0% found this document useful (0 votes)
4 views15 pages

CAIE IGCSE Computer Science Theory

The document provides a comprehensive overview of binary, denary, hexadecimal, and ASCII systems, detailing their conversions and applications. It also discusses sound and image processing, data transmission methods, error detection techniques, and encryption types. Additionally, it covers computer architecture components, including the CPU and its buses, as well as the function of various registers.

Uploaded by

Blue Berry
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views15 pages

CAIE IGCSE Computer Science Theory

The document provides a comprehensive overview of binary, denary, hexadecimal, and ASCII systems, detailing their conversions and applications. It also discusses sound and image processing, data transmission methods, error detection techniques, and encryption types. Additionally, it covers computer architecture components, including the CPU and its buses, as well as the function of various registers.

Uploaded by

Blue Berry
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 15

What is the base of the Binary System and what values does it represent?

; The
Binary System is a **Base 2** number system that has two possible values: **0**
(OFF) and **1** (ON).
What does the Most Significant Bit (MSB) refer to in a binary number?; The **Most
Significant Bit (MSB)** refers to the leftmost bit in a binary number, which holds
the highest value in the number's representation.
How do you convert a binary number to denary?; To convert a binary number to
denary, place the binary value in columns of **2 raised to the power** of the
number of values from the right starting from 0, then add the values corresponding
to the bits that are **1**.
What is the process for converting denary to binary?; To convert denary to binary,
successively divide the value by **2**, recording the remainders. Read the
remainders from bottom to top to get the binary value.
How do you convert hexadecimal to binary?; To convert hexadecimal to binary,
separate each hexadecimal digit, convert each to denary, then convert each denary
value to binary, and finally merge all binary values together.
What is the method for converting binary to hexadecimal?; To convert binary to
hexadecimal, divide the binary value into groups of **4** starting from the right,
convert each group to its denary value, and then to its corresponding hexadecimal
value, combining them for the final answer.
What is the process to convert a binary value to denary?; 1. Group the binary value
into sets of four bits.
2. Convert each group to denary.
3. Combine the denary values to get the final result.
What is the hexadecimal equivalent of the denary value 21FD?; The hexadecimal
equivalent of the denary value 21FD is 21FD itself, as it is already in hexadecimal
format.
What are the rules for adding binary values?; - 0 + 0 = 0
- 1 + 0 / 0 + 1 = 1
- 1 + 1 = 0 (1 carry)
- 1 + 1 + 1 = 1 (1 carry)
What is overflow in binary addition?; Overflow occurs when the result of a binary
addition exceeds the number of bits allocated for the values, resulting in a carry
that cannot be represented within the given bit limit.
How do you perform a logical shift on a binary number?; 1. Move all bits in the
binary number to the left or right by the specified number of places.
2. Fill the emptied bit positions with 0.
What is two's complement and how is it used?; Two's complement is a method for
representing negative binary values. It allows for the representation of values
from -128 to 127 in an 8-bit binary format by inverting the bits to the left of the
first 1 from the right and adding 1.
How do you convert a negative denary value to two's complement?; 1. Find the binary
equivalent of the absolute value of the negative number.
2. Convert this binary value to two's complement.
3. Ensure the most significant bit (MSB) is set to 1 to indicate negativity.
What is the range of values in a two's complement byte?; The range of values in a
two's complement byte is from -128 to 127.
How do you convert a two's complement binary value to denary?; 1. Identify the MSB;
if it is 1, the value is negative.
2. Convert the binary value to denary as usual, replacing 128 with -128 for the
MSB.
3. Sum the values accordingly to get the final denary result.
What are some examples of the use of the hexadecimal system?; - Defining colours in
HTML
- Media Access Control (MAC) addresses
- Assembly languages and machine code
- Memory Dumps
- Debugging
- Display error codes
- IP addresses
Why is hexadecimal preferred over binary in writing assembly code and machine
code?; Using hexadecimal makes writing code easier, faster, and less error-prone
than binary. Machine code (binary) takes a long time to key in values and is prone
to errors.
What is the standard ASCII code character set?; The standard ASCII code character
set consists of a 7-bit code that represents letters, numbers, and characters found
on a standard keyboard, along with 32 control codes.
How does the ASCII value change from lowercase to uppercase characters?; The sixth
bit changes from 1 to 0 when going from lowercase to uppercase of a character,
while the rest remains the same.
What is the purpose of Unicode?; Unicode is used to represent characters from
multiple languages, as ASCII does not contain all international languages. The
first 128 values in Unicode are the same as ASCII.
How is sound converted from analogue to digital form?; Sound is sampled at regular
time intervals where the amplitude is measured, and approximate values are stored
in digital form.
What is sampling resolution in sound recording?; Sampling resolution, also known as
bit depth, is the number of bits per sample. Increasing it increases the accuracy
of the sampled sound and the memory usage of the file.
What is the sampling rate and how does it affect sound accuracy?; The **sampling
rate** is the number of sound samples taken per second, measured in **Hertz (Hz)**.
A higher sampling rate allows for more accurate sound as it results in fewer
estimations between samples.
What are bitmap images and how are they stored in a computer?; **Bitmap images**
are made up of **pixels** and are stored in a computer as a series of **binary
numbers**.
What is colour depth and how does it affect the number of colours in a bitmap
image?; **Colour depth** refers to the number of bits representing each colour. An
**8-bit colour depth** allows each pixel to be one of **256 colours**. A **1-bit
colour depth** allows each pixel to store one colour (0 for white, 1 for black).
Increasing colour depth increases the file size when storing an image.
How does image resolution impact the detail of a photograph?; **Image resolution**
refers to the number of pixels that make up an image. Higher resolution images
contain more pixels, resulting in greater detail, while lower resolution images
have less detail and can appear **pixelated** when zoomed in.
What is a BIT and how does it relate to measuring memory size?; A **binary digit**
is referred to as a **BIT**. **8 bits** make up a **byte**, and **4 bits** make up
a **nibble**. The byte is commonly used to measure memory size.
What is the difference between the IEC and Conventional systems of measuring memory
size?; | System | Name of Memory Size | No. of Bytes | Equivalent Denary
Value |
|---------------|---------------------|--------------|-----------------------------
|
| IEC | 1 kibibyte (1KiB) | 2^10 | 1,024 bytes
|
| IEC | 1 mebibyte (1MiB) | 2^20 | 1,048,576 bytes
|
| IEC | 1 gibibyte (1GiB) | 2^30 | 1,073,741,824 bytes
|
| IEC | 1 tebibyte (1TiB) | 2^40 | 1,099,511,627,776 bytes
|
| IEC | 1 pebibyte (1PiB) | 2^50 | 1,125,899,906,842,624 bytes
|
| Conventional | 1 kilobyte (1KB) | 10^3 | 1,000 bytes
|
| Conventional | 1 megabyte (1MB) | 10^6 | 1,000,000 bytes
|
| Conventional | 1 gigabyte (1GB) | 10^9 | 1,000,000,000 bytes
|
| Conventional | 1 terabyte (1TB) | 10^12 | 1,000,000,000,000 bytes
|
| Conventional | 1 petabyte (1PB) | 10^15 | 1,000,000,000,000,000 bytes
|
How is the file size of an image calculated?; The **file size** of an image is
calculated as:

**Image Size** = **Image Resolution (in pixels)** x **Colour Depth (in bits)**.
What is MIDI and how does it function in music storage?; **MIDI** (Musical
Instrument Digital Interface) is a protocol for storing music files and allows
electronic musical instruments to interact. It is stored as a series of demands
without actual music notes and uses **8-bit serial transmission**. Each MIDI
command consists of a **status byte** that informs the device what function to
perform, operating on **16 different channels**. Examples include commands for note
on/off and key pressure.
What is the purpose of Audio Compression in converting sounds to MP3 format?; Audio
Compression reduces the normal file size by 90% using file compression algorithms
that employ Perceptual Music Shaping, which removes sounds that the human ear
cannot hear properly without significantly affecting quality.
What types of files can be stored in the MP4 format?; The MP4 format allows the
storage of multimedia files, including music, videos, photos, and animations, and
enables streaming of videos without losing discernible quality.
How does JPEG file compression reduce photographic file sizes?; JPEG reduces
photographic file sizes by lowering picture resolution, which changes the number of
pixels per centimeter, and can reduce the raw bitmap image size by a factor between
5 and 15.
What is the main characteristic of Lossless File Compression?; In Lossless File
Compression, all data bits from the original file are reconstructed when the file
is uncompressed, ensuring no data is lost, which is crucial for files where data
loss would be disastrous.
What is Run-Length Encoding (RLE) and how does it work?; Run-Length Encoding (RLE)
reduces the size of a string of adjacent, identical data by encoding a repeating
string into two values: the count of identical items and the code of the data item,
making it effective for long runs of repeated units.
What is a key disadvantage of Lossy File Compression?; A key disadvantage of Lossy
File Compression is that it eliminates unnecessary data bits, making it impossible
to recover the original file once it is compressed, and it can reduce file quality.
What are the main components of a packet structure in data transmission?; The main
components of a packet structure are:

1. **Header**: Contains the IP address of the sender and receiver, the sequence
number of the packet, and the size of the packet.
2. **Payload**: Contains the actual data being transmitted.
3. **Trailer**: Includes a method of identifying the end of the packet and error-
checking methods.
What is packet switching and how does it work?; Packet switching is a method of
data transmission where data is broken into multiple packets. These packets are
sent independently from the sender to the receiver and are reassembled at the
receiver's computer.
What are the advantages and disadvantages of packet switching?; | Advantages
| Disadvantages
|
| :-----------------------------------------------
| :--------------------------------------------------------------------------------
---- |
| There is no need to create a single line of communication | Packets may be lost
|
| Possible to overcome failed or busy nodes | More prone to errors in real-
time streaming |
| High data transmission speed | Delay at the receiver while
the packets are being re-ordered |
| Easy to expand package usage |
|
What are the three types of data transmission?; 1. **Simplex**: Data transmission
in one direction only (e.g., computer to printer).
2. **Half-duplex**: Data transmission in both directions but not at the same time
(e.g., walkie-talkie).
3. **Full-duplex**: Data transmission in both directions simultaneously (e.g.,
broadband connection on the phone line).
What is the difference between serial and parallel data transmission?; |
| Serial | Parallel
|
| :----------- | :-----------------------------------------------
| :-------------------------------------------------- |
| **Distance** | Better for longer distances (Telephone Lines) | Better for
short distances (Internal circuits) |
| **Cost** | Cheaper Option | Expensive (More
hardware required) |
| **Data Size**| Used when the size of data transmitted is small | Used when speed
is necessary |
| **Speed** | Slower Option | Faster than
Serial |
| **Synchronization** | Easier to synchronise as there's only one data stream |
Difficult to synchronise due to skew between bits. |
What are the advantages and disadvantages of USB as a data transmission method?; |
Advantages | Disadvantages
|
| :--------------------------
| :--------------------------------------------------------------------------------
------------ |
| Automatically detected | Transmission rate is less than 120 MB/sec
|
| Only fit one way, prevents incorrect connections | Maximum cable length is about
5 metres |
| Different data transmission rates |
|
| Backwards compatible |
|
| Industry-standard |
|
What are the two types of parity checks used in error detection?; The two types of
parity checks are:

1. **Even Parity**: The number of 1-bits in a byte is even.


2. **Odd Parity**: The number of 1-bits in a byte is odd.
What are the limitations of parity checks in error detection?; 1. Two bits may
change during transmission, which means the error may not be detected.
2. Even though parity checks can reveal that an error has occurred, they do not
identify which bit(s) have changed.
How do parity blocks improve upon the limitations of parity bits?; Parity blocks
improve upon the limitations of parity bits by allowing for the identification of
changes in bits through the use of rows and columns, making it easier to detect
errors in the transmitted data.
What is the purpose of a checksum in data transmission?; A **checksum** is
calculated by the sender using a specific algorithm before sending data. The
receiver recalculates the checksum with the same data and algorithm. If the values
do not match, a request is made to re-send the data.
What is the process of Echo Check in data verification?; In **Echo Check**, after
data is sent, the receiver sends the data back to the sender for verification. The
sender compares the received data with the original data to check for errors.
However, it does not indicate when the error occurred (during sending or
returning).
How do Check Digits help in error detection?; **Check digits** are calculated from
the other digits in the data (e.g., codes) and are used to identify mistyping
errors. For example, if '6372' is mistyped as '6379', the check digit can help
detect this error.
What is the function of Automatic Repeat Requests (ARQs) in data transmission?;
**Automatic Repeat Requests (ARQs)** use acknowledgements and timeouts to ensure
data is received correctly. If the receiver finds no errors, a positive
acknowledgement is sent. If errors are found, a negative acknowledgement prompts
the sender to resend the data. Timeouts are used to resend data if no
acknowledgement is received.
What is the difference between Plaintext and Ciphertext?; **Plaintext** is the
original data being sent, while **Ciphertext** is the unreadable text produced
after encryption, making it secure against unauthorized access.
What is Symmetric Encryption?; **Symmetric Encryption** uses the same encryption
key for both encrypting and decrypting data, ensuring that the same key is shared
between the sender and receiver for secure communication.
What is Asymmetric Encryption and how does it work?; **Asymmetric Encryption** uses
a pair of keys: a public key, which is available to everyone, and a private key,
which is kept secret by the user. The sender encrypts the message with the public
key, and only the receiver can decrypt it using their private key.
What are the main components of a CPU in computer architecture?; The **CPU**
consists of several components:
1. **Processor**: Contains the Arithmetic and Logic Unit (ALU).
2. **Control Unit**: Manages memory, processor, and I/O devices.
3. **Arithmetic Logic Unit (ALU)**: Performs calculations and logic operations.
4. **System Clock**: Produces timing signals for control bus operations.
What are the types of buses in computer architecture?; The types of buses in
computer architecture include:

| Bus Type | Direction |


|----------------|---------------|
| Address Bus | Unidirectional|
| Data Bus | Bi-directional|
| Control Bus | Bi-directional|
What is the function of the Current Instruction Register (CIR)?; The **Current
Instruction Register (CIR)** stores the instruction that the CPU is currently
decoding or executing.
What does the Memory Address Register (MAR) do in the CPU?; The **Memory Address
Register (MAR)** stores the address of the instruction, copies it, and sends it to
the Memory Data Register (MDR).
Explain the role of the Memory Data Register (MDR).; The **Memory Data Register
(MDR)** stores the data from the address received from the MAR and sends this data
to the Current Instruction Register (CIR).
What is the purpose of the Program Counter (PC)?; The **Program Counter (PC)**
stores the address of the next instruction to be fetched from memory.
What is the function of the Accumulator in a CPU?; The **Accumulator** temporarily
holds data during calculations.
Describe the steps involved in the Fetch-Execute Cycle.; 1. The PC contains the
address of the next instruction to be fetched.
2. This address is copied to the MAR via the address bus.
3. The instruction at the address is copied into the MDR temporarily.
4. The instruction in the MDR is then placed in the CIR.
5. The value in the PC is incremented by 1, pointing to the next instruction to be
fetched.
6. The instruction is finally decoded and executed.
What is the Stored Program Concept?; The **Stored Program Concept** states that
instructions are stored in the main memory and are fetched, decoded, and executed
by the processor. Programs can be moved to and from the main memory.
How does the system clock affect computer operations?; The **system clock** defines
the clock cycle that synchronizes all computer operations. Increasing the clock
speed can increase processing speed, but it does not necessarily improve overall
performance.
What are the potential issues of overclocking a CPU?; Overclocking can lead to:
- Unsynchronized operations, causing frequent crashes and instability.
- Serious overheating of the CPU.
How does cache memory improve CPU performance?; **Cache memory** is located within
the CPU and allows faster access to frequently used instructions and data, which
improves CPU performance. The larger the cache memory size, the better the CPU
performance.
What is the impact of having multiple cores in a CPU?; Having more cores in a CPU
generally improves performance, but if too many cores are used, it can slow down
system performance due to increased communication between cores and data cables.
What is the process by which a 2D scanner converts a hard-copy document into an
electronic form?; 1. The document is placed on a glass panel.
2. A bright light illuminates the document.
3. A scan head moves across the document to scan the entire page.
4. An image is produced and sent to a lens using mirrors.
5. The lens focuses the image onto a charge-coupled device (CCD).
6. Software produces a digital image in electronic form.
What is Optical Character Recognition (OCR) and its function in scanning
documents?; Optical Character Recognition (OCR) is software that converts scanned
documents into a text file format, allowing the text to be editable and searchable.
How do 3D scanners capture images of solid objects?; 3D scanners capture images at
several points in three dimensions (x, y, and z) using technologies such as lasers,
magnetic fields, or white light to produce a three-dimensional image.
What are the applications of 2D scanners at an airport?; 1. Use of OCR to produce
digital images of passport pages.
2. Storing text in ASCII format.
3. Scanning the 2D photograph in the passport as a JPEG image.
4. Photographing the passenger's face for comparison using face recognition
software, focusing on key facial features.
What is a barcode and how is it read?; A barcode is a series of dark and light
parallel lines of varying thicknesses representing numbers 0-9. It is read by a red
laser or LED, where light reflects off the barcode, and sensors detect the
reflected light to generate a digital pattern.
What are the advantages of QR codes compared to traditional barcodes?; 1. QR codes
can hold more information (up to 7000 digits).
2. They eliminate the need for users to write down website addresses.
3. QR codes can be easily scanned using phone cameras, making them more user-
friendly.
How does a digital camera capture a photo?; A digital camera captures a photo when
light passes through the lens onto a light-sensitive cell made up of pixels. The
number of pixels determines the size of the file.
What is the function of a keyboard in data input?; A keyboard is connected to a
computer via USB or wirelessly, where each character has an ASCII value that is
converted into a digital signal. However, it is a slow method and prone to errors.
What are the two types of pointing devices mentioned, and how do they function?; 1.
**Mouse**: A traditional mechanical device with a ball that detects movement,
connected via USB.
2. **Trackball**: A modern type that uses red LEDs to detect movement, allowing for
more precise control.
What is the function of a microphone in sound input to a computer?; A microphone
picks up sound, causing a diaphragm to vibrate and produce an electric signal,
which is then converted into digital values by a sound card and stored in the
computer.
How does a capacitive touchscreen determine the point of contact?; A capacitive
touchscreen creates electric fields between layers of glass, and when the top layer
is touched, the electric current changes. The coordinates of the touch are
determined by an on-board microprocessor.
What is the role of an Analogue-to-Digital Converter (ADC) in sensors?; An
Analogue-to-Digital Converter (ADC) converts physical values measured by sensors
into digital data for processing.
What type of sensor measures the flow of liquid or gas?; A flow sensor measures the
flow of liquid or gas.
What is the purpose of a temperature sensor?; A temperature sensor measures the
temperature of the environment.
What distinguishes an active infrared sensor from a passive infrared sensor?; An
active infrared sensor uses an invisible infrared beam that changes when disturbed,
while a passive infrared sensor detects the heat emitted by objects without
emitting any beam.
What type of sensor would you use to measure humidity in the air?; A humidity
sensor measures the water vapor in the air or any sample.
What is the purpose of a proximity sensor?; A proximity sensor detects nearby
objects around the sensor.
What is the process by which a light sensor sends data to a microprocessor?; 1. The
light sensor sends data to the ADC.
2. The data is digitised and sent to the microprocessor.
3. The microprocessor samples the data every minute.
4. If the data from the sensor is less than the value stored in memory, a signal is
sent from the microprocessor to switch on the street lamp.
What are the main steps involved in the operation of an inkjet printer?; 1. Data
from the document is sent to the printer driver.
2. The printer driver ensures the data is in the correct format and checks if the
printer is available.
3. Data is sent to the printer and stored in the printer buffer.
4. A sheet of paper is fed, and the sensor detects if paper is available.
5. The print head moves across the paper, spraying four ink colors in the exact
amount until the buffer is empty.
6. Once done, the printer sends an interrupt to the processor for more data.
How does a laser printer produce text and images?; 1. The printing drum is given a
positive charge.
2. A laser beam scans across the drum, removing the positive charge and leaving
negatively charged areas that match the text/image.
3. The drum is coated with positively charged toner, which sticks to the negatively
charged parts.
4. A negatively charged sheet is rolled over the drum, transferring the toner to
the paper.
5. The paper goes through a fuser, where heat melts the ink to make it permanent.
6. The discharge lamp removes all electric charge from the drum for the next print.
What is the purpose of actuators in control applications?; Actuators convert
electrical signals into mechanical processes and are used in various control
applications involving sensors and devices, such as ADC and DAC.
What is the function of loudspeakers in sound production?; Loudspeakers produce
sound by passing digital data through a DAC, then through an amplifier, causing
voltage differences that vibrate a cone in the speaker at different frequencies.
What materials are used in 3D printing to create solid objects?; 3D printers use
powdered resin and ceramic powder to build solid objects layer by layer, based on
designs made using Computer-aided Design (CAD).
What is the primary function of Liquid Crystal Display (LCD) in monitors?; The
primary function of Liquid Crystal Display (LCD) in monitors is to serve as the
front layer that displays images, as LCD itself does not emit any light.
What are the advantages of using Light Emitting Diode (LED) backlighting in LCD
monitors compared to Cold Cathode Fluorescent Lamp (CCFL)?; Advantages of using LED
backlighting include:

1. LEDs reach their maximum brightness immediately.


2. LEDs sharpen image resolution and eliminate the yellow tint associated with
CCFL.
3. LEDs improve color image quality.
4. Monitors using LED are much thinner than those using CCFL.
5. LEDs consume very little power.
What are the two common types of light projectors?; The two common types of light
projectors are:

1. Digital Light Projector (DLP)


2. LCD Projector
How does a Digital Light Projector (DLP) create light or dark pixels on the
projection screen?; A Digital Light Projector (DLP) creates light or dark pixels by
using millions of micromirrors:

- When the micromirrors tilt towards the light source, they are 'on', creating a
light pixel.
- When they tilt away from the light source, they are 'off', creating a dark pixel.
What is a key disadvantage of Digital Light Projectors (DLP)?; A key disadvantage
of Digital Light Projectors (DLP) is that the image tends to suffer from 'shadows'
when displaying grey components in the image.
What is a significant advantage of LCD projectors over DLP projectors?; A
significant advantage of LCD projectors is that they have better color saturation
than DLP projectors, making the colors appear more vibrant.
What is the difference between primary and secondary storage in terms of CPU
access?; The CPU directly accesses primary storage, which includes RAM, ROM, and
cache memory. In contrast, the CPU does not directly access secondary storage,
which includes HDD, SSD, DVD, memory sticks, and Blu-ray discs.
What is the primary function of RAM in a computer system?; RAM is used to store and
access data that is actively being used or processed by the user immediately.
What are the two types of RAM?; The two types of RAM are **DRAM (Dynamic RAM)** and
**SRAM (Static RAM)**.
What is a key difference between DRAM and SRAM regarding data refresh?; DRAM needs
to be constantly refreshed, while SRAM doesn't need to be constantly refreshed.
What happens when RAM runs out of memory?; When RAM runs out of memory, the
processor has to access the hard drive to overwrite old data on RAM with new data,
which can slow down the system.
What is virtual memory and why is it used?; Virtual memory is a memory management
capability that allows the system to use hard drive or SSD space as additional
memory when RAM runs out, preventing system crashes.
What are the advantages of using virtual memory?; The advantages of virtual memory
include:
1. It can be larger than the physical memory provided in RAM.
2. It avoids the need to install/upgrade RAM, which can be expensive.
3. The system wastes no storage on unwanted/unused data.
What is the main purpose of Read Only Memory (ROM)?; ROM is used to store start-up
instructions (basic input/output systems) and retains its contents even when turned
off.
How is data stored in Hard Disk Drives (HDD)?; Data is stored in a digital format
on the magnetic surface of the disks (platter), organized in sectors and tracks.
What is a significant difference in data access speed between HDD and RAM?; HDD has
very slow data access compared to RAM.
What are the benefits of using SSDs over HDDs?; - More reliable (no moving parts)
- Considerably lighter (suitable for laptops)
- Lower power consumption
- Run much cooler than HDDs
- Very thin
- Data access is faster than HDD
What is the primary method used to read and write data on CD/DVD disks?; Laser
(red) light is used to read and write data on the surface of the disk, utilizing a
thin layer of metal alloy to store data.
How does Blu-ray technology differ from CD and DVD in terms of data storage?; Blu-
ray uses a blue laser with a shorter wavelength, allowing it to store up to five
times more data than DVD and includes secure encryption to prevent piracy.
What is cloud storage and what is its key feature?; Cloud storage is a method of
data storage where data is stored on remote servers, with the key feature being
**data redundancy**, allowing access to data at any time from multiple servers.
What are the three types of cloud storage?; 1. **Public cloud** - storage
environment where the customer and provider are different companies.
2. **Private cloud** - dedicated storage behind a company firewall, integrated with
the customer.
3. **Hybrid cloud** - a combination of public and private cloud environments, with
some data in the private cloud and less sensitive data in the public cloud.
What are the components that may be found in embedded systems?; - Microcontrollers
(CPU, RAM, ROM, and other peripherals on one chip)
- Microprocessors (integrated circuit with CPU only)
- System on Chips (SoC) (microprocessor with I/O ports, storage, and memory)
What are the two methods for updating programmable embedded devices?; 1. Connecting
the device to a computer and downloading the update.
2. Updating automatically via a satellite, cellular, or Wi-Fi link.
What are the advantages of using embedded systems?; The advantages of using
embedded systems include:

- **Small in size**, allowing easy integration into devices.


- **Low cost** to manufacture.
- **Requires very little power**, making them energy efficient.
- **Very fast reaction** to changing input.
- **Dedicated to one task only**, enhancing performance.
- **Can be controlled remotely**, providing convenience.
What are the disadvantages of using embedded systems?; The disadvantages of using
embedded systems include:

- **Difficult to upgrade**, limiting future enhancements.


- **Confusing interfaces** at times, affecting usability.
- **Troubleshooting** often requires a specialist's expertise.
- **Often discarded** due to upgrade difficulties and fault identification
challenges.
- **Increased waste** as they are frequently thrown away.
- **Prone to attacks**, like any computerized system.
What is the purpose of a Network Interface Card (NIC)?; A Network Interface Card
(NIC) is essential for allowing a device to connect to a network, such as the
Internet.
What is a MAC address and how is it structured?; A MAC address is a unique
identifier for a network device, comprising **48 bits** represented as six groups
of hexadecimal digits. The first six digits indicate the **manufacturer's code**,
while the last six represent the **device serial number**. MAC addresses are
constant and do not change.
What are the two types of MAC addresses?; The two types of MAC addresses are:

- **Universally Administered MAC Address (UAA)**: Made universally and cannot be


changed.
- **Locally Administered MAC Address (LAA)**: Can be changed by the user or
administrator.
What is the difference between static and dynamic IP addresses?; The differences
between static and dynamic IP addresses are:

- **Static IP Address**:
- Assigned **manually** to a device.
- **Does not change** over time.

- **Dynamic IP Address**:
- Assigned **automatically** by a DHCP server.
- **Changes periodically** or when the device connects to a different network.
What are the key differences between IPv4 and IPv6?; | Feature |
IPv4 | IPv6 |
|------------------------|-------------------------------|-------------------------
---------------|
| Address Format | 32-bit address | 128-bit address
|
| Address Space | Approximately 4.3 billion | Approximately 340
undecillion |
| Address Allocation | Manually allocated via DHCP | Primarily assigned using
stateless autoconfiguration |
What is the primary function of a router in a network?; A router directs data
packets between different networks and determines the most efficient path for data
transmission.
How does a router determine the next hop for data packets?; A router examines the
destination IP address of incoming data packets and uses routing tables to
determine the next hop or the next router on the path to the destination.
What role does a router play in IP address assignment?; A router can act as a DHCP
server, dynamically allocating IP addresses from a predefined range to connected
devices on a local network, simplifying network management.
How does a router connect a local network to the Internet?; A router serves as the
gateway between a local network and the internet, forwarding data packets from
devices on the local network to the internet and vice versa.
What is system software and its purpose?; System software is a set of programs that
control and manage hardware operations, provide a platform for other software to
run, and ensure hardware and software function without issues.
What are the main types of software?; The main types of software are System
Software (e.g., Operating System, Utility programs, device drivers) and Application
Software (e.g., spreadsheet, word processor).
What is the function of a device driver in system software?; A device driver
enables hardware devices to communicate with a computer's operating system,
allowing devices like printers to function properly.
What is the difference between system software and application software?; System
software manages hardware operations and provides a platform for applications,
while application software allows users to perform specific tasks using the
computer's resources.
What is the primary function of a word processor?; A word processor is software
used for manipulating text documents, including creating, editing, and formatting
text with tools for copying, deleting, spell-checking, and importing images.
How does a spreadsheet organize data?; A spreadsheet organizes and manipulates
numerical data using a grid of lettered columns and numbered rows, with each cell
identified by a unique combination of columns and rows. It can calculate using
formulas, produce graphs, and perform modeling and 'what if' calculations.
What is the purpose of a database in software applications?; A database is software
used to organize, analyze, and manipulate data consisting of one or more tables
that hold records and fields. It allows querying and reporting on data, as well as
adding, deleting, and modifying records in a table.
What is the role of control and measuring software?; Control and measuring software
is designed to interface with sensors, allowing a computer or microprocessor to
measure physical quantities and control applications by comparing sensor data with
stored data and altering process parameters accordingly.
What types of applications are typically referred to as 'apps'?; Apps are software
designed to run on mobile phones or tablets, downloaded from an 'App Store', and
can range from games to sophisticated software such as phone banking. Common
examples include video and music streaming, GPS, and camera facilities.
What functionalities does photo and video editing software provide?; Photo and
video editing software allows users to manipulate digital photographs or videos,
including changing colour, brightness, and contrast, applying filters and
enhancements, and creating transitions between clips.
What distinguishes graphics manipulation software from other types of software?;
Graphics manipulation software allows the manipulation of bitmap and vector images,
with bitmap graphics editors changing pixels to produce a different image, while
vector graphics editors manipulate lines, curves, and text to alter the stored
image as required.
What is an interrupt in the context of microprocessors?; An interrupt is a signal
sent to the microprocessor, prompting it to pause its ongoing tasks and handle the
interrupt temporarily. It can be triggered by timing signals, input/output
processes, hardware faults, user interaction, or software errors.
What are some common types of utility software?; Common utility programs include
virus checkers, defragmentation software, disk analysis and repair tools, file
compression and management software, backup software, security tools, and
screensavers.
How can utility programs operate in relation to user input?; Utility programs can
be initiated by the user or run in the background without user input, providing
essential maintenance and support for the system software.
What is the primary function of anti-virus software?; The primary function of anti-
virus software is to protect computers from malware by checking files before they
are run or loaded and comparing them against a database of known viruses.
What is heuristic checking in anti-virus software?; Heuristic checking is a method
used by anti-virus software to identify possible viruses that are not yet in the
database by analyzing the behavior and characteristics of files.
Why is it important to regularly update anti-virus software?; It is important to
regularly update anti-virus software because new viruses are constantly discovered,
and updates ensure that the software can detect and protect against these new
threats.
What does disk defragmentation software do?; Disk defragmentation software
rearranges the data blocks on a hard disk drive (HDD) to store files in contiguous
sectors, reducing head movements and improving data access time.
How does defragmentation improve data retrieval on an HDD?; Defragmentation
improves data retrieval on an HDD by organizing scattered data blocks into
contiguous sectors, allowing the read-write head to access data more quickly and
efficiently.
What are the benefits of using backup software?; Backup software helps create and
manage backup copies of data files and programs, allows scheduling of backups, and
can back up only files that have changed, ensuring data security and recovery
options.
What role does security software play in a computer system?; Security software
manages access control, user accounts, and links to other utilities like virus
checkers, while also protecting network interfaces with firewalls and overseeing
software updates to prevent malicious installations.
What was the original purpose of screensavers?; Screensavers were originally
developed to protect CRT monitors from 'phosphor burn' by displaying moving and
still images after a period of inactivity.
How do screensavers contribute to computer security?; Screensavers contribute to
computer security by automatically logging out the user after a certain period of
inactivity, thus preventing unauthorized access to the system.
What is the role of device drivers in a computer system?; Device drivers translate
data into a format that can be understood by the associated hardware device.
Without the appropriate device driver, a hardware device cannot work with a
computer and may not be recognized by the operating system.
What information do USB device drivers contain to help the operating system
identify a device?; USB device drivers contain descriptors, which include a vendor
ID (VID), product ID (PID), and a unique serial number that allow the operating
system to identify the device.
What are the main functions of a typical operating system?; The main functions of a
typical operating system include:

1. Managing files
2. Handling interrupts
3. Providing an interface
4. Managing peripherals and drivers
5. Managing memory
6. Managing multitasking
7. Providing a platform for running applications
8. Providing system security
9. Managing user accounts
What are the advantages and disadvantages of Command Line Interface (CLI) compared
to Graphical User Interface (GUI)?; | Interface | Advantages | Disadvantages |
|-----------|------------|---------------|
| CLI | Direct communication with the computer; Not restricted to pre-
determined options; Uses less memory | User needs to learn commands; All commands
need to be typed correctly; Spelling and format matters |
| GUI | User-friendly; Icons represent applications; Easy to use with a
pointing device | Uses more computer memory; Limited to the icons on the screen |
What is the process of booting up a computer?; The booting process involves:

1. The computer starts its OS through the bootstrap loader.


2. The BIOS (Basic Input/Output System) tells the computer the location of the OS
in the storage.
3. BIOS is often referred to as the firmware.
What is the purpose of interrupts in a microprocessor?; Interrupts signal the
microprocessor to stop its current task and service a new task, ensuring that
important tasks are handled on a priority basis. They can be generated by
peripherals like keyboards and mice, and different interrupts have different levels
of priority. After servicing the interrupt, the previous process continues.
What are the advantages of high-level programming languages?; High-level
programming languages are easier to read and understand, quicker to write, easier
to debug, and easier to maintain. They are independent of the type of computer
being used, which allows for more flexibility in programming.
What are the disadvantages of low-level programming languages?; Low-level
programming languages take longer to write and debug, and they are more difficult
to understand compared to high-level languages. However, they allow for special
machine-dependent instructions and can perform tasks very quickly.
What is the role of a compiler in programming?; A compiler translates a program
written in a high-level language into machine code, producing an executable file.
It translates one high-level language statement into several machine code
instructions and allows compiled programs to run without the compiler.
How does an interpreter differ from a compiler?; An interpreter executes a high-
level language program one statement at a time and does not produce an executable
file. In contrast, a compiler translates the entire program into machine code at
once, producing an executable file that can be run independently.
What is the function of an assembler?; An assembler translates a low-level assembly
language program into machine code, producing an executable file. It typically
translates one low-level language statement into one machine code instruction and
allows assembled programs to be used without the assembler.
What are the main features of an Integrated Development Environment (IDE)?; An IDE
typically includes the following features:

1. **Code Editor**
2. **Translator**
3. **Debugger**
4. **Error Reports**
5. **Auto-Completion and Auto-Correction**
6. **Auto-Documenter**
7. **Pretty Printing**
What is the difference between the Internet and the World Wide Web (WWW)?; |
Internet
| World Wide Web (WWW)
|
| :--------------------------------------------------------------------------------
-------------
| :--------------------------------------------------------------------------------
-------- |
| Uses transmission protocols such as TCP and IP (Internet Protocols)
| Collection of webpages and other information on websites
|
| Allows the user to communicate with other users via chat, email, calling and more
| Uses HTTP(S) protocols that are written using Hypertext Mark-up Language (HTML)
|
| Worldwide Collection of Interconnected Networks and Devices
| URLs (Uniform Resource Locator) are used for the location of the web pages
|
|
| Web browsers can access web pages.
|
What is the typical format of a URL?; The typical format of URLs is:

**protocol://website address/path/file name**

- The protocol is usually **HTTP** or **HTTPS**.


- The website address contains:
- **domain host** (www)
- **domain name** (website name)
- **domain type** (.com, .org, .net, .gov) or sometimes country codes
(.uk, .in, .cy)
- The path usually becomes the file directory roots, for example, **/computer-
science** is the file name in the URL **https://www.znotes.com/computer-science**.
What are cookies and their types?; | Type of Cookie | Description
| Example |
|---------------------|------------------------------------------------------------
-------------------------------------|---------------------------------------------
------|
| **Session Cookie** | Temporary cookies stored in RAM until the browser is
closed. Does not collect user information. | Virtual shopping basket on e-commerce
websites. |
| **Persistent Cookie**| Remembers user login details, stored on the hard disk
until expiry or deletion. | Login details for frequently visited
websites. |
How does a blockchain network ensure security during transactions?; A blockchain
network ensures security through:

- **Interconnected Computers**: Transaction data is stored across multiple


computers.
- **Data Integrity**: Transaction details are sent to all computers, making hacking
difficult.
- **Consensus Requirement**: Data cannot be changed without the consent of all
network members.
What information is contained in a block of a blockchain?; Every time a transaction
takes place, a block is created containing:

1. **Data**: Name of the sender and receiver, amount of money, etc.


2. **Hash Value**: A unique value generated by an algorithm.
3. **Previous Hash Value**: The hash value of the previous block in the chain.
What is a brute force attack in cyber security?; A brute force attack is when
hackers try to guess your password by attempting all possible combinations of
letters, numbers, and symbols.
What are the effects of a brute force attack?; The effect of a brute force attack
is that the hacker gains access to the user's personal data, including credit
cards, passwords, and more.
How can the risk of a brute force attack be mitigated?; To remove the risk of a
brute force attack, use stronger passwords that include more characters and
symbols.
What is data interception in cyber security?; Data interception involves stealing
data by tapping into a wired or wireless transmission line.
What is wardriving?; Wardriving is the act of locating and using wireless internet
connections illegally.
What is packet sniffing?; Packet sniffing uses packet sniffers to examine packets
sent over a line, allowing attackers to collect data being transmitted.
What are the potential effects of data interception?; Data interception can cause a
computer to crash and can lead to the deletion or corruption of files/data.
How can the risk of data interception be reduced?; To reduce the risk of data
interception, install anti-virus software, avoid software from unknown sources, and
be cautious when opening emails from unknown senders.
What is a Distributed Denial of Service (DDoS) attack?; A DDoS attack is an attempt
to prevent users from accessing part of a network, usually temporarily but
potentially damaging.
What are the effects of a DDoS attack?; The effects of a DDoS attack may include
preventing users from accessing their emails, websites, or online services.
What is hacking?; Hacking is the act of gaining illegal access to a computer
system.
What are the effects of hacking?; Hacking can lead to identity theft, gaining
personal information, and the deletion, alteration, or corruption of data.
How can the risk of hacking be mitigated?; To reduce the risk of hacking, use
firewalls, strong passwords/user IDs, and anti-hacking software.
What is the difference between hacking and cracking?; Hacking involves breaking
into computer systems to steal data, while cracking refers to editing a program's
code maliciously.
What is malware?; Malware stands for malicious software, which includes viruses,
ransomware, adware, Trojan horses, spyware, and worms.
What is a virus in the context of malware?; A virus is a program that can replicate
itself with the intention of deleting or corrupting files, causing a computer
malfunction.
What is ransomware?; Ransomware is a type of malware that encrypts the user's data
until a certain amount of money is paid.
What is adware?; Adware is a type of malware that displays unwanted ads on the
user's screen.
What is a Trojan horse in malware?; A Trojan horse is a program that is disguised
as legitimate software but is actually malicious.
What is spyware?; Spyware is malware that sends data about the user's activities to
the attacker.
What are worms in the context of malware?; Worms are programs that can replicate
themselves with the intention of corrupting an entire network rather than just a
single computer.
What is phishing and how can users protect themselves from it?; Phishing is when
attackers send legitimate-looking emails to bait users into giving out their
information. To protect against phishing, users should:
1. Don't open links from unknown receivers
2. Use anti-phishing tools
3. Block pop-up ads
4. Have an up-to-date browser
What is pharming and what measures can be taken to mitigate its risks?; Pharming
involves an attacker installing malicious code on a computer to redirect users to
fake websites, leading to the theft of login and personal details. To mitigate
risks, users should:
1. Use anti-virus software
2. Check the spelling and the weblink carefully
3. Ensure the green padlock is present in the URL bar
What is social engineering in the context of cyber security?; Social engineering is
a tactic used by attackers to create a social situation that leads victims to give
out their personal details, such as through spam calls claiming an account has been
hacked.
What are the different access levels and their importance in data security?; Access
levels refer to having different levels of access for different people, ensuring
that only authorized individuals, such as doctors, can access sensitive data like
patient information. This helps protect data from unauthorized access and breaches.
What are the benefits and drawbacks of fingerprint scans as a biometric method?; |
Biometric Methods | Benefits | Drawbacks |
|---|---|---|
| Fingerprint Scans | Easy to use, low storage space required | Intrusive, can't be
used if the finger is dirty or damaged |
What is two-step verification and why is it important?; Two-step verification is a
security process that requires two methods of authentication to verify a user's
identity. It adds an extra layer of security, making it harder for unauthorized
users to gain access to accounts.
How do firewalls contribute to network security?; Firewalls are hardware or
software that monitor traffic between a network and a user's computer, helping to
block unauthorized access and protect against cyber threats.
What role do proxy servers play in internet security?; Proxy servers act as
intermediaries between a user's computer and the web server, providing benefits
such as:
1. Filtering Internet traffic
2. Keeping the user's IP address confidential
3. Blocking access to certain websites
4. Protecting against DDoS and hacking attacks
5. Acting as a firewall
What are automated systems and how do they function?; Automated systems are
combinations of software and hardware designed to operate without human
intervention. They function by:
1. Sensors taking inputs and sending them to a microprocessor
2. The microprocessor processing the data and making decisions
3. Actuators executing the actions based on the processed data
What are the advantages and disadvantages of automated systems?; | Advantages |
Disadvantages |
|---|---|
| Increased efficiency and productivity | High initial setup costs |
| Consistent output quality | Potential job displacement |
| Reduced human error | Dependence on technology |

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy