IGCSE Computer Science Notes
IGCSE Computer Science Notes
Science Notes
001
�
Chapter 1: Data
Representation
Computers store data as binary as they use switches and logic gates,
there are only 2 states (e.g. on/off, 0/1) Data processed using logic
gates, stored in registers
NUMBER SYSTEMS
Binary System
• Base of 2
• ASCII/Unicode
• Part of image
• Sound
• Instruction
002
�
Converting denary (base 10)
to binary (base 2)
Converting 30 to binary
Step 1: Write down the binary placeholders.
32 16 8 4 2 1
Step 2: Find the largest placeholder that is less than or equal to the
denary number. Write a 1 underneath this placeholder.
32 16 8 4 2 1
30-16 = 14
Step 4: Repeat this process with the result until you’re left with 0
32 16 8 4 2 1
1 1
14-8 = 6
32 16 8 4 2 1
1 1 1
003
6-4 = 2
32 16 8 4 2 1
1 0 0 1 0 1
• 32
• 4
• 1
32+4+1 = 37
1 1 1 1
2-2 = 0
004
Step 5: Fill in the remaining placeholders with 0s
32 16 8 4 2 1
0 1 1 1 1 0
005
Denary
• Base of 10
• Values 0 to 9
Hexadecimal
• Base 16
• Values 0 to 9, A, B, C, D, E, F
Benefits of hex
• Easier to read
Uses of hex
• MAC address
• URL
• Assembly language
• Error codes
• IP addresses
• Locations in memory
• Memory dumps
006
�
Calculations:
• Addition of binary numbers
◦ Overflow error: value generated is larger than can be stored in
the register, register has a predetermined number of bits and
there are too many bits for it
• Logical shifts
◦ To left = double
◦ To right = halve
• Complement of two
◦ Left-most digit = negative
• Unicode
◦ Universal standard covering all languages (incl. Emoji)
◦ Reserve part of code for private use, enable user to assign codes
for own characters/symbols (e.g. Chinese, Japanese...)
007
�
Sound storage
• Sound wave sampled for sound to be converted to binary, then
processed by computer
• Drawbacks:
◦ Larger file size
Image storage
• Image: series of pixels converted to binary, then processed by a
computer Bitmap images: made up of pixels Vector images: store
mathematics required to draw shapes (used for simpler images)
• Metadata: set of data that give information about other data stored
with image – define width, height, colour depth, colour palette
008
�
• Increased resolution + colour depth = increased file size + quality
Drawbacks: increased file size, transmission time
DATA MEASUREMENTS
• 1 bit = basic unit of computing memory (binary digit), either 0 or 1
• 1 byte = 8 bits
• 1 nibble = 4 bits
009
�
File size calculations
Image size (bit) = resolution (pixel) × colour depth (bit)
Sound size (bit) = sample rate (Hz) × sample resolution (bit) × sample
length (s)
DATA COMPRESSION
Compression reduces file size
Reason:
Lossless
Reduces file size without permanent loss of data (Original uncompressed
file can be reconstructed)
010
�
Lossy
Reduces file size by permanently removing data (removes redundant data)
• Sound
◦ Reduce sampling rate + resolution
JPEG (image)
Human eyes don’t differentiate colours well Separate pixels from
brightness, separate into 8 × 8 pixel blocks, discard information
(doesn’t noticeable affect quality)
011
�
CHAPTER 2: DATA
TRANSMISSION
DATA PACKETS
Data broken down into packets for transmission
Data packet structure:
• Header:
◦ IP address of source device
• Trailer:
◦ Method to identify end of packet
Packet switching:
• Data broken down into packets
012
�
Benefits:
• No need to tie up a single communication line
Drawbacks:
• Packets can be lost, need resending
Classification of data
transmission:
Direction of transmission:
• Simplex: unidirectional e.g. microphone to computer, webcam to
computer, computer to printer
Method of transmission:
Serial Parallel
one bit at a tie, using a single multiple bits sent at the same
wire time, using multiple wires
013
�
Serial Parallel
014
�
Drawbacks:
• Standard USB max. 5m, need USB hub to extend further
• Software failure
• Power failure/surge
• Fire
• Flood
• Natural disaster
Prevention
• Use verification methods before deleting files
• Access rights
• Back data up
Parity checks
• A parity bit is transmitted with each byte of data
Including the parity bit, the number of 1s is even in the data, so the
data is correct
Even parity
Checksum
• Before transmission, checksum value of data is calculated from the
block of data (using agreed algorithm)
016
�
• Value is recalculated after transmission and compared with sent
value
CRC
Echo check
• Copy of data is sent back to sender
Check digit
A validation method to identify errors in data entry (caused my
mistyping/mis-scanning) e.g. international standard book numbers (ISBN)
ISBN-13, modulo-11, barcodes...
017
�
• Once the receiving device knows the packet is error free it sends an
acknowledgement back to the sending device …
◦ … and the next packet is sent
ENCRYPTION
To prevent data being intercepted by an unauthorised party
(confidentiality, integrity, authentication, privacy, compliance with
law)
Hackers may do it to:
• Financial gain
• Challenge/protest
Data is altered into a form that is unreadable for anyone for whom data
is not intended (doesn’t prevent interception, but makes it senseless
for eavesdroppers)
018
�
Symmetric encryption
• Same encryption key used to encrypt and decrypt message
Issues:
• Encryption key is same for both sender and recipient, hard to keep
secure
Asymmetric encryption
• Uses both public and private keys to ensure data is secure
◦ Public key: type of encryption key known to all users
• Process:
◦ A uses public key to encrypt their message
019
�
CHAPTER 3: HARDWARE
Microprocessor:
type of integrated circuit on a single chip
Integrated circuit:
usually chip made from a semi-conductor material, carries out the same
tasks as a larger circuit made from individual components
CPU components:
• Control unit
◦ Reads instructions from memory
020
�
• System clock
◦ Produce timing signals on control bus
• Registers
◦ High speed areas of memory within CPU
◦ Memory data register (MDR): stores data that has been read/is
being written into
• System buses
◦ Transfer data + control signal between components
Fetch-decode-execute cycle
(FDE cycle)
• PC contains address of next instruction to fetch
• Instruction of memory location (in MAR) copied and placed into MDR
Clock
• System clock defines clock cycle
◦ Synchronise all computer operations
Bus width
• Increased bus width = increased processing speed of CPU
◦ 16 bits = 2^16 memory locations
Caches
Store frequently used instructions and data
Cores
• Each core is an independently operating unit (with CU and ALU)
022
�
• More cores = better CPU performance
◦ Dual-core = 2 cores; quad-core = 4 cores
Instruction set
• Instructions: set of operation that need to be decoded in sequence
◦ Each operation made up of:
▪ Opcode: identifies what operation needs to be done
Embedded systems
Combination of hardware + software used to perform a dedicated functionc
• Microcontroller
• Microprocessor
◦ Integrated circuit only w/ CPU
• System on chip
◦ May contain microcontroller as part
Drawbacks:
• Difficult to upgrade to take advantage of new tech
Examples of usage:
• Domestic appliances
◦ Selection via keypads
• Cars
◦ In-car entertainment
◦ Airbags
◦ Exhaust emissions
024
�
◦ Vehicle security
◦ Traction control
• Security systems
◦ Security code set in RAM
• Lighting systems
◦ Using sensors and actuators
• Vending machines
• Set-top box
◦ Recording and playback of television programmes
Primary memory
Directly accessed by CPU
RAM
• Random access memory
◦ Aka immediate access store (IAS)
• Volatile memory
025
�
• Increased size = increased computer operational speed
◦ As CPU doesn’t have to overwrite old data with new data
2 types of RAM
Dynamic RAM (DRAM)
• Consists of number of capacitor (holds bits of info) and transistor
(allow chip control circuitry to read/change capacitor value)
ROM
• Read only memory
• Non-volatile
• Read only
026
�
Secondary storage (off-line
storage)
• Not directly accessed by CPU
• Non-volatile
Magnetic storage
• Uses platters
◦ Divided into tracks and sectors
◦ Platter is spun
027
�
• After lots of use, data fragmentation
◦ when a file is stored in non-contiguous sectors on a hard drive,
causing it to take longer to open and decrease overall
performance
Solid-state storage
• Control movement of electrons within NAND or NOR gates
◦ Using transistors
◦ A control gate
Benefits Drawbacks
Runs cooler
028
�
Benefits Drawbacks
Thinner
Optical storage
• Laser shone at disk
Disk type
Blu-ray Blu-ray
DVD (dual
Disk type CD (single (double
layer)
layer) layer)
Laser
wavelength 780 650 405 405
(nm)
Track pitch
(d b/w 1.60 0.74 0.30 0.30
tracks) (µm)
029
�
Blu-ray Blu-ray
DVD (dual
Disk type CD (single (double
layer)
layer) layer)
Shorter
wavelength =
Better Faster data
Other better
capacity than transfer rate
details storage
CD than DVD
capacity than
DVD
Built-in encryption
Virtual memory
• Memory management system making use of secondary storage and
software to enable computer to compensate for shortage of actual
physical RAM
• Pages of data transferred between RAM and virtual memory when needed
Benefits
• Can execute programs larger than physical RAM
Drawbacks
• Disk thrashing: problem in HDD caused by excessive swapping in and
out of data – high rate of head movements during virtual memory
operations
◦ Reach thrash point: execution of program halts as system is too
busy moving data in and out of memory and not executing program
030
�
Cloud storage
Collection of servers that store data
In remote location
3 types:
• Public cloud: client and provider are different companies
Data redundancy: same data stored on more than one server in case of
maintenance
Benefits:
• Accessible anytime anywhere with internet connection
Drawbacks:
• Less secure
• Ongoing costs
031
�
Network hardware
Network interface card (NIC): hardware component (circuit board/chip)
required to allow device connection to a network (e.g. internet)
• Hexadecimal
• Assigned by manufacturer
• Static
2 types:
• Universally administered MAC address (UAA) - set at manufacturing
stage
Can be:
• Static
◦ Permanent
• Dynamic
◦ Change every time device connects to network
◦ More privacy
◦ Sometimes an issue
Can be:
• IPv4
◦ 32-bit address (A.B.C.D)
◦ e.g. 215.180.1.80
• IPv6
◦ 128-bit address
◦ e.g. A8FB:7A88:FFF0:0FFF:3D21:2085:66FB:F0FA
Routers
• Sends data to a specific destination on a network
◦ Convert data from network A to another format that B understands
033
�
◦ Inspects packets sent to it from another network/device
Input devices
Barcode readers
• Barcodes: series of dark/light lines of varying thickness
representing data digitally (0-9 or binary e.g. 1010110)
034
�
Advantages to business Advantages to customer
• Better track of
• Better, up-to-date sales information
expiration = fresher food
• Process:
◦ Camera pointed at QR code
Disadvantage compared to
Advantage compared to barcodes
barcodes
• Fewer errors
• Can encrypt
035
�
Disadvantage compared to
Advantage compared to barcodes
barcodes
Digital camera
• Microprocessors automatically control functions e.g. shutter speed,
focus, aperture size, flash, “red eye” removal, etc.
• Converted to pixels
◦ Form electronic matrix of image
• Stored in memory
Keyboards
• Can be:
◦ Virtual
◦ Physical
Optical mouse
• Move cursor, example of pointing device
037
�
• Cheaper
Scanners
2D
• Scan documents
3D
• Scan 3D images
• X, y, z coordinates
◦ Types:
▪ CT scanners – X-rays
038
�
▪ SPECT (single photon emission computer tomography) - gamma
rays
Touchscreens
Type Description
2 types
• Surface capacitive:
◦ Sensors at screen corner (small voltage applied create electric
field)
• Projective capacitive:
◦ Conductive layer = X-Y matrix pattern, forms 3D electrostatic
field
◦ Allow multitouch
◦ Durable
◦ Scratch resistant
039
�
Infrared
• Glass screen with array of sensors + IFR transmitters
• Durable
• Sensitive to water/moisture
Resistive
• Two layers of electrically resistive material with voltage applied
across them
• Creates circuit
• Cheap to buy
• Poor visibility
• Lower resolution
• Prone to scratches
040
�
This section of the course has been simplified for exams taking place
from 2023 onwards. In the past students needed to know how each device
physically worked. You now only need to know:
• When it is used
INPUT DEVICES
QR scanner
• Can represent over 7000 digits
whereas barcode can only
represent up to 30
•
Often link to a website where more info can be found
•
Also used to advertise products, share contact details, provide
promotional codes, train tickets and event tickets
Barcode scanner
How it can be used in a shop:
Digital Camera
A digital camera works by capturing light and converting it into a
digital image Light enters the camera through the lens, it reaches an
image sensor where it is split into millions of pixels (small squares).
Each pixel measures light intensity which is converted into binary and
represents a colour. Digital cameras are integrated into smartphones ,
used in security systems and by professional photographers to create
high quality digital images An advantage of digital cameras is they
show a preview of the image They also instantly create an image which
can then be easily duplicated and transmitted via bluetooth or WiFi
Software can be used to edit digital photos, for example applying
041
� a
filter or retouching a photo
Keyboard
When the user presses a key on a keyboard, the key pushes the switch on
the circuit board. This completes a circuit. Signals are sent to the
computer that uses the data to calculate which key was pressed. Unique
character code transmitted Connected by USB or wirelessly to computers
and are built into laptops
Optical Mouse
An optical mouse shines a red light from a Light-Emitting Diode//LED
underneath the mouse. The light reflects back from a surface through a
lens in the mouse and is converted to a value. This value is
transmitted to the computer. The computer then determines the direction
and speed of the movement
• Simple to use
042
�
Microphone
Converts sound waves into electrical signals that can be processed byc
computer
Can capture andy real world sound and convert it into digital datacwhich
can be stored, duplicated or modified
Touch Screens
Resistive
Advantages:
• Cheap to manufacture
• Waterproof
043
040
Disadvantages:
• Doesn’t normally support multitouch
• Longevity issues
• Prone to scratches
Capacitive
Made up of a protective layer, a transparent conductive layer and a
glass substrate
Advantages:
• Good visibility in sunlight
• Scale well
Disadvantages:
• Sensitive to interference from light, water, snow
044
�
Infrared
LEDs shine infrared light across a screen forming a matrix
Advantages:
• Excellent image quality
• High precision
• Durable
Disadvantages:
• Sensitive to dirt/dust
• Expensive to manufacture
2D Scanner
Used to create digital versions of documents or photographs
3D Scanner
Objects recreated digitally
045
�
Can be used to create 3D models to use w/ CAD (computer aided design)
software
OUTPUT DEVICES
Projectors
DLP
Advantages:
• Higher contrast ratios
• Smooth video
• Higher reliability
Disadvantages:
• Image suffers from “shadows” when showing a moving image
LCD
LCD projectors use three
mirror filters to separate
an image into red, green and blue wavelengths.
The three images are then combined to produce the full colour image
which is passed through the lens on to the wall/screen
046
�
Uses millions of micro mirrors to reflect light through a lens
Advantages:
• Gives a sharper image
• Quieter running
Disadvantages:
• Not as good contrast ratios
• Limited life
Printers
Laser
Very fast when making multiple copies of a doc
Inkjet
High quality hard copies of digital images or documents
047
�
Actuators
Used in conjunction with a motor to translate energy into real world
movement of a physical object
Input of sensor checked against stored value and if input meets the
value or range actuator is used to provide movement of a physical
object
3D Printers
Allow for precision and can be used in medicine to create prosthetics
and blood vessels
Models can be transmitted digitally and then models printed out all
across the world
Screens
LCD
Used for TVs, monitors, tablets and phones
048
�
Cheaper to produce than LED
LED
Advantages:
• Better image quality
OLED
Much thinner and lighter than LCD
Speakers
Used to take digital sounds or recordings and output them as sound
waves which can be heard by humans
049
�
Typical uses include listening to music, listening to video sound,
telephone calls and alarms
050
�
CHAPTER 4: SOFTWARE
Types of software
Application software: provides services that user requires
Features:
• Perform various applications (apps) on computer
◦ Spell checkers/thesaurus
◦ Translation
◦ Produce graphs
051
�
• Databases: organise/manipulate/analyse data, made up of table,
tables have rows (records) + column (fields)
◦ Queries on database data + produce report
◦ Camera facility
System software:
provides services that computer requires, including operating system
and utility software
052
�
Features:
• Control and manage operation of computer hardware
• Linkers: combines many object files together into single program when
run
◦ Different pieces of code = modules (decomposition)
Utilities programs
Most computer system software include:
• Anti-virus
• Defragmentation software
• Back-up software
053
�
• Security
• Screensavers
Anti-virus/anti-malware
software
• Defend against malware attacks
• Features:
◦ Check files before running/loading
Defragmentation software
(disk defragmenter)
• Organises files to be stored in contiguous sectors, reduce HDD head
movement (not used with SSD) + faster reading
Back-up software
• Allows schedule for file back-up
054
�
• For total security, 3 file versions:
◦ Current version (on internal SSD/HDD)
Security software
• Manage access control + user accounts (IDs + passwords)
Screensavers
• Supply moving and still images on monitor screen after period of
inactivity
• Not needed with LCD and OLED screens, now used as security system
◦ 5 minutes of inactivity, loading of screensaver
Device drivers
• Communicate with OS and translate data into format understood by
hardware peripheral devices
• Managing files
• Managing memory
• Managing multitasking
• Handling interrupts
• Providing an interface
Managing files
• File naming conventions
◦ (filename.extension - e.g. name.docx)
Managing memory
• Manage RAM
◦ Allow data movement between RAM and HDD/SSD
056
�
• Memory protection – two competing applications cannot use same
memory location at same time
◦ Else: data loss, incorrect application functioning, security
issues, crash
Managing multitasking
• Allow computer to carry out >1 task at a time
◦ Resources allocated to a process for specific time limit
057
�
Providing an interface
Human Computer Interface (HCI) as Command Line Interface (CLI) or
Graphical User Interface (GUI)
Users:
058
�
Providing system security
Ensure data integrity, confidentiality and availability
Running applications
• Applications are run on OS
• OS runs on firmware
059
�
Interrupts
Interrupts
• Signal sent from a device/software to the microprocessor,
temporarily stopping its task to service interrupt
• Causes:
◦ Timing signal
◦ Input/output process
◦ Hardware fault
◦ User interaction
◦ Software errors
• Purpose:
◦ Attend to certain tasks
◦ Enable multitasking
Process:
060
�
Buffer
◦ Memory area that stores data temporarily
Languages
Computer program: list of instructions that enable a computer to
perform a specific task
High-level languages
◦ Use English-like statements
◦ Is portable
Low-level languages
◦ Close to machine code
Assembly language
◦ Uses mnemonics
Advantages Disadvantages
◦ Easy to understand +
debug + maintain
◦ Quicker to write
◦ Larger programs
◦ Portable
◦ Take longer to
High-level ◦ Can use IDE
execute
languages ◦ Greater range of
◦ Cannot use special
languages
hardware
◦ Don’t need knowledge of
manipulating memory
locations
062
�
Advantages Disadvantages
◦ Directly manipulate
hardware
Translators
Utility program translating instructions into binary
Compilers:
◦ Translate high-level into machine code all at once (before
execution)
◦ If error detected:
▪ Creates error report after trying to compile
▪ Display all errors in code
063
�
Interpreters:
◦ Execute high-level program line-by-line
Assemblers:
• Translate low-level assembly program into machine code
• Stops execution
Advantages Disadvantages
064
�
Advantages Disadvantages
Integrated development
environment (IDE)
Suite of software development tools used by programmers to aid writing
+ development of programs
Features:
• Code editor
◦ Allow editing program without separate text editor
• Translator
◦ Compiler/integrator
065
�
• Error diagnostics
◦ Find errors as code is typed
• Auto-completion
◦ Context-sensitive prompts with text completion for variable
names/ reserved words
• Auto-correction
◦ Alerts to errors + provide corrections
• Auto-documenter
◦ Explain function and purpose of key words
• Prettyprinting
◦ Colour codes words and lay program out clearly
066
�
CHAPTER 5: THE INTERNET
AND ITS USES
Internet = INTERconnected NETwork
Worldwide collection of
Collection of multimedia web pages
interconnected networks and
and other information on websites
devices
067
�
Protocol://websiteaddress/path/filename
• Protocol: http/https
• Website address:
◦ Domain host: www
• Uses TLS/SSL
• Uses encryption
Web browsers
• Software that allows users to access and display web pages on their
device screens
068
�
• Identifies protocols (e.g., https, SSL ...)
• Provides functions:
◦ Stores history
◦ Stores favourites
◦ Allows homepage
◦ Check security
◦ Store cookies
◦ ...
• Web browser requests for IP address of the URL from DNS server (1)
069
�
• DNS server (1) can’t find matching IP address for the URL, sends
request to DNS server (2)
• DNS server (2) finds matching IP address, sends it to DNS server (1)
Cookies
Text file (stored by web browser) that contains data about a user’sc
browsing habits/details/preferences
Small look-up table, with pairs of values (key, data) e.g. (surname,c
Jones)
070
�
Uses:
• ...
• When user revisits website, web server requests for cookie file
2 types of cookies:
Session cookies:
• Stored in RAM
071
�
• Deleted once browser closed
• Uses:
◦ Store login details
◦ Targeted advertising
◦ Store preferences
Concerns:
• Users don’t know what information is stored
◦ Feel like privacy is affected
*non-ms
DIGITAL CURRENCY
• Currency that only exists electronically
072
�
• Money exists as data on a computer system but can be transferred
into physical cash
CRYPTOCURRENCY
• Decentralised = solution to the issues of centralised digital
currency
Blockchain
A digital ledger, a time-stamped series of records that cannot bec
altered
Decentralised database
073
�
A new block is created, consisting of:
1st block without previous block hash value is the genesis block
Any change to any block means all blocks after it will have to be
changed
• Smart contracts
• Politics
• Education
• Miners earn rewards for being the first one to solve the encryption
074
�
CYBERSECURITY
• Data interception
• DDoS
• Hacking
• Malware (6)
• Pharming
• Phishing
• Social engineering
• If not, program generates word list (text file containing words that
can be used)
Prevention:
Data interception
Stealing data by tapping into a wired/wireless communication link
Can use a packet sniffer (examines data packets sent over a network,c
sends intercepted data abck to hacker)
075
�
(Wi-Fi) can use wardriving (AKA Access Point Mapping)
can be done outside the building victim is in, using the Wi-Fi signal
Solution:
• Firewall
Process:
Prevention:
• Firewall
• Email filters
076
�
• Inability to access certain websites
Hacking
Illegal access to a computer system without the owner’s consent or
knowledge, possibly also amending/stealing/deleting data
Prevention:
• Firewalls
• Encryption of data
◦ (only makes data meaningless, but it still can be stolen)
MALWARE
Virus
Program that replicates itself, designed to amend/delete/copy data or
files on a user’s computer or fill up disk space, often causing computer
to crash/run slowly
Prevention:
077
�
Worms
Program that replicates itself on a network, without user input. It
takes up bandwidth, damage/deletes/corrupts data or files
Prevention:
Trojan horse
Program that is disguised as an authentic software, when installed, the
other malware it contains is also installed
Prevention:
• Anti-malware software
Spyware:
Software that monitors a user’s activities on their computer and
sending information back to attacker. The collected data is analysed to
obtain sensitive data.
(e.g. web browsing to capture personal data like bank account details
...)
Prevention:
• Anti-spyware software
078
�
• Don't open emails from unknown sources
Adware:
Software that displays unwanted adverts on a user’s computer
Prevention:
Ransomware
Program that stops a user accessing their computer/data by encrypting
it. The user must pay a fee to decrypt it.
• Backing up files
PHISHING
Attacker sends out legitimate-looking email in the hopes of gathering
personal and financial information from the recipient. A link is
attached taking user to fake website, containing personal data.
Prevention:
• Up-to-date browser
PHARMING
Malicious code installed on a user's computer or on a web server, it
redirects user to a fake website without the user’s knowledge, to
obtain personal data
Done using DNS cache poisoning (changes IP address of the real website
address to the fake one)
Prevention:
• sourcescAnti-virus software
SOCIAL ENGINEERING
Attacker creates social situation leading to victim dropping their
guard, manipulating people into breaking their normal security
procedures
Types:
080
�
• Baiting – leave infected memory stick somewhere for victim to find and
open (thus unknowingly downloading malware)
• Curiosity
Typical stages:
1. Victim identified (gathering info + decide method)
3. Attack executed
Access levels
Having different levels of access to data for different people,
depending on the user’s level of security
• Public access
081
�
• Friends
• Custom
• Data owner
ANTI-MALWARE
Anti-virus (CH4)
Anti-spyware:
Software that detects and removes spyware programs that are installed
illegally on a user’s computer system, preventing data from being
relayed to a third-party
Features of an anti-spyware:
• Detect + remove installed spyware
• Encrypt keyboard
• Scan for signs that user’s personal info was stolen and warns user
AUTHENTICATION
Ability of a user to prove who they are
082
�
3 common factors used:
Passwords + usernames
Ways to ensure password is protected:
◦ 1 capital letter
◦ 1 numerical value
◦ 1 symbol
BIOMETRICS
Relies on unique characteristics of human beings (biological data)
Examples:
• Fingerprint scans
• Retina scans
• Face recognition
• Voice recognition
Fingerprint scans
• Image of fingerprints compared to previously scanned fingerprints
stored in database
083
�
• Compare pattern of ridges and valleys
Retina scans
• Use infrared light to scan unique pattern of blood vessels in retina
• Easy to use
• One of the most
• Some people regard it as very
developed
intrusive and infringement of
biometric
civil liberties (related to
Fingerprint techniques
criminal identification)
scans • Smaller storage
• Mistakes if skin is dirty/
requirement for
damaged
data
• Expensive to install
• Unique
• Cannot be lost
• High accuracy
• Very intrusive
• Unique
Retina scans • Slow and unpleasant process
• Impossible to
• Expensive to install
replicate
• Non-intrusive
Face • Affected by changes in
• Inexpensive
recognition environment and accessories
• Fast
TWO-STEP VERIFICATION
Extra data sent to (other) device, making it difficult for hacker toc
obtain data, has to be entered into the same system (two methods ofc
verification)
084
�
AUTOMATIC SOFTWARE UPDATES
Software on devices kept up to date, contains patches to update
software security/performance
• Mismatched link
FIREWALLS
Hardware/software that sits between user’s computer and external
network.
Tasks:
• Monitors traffic to/from a user’s computer and network
085
�
• Can help prevent viruses/hackers gaining access
• Employee misconduct/carelessness
PROXY SERVERS
Hardware/software that act as intermediate between user and web server
Features:
• Prevent direct access to web server
• Filters traffic
PRIVACY SETTINGS
Limit who can access and see a user’s personal profile
Different examples:
• App permissions
Examples of usage:
• Online banking
• Online shopping
• Send/receiving emails
087
�
• Intranets/extranets
• Instant messaging
TLS
2 layers: handshake, record
HTML:
HTML structure and presentation
for a web page:
Structure and presentation are defined using (mark-up) tags
Example of structure
Example of formatting
088
�
CHAPTER 6: AUTOMATED
AND EMERGING
TECHNOLOGIES
Automated system: combination of hardware and software designed and
programmed to work automatically without human intervention
Advantages:
• Faster than human intervention
Disadvantages:
• Expensive to set up
• Fear of cyberattacks
089
�
Examples
Industrial
Nuclear power station
Paracetamol manufacture
• Same as nuclear
Transport
Adaptive cruise control
Self-parking cars
Weather
Weather stations
Gaming
Gaming and simulations
Lighting
Lighting systems
Robotics
Branch of CS that incorporates the design, construction, operation of
robots
091
�
Examples:
• Factory equipment:
◦ Welding
◦ Spray painting
◦ Warehouse logistics
• Domestic robots:
◦ Autonomous floor sweepers
◦ Lawn mowers
◦ Window cleaning
◦ Home entertainment
• Drones:
◦ Reconnaissance (e.g. aerial photography)
◦ Parcel delivery
• Mechanical structure/framework
◦ Motors, hydraulic pipes, actuators, circuit boards
• Electrical components
◦ e.g. sensors, microprocessors, actuators (end-effectors)
• Programmable
◦ e.g. controller
• Independent robots
◦ Autonomous
Advantages:
• Can work in hazardous conditions
• Consistent results
Disadvantages:
• Deskilling of humans
• Expensive to set up
Roles
• Industry
◦ Welding + painting
• Transport
◦ Autonomous vehicles
• Agriculture
◦ Harvesting, weed control, phenotyping, seed planting, fertiliser
spraying, automatic fruit picking
093
�
• Medicine
◦ Surgical procedures, monitoring patients, disinfecting, taking
blood samples, prosthetic limbs
• Domestic robots
◦ Autonomous vacuum cleaners, autonomous grass cutters, personal
assistants
• Entertainment
◦ Theme parks, film industry
3 categories of AI:
Characteristics:
• Collects data
• Ability to reason
◦ Reasoning: ability to draw reasoned conclusions based on given
data
094
�
◦ By being trained
• Analyse patterns
2 types of AI:
• Expert system
• Machine learning
Expert system
AI developed to mimic human knowledge and experience using knowledge
and inference to solve problems analyses responses to a series of
questions
Application examples:
• Logistics
Advantages:
• High level of expertise, very accurate
• Consistent results
• Unbiased reporting
Disadvantages:
• Expensive + maintenance expensive and time-consuming
096
�
2. Rule base created
◦ Made up of series of inference rules for inference engine to draw
conclusions
Machine learning
• When program can automatically adapt its own processes and/or data
◦ Based on previous experiences (analyses successful/unsuccessful
results)
◦ Can adapt
◦ Can be trained
Examples:
• Search engines
◦ Web crawlers to train algorithm to list all “hits” on first page
• Collaborative filtering
◦ Recognising user’s purchase history
097
�
◦ Compare new customer to other customers with similar shopping
habits
098
�