 1 0 1 0 1 1 0 0
1 0 0 1 1 1 0 0 1 0
1 1 0 0 0 1 1 0 0 0
Steve, Farrell. Revise BTEC National Computing Revision Guide, Pearson Education Limited, 2017. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/cavc-ebooks/detail.action?docID=6709856.
Created from cavc-ebooks on 2022-02-10 08:11:38.
Unit 2 Had a look Nearly there Nailed it!
Content
Simplify, if possible.
The following examples show how you can break down problems and processes into distinct steps.
Case Conditions:
study
A: car approaches (y or n)
B: office is open (y or n)
F&N installs a new parking barrier that
lifts only when a car approaches when Algebra:
the office is open. Output = A AND B, i.e. A . B
Truth table Circuit:
The circuit is shown opposite.
A B A.B A
B
0 0 0
0 1 0
1 0 0
1 1 1
C
Algebra:
Output: (A AND (B OR C)) AND D A
A tablet screen will be blank if there is no recent activity, or there is recent activity Show the
but the off button is pressed. conditions, algebra,
simplifying and
Show the circuit. truth table.
90
Steve, Farrell. Revise BTEC National Computing Revision Guide, Pearson Education Limited, 2017. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/cavc-ebooks/detail.action?docID=6709856.
Created from cavc-ebooks on 2022-02-10 08:11:38.
Unit 2
Had a look Nearly there Nailed it!
Content
Flow charts
A flow chart is a flexible diagram that can represent, explain and communicate a workflow, a system, a
program, a procedure or process in a logical, unambiguous and concise manner. In computing they can
be used to solve problems.
Have a logical start and end with one flow. Avoid crossing lines where possible.
One flow into process and one out. Use active verb for each process.
One flow into decision, two (y and n) out. Use a question for each decision.
Case In Mr Nicholson’s smart home, if a motion sensor notices movement in front of the front
study
door it will send a message to his smartphone. A porch light will come on if it is dark.
condition:
Display
YES porch light
Display
porch light End
An EAN13 barcode has a built-in validation check digit (13th digit). One algorithm for checking that the barcode
has been scanned correctly is to read each number from the 1st to 13th. If the number is in an even position,
multiply it by three and add to the sum of digits. If in an odd position, then just add it.
Assuming it beeps for an error and looks up the barcode and displays the product if OK, create a flow chart to show
this process. Test your flow chart with a 13-digit barcode.
91
Steve, Farrell. Revise BTEC National Computing Revision Guide, Pearson Education Limited, 2017. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/cavc-ebooks/detail.action?docID=6709856.
Created from cavc-ebooks on 2022-02-10 08:11:38.
Unit 2 Had a look Nearly there Nailed it!
Content
System diagrams
Systems diagrams are a good way to start building or understanding a system and to solve problems.
They are usually a fairly high level model of the system and do not require a specific methodology or
symbols.
(Output)
92
Steve, Farrell. Revise BTEC National Computing Revision Guide, Pearson Education Limited, 2017. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/cavc-ebooks/detail.action?docID=6709856.
Created from cavc-ebooks on 2022-02-10 08:11:38.
Unit 2
Had a look Nearly there Nailed it!
Skills
Question types
Command words are the key terms used in questions, for example ‘identify’, ‘explain’, ‘draw’. They
identify the approach you should take to answering the question.
Draw Give Identify, name, state
Complete Calculate
Demonstrate
Evaluate
Write
Command words Describe
Discuss Analyse Develop
Produce Explain
93
Steve, Farrell. Revise BTEC National Computing Revision Guide, Pearson Education Limited, 2017. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/cavc-ebooks/detail.action?docID=6709856.
Created from cavc-ebooks on 2022-02-10 08:11:38.
Unit 2 Had a look Nearly there Nailed it!
Skills
94
Steve, Farrell. Revise BTEC National Computing Revision Guide, Pearson Education Limited, 2017. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/cavc-ebooks/detail.action?docID=6709856.
Created from cavc-ebooks on 2022-02-10 08:11:38.
Unit 2
Had a look Nearly there Nailed it!
Skills
Short-answer questions
With short-answer questions, try to answer as quickly and concisely as possible.
extract
Sample response
This question requires one simple
The JPEG format is lossy. statement.
Explain which of these two file types you would choose for storing This explain question has two parts.
the photographs of models wearing the designer dresses This type of explanation question
and which the complex illustrations on the website. 4 marks typically requires you to give an
answer to each part and then
extract
Sample response expand the answer.
extract
Sample response
1 Most browsers will only display JPEG, PNG or GIF files, s
Do not give more than two answer
thus these are the most sensible file formats to use. ans wer. Try to
nor over-elaborate the
2 JPEG files are known sometimes to contain viruses tho se for
use different answers from
and thus some systems with anti-virus software will previous questions, however.
automatically block them.
State one advantage of storing a complex image of Revise image representation on page 75
Links
a painting as a PNG and one of storing it as a JPEG. and compression on page 85.
95
Steve, Farrell. Revise BTEC National Computing Revision Guide, Pearson Education Limited, 2017. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/cavc-ebooks/detail.action?docID=6709856.
Created from cavc-ebooks on 2022-02-10 08:11:38.
Unit 2 Had a look Nearly there Nailed it!
Skills
Performing calculations
You may need to show that you can perform calculations.
15 * 2 25 * 2 15 * 2
= 1 Calculate the offset.
+4 * 3 +5 * 3 +4 * 3
2 Write out the offset cipher alphabet
underneath the plaintext alphabet.
= 42 65 42 3 Read the original word by matching letters to
the cipher letters by position.
96
Steve, Farrell. Revise BTEC National Computing Revision Guide, Pearson Education Limited, 2017. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/cavc-ebooks/detail.action?docID=6709856.
Created from cavc-ebooks on 2022-02-10 08:11:38.
Unit 2
Had a look Nearly there Nailed it!
Skills
Drawing diagrams
You may be asked to complete a diagram or draw one from scratch.
NO
When a proximity sensor senses there is a person in front of the lift it turns on a timer and illuminates the up and
down buttons for five seconds, then turns them off and resets the timer.
97
Steve, Farrell. Revise BTEC National Computing Revision Guide, Pearson Education Limited, 2017. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/cavc-ebooks/detail.action?docID=6709856.
Created from cavc-ebooks on 2022-02-10 08:11:38.
Unit 2 Had a look Nearly there Nailed it!
Skills
Longer-answer questions
Some questions want longer, more detailed answers. They require a related but slightly different
approach.
extract
Sample response
Fletcher and Nicholson will need to backup its data
Use technical vocabulary such as
so that it can be restored if the data is lost or
corrupted, virus, restored, offline, etc.
corrupted, through accidental mishap such as a
hard disk crash or a malicious act such as sabotage
or a virus. If data cannot be restored it could be
catastrophic to the firm’s trading.
Data is archived to keep copies of non-live data (such
as previous years’ products or accounting data) Examples help to reinforce an
available for future use. This frees up space on the explanation. Ensure they are relevant
running or live system whilst maintaining availability if and accurate, however.
required.
The procedure for backing up will include a schedule
for backing up incremental data such as new products
or customers or orders added at least daily and for
doing a full backup of all data periodically (perhaps Try to make about eight points in total
weekly). The data will be backed up to a separate spread among four separate parts.
storage medium, with one full copy to be held off site
on a removable disk or secure cloud storage.
Data are archived to a separate, probably slower and
cheaper, storage location, such as an offline disk or Use a coherent and logical
tape or DVDR. This can be done periodically but less argument which is related back to
often, perhaps at a quarter end or year end. the case.
Copyright © 2017. Pearson Education Limited. All rights reserved.
98
Steve, Farrell. Revise BTEC National Computing Revision Guide, Pearson Education Limited, 2017. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/cavc-ebooks/detail.action?docID=6709856.
Created from cavc-ebooks on 2022-02-10 08:11:38.
Unit 2
Had a look Nearly there Nailed it!
Skills
‘Discuss’ questions
You may be asked to discuss a specific topic area or choice. You need to do more than list a number of
issues – try to link your points together with a solid chain of reasoning using examples relevant to the
case identified.
A multi-floor shopping mall intends to add custom-built interactive To answer this question, start with
information kiosks at strategic points in the centre. Discuss the type an introduction that includes a very
of user interface it should use. 4 marks brief summary of, or restatement
of the question and an indication
extract
Sample response of the range of ideas that you will
discuss.
The purpose of an interactive information kiosk in a
This may be in the form of a list
shopping centre is to provide shoppers with information
of the technical concepts you will
about the centre, and possibly to provide directions
discuss or, as here, a list of the
and advice. The type of user interface chosen will have
factors that will later be matched to
to take into account the the diverse range of users, the
the technical issues that will have to
requirement for system security, and the need for a very
be addressed.
fast response in order to answer queries quickly and be
compatible with the hardware used for the kiosk.
A command line interface (CLI) would not be at all
appropriate as it requires skill and experience to use and
potentially exposes the system to accidental error or Follow through your introduction
deliberate hacking. A graphical user interface (GUI) could with a number of points developing
be considered as it can be easy to use, but a forms-based your discussion in more detail, using
interface would be the most likely choice as it involves relevant technical terms wherever
little or no prior experience or skill and can deal with all possible.
the required functionality in a very easy to use and secure
manner.
A forms UI is fast and easy for the shopper to input
choices, such as ‘Directions to nearest WC’ or ‘Jewellers’
or ‘Coffee’ using items such as menu buttons and allows
text-based entry in search boxes.
A forms-based interface reduces the possibility of error You must relate the technical
and of the shoppers’ accessing unauthorised parts of the details to the specific case/
system as it restricts the choices that can be made, which content that you are discussing, in
could be a potential problem when using a GUI. this case an information kiosk for
a shopping centre. Use concepts
The simplicity of the forms interface means it can be
such as shopper, shop, café, WC and
very consistent and efficient to process and a very fast
short examples where possible to
response, thus minimising queues at the kiosk. A GUI may
Copyright © 2017. Pearson Education Limited. All rights reserved.
Immersive Source is planning to introduce computer systems to help toddlers with behavioural issues in nurseries.
Discuss the factors it should consider when specifying the hardware for these systems.
99
Steve, Farrell. Revise BTEC National Computing Revision Guide, Pearson Education Limited, 2017. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/cavc-ebooks/detail.action?docID=6709856.
Created from cavc-ebooks on 2022-02-10 08:11:38.
Unit 2 Had a look Nearly there Nailed it!
Skills
‘Evaluate’ questions
Evaluate questions require you to weigh how effective, correct or worthwhile a decision or judgement is.
Fruitful Vegan Restaurant Chain is planning a large expansion across the UK under the direction of new
Commercial Director, Bill Fence. It has a single computer system in each branch which runs the whole branch
operation. The system uses open source software for all tasks, adapted by a local software house for the
company’s specific needs, running on a version of the open source BSD operating system. Although this system
works effectively, Bill has decided he wants to move to the most popular, proprietary operating system running
the standard office software he has always used and that he feels most new recruits will know and understand.
extract
Sample response It is useful to have an introduction
stating the basis of your argument
Bill Fence’s decision to change the operating system and and the main factors you will
software from an existing working open source system to a weigh.
proprietary system has a number of implications for Fruitful
regarding the compatibility of current hardware, current
software, training needs of existing as well as new staff, You need to consider all sides of
costs of implementation and handover and the lifetime cost an argument. A scenario is unlikely
of the new system, including licensing, support costs, etc. to be one-sided.
On the positive side the use of a proprietary system will
mean that many new staff will have some familiarity with
the basic file operations of the system and may have some
Use your technical knowledge
experience with the office software already. With a large
of the area and combine it with
expansion planned this could be very beneficial. On the
details of the specific case to
other hand, current staff are used to working with the
make the points towards your
current system.
argument.
One of the major issues for Fruitful will be compatibility
of their current hardware with the new OS. EPOS tills,
Ideally make a point and then
contactless card systems, etc. may need to be adapted or
explain it, perhaps using a concise
indeed changed.
example.
Bill Fence’s decision is, on balance, a risky one for Fruitful.
It will be changing from an existing, effective system to a
new system that will need some development, although it When evaluating a decision
is based on a well-known operating system and software. it is important to come
There will be training needs, development needs and extra to a conclusion about the
costs at each stage of the implementation, handover and appropriateness of that
during the lifetime of the product. A full feasibility study decision or perhaps make a
Copyright © 2017. Pearson Education Limited. All rights reserved.
Each student at the John Snow School currently has to carry a You could explain the basic operation
photo ID card which features a magnetic strip carrying their ID. It and consider the advantages and
is swiped at the entrance to the school and class to register them. disadvantages. As it is an evaluate
It is proposed to replace these with new ID cards that contain RFID question, finish with a definite
chips to automate the class registration system. recommendation.
Evaluate this decision.
100
Steve, Farrell. Revise BTEC National Computing Revision Guide, Pearson Education Limited, 2017. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/cavc-ebooks/detail.action?docID=6709856.
Created from cavc-ebooks on 2022-02-10 08:11:38.