OL Revision Guide 2023 by MAK
OL Revision Guide 2023 by MAK
PAPER 1
COMPUTER SCIENCE 2023
BY SIR MAK
bit – the basic computing element that is either 0 or 1, and is formed from the words Binary digit
binary number system – a number system based on 2 and can only use the values 0 and 1
hexadecimal number system – a number system based on the value 16 which uses denary digits 0 to
9 and letters A to F error code – an error message generated by the computer
MAC address – standing for Media Access Control, this address (given in hexadecimal) uniquely identifies a device on the
internet; it takes the form: NN-NN-NN-DD-DD-DD, where NN-NN-NN is the manufacturer code and DD-DD-DD is the device code
NN-NN-NN-DD-DD-DD
IP address – Internet Protocol identified either as IPv4 or IPv6; it gives a unique address to each device connected to a
network identifying their location
HTML – HyperText Mark-up Language is used in the design of web pages and to write, for example, http(s) protocols; in the
context of this chapter, colours used in web pages are assigned a hexadecimal code based on red, green and blue colours
overflow error – the result of carrying out a calculation that produces a value that is too large for the computer’s allocated
word size (8-bit, 16-bit, 32-bit, and so on)
logical shift – an operation that shifts bits to the left or right in a register; any bits shifted out of a register (left or right) are
replaced with zeroes
two’s complement – a method of representing negative numbers in binary; when applied to an 8-bit system, the left-most bit
(most significant bit) is given the value –128
ASCII code – a character set for all the characters on a standard keyboard and control codes
character set – a list of characters that have been defined by computer hardware and software. The character set is necessary
so that the computer can understand human characters
Unicode – a character set which represents all the languages of the world (the first 128 characters are the same as ASCII code)
sampling resolution – the number of bits used to represent sound amplitude in digital sound recording (also known as bit depth) bit
depth – the number of bits used to represent the smallest unit in a sound file
colour depth – the number of bits used to represent the colours of a pixel
sampling rate – the number of sound samples taken per second in digital sound recording
bitmap image – an image made up of pixels
pixel – derived from the term 'picture element', this is the smallest element used to make up an image on a display image
resolution – the number of pixels in the X–Y direction of an image, for example, 4096 × 3192 pixels
pixelated (image) – this is the result of zooming into a bitmap image; on zooming out the pixel density can be diminished to
such a degree that the actual pixels themselves can be seen
pixel density – number of pixels per square inch
compression – reduction of the size of a file by removing repeated or redundant pieces of data; this
can be lossy or lossless
bandwidth – the maximum rate of transfer of data across a network, measured in kilobits per second (kbps) or megabits per
second (Mbps)
lossy (file compression) – a file compression method in which parts of the original file cannot be recovered during the
decompression process for example, JPEG, mp3
lossless (file compression) – a file compression method that allows the original file to be fully restored during the
decompression process, for example, run length encoding (RLE)
audio compression – a method used to reduce the size of a sound file using perceptual music shaping
MP3 – a lossy file compression method used for music files
MP4 – a lossy file compression method used for multimedia files
JPEG – from Joint Photographic Expert Group; a form of lossy file compression used with image files which relies on the
inability of the human eye to distinguish certain colour changes and hues
run length encoding (RLE) – a lossless file compression technique used to reduce the size of text and photo files in particular
bit – the basic computing element that is either 0 or 1, and is formed from the words Binary
digit
binary number system – a number system based on 2, in which only the digits 0 and 1 are
used
hexadecimal number system – a number system based on the value 16 which uses denary
digits 0 to 9 and letters A to F
error codes – error messages (in hexadecimal) generated by the computer
MAC address – MAC address - standing for Media Access Control, this address uniquely
identifies a device on the internet; it takes the form: NN-NN-NN-DD-DD-DD, where NN-NN-
NN is the manufacturer code and DD-DD-DD is the device code
IP address – IP address short for internet protocol address and identified as either IPv4 or
IPv6; the IP address gives a unique address to each device connected to the internet,
identifying its location
hypertext mark-up language (HTML) – the language used to design, display and format web
pages
BINARY TO DENARY
Convert the following binary number, 011110001011, into a denary number.
2048 1024 512 256 128 64 32 16 8 4 2 1
0 1 1 1 1 0 0 0 1 0 1 1
DENARY TO BINARY
Consider the conversion of the denary number, 142, into binary:
Method
The denary number 142 is made up of 128 + 8 + 4 + 2 (that is, 142 – 128 = 14; 14 – 8 = 6;
6 – 4 = 2; 2 – 2 = 0; in each stage, subtract the largest possible power of 2 and keep
doing this until the value 0 is reached. This will give us the following 8-bit binary
number:
128 64 32 16 8 4 2 1
1 0 0 0 1 1 1 0
binary addition carry sum binary digit carry sum
0+0 0 0 0+0+0 0 0
0+1 0 1 0+0+1 0 1
1+0 0 1 0+1+0 0 1
1+1 1 0 0+1+1 1 0
1+0+0 0 1
1+0+1 1 0
1+1+0 1 0
1+1+1 1 1
» The number of bits per sample is known as the sampling resolution (also known as the bit depth).
» Sampling rate is the number of sound samples taken per second. This is measured in hertz (Hz),
where 1 Hz means ‘one sample per second
Bit-map image – system that uses pixels to make up an image.
Pixel – smallest picture element that makes up an image.
Colour depth – number of bits used to represent the colours in a pixel, e.g. 8 bit colour depth can
represent 28 = 256 colours.
Bit depth – number of bits used to represent the smallest unit in, for example, a sound or image file – the
larger the bit depth, the better the quality of the sound or colour image.
Image resolution – number of pixels that make up an image, for example, an image could contain 4096 ×
3192 pixels (12 738 656 pixels in total).
Screen resolution – number of horizontal and vertical pixels that make up a screen display. If the screen
resolution is smaller than the image resolution, the whole image cannot be shown on the screen, or the
original image will become lower quality.
Resolution – number of pixels per column and per row on a monitor or television screen. Pixel density –
number of pixels per square centimetre.
Sampling resolution – number of bits used to represent sound amplitude (also known as bit depth).
Sampling rate – number of sound samples taken per second.
Frame rate – number of video frames that make up a video per second.
Bit-map images are made up of pixels (picture elements); the image is stored in a two-dimensional matrix
of pixels.
Pixels can take different shapes, such as or
When storing images as pixels, we have to consider
• at least 8 bits (1 byte) per pixel are needed to code a coloured image (this gives 256 possible colours by
varying the intensity of the blue, green and red elements)
• true colour requires 3 bytes per pixel (24 bits), which gives more than one million colours
• the number of bits used to represent a pixel is called the colour depth.
Sampling
Pros Cons
larger dynamic range produces larger file size
better sound quality takes longer to transmit/download sound files
less sound distortion requires greater processing power
Lossless file compression – file compression method where the original file can be restored following
decompression.
Lossy file compression – file compression method where parts of the original file cannot be recovered
during decompression, so some of the original detail is lost.
JPEG – Joint Photographic Expert Group – a form of lossy file compression based on the inability of the
eye to spot certain colour changes and hues.
MP3/MP4 files – file compression method used for music and multimedia files.
Audio compression – method used to reduce the size of a sound file using perceptual music shaping.
Perceptual music shaping – method where sounds outside the normal range of hearing of humans, for
example, are eliminated from the music file during compression.
Bit rate – number of bits per second that can be transmitted over a network. It is a measure of the data
transfer rate over a digital telecoms network.
Run length encoding (RLE) – a lossless file compression technique used to reduce text and photo files
in particular.
Run-length encoding (RLE) can be used to compress a number of different file formats.
It is a form of lossless/reversible file compression that reduces the size of a string of adjacent, identical
data (such as repeated colours in an image).
A repeating string is encoded into two values.
The first value represents the number of identical data items (such as characters) in the run. The second
value represents the code of the data item (such as ASCII code if it is a keyboard character).
RLE is only effective where there is a long run of repeated units/bits.
Using RLE on text data
Consider the text string ‘aaaaabbbbccddddd’.
Assuming each character requires 1 byte, then this string needs 16 bytes. If we assume ASCII code is
being used, then the string can be coded as follows:
Internet – massive network of networks, made up of computers and other electronic devices;
uses TCP/IP communication protocols.
World Wide Web (WWW) – collection of multimedia web pages stored on a website, which
uses the internet to access information from servers and other computers.
HyperText Mark-up Language (HTML) – used to design web pages and to write http(s)
protocols, for example.
Uniform resource locator (URL) – specifies location of a web page (for example,
www.hoddereducation.co.uk).
Web browser – software that connects to DNS to locate IP addresses; interprets web pages
sent to a user’s computer so that documents and multimedia can be read or watched/listened to.
Internet service provider (ISP) –
company which allows a user to connect to the internet. They will usually charge a monthly fee
for the service they provide.
Public switched telephone network (PSTN) – network used by traditional telephones when
making calls or when sending faxes.
Voice over Internet Protocol (VoIP) – converts voice and webcam images into digital
packages to be sent over the internet.
Internet protocol (IP) – uses IPv4 or IPv6 to give addresses to devices connected to the
internet.
IPv4 – IP address format which uses 32 bits, such as 200.21.100.6.
Classless inter-domain routing (CIDR) – increases IPv4 flexibility by adding a suffix to the
IP address, such as 200.21.100.6/18.
IPv6 – newer IP address format which uses 128 bits, such as A8F0:7FFF:F0F1:F000:3DD0:
256A:22FF:AA00.
Zero compression – way of reducing the length of an IPv6 address by replacing groups of
zeroes by a double colon (::); this can only be applied once to an address to avoid ambiguity.
Sub-netting – practice of dividing networks into two or more sub-networks.
Private IP address – an IP address reserved for internal network use behind a router.
Public IP address – an IP address allocated by the user’s ISP to identify the location of their
device on the internet.
Domain name service (DNS) – (also known as domain name system) gives domain names for
internet hosts and is a system for finding IP addresses of a domain name.
JavaScript® – object-orientated (or scripting) programming language used mainly on the web
Memory cache – high speed memory external to processor which stores data which the
processor will need again.
Random access memory (RAM) – primary memory unit that can be written to and read from.
Read-only memory (ROM) – primary memory unit that can only be read from.
Dynamic RAM (DRAM) – type of RAM chip that needs to be constantly refreshed.
Static RAM (SRAM) – type of RAM chip that uses flip-flops and does not need refreshing.
Refreshed – requirement to charge a component to retain its electronic state.
Programmable ROM (PROM) – type of ROM chip that can be programmed once.
Erasable PROM (EPROM) – type of ROM that can be programmed more than once using
ultraviolet (UV) light.
Hard disk drive (HDD) – type of magnetic storage device that uses spinning disks.
Latency – the lag in a system; for example, the time to find a track on a hard disk, which
depends on the time taken for the disk to rotate around to its read-write head.
Fragmented – storage of data in non-consecutive sectors; for example, due to editing and
deletion of old data.
Removable hard disk drive – portable hard disk drive that is external to the computer; it can
be connected via a USB part when required; often used as a device to back up files and data.
Solid state drive (SSD) – storage media with no moving parts that relies on movement of
electrons.
Electronically erasable programmable read-only memory (EEPROM) – read-only (ROM)
chip that can be modified by the user, which can then be erased and written to repeatedly using
pulsed voltages.
Flash memory – a type of EEPROM, particularly suited to use in drives such as SSDs,
memory cards and memory sticks.
Optical storage – CDs, DVDs and Blu-rayTM discs that use laser light to read and write data.
Dual layering – used in DVDs; uses two recording layers.
Birefringence – a reading problem with DVDs caused by refraction of laser light into two
beams.
Binder 3D printing – 3D printing method that uses a two-stage pass; the first stage uses dry
powder and the second stage uses a binding agent.
Direct 3D printing – 3D printing technique where print head moves in the x, y and z
directions. Layers of melted material are built up using nozzles like an inkjet printer.
» PACKET SWITCHING
» each packet will follow its own path (route)
» routers will determine the route of each packet
» routing selection depends on the number of packets waiting to be processed at
each node
» the shortest possible path available is always selected – this may not always
be the shortest path that could be taken, since certain parts of the route may
be too busy or not suitable
» unfortunately, packets can reach the destination in a different order to that in
which they were sent.
Serial Parallel
less risk of external interference than with parallel (due to faster rate of data transmission than serial
fewer wires)
more reliable transmission over longer distances works well over shorter distances (for example, used in
internal pathways on computer circuit boards)
transmitted bits won’t have the risk of being skewed (that is, since several channels/wires used to transmit data, the bits
out of synchronisation) can arrive out of synchronisation (skewed)
used if the amount of data being sent is relatively small since preferred method when speed is important
transmission rate is slower than parallel (for example, USB
uses this method of data transmission)
used to send data over long distances (for example, if data is time-sensitive, parallel is the most appropriate
telephone lines) transmission method
less expensive than parallel due to fewer hardware parallel ports require more hardware, making them more
requirements expensive to implement than serial ports
easier to program input/output operations when parallel used
Benefits Drawbacks
devices plugged into the computer are automatically detected and device standard USB only supports a maximum
drivers are automatically loaded up cable length of 5 m; beyond that, USB hubs
connections can only fit one way preventing incorrect connections being made are needed to extend the cable length
it has become an industry standard, which means considerable support is even though USB is backward compatible,
available very early USB standards (V1) may
not always be supported by the latest
can support different data transmission rates (from 1.5 Mbps to 5 Gbps)
computers
no need for external power source since cable supplies +5 V power even the latest version 3 (V3) and version 4
USB protocol notifies the transmitter to re- transmit data if any errors are (V4) USB-C systems have a data transfer
detected; this leads to error-free data transmission rate which is slow compared to, for
example, Ethernet connections (Note: USB
it is relatively easy to add more USB ports if necessary, by using USB hubs V2 has a maximum data transfer rate of
USB is backward compatible (that is, older versions are still supported) 480 Mbps.)
data packet – a small part of a message/data that is transmitted over a network; after
transmission all the data packets are reassembled to form the original message/data
packet header – the part of the data packet that contains the IP addresses of the sender and
receiver, and includes the packet number which allows reassembly of the data packets
packet trailer – the part of a data packet that indicates the end of the data packet and cyclic
redundancy check error check
cyclic redundancy check (CRC) – an error checking method in which all the 1-bits in
the data packet payload are added and the total is stored in the packet trailer; the same
calculation is repeated at the receiving station
payload – the actual data being carried in a data packet
node – stages in a network that can receive and transmit data packets; routers are nodes in
communication networkss
packet switching – a method of transmission in which a message is broken into many data
packets which can then be sent along pathways independently of each other
router – a device that enables data packets to be moved between different networks, for
example to join a LAN to a WAN
real time streaming – the transmission of data over a network for live events where the data
is sent as soon as it is received or generated
hopping/hop number – a number in a data packet header used to stop data packets that
never reach their destination from ‘clogging up’ the data paths/routes
simplex – data that can be sent on one direction only
half-duplex – data that can be sent in both directions but not at the same time
full-duplex – data that can be sent in both directions at the same time (simultaneously)
serial data transmission – sending data down one channel/wire one bit at a time
parallel data transmission – sending data down several channels/wires several bits at a
time (usually 1 byte)
skewed (data) – data that arrives at the destination with the bits no longer synchronised
universal serial bus (USB) – a type of serial data transmission which has become the
industry standard for connecting computers to devices via a USB port
parity check – a method used to check if data has been transferred correctly; it makes use of
even parity (an even number of 1-bits) or odd parity (an odd number of 1-bits)
parity bit – a bit (either 0 or 1) added to a byte of data in the most significant bit position; this
ensures that the byte follows the correct even parity or odd parity protocol
parity block – a horizontal and vertical parity check on a block of data being transmitted
parity byte – an extra byte of data sent at the end of a parity block; it is composed of the
parity bits generated from a vertical parity check of the data block
checksum – a verification method used to check if data transferred has been altered or
corrupted; calculated from the block of data of data being sent; the checksum value is sent
after each data block
automatic repeat request (ARQ) – a method of checking transmitted data for errors;
it makes use of acknowledgement and timeout to automatically request re-sending of
data if the time interval before positive acknowledgement is too long
acknowledgement – a message sent to the receiver indicating that data has been
received correctly (used in the ARQ error detection method)
timeout – the time interval allowed to elapse before an acknowledgement is received
(in the ARQ error detection method)
echo check – a method used to check if data has been transferred correctly; data is
sent to a receiver and then immediately sent back to the sender; the sender then
checks if the received data matches the sent data
check digit – an additional digit appended to a number to check if the entered number
is error-free; check digit is a data entry check and not a data transmission check
eavesdropper – another name for a hacker who intercepts data being transmitted on
a wired or wireless network
encryption – the process of making data meaningless using encryption keys; without
the correct decryption key the data cannot be decoded (unscrambled)
plaintext – the original text/message before it is put through an encryption algorithm
ciphertext – encrypted data that is the result of putting a plaintext message through
an encryption algorithm
encryption algorithm – a complex piece of software that takes plaintext and
generates an encrypted string known as ciphertext
symmetric encryption – a type of encryption in which the same encryption key is
used both to encrypt and decrypt a message
asymmetric encryption – a type of encryption that uses public keys and private keys
to ensure data is securepublic key – a type of encryption key that is known to all users
private key – a type of encryption key which is known only to the single computer/
user
quantum computer – a computer that can perform very fast calculations; it can
perform calculations that are based on probability rather than simple 0 or 1 values;
this gives
a quantum computer the potential to process considerably more data than existing
computers
Digital to analogue converter (DAC) – needed to convert digital data into electric currents
that can drive motors, actuators and relays, for example.
Analogue to digital converter (ADC) – needed to convert analogue data (read from sensors,
for example) into a form understood by a computer.
Organic LED (OLED) – uses movement of electrons between cathode and anode to produce
an on-screen image. It generates its own light so no back lighting required.
Screen resolution – number of pixels in the horizontal and vertical directions on a
television/computer screen.
Touch screen – screen on which the touch of a finger or stylus allows selection or
manipulation of a screen image; they usually use capacitive or resistive technology.
Capacitive – type of touch screen technology based on glass layers forming a capacitor, where
fingers touching the screen cause a change in the electric field.
Resistive – type of touch screen technology. When a finger touches the screen, the glass layer
touches the plastic layer, completing the circuit and causing a current to flow at that point.
Sensor – input device that reads physical data from its surroundings.
DRAM SRAM
• consists of a number of transistors and capacitors • uses flip-flops to hold each bit of
• needs to be constantly refreshed memory
• less expensive to manufacture than SRAM • does not need to be constantly
refreshed
• has a higher memory capacity than SRAM
• has a faster data access time than
• main memory is constructed from DRAM
DRAM
• consumes more power than SRAM under reasonable
• processor memory cache makes
levels of access, as it needs to be constantly
use of SRAM
refreshed
• if accessed at a high frequency,
power usage can exceed that of
DRAM
RAM ROM
• small in size and therefore easy to • difficult to upgrade devices to take advantage of new
fit into devices technology
• relatively low cost to make • troubleshooting faults in the device becomes a
• usually dedicated to one task, specialist task
making for simple interfaces and • although the interface can appear to be simple, in
often no requirement of an reality it can be more confusing (changing the time
operating system on a cooker clock can require several steps, for
• consume very little power example)
• very fast reaction to changing input • any device that can be accessed over the internet is
(operate in real time) also open to hackers, viruses, and so on
• with mass production comes • due to the difficulty in upgrading and fault finding,
reliability devices are often just thrown away rather than being
repaired (wasteful)
working of laser printer
9 to prevent the paper sticking to the drum, the electric charge on the paper is removed
after one rotation of the drum
10 the paper goes through a fuser (a set of heated rollers), where the heat melts the ink so
that it fixes permanently to the paper
11 a discharge lamp removes all the electric charge from the drum so it is ready to print the
next page
Advantages Disadvantages
higher contrast ratios image tends to suffer from ‘shadows’ when
higher reliability/longevity showing a moving image
quieter running than LCD projector DLP do not have grey components in the image
Digital light uses a single DMD chip, which mean no issues
projector (DLP) lining up the images the colour definition is frequently not as good as
LCD projectors because the colour saturation is
smaller and lighter than LCD projector
not as good (colour saturation is the intensity of a
they are better suited to dusty or smoky colour)
atmospheres than LCD projectors
although improving, the contrast ratios are not as
give a sharper image than DLP projectors
good as DLPs
LCD projectors have a limited life (that is, the
have better colour saturation than DLP projectors
LCD projector longevity is not as good as DLPs)
more efficient in their use of energy than DLP since LCD panels are organic in nature, they tend
technology – consequently they generate less to degrade with time (screens turn yellow and the
heat colours are subsequently degraded over time)
Ink-jet Printer
3 check is made by the printer driver to ensure that the chosen printer is available to
print (is it busy? is it off-line? is it out of ink? and so on)
4 data is sent to the printer and stored in a temporary memory known as a printer buffer
5 a sheet of paper is fed into the main body of the printer. A sensor detects whether
paper is available in the paper feed tray – if it is out of paper (or the paper is jammed),
an error message is sent back to the computer
6 as the sheet of paper is fed through the printer, the print head moves from side to side
across the paper printing the text or image. The four ink colours are sprayed in their
exact amounts to produce the desired final colour
7 at the end of each full pass of the print head, the paper is advanced very slightly to
allow the next line to be printed. This continues until the whole page has been printed
8 if there is more data in the printer buffer, then the whole process from stage 5 is
repeated until the buffer is empty
9 once the printer buffer is empty, the printer sends an interrupt to the processor in the
computer, which is a request for more data to be sent to the printer. The process
continues until the whole of the document has been printed
Sensor Description of sensor Example applications
measures temperature of the surroundings by • control of a central heating system
Temperature sending signals; these signals will change as the • control/monitor a chemical process
temperature changes • control/monitor temperature in a greenhouse
• control/monitor moisture levels in soil in a
measures water levels in, for example, soil (it is
greenhouse
Moisture based on the electrical resistance of the sample
• monitor the moisture levels in a food processing
being monitored)
factory
this is slightly different to moisture; this measures • monitor humidity levels in a building
the amount of water vapour in, for example, a sample • monitor humidity levels in a factory
Humidity of air (based on the fact that the conductivity of air manufacturing microchips
will change depending on the amount of water • monitor/control humidity levels in the air in a
present) greenhouse
• switching street lights on or off depending on
these use photoelectric cells that produce an output
light levels
Light (in the form of an electric current) depending on the
• switch on car headlights automatically when it
brightness of the light gets dark
these use an invisible beam of infrared radiation • turn on car windscreen wipers automatically
Infrared picked up by a detector; if the beam is broken, then when it detects rain on the windscreen
(active) there will be a change in the amount of infrared • security alarm system (intruder breaks the infra-
radiation reaching the detector (sensor) red beam)
these sensors measure the heat radiation given off • security alarm system (detects body heat)
Infrared
by an object, for example, the temperature of an • monitor the temperature inside an industrial
(passive)
intruder or the temperature in a fridge freezer or chiller unit
a pressure sensor is a transducer and generates
• weighing of lorries at a weighing station
Pressure different electric currents depending on the
• measure the gas pressure in a nuclear reactor
pressure applied
• pick up the noise of footsteps in a security system
these are basically microphones that convert
Acoustic/sound • detect the sound of liquids dripping at a faulty pipe
detected sound into electric signals/pulses
joint
most common ones are oxygen or carbon dioxide • monitor pollution levels in the air at an airport
sensors; they use various methods to detect the gas • monitor oxygen and carbon dioxide levels in a
Gas
being monitored and produce outputs that vary with greenhouse
the oxygen or carbon dioxide levels present • monitor oxygen levels in a car exhaust
• monitor/control acidity levels in the soil in a
these measure acidity through changes in voltages greenhouse
pH
in, for example, soil
• control acidity levels in a chemical process
these sensors measure changes in magnetic fields – • detect magnetic field changes (for example, in
Magnetic field the signal output will depend on how the magnetic mobile phones and CD players)
field changes • used in anti-lock braking systems in cars
these are sensors that measure acceleration and • used in cars to measure rapid deceleration and
motion of an application, i.e. the change in velocity apply air bags in a crash
Accelerometer
(a piezoelectric cell is used whose output varies • used by mobile phones to change between
according to the change in velocity) portrait and landscape mode
these sensors detect the presence of a nearby • detect when a face is close to a mobile phone screen
Proximity
object and switches off screen when held to the ear
these sensors measure the flow rate of a moving • used in respiratory devices and inhalers in
Flow (rate) liquid or gas and produce an output based on the hospitals
amount of liquid or gas passing over the sensor • measure gas flows in pipes (for example, natural gas)
these sensors use ultrasonics (to detect changing
• monitor levels in a petrol tank in a car
liquid levels in, for example, a tank) or capacitance/
• in a pharmaceutical process where powder levels
Level conductivity (to measure static levels (for example,
in tablet production need to be monitored
height of water in a river) – note, level sensors can
• leak detection in refrigerant (air conditioning)
also be optical or mechanical in nature
Examples of monitoring Examples of control
• monitoring a patient in a hospital for vital signs • turning street lights on at night and
such as heart rate, temperature, and so on turning them off again during daylight
• checking for intruders in a burglar alarm system • controlling the temperature in a central
• checking the temperature levels in a car engine heating/air conditioning system
• monitoring pollution levels in a river • controlling the traffic lights at a road
junction
• operating anti-lock brakes on a car
when necessary
• controlling the environment in a
greenhouse
address – a label for a memory location used by
central processing unit (CPU) – responsible for the CPU to track data
the execution or processing of all the memory location – a numbered place in memory
instructions and data in a computer where values can be stored
integrated circuit – usually a chip made from a
semi-conductor material which carries out the system buses – a connection between major
same tasks as a larger circuit made from components in a computer that can carry data,
individual components addresses or control signals
von Neumann architecture – a type of computer address bus – the system bus that carries the
architecture which introduced the concept of the addresses throughout the computer system
stored program in the 1940s data bus – the system bus that allows data to be
Arithmetic & Logic Unit (ALU) – the component of carried from CPU to memory (and vice versa) or
the CPU that carries out all arithmetic and to and from input/output devices
logical operations control bus – the system bus that carries signals
accumulator (ACC) – temporary general-purpose from control unit to all other computer
register that stores numerical values at any part components
of a given operation unidirectional – can travel in one direction only;
memory address register (MAR) – a register that used to describe data
stores the address of the memory location bidirectional – can travel in both directions; used
currently being read from or written to to describe data
current instruction register (CIR) – a register that word – a group of bits used by a computer to
stores the current instruction being decoded and represent a single unit; for example, modern
executed computers often use
memory data register (MDR) – a register that 64-bit word lengths
stores data that has just been read from memory overclocking – changing the clock speed of a
or data that is about to be written to memory system clock to a value higher than the factory/
program counter (PC) – a register that stores the recommended setting
address where the next instruction to be read core – a unit on a CPU made up of an ALU,
can be found control unit and registers; a CPU may contain a
control unit – the component of a computer’s number of cores
CPU that ensures synchronisation of data flow dual core – a CPU containing two cores
and programs throughout the computer by
sending out control signals along the control bus quad core – a CPU containing four cores
clock cycle – clock speeds are measured in Basic Input/Output System (BIOS) – a suite of
terms of GHz; this is the vibrational frequency of programs on firmware that are used to perform
the system clock which sends out pulses along the initialisation of a computer system during the
the control bus; for example, a boot-up process
3.5 GHZ clock cycle means 3.5 billion clock opcode – part of a machine code instruction that
cycles a second identifies what action the CPU has to perform
immediate access store (IAS) – memory that operand – part of a machine code instruction
holds all data and programs needed to be that identifies what data is to be used
accessed by the control unit
instruction set – the complete set of machine
backing store – a secondary storage device (such code instructions used a particular
as HDD or SSD) used to store data permanently microprocessor
even when the computer is powered down
embedded system – a combination of hardware
cache – is temporary memory using static RAM to and software designed to carry out a specific set
hold frequently used data/instructions by the CPU of functions
thereby increasing CPU performance. More
generally, cache means any area of storage used barcode – a series of dark and light lines of
to quickly access frequently-used data - other varying thickness used to represent data; the
examples include web cache, database cache, code has to be scanned using laser or LED light
DNS cache source
register – a temporary component in the CPU key field – the field that uniquely identifies a
which can be general or specific in its use; it record in
holds data or instructions as part of the Fetch– a file
Decode–Execute cycle
quick response (QR) code – a matrix of dark and resistive touch screen – a type of touch screen
light squares which represent data; the pattern that uses two conductive layers which make
can be read and interpreted using a smartphone contact where the screen has been touched
camera and QR app
actuator – an output device that converts
frame QR code – a type of QR code that includes electrical energy into mechanical movement
a space for advertising
digital micromirror device (DMD) – a chip that
DAC (digital to analogue converter) – device that uses millions of tiny mirrors on its surface to
converts digital data into electric currents that create a video display
can drive motors, actuators and relays, for
thermal bubble – inkjet printer technology
example
whereby tiny resistors create heat and form an
ADC (analogue to digital converter) – a device ink bubble which is ejected onto paper in an
that converts analogue data (for example, data inkjet printer
read from sensors) into a form understood by a
piezoelectric crystal – a crystal located in an ink
computer
reservoir within an inkjet printer; the crystal
charge couple device (CCD) – a light sensitive vibrates and forces ink out onto paper
cell made up of millions of tiny sensors acting as
direct 3D printing – a 3D printing technique in
photodiodes
which the print head moves in the x, y and z
virtual keyboard – an onscreen keyboard which directions
uses the features of the touch screen to emulate
binder 3D printing – a 3D printing method that
a physical keyboard
uses a two-stage pass; the first stage uses dry
touch screen – a screen that allows the user to powder and second stage uses a binding agent
select or manipulate a screen image using the
cathode – a negative electrode
touch of a finger or stylus; touch screens most
frequently use capacitive, infra-red or resistive snode – a positive electrode
technology
organic LED (OLED) – a light-emitting diode that
repetitive strain injury (RSI) – pain felt in the uses the movement of electrons between a
muscles, nerves and tendons caused by a cathode and an anode to produce an on-screen
repetitive action (for example, excessive clicking image; it generates its own light so no
of a mouse button over a period of time) backlighting is required
optical mouse – a pointing device that uses a red loudspeaker – an output device that converts
LED electric current into sound
to track the movement of the device and then
memory – the devices within the computer that
relays its coordinates to a computer
are directly accessible by the CPU; there are two
pointing device – an input device that allows the types of memory – RAM and ROM; memory is
user to control the movement of an onscreen different to hard disk drives, for example, which
cursor or to allow onscreen selection by clicking are known as storage devices
a button on the device
random access memory (RAM) – primary memory
complementary metal oxide semi-conductor that can be written to or read from
(CMOS) – a chip that generates an electric
read only memory (ROM) – primary memory that
current (or pulses) when light falls on its surface
cannot be written to (changed) and can only be
digital signal processor (DSP) – a processor that read
calculates, for example, the coordinates of a
dynamic RAM (DRAM) – a type of RAM chip that
pointing device based on the pulses of electricity
needs to be constantly refreshed
received
static RAM (SRAM) – a type of RAM chip that uses
optical character recognition – technology that
flip flops and doesn’t need to be constantly
can convert hard copy text or images into a
refreshed
digital format to be stored in a computer memory
volatile – describes memory that loses its
computer sided design (CAD) – software used to
contents when the power is turned off
create drawings (for example, to send to a 3D
printer or to produce blue-prints of a refresh – recharge every few seconds in order to
microprocessor design) maintain charge; for example with a device such
as a capacitor
computed tomographic (CT) scanner –
technology that can create a 3D image of a solid flip flop – electronic circuit with only two stable
object by slicing up the object into thin layers conditions
(tomography)
latency – the lag in a system; for example, the
capacitive touch screen – a type of touch screen time it takes to find a track on a hard disk,
that uses the change in the screen’s capacitance which depends on the time it takes for the disk
(the ability to store an electrical charge) when it to rotate around to its read-write head
is touched by a finger or stylus
infra-red touch screen – a type of touch screen
that uses infra-red beams and sensors to detect
where the screen has been touched
SSD endurance – the total guaranteed number of data redundancy – the unnecessary storing of the
times data can be written to or read from a solid same data on several storage devices at the same
state drive (SSD) in its usable life cycle time
optical storage – a type of storage that uses laser cloud storage – a method of data storage where
light to read and write data, and includes CDs, data is stored on offsite servers; the physical
DVDs and Blu-ray discs storage may be on hundreds of servers in many
locations
dual layering – using two recording layers in
storage media such as DVDs and some Blu-rays network interface card (NIC) – a hardware
component
virtual memory – a memory management system
(circuit board or chip) that is required to allow a
that makes use of secondary storage and
device to connect to a network, such as the
software to enable a computer to compensate for
internet
the shortage of actual physical RAM memory
router – a device that enables data packets to be
disk thrashing (HDD) – a problem in a hard disk
moved between different networks, for example,
drive
to join a LAN to a WAN
(HDD) caused by excessive swapping in and out
of data causing a high rate of head movements static IP address – an IP address that doesn’t
during virtual memory operations change
thrash point – the point at which the execution of MAC address – a unique identifier which acts as a
a program comes to a halt because the system is network address for a device; it takes the form
so busy moving data in and out of memory rather NN-NN-NN-DD-
than actually executing the program DD-DD, where NN is the manufacturer code and
DD is the device code
dynamic IP address – a temporary IP address
assigned to a device each time it logs onto a
network
Von Neumann architecture – computer architecture which introduced the concept of the
stored program in the 1940s.
Arithmetic logic unit (ALU) – component in the processor which carries out all arithmetic
and logical operations.
Control unit – ensures synchronisation of data flow and programs throughout the computer by
sending out control signals along the control bus.
System clock – produces timing signals on the control bus to ensure synchronisation takes
place.
Immediate access store (IAS) – holds all data and programs needed to be accessed by the
control unit.
Accumulator – temporary general purpose register which stores numerical values at any part
of a given operation.
Register – temporary component in the processor which can be general or specific in its use
that holds data or instructions as part of the fetch-execute cycle.
Status register – used when an instruction requires some form of arithmetic or logical
processing.
Flag – indicates the status of a bit in the status register, for example, N = 1 indicates the result
of an addition gives a negative value.
Address bus – carries the addresses throughout the computer system.
Data bus – allows data to be carried from processor to memory (and vice versa) or to and from
Control bus – carries signals from control unit to all other computer components.
Unidirectional – used to describe a bus in which bits can travel in one direction only.
Bidirectional – used to describe a bus in which bits can travel in both directions.
Word – group of bits used by a computer to represent a single unit.
Clock cycle – clock speeds are measured in terms of GHz; this is the vibrational frequency of the clock
which sends out pulses along the control bus – a 3.5 GHZ clock cycle means 3.5 billion clock cycles a
second.
Overclocking – changing the clock speed of a system clock to a value higher than the factory/
recommended setting.
BIOS – basic input/output system.
Cache memory – a high speed auxiliary memory which permits high speed data transfer and retrieval.
Core – a unit made up of ALU, control unit and registers which is part of a CPU. A CPU may contain a
number of cores.
Dual core – a CPU containing two cores.
Quad core – a CPU containing four cores.
Port – external connection to a computer which allows it to communicate with various peripheral
devices. A number of different port technologies exist.
Universal Serial Bus (USB) – a type of port connecting devices to a computer.
Asynchronous serial data transmission – serial refers to a single wire being used to transmit bits of
data one after the other. Asynchronous refers to a sender using its own clock/timer device rather sharing
the same clock/timer with the recipient device.
Fetch-execute cycle – a cycle in which instructions and data are fetched from memory and then decoded
and finally executed.
Program counter (PC) – a register used in a computer to store the address of the instruction which is
currently being executed.
Current instruction register – a register used to contain the instruction which is currently being
executed or decoded.
Register Transfer Notation (RTN) – short hand notation to show movement of data and instructions in
a processor, can be used to represent the operation of the fetch-execute cycle.
Interrupt – signal sent from a device or software to a processor requesting its attention; the
processor suspends all operations until the interrupt has been serviced.
Interrupt priority – all interrupts are given a priority so that the processor knows which need to be
serviced first and which interrupts are to be dealt with quickly.
Interrupt service routine (ISR) or interrupt handler – software which handles interrupt requests (such
as ‘printer out of paper’) and sends the request to the CPU for processing.
Register Abbreviation Function/purpose of register
current CIR stores the current instruction being decoded and executed
instruction
register
index register IX used when carrying out index addressing operations
(assembly code)
memory MAR stores the address of the memory location currently being read
address from or written to
register
memory MDR/MBR stores data which has just been read from memory or data
data/buffer which is about to be written to memory (sometimes referred
register to as MBR)
program PC stores the address where the next instruction to be read can be
counter found
Binary shifts
A shift involves moving the bits stored in a register a given number of places within the register.
Each bit within the register may be used for a different purpose. For example, in the IR each bit
identifies a different interrupt.
There are several different types of shift.
Logical shift – bits shifted out of the register are replaced with zeros. For example, an 8-bit
register containing the binary value 10101111 shifted left logically three places would become
01111000.
CMOS – complementary metal-oxide semiconductor.
Operating system – software that provides an environment in which applications can run and
provides an interface between hardware and human operators.
HCI – human–computer interface.
GUI – graphical user interface.
CLI – command line interface.
Icon – small picture or symbol used to represent, for example, an application on a screen.
WIMP – windows, icons, menu and pointing device.
Post-WIMP – interfaces that go beyond WIMP and use touch screen technology rather than a
The developer keeps hold of the source code, so it The developer relinquishes control of the
cannot be altered or extended by the end user, source code, making it more difficult to
therefore, the developer benefits as they can charge charge for upgrades and alterations. Since
for upgrades and alterations. end users can view the source code, they
could potentially use the developer’s
intellectual property.
Compiled programs take a shorter time to execute An interpreted program can take longer to
as translation has already been completed and the execute than the same program when
machine code generated may have been optimised compiled, since each line of the source
by the compiler. code needs to be translated before it is
executed every time the program is run.
Compiled programs have no syntax or semantic Interpreted programs may still contain
errors. syntax or semantic errors if any part of
the program has not been fully tested,
these errors will need to be debugged.
The source program can be translated on one type Interpreted programs cannot be interpreted
of computer then executed on another type of on one type of computer and run on another
computer. type of computer.
A compiler finds all errors in a program. One error It is easier to develop and debug a
detected can mean that the compiler finds other program using an interpreter as errors
dependent errors later on in the program that will not be can be corrected on each line and the
errors when the first error is corrected. Therefore, the program restarted from that place,
number of errors found may be more than the actual enabling the programmer to easily
number of errors. learn from any errors.
Untested programs with errors may cause the Untested programs should not be able to
computer to crash. cause the computer to crash.
The developer needs to write special routines in Partial results can be viewed during
order to view partial results during development, development, enabling the developer to
making it more difficult to assess the quality of make informed decisions about a section
particular sections of code. of code, for example whether to continue,
modify, or scrap and start again.
End users do not have access to the source code and If an interpreted program is purchased,
the run-time libraries, meaning they are unable to make end users have all the source code and
modifications and are reliant on the developer for the run-time libraries, enabling the
updates and alterations. program to be modified as required
without further purchase.
Data privacy – the privacy of personal information, or other information stored on a computer,
that should not be accessed by unauthorised parties.
Data protection laws – laws which govern how data should be kept private and secure.
Data security – methods taken to prevent unauthorised access to data and to recover data if lost
or corrupted.
User account – an agreement that allows an individual to use a computer or network server,
often requiring a user name and password.
Authentication – a way of proving somebody or something is who or what they claim to be.
Access rights (data security) – use of access levels to ensure only authorised users can gain
access to certain data.
Malware – malicious software that seeks to damage or gain unauthorised access to a computer
system.
Firewall – software or hardware that sits between a computer and external network that
monitors and filters all incoming and outgoing activities.
Anti-spyware software – software that detects and removes spyware programs installed
illegally on a user’s computer system.
Encryption – the use of encryption keys to make data meaningless without the correct
decryption key.
Biometrics – use of unique human characteristics to identify a user (such as fingerprints or
face recognition).
Hacking – illegal access to a computer system without the owner’s permission.
Malicious hacking – hacking done with the sole intent of causing harm to a computer system
or user (for example, deletion of files or use of private data to the hacker’s advantage).
Ethical hacking – hacking used to test the security and vulnerability of a computer system.
The hacking is carried out with the permission of the computer system owner, for example, to
help a company identify risks associated with malicious hacking of their computer systems.
Phishing – legitimate-looking emails designed to trick a recipient into giving their personal
data to the sender of the email.
Pharming – redirecting a user to a fake website in order to illegally obtain personal data about
the user.
DNS cache poisoning – altering IP addresses on a DNS server by a ‘pharmer’ or hacker with
the intention of redirecting a user to their fake website.
Language Advantages Disadvantages
independent of the type of computer being used programs can be larger
easier to read, write and understand programs programs can take longer
to execute
High-level quicker to write programs
programs may not be
programs are easier and quicker to debug
able make use of special
easier to maintain programs in use hardware
can make use of special hardware
it takes a longer time to
includes special machine-dependent instructions
write and debug programs
Low-level can write code that doesn’t take up much space
programs are more
in primary memory
difficult to understand
can write code that performs a task very quickly
boot up/bootstrap loader – a small program
utility programs (utilities) – part of an operating that is used to load other programs to correctly
system which carries out certain functions such ‘start-up’ a computer system
as virus checking, defragmentation and EEPROM – stands for electronically erasable
screensaver programmable ROM
malware – programs (such as viruses, worms and human computer interface (HCI) – an interface
Trojan horses) that are installed on a user’s supplied by the operating system to ‘hide’ the
computer with the aim of deleting, corrupting or complexities of the software and hardware from
manipulating the human user
data illegally
command line interface (CLI) – an interface
anti-virus software – software that quarantines which allows communication with the computer
and deletes files or programs infected by a by typing in commands using a keyboard
computer virus; the software can run in the
background or be initiated graphical user interface (GUI) – an interface that
by the user uses icons to represent apps and tasks which the
user can select/launch by clicking on a mouse or
heuristic checking – checking software for using a touch screen
behaviour that could indicate a possible virus
windows icons menu and pointing device (WIMP)
quarantine – to isolate (in order to later delete) a – an interface that uses a pointing device such as
file or program identified by anti-virus software as a mouse to select options from screen icons or a
being infected by a virus menu
defragmentation – a process that reorganises post-WIMP – a modern touch screen interface
sectors system that allows actions such as pinching and
on an HDD by rearranging blocks of data so that rotating
they are contiguous
memory management – the part of an operating
contiguous – next to each other system that controls main memory
back-up – make copies of files onto another security management – the part of an operating
storage media in case the original file becomes system that ensures the integrity, confidentiality
corrupted or is deleted and availability of data
screensaver – software that supplies a still or hardware management – the part of an
moving image on a monitor if a computer has operating system that controls all input and
been inactive for a period of time output devices; it is made up of sub-systems
device driver – software that communicates with such as printer management
the operating system and translates data into a buffer – a memory area used to store data
format understood by the device temporarily
descriptor – a collection of information about a file management – part of an operating system
device plugged into a USB port; this can be vendor that manages files in a computer (for example,
ID (VID), product ID (PID) or serial number the ability to create, delete, copy, open, close and
operating system – software that provides an rename files)
environment in which applications can run and interrupt – a signal sent from a device or
also provides an interface between computer and software
human operator to a microprocessor requesting its attention; the
microprocessor suspends all operations until the
interrupt has been serviced
multitasking – a function that allows a computer low-level language (LLL) – a programming
to process more than one task/process at a time language that is dependent on computer
hardware, both machine code and assembly
administrator – a person responsible for the
language are LLLs
upkeep and maintenance of a computer system
that involves assembly language – a programming language
multi-user function that is dependent on computer hardware, a
program written in an assembly language
user account – an agreement that allows an
program needs to be translated into machine
individual to use a computer; the user needs a
code before it is executed
user name and password to enter the user’s area
assembler – a computer program that translates
error handling routine – a routine in a program
programming code written in assembly language
or operating system that recognises and recovers
into machine code
a system from abnormal inputs or hardware
faults (for example, recovery from an attempt to compiler – a computer program that translates a
divide by zero) source program written in a high-level language
to machine code
firmware – a program that provides low level
control for devices translator – converts a program written in a
high-level language program into machine code
interrupt priority – the priority assigned to an
interrupt are given a priority so that the interpreter – a computer program that analyses
microprocessor knows which one needs to be and executes a program written in a high-level
serviced first and which interrupts are to be dealt language line by line
with quickly
Integrated Development Environment (IDE) – a
service (an interrupt) – when an interrupt is suite of programs used to write and test a
received, some action needs to be taken by the computer program written in a high-level
processor depending on what caused the language
interrupt; until this is resolved (that is, it is
debugging – finding errors in a computer
serviced), the interrupt cannot be removed to
program by running or tracing the program
allow the processor to continue
prettyprinting – displaying source code using
interrupt service routine (ISR) – software that
different colours and formatting, which make the
handles interrupt requests (for example, when
code easier to read and understand
the printer out of paper) and sends a request to
the CPU for processing report window – a separate window in the
runtime environment of an IDE that shows the
machine code – a binary programming language,
contents of variables during the execution of a
a program written in machine code can be loaded
program
and executed without translation
high-level language (HLL) – a programming
language that is independent of computer
hardware, a program written in a HLL needs to be
translated into machine code before it is
executed.
Internet World Wide Web (WWW)
• it is a collection of multimedia web pages
• users can send and receive emails
and other information on websites
• allows online chatting (via text, audio and • http(s) protocols are written using
video) hypertext mark-up language (HTML)
• makes use of transmission protocols • uniform resource locators (URLs) are
(TCP) and internet protocols (IP) used to specify the location of web pages
• web resources are accessed by web
• it is a worldwide collection of browsers
interconnected networks and devices • uses the internet to access information
from web servers
Viruses – programs (or program code) that can replicate/copy themselves with the intention
of deleting or corrupting files, or causing the computer to malfunction. They need an active
host program on the target computer or an operating system that has already been infected
before they can run
Worms – these are types of standalone viruses that can replicate themselves with the intention
of spreading to other computers; they often networks to search out computers with weak
security that are prone to such attacks
Trojan horses – these are malicious programs often disguised as legitimate software; they
replace all or part of the legitimate software with the intent of carrying out some harm to the
user’s computer system
Spyware – software that gathers information by monitoring, for example, all the activity on a
user’s computer; the gathered information is then sent back to the person who sent the
software (sometimes spyware monitors key presses and is then referred to as key logging
software)
Adware – software that floods a user’s computer with unwanted advertising; usually in the
form of pop-ups but can frequently appear in the browser address window redirecting the
browser to a fake website which contains the promotional adverts
Ransomware – programs that encrypt the data on a user’s computer; a decryption key is
sent back to the user once they pay a sum of money (a ransom); they are often sent via a
Trojan horse or by social engineering
persistent cookies – a cookie that is stored on the
internet – the world-wide interconnection of user’s hard drive and only deleted when the expiry
networks; the internet makes use of TCP and IP date is reached or the cookie is deleted by the
protocols user
World Wide Web – a massive collection of web virtual shopping basket – an area of memory in a
pages and is based on hypertext transfer website where items a user wishes to purchase
protocols (http and https) are temporarily stored; items remain in the
basket until payment is made or the session has
(web) browser – software that connects to a
ended
domain name server (DNS) to locate IP
addresses; a browser interprets HTML web pages digital currency – currency (a system of money)
sent to a user’s computer so that the user can that exists in electronic form only; it has no
read documents and watch multimedia physical form and is essentially data on a
database
hypertext mark-up language (HTML) – the
language used to design, display and format web cryptocurrency – a form of digital currency that
pages, and to write http(s) protocols uses a chain of decentralised computers to
control and monitor transactions
uniform resource locator (URL) – a text-based
address for a web page cryptography – the protection of data/information
by use of coding; it usually involves encryption and
hypertext transfer protocol secure (https) – http
decryption
with extra security (such as SSL) applied
blockchain – a decentralised database where all
hyperlink – highlighted text or an image that is
transactions are stored; it consists of a number of
activated by clicking and links to further text,
interconnected computers but not a central server
images, a web page or a website
timestamp – a digital record of the date and time
domain name server (DNS) – a server that looks
that a data block is created in blockchain
up domain names for websites (for example,
networks
www.hoddereducation. com) in order to find the IP
addresses that a computer needs to locate the proof-of-work – the algorithm used in blockchain
web servers (for example, 107.162.140.19) networks to confirm a transaction and to produce
new blocks to add to the chain; special users
cookie – a text file sent from a website to a user’s
called miners complete and monitor transactions
browser; it is used to remember user
on the network for a reward
preferences each time they visit the website
brute force attack – a ‘trial and error’ method
user preferences – settings or options stored in
used by cybercriminals to crack passwords by
cookies that can remember customised web
finding all possible combinations of letters,
pages or indicate browsing history to target
numbers and symbols until the password is found
adverts
word list – a text file containing a collection of
session cookie – a cookie that is stored
words used in a brute force attack
temporarily on a computer; it is deleted when the
browser is closed or the website session ends data interception – an attempt to eavesdrop on a
wired or wireless network transmission;
cybercriminal often use
packet sniffing or access point mapping / wardriving to spear phishing – similar to phishing but targeting specific
intercept data people or organisations rather than carrying out a blanket
attack
packet sniffing – a method used by a cybercriminal to
examine data packets being sent over a network and to find pharming – redirecting a user to a fake website in order to
the contents of a data packet, which are sent back to the illegally obtain personal data about the user without their
cybercriminal knowledge; unlike phishing, pharming is initiated without
needing any action by the user
wardriving – using a laptop, antenna, GPS device and
software to intercept Wi-Fi signals and illegally obtain data; DNS cache poisoning – altering IP addresses on a domain
sometimes called Access Point Mapping name server (DNS) with the intention of redirecting a user’s
browser to a fake website; carried out by a pharmer (see
wired equivalency privacy (WEP) encryption protocol
pharming) or hacker (see hacking)
security – an algorithm for wireless networks to protect
them against data interception social engineering – manipulating people into breaking
normal security procedures (such as giving away their
denial of service (DoS) attack – a cyberattack in which
password) in order to gain illegal access to computer
cybercriminals seek to disrupt the normal operation of a
systems or to place malware on their computer
website by flooding it with requests; also used to clog up a
user’s mailbox by sending out thousands of spam emails access levels – different levels of access in a computer
system allowing a hierarchy of access levels depending on
distributed denial of service (DDoS) attack – a denial of
user’s level of security
service (DoS) attack in which the fake requests come from
many different computers, which makes it harder to stop anti-spyware – software that detects and removes spyware
programs installed on a system; the software is based on
spam – unsolicited emails sent to a user’s mailbox
typical spyware rules or known file structures
hacking – the act of gaining illegal access to a computer
authentication – the process of proving a user’s identity by
system without the owner’s permission
using something they know, something they have or
malware – programs (such as viruses, worms and Trojan something unique to them
horses) installed on a user’s computer with the aim of
biometrics – type of authentication that uses a unique
deleting, corrupting or manipulating data illegally
human characteristic, such as fingerprints, voice or retina
virus – a program or program code that replicates itself with blood vessel pattern
the intention of deleting or corrupting files or by causing the
two-step verification – a type of authentication that requires
computer system to malfunction
two methods of verification to prove the identity of a user
active host – functioning software that a virus can affect by
patch – an update for software that is developed to improve
attaching itself to the code or by altering the code to allow
the software and/or to remove any bugs
the virus to carry out its attack
typo squatting – the use by cybercriminals of subtle spelling
worm – a stand-alone type of malware that can self-
errors in website addresses used to trick users into visiting
replicate; unlike viruses, worms don’t need an active host;
their fake websites
they can spread throughout a network without the need for
any action by an end-user firewall – software or hardware that sits between a
computer and an external network (for example, the
Trojan horse – a type of malware that is designed to look like
internet); the firewall monitors and filters all incoming and
legitimate software but contains malicious code that can
outgoing traffic
cause damage to a computer system
proxy server – a server that acts as an intermediary server
spyware – a type of malware that gathers information by
through which internet requests are processed; it often
monitoring a user’s activities on a computer and sends the
makes use of cache memory to speed up web page access
gathered information back to the cybercriminal who sent out
the spyware privacy settings – controls available on social networking
and other websites which allow users to limit who can access
adware – a type of malware that attempts to flood the end-
their profile or what they are allowed to see
user with unwanted advertising
secure sockets layer (SSL) – a security protocol used when
ransomware – a type of malware that encrypts data on
sending data over a network (such as the internet)
a user’s computer and ‘holds the data hostage’ until a
ransom is paid SSL certificate – a form of digital certificate which is used to
authenticate a website; providing the SSL certificate can be
phishing – sending out legitimate-looking emails designed to
authenticated, any communication or data exchange between
trick the recipients into giving their personal details to the
browser and website is secure
sender of the email
▼ Advantages and disadvantages of using robots
Advantages Disadvantages
robots are capable of working in conditions that may be hazardous robots can find it difficult to do ‘non-standard’ tasks
to humans (for example, windscreen being fitted to a car is
cracked)
robots work 24/7 without the need to stop
robots are less expensive in the long run (since there will be fewer robots can lead to higher unemployment amongst
salaries to pay) manual labour tasks
robots are more productive than humans (higher productivity) there is a risk of deskilling when robots take over
certain tasks (for example, welding and paint spraying)
although not necessarily more accurate, robots are more consistent
robots are better suited to boring, repetitive tasks than humans factories can now be moved to anywhere in the world
(therefore less likely to make mistakes) where operation costs are lower (leading again to
unemployment in some countries)
there will be less cost in heating and lighting (robots don’t need robots are expensive to buy and set up in the first place
good light or warmth)
» a packet header
» the payload
» a trailer.
Red (+ 5 V)
White (Data +)
Green (Data −)
Shield – no connection
at USB device
Black (Ground)
▲ USB CABLE
▲ SYMMETRIC ENCRYPTION
Address bus Data bus
Memory address
register (MAR)
System
clock
Control
bus Current instruction
CONTROL UNIT (CU)
register (CIR)
Ports
Control bus
Address bus
Data bus
System bus
Aerial input
HDMI output
Set-top box
Cable input Front end Interface
controller
Analogue
Satellite input audio output
SSD Front
panel Remote signal
Manual input
Temperature
Acoustic
Keypad
interface
ADC 0111001111010111
digitial representation
image lens of image
sound waves
output from
permanent the microphone
magnet
diaphragm
image
projected
on to
screen
light
mirror source
red
lens
component
LCD screens
image
dichromic
projected
mirrors
on to screen prism
green
component
blue
component
mirror
▲ LCD projector
plastic or
paper cone
coil of wire
wrapped
sound waves
around an
produced
iron core
HDD/
SSD
▲ Status with program 0 now mapped to HDD and program 4 has access to RAM
SOFTWARE
SYSTEM APPLICATION
SOFTWARE SOFTWARE
▲ Software types
How blockchain works
Whenever a new transaction takes place, a new block is created:
Data – for example, name of sender and recipient,
amount of money, and so on
A new hash value is created each time a new block is created. This hash value is
unique to each block and includes a timestamp, which identifies when an event
actually takes place. We will now consider what happens when a chain of blocks
is created. Figure 5.9 shows part of a typical blockchain:
1 2 3 4 5
The user’s browser sends The browser then The web server responds
a message so that it can requests that the web by sending a copy of its
connect with the required server identifies itself SSL certificate to the
website which is secured user’s browser
by SSL
Valves
Automatic
shut-down Actuators Gas pumps
Valves
wireless
transmitter
wireless
supervisor internet controller
receiver
wireless
transmitter
wireless
transmitter
actuators
water pumps
Security
lights
Light
sensor
Array of LED lights
Interface
Micro- around the garden
processor
(controller)
Infrared
sensor Actuators
Fountain display +
Solar panels Power supply unit
fountain lights
explanation
system
user interface
rules base
inference
engine
knowledge
base
• Many ISPs can filter out these phishing emails, but users
should always be aware of the risk and exercise caution when
opening emails.
Users affected by Pharming is where malicious code software is installed on the hard
pharming are oblivious drive of the user's computer or on the actual web server. This code
will re-direct users to bogus (fake) websites without the user's
to what is happening consent or knowledge. Unlike phishing, which requires the user to
until it is perhaps too open an email, in pharming there is no need for the user to
late. consciously take any action.