Comp Notes
Comp Notes
• Set of rules for controlling error checking/detection // it’s an error detection method // used to
detect errors • Uses acknowledgement and timeout • Request is sent (with data) requiring
acknowledgement • If no response/acknowledgment within certain time frame data package is
resent • When data received contains an error a request is sent (automatically) to resend the data •
The resend request is repeatedly sent until packet is received error free/limit is
reached/acknowledgement received
Give one application of serial data transmission = USB / SATA / Wifi /PCI Express / Any appropriate
serial device
He uses lossless compression to reduce the file size. Explain how the file size is reduced.
from: • Uses compression algorithm / by example e.g. RLE • Repeating words / phrases / patterns
identified « • « replaced with value • File / dictionary / index of phrases created • Index will store
word/phrase with value
• A (compression) algorithm is used • No data is removed in the process // original file can be
restored • Repeated words (are identified) // Patterns in the data (are identified) • « and are
indexed/put into a table // by example • « and are replaced with their index // by example • « and
their positions are stored (in the table) // by example • « and the number of times the word/pattern
appears is stored (in the table) // by example
Explain how the web browser uses the URL to access the webpage.
Uniform Resource Locator. The web browser sends URL to DNS • DNS stores an index of URL and
matching IP address • DNS searches for URL to obtain the IP address • IP address sent to web
browser, (if found) • Web browser sends request to IP of webserver • Webserver sends web page to
web browser • Web browser interprets HTML to display web page • If URL not found DNS returns
error
ROM is permanent « • « RAM is temporary • ROM is non-volatile • « RAM is volatile « • ROM is read
only « • « RAM can have read/write operations • ROM holds instructions for boot up « • « RAM
holds files / instructions in use
MP3 • Digital recording of sound • Produced by recording software / microphone • Used when
distributing sound files • Compressed file format
MIDI • Instructions of how to make sound • Non-audio recording • File created using digital musical
instruments • Produced by synthesizer • Used when composing music • Individual
notes/instruments can be changed
Storing applications on a tablet device = SSD // SD card // Flash memory • Small physical size •
Lightweight • Low heat production • Low power consumption • It’s quiet • Fast read/write times
Storing a 1200MB high-definition promotional movie about a new car. The movie is to be given to
people who are interested in buying a new car = DVD // Blu-ray // USB Flash Drive // SD card • Easy
to distribute • Small in size • Cheap to buy • Universal storage therefore compatible with many
devices
• (HTML) colour codes • Error messages • MAC addresses • IP addresses • Assembly language •
Memory dump • Locations in memory
Easier to read/write/understand (for humans) • Easier to remember (for humans) • Short way to
represent binary // Uses less screen/display space • Fewer errors made (in data transcription) •
Easier to debug (for humans)
Non-volatile storage • Storage that can be disconnected/removed from the computer • Any suitable
example • Must be (physically) connected to computer to obtain stored data • Used to store files as
a backup
“It is responsible for powering and moving a motor in machinery, such as a robot arm in a factory.” =
actuator
• Used to attend to certain tasks/issues • Used to make sure that vital tasks are dealt with
immediately • The interrupt/signal tells the CPU/processor (that its attention is required) • A signal
that can be sent from a device (attached to the computer) • A signal that can be sent from software
(installed on the computer) • The interrupt will cause the OS/current process to pause • The
OS/CPU/ISR will service/handle the interrupt • They have different levels of priority • After the
interrupt is serviced, the (previous) process is continued • It enables multi-tasking to be carried out
on a computer • A valid example of an interrupt e.g. ‘out of paper’ message for a printer.
What does an anti virus do? Anti-virus (software) // Anti-malware (software) • Scans the computer
system (for viruses) • Has a record of known viruses • Removes/quarantines any viruses that are
found • Checks data before it is downloaded • « and stops download if virus found/warns user may
contain virus
Firewall // proxy server • Monitors traffic coming into and out of the computer system • Check that
the traffic meets any criteria/rules set • Blocks any traffic that does not meet the criteria/rules set //
set blacklist/whitelist NOTE: Cannot be awarded if already given in 4(a)(i) Passwords • Making a
password stronger // by example • Changing it regularly • Lock out after set number of attempts //
stops brute force attacks // makes it more difficult to guess Biometrics • Data needed to enter is
unique to individual • « therefore very difficult to replicate • Lock out after set number of attempts
Two-step verification // Two-factor authentication • Extra data is sent to device, pre-set by user • «
making it more difficult for hacker to obtain it • Data has to be entered into the same system • « so
if attempted from a remote location, it will not be accepted
Four from (max 2 marks per improvement): • Make the password require more characters • Makes
the password harder to crack/guess • More possible combinations for the password • Make the
password require different types of characters • Makes the password harder to crack/guess • More
possible combinations for the password • Use a biometric device • Hard to fake a person’s biological
data // data is unique • Two-step verification // Two factor-authentication • Adds an additional level
to hack • Have to have the set device for the code to receive it • Drop-down boxes // onscreen
keyboard • To prevent passwords being obtained using keylogger • Request random characters •
Won’t reveal entire password • Set number of password attempts • Will lock account if attempting
to guess • Will stop brute-force attacks
Four from (max 3 marks for benefits only, without an explanation): • More read/write cycles (over
its lifetime) // greater longevity « • « likely to be a lot of read/write functions each day • Read/write
speed is sufficient « • « even though it is slower than solid-state • Cheaper per unit of data stored «
• « better value for the company to purchase • « so the law company can afford to buy a server with
greater storage capacity • No requirement for portability « • « as a server, it does not need to be
moved • Trusted technology « • « it has been traditionally used for many years
A set of guidelines • Rules/laws that govern the use of computers / by example • Tell people how to
behave when using computers // helps keep users safe when using computers // by example • Art
gallery could be subject to plagiarism / intellectual property theft • Art gallery could copyright their
work (to make it illegal to steal it)
If u want the person to open data on that time: Password protection − Password is released on the
release date − Encryption − Encryption key is released on the release date
Structure − This is the layout of the web page − e.g. placing an image alongside some text //
example of tag, such as
Presentation − This is the formatting/style of the web page − e.g. the colour that is applied to
some text // example of tag, such as
What is a DOS
Four from: − Designed to deny people access to a website − A large number/numerous requests are
sent (to a server) « − « all at the same time − The server is unable to respond/struggles to respond to
all the requests − The server fails/times out as a result. Prevention: proxy server or firewall.
What is ROM?
Read only memory − Non-volatile memory // Contents of memory are retained when power is
turned off//permanent storage − Primary storage // directly accessed by the CPU − Holds
firmware/boot-up instructions/start-up instructions/BIOS − Cannot be written to
Electrical field/charge is spread across the screen − Sensors are located around the screen // sensors
are used to read the electric field − When finger touches screen, the charge/ is transferred to the
user − « as it is affected by the conductivity of another object − Coordinates of touch
determined/calculated/measured
Describe what is meant by main memory and how it is used in the Von Neumann model for a
computer system.
RAM • Primary memory • Volatile memory • Holds currently in use data/instructions • Directly
accessed by the CPU
The display is made up of pixels « • « that are arranged together as a matrix • Each pixel has three
filters, red, blue and green • Shades of colour are achieved by mixing red, blue and green • The
screen is backlit • Light is shone through the liquid crystals • The liquid crystals can be made to turn
solid or transparent/on or off « • « by changing the shape of the crystal
Digital data:
Analogue data:
Describe how the webpages are requested and displayed on the customer’s computer.
Browsers sends URL to DNS − … using HTTP − DNS finds matching IP addresses for URL − … and sends
IP address to web browser − Web browser sends request to IP address/web server for web pages −
Web pages are sent from web server to browser − Browser renders HTML to display web pages −
Any security certificates are exchanged/authenticated // SSL/HTTPS is used to secure the data − …
encrypting any data sent
Similarities between dvd and cd: Both need a red laser to read/write data − Both are spun to be read
− Both use spiral tracks for data − Both are optical storage − Both are off-line storage // both non-
volatile − Both use pits and lands to store data
Differences b/w dvd and cd: − DVD can be dual layer, but CD can only be single − DVD has higher
storage capacity − DVD has a shorter wavelength laser − DVD are spun faster − DVDs have a higher
data transfer rate
Similarities between phishing and pharming: Both are designed to steal/collect personal data − Both
pretend to be a real company − Both use fake websites
differences between phishing and pharming: Phishing involves use of an email whereas pharming
involves installing malicious code − Phishing involves clicking a link or an attachment whereas
pharming creates a redirection
A (compression) algorithm is used − Removes redundant/unnecessary data from the file − Removes
sounds that cannot be heard by the human ear/background noise − Reduces sample rate − Reduces
sample resolution − Data is permanently removed // original file cannot be re-instated − Perceptual
music shaping is used
NOTE: If lossless given, marks can be awarded for a correct description of lossless as follow through.
Any three from (lossless): − A (compression) algorithm is used − Repeating patterns are identified −
… are replaced with a value − … and indexed − No data is permanently removed // original file can be
re-instated − Suitable example of a lossless algorithm
Why compression is required: Quicker for her to upload − Quicker for users to download − Won’t
slow website down as much when loading − Takes up less storage space
Client/browser requests secure connection to server − Client/browser requests the server to identify
itself − Server provides a digital certificate − Client/browser validates the certificate − Client/browser
send signal back to server (to begin transmission) − Session caching can be used − A session key is
generated − Encryption method is agreed // data is encrypted
Identify three security threats to her web server: virus, hacking, DOS
Role of proxy server: Acts as a firewall − Monitor/filters/examines incoming and outgoing traffic −
Rules/criteria for traffic can be set // blacklist/whitelist set − Blocks any traffic that does not meet
criteria … − … and can send a warning message to the user − Stop the website failing in a DoS
attack // DoS attack hits the proxy server and not the webserver
How to calculate checksum: A value is calculated from the data − The value is calculated using an
algorithm // by example − The value is appended to the data to be transmitted − Value is
recalculated after transmission − Values are compared − If the values match the data is correct // if
the values do not match the data is incorrect
What is SSD and how does it operate: Solid state drive − Non-volatile − Secondary storage − Flash
memory − Has no mechanical/moving parts − Uses transistors − … and cells that are laid out in a grid
− Uses control gates and floating gates − Can be NAND/NOR (technology) − Use EEPROM technology
Max two from: − Stores data by flashing it onto the chips − Data stored by controlling the flow of
electrons through/using transistors/chips/gates − The electric current reaches the control gate and
flows through to the floating gate to be stored − When data is stored the transistor is converted
from 1 to 0
Role of a browser: Allows user to view web pages − Renders HTML − Allows user to
bookmark/favourite web pages − Provides navigation features − Allows (multiple) tabs − Stores
cookies − Records history of pages visited − Has a homepage − Runs active script − Allows files to be
downloaded from website/internet − Sends a request to the IP address/web server (to obtain the
contents of a web page) − Sends URL to DNS − Manages HTTP/HTTPS protocol