0% found this document useful (0 votes)
191 views39 pages

GR 10 Olev Exam Notes & Questions by Harshvardhan Sir Computer Science Cie Igcse

Uploaded by

Aala Solih
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
191 views39 pages

GR 10 Olev Exam Notes & Questions by Harshvardhan Sir Computer Science Cie Igcse

Uploaded by

Aala Solih
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 39

WORKING PRINCIPLES OF A FEW INPUT DEVICES

A DOCUMENT SCANNER:

The cover is first raised thenthe document is placed on a glass panel and then the cover is closed.

A bright light then illuminates the document - modern scanners use a type of xenon lamp which
produces a very bright white light.

A scan head moves across the document until the whole pagehas been scanned. An image of the
document is produced whichis then sent to alens using a series of mirrors.The lens focuses the
document image.

The focused image now falls onto a charge couple device (CCD) which consists of a number of
integrated circuits etched into silicon.
Essentially the CCD is made up of thousands of light-sensitive elements (or pixels). Each element
creates an electric charge when light falls on it. This charge is sent to the ADC to convert it into
digital values. Software produces a digital image from these digital values.
Application of 2D scanners at an airport:
2D scanners are used at airports to read passports. They make use of OCR technology to produce
digital images and select the text part and then automatically put the text into the correct fields of
an existing database.
At many airports the two-dimensional photograph in the passport is also scanned and stored as a
jpeg image. The passenger's face is also photographed using a digital camera (a 2D image is taken
so it can be matched to the image taken from the passport). The two digital images are compared
using face recognition/detection software. Key parts of the face are compared.
The face in the picture above shows several of the positions used by the face recognition software.
Each position is checked when the software tries to compare two facial
images.
Data such as:
• distance between the eyes
• width of the nose
• shape of the cheek bones
• length of the jaw line
• shape of the eyebrows are all used to identify a given face.
When the image from the passport and the image taken by the camera are compared, these key
positions on the face determine whether or not the twoimages represent the same face.

3D SCANNERS:
3D scanners scan solid objects and produce a tree-dimensional image. Since solidobjects have x, y
and z coordinates, these scanners take images at several points alongthese coordinates. A digital
image which represents the solid object is formed.
The scanned images can be used in COMPUTER AIDED DESIGN (CAD) orsent to a 3D printer to
produce a working model ofthe scanned image.

Application of 3D scanning – computed tomography (CT) scanners


COMPUTED TOMOGRAFFIC(CT) SCANNERS are used to create a 3D image of asolid object.
This is based on TOMOGRAPHY technology which basically builds upan image of the solid object
through a series of very thin 'slices'. Together these 2D 'slices' make up a representation of the 3D
solid object.

©AIS INPUT DEVICES – WORKING PRINCIPLES COMPUTER SCIENCE Page 1 of 4


Each slice isbuilt up by use of X-rays, radio frequencies or gamma imaging;
Each 'slice' is then stored as a digitalimagein the computer memory. The whole of the solid object
is representeddigitally inthe computer memory.
Depending on how the image is formed, the type of tomographic scanner canhave different
names.
For example:
• X-rays CT scanners computerised tomography
• radio frequencies MRI magnetic resonance imaging
• gamma rays SPECT Single photon emission computed tomography.

BARCODE READER / SCANNERS:


A barcode is a series of dark and light parallel lines of varying thickness. The actual left-hand and
right-hand sides of the barcode are separated using guard bars. The structure ofthese guard bars
is shown in Figure below.

5 4 3 0 5 2
Guard Bars
L DD L L L D
0 1 1 0 0 0 1

So what happens when a barcode is scanned?


• The barcode is first read by a red laser or red LED (LIGHT EMITTING DIODE).
• Light is reflected back off the barcode; the dark areas reflect little or no light which allows the
bars to be read.
• The reflected light is read by sensors (photoelectric cells).
• As the laser or LED light is scanned across the barcode, a pattern is generatedwhich is converted
into digital data - this allows the computer to understand the barcode.
• For example: the digit '5' on the left generates the pattern L D D L L L D
(where L = light and D = dark); this has the binary equivalent of 0 1 1 0 0 0 1
(where L = 0 and D = 1 ).

QR Codes (Quick Response)


A kind of barcodes that are in the form of a square matrix. They can store up to7000 digits. It
needs a special QR Scanner. Smart phones could also be used to scan and interpret a QR code.
QR codes store numbers as well as pieces of text. They could store website links,URL, etc

Digital Cameras:
Digital cameras are controlled by a microprocessor which can automatically carry out the following
tasks:
• adjust the shutter speed • focus the image automatically • operate the flash
automatically
• adjust the aperture size • adjust the size of the image • remove 'red eye' when
the flash has been used
Working:
The photograph is captured when Light passes through the lens onto a Light sensitive cell (Sensor).
This cell is made up of tiny elements known as pixels. The numberof pixels determine the size
ofthe file used to store the photograph (e.g. a14-megapixel camera will need 42 megabytes to
store each raw (uncompressed) photograph. By reducing the resolution to, for example, a jpeg

©AIS INPUT DEVICES – WORKING PRINCIPLES COMPUTER SCIENCE Page 2 of 4


image, the storage requirement is reduced to 4 megabytes. The quality of the photograph also
depends on many other factors, such as:
• the type of lens used
• the lighting and so on.
The drawback of Mobile phones for photography is usually low picture quality due to poor lens
quality and limited memory for the storage of photos.

Touch Screen Types:


Touch type Features / Functioning Benefits Drawbacks
- upper layer of polyester and a -Relatively - poor screen visibility
bottom layer of glass is used inexpensive in sunlight
- when the top layer/screen is technology. - vulnerable to
Resistive pushed/touched into the -Can use bare scratching
lower/bottom layerthe electric fingers, gloved - wears through time
current changes and location of fingers or stylus to -does not allow multi-
“touch” is found input. touch facility
Several layers of glass that act like a medium cost Allows only use of
capacitor creating electric fields -good screen bare fingers to input
between glass layers visibility in sunlight
Capacitive When the top layer is touched, -multi-touch
current alters and the position of the -durable (breaks
location where current changes is only on a major
determined by a microchip. impact)
-uses glass for screen material -multi-touch -Relatively expensive
Infra-Red
-needs warm object Ex. Fingers for -use of bare fingers / -heat type allows only
(Heat)
the touch to work gloved fingers / bare fingers
-uses glass for screen material stylus in optical -optical type breaks
Infra-Red -uses an array of sensors in the form -durable then cannot use
(Optical) of a grid, touch position is calculated touch at all
based on which grid is touched.

Resistive Capacitive Infra-Red (Heat) Infra-Red (Optical)

©AIS INPUT DEVICES – WORKING PRINCIPLES COMPUTER SCIENCE Page 3 of 4


Sensors and their applications

Sensor Application
Temperature • control a central heating system
Sensor • control/monitor a chemical process
• control/monitor the temperature in a greenhouse
• control/monitor the moisture levels in soil in a greenhouse
Moisture/Humidity • control/monitor the humidity levels in the air in a greenhouse
Sensor • monitor dampness levels in an industrial application (e.g.,
monitor moisture in a paint spray booth in a car factory)
• switch street lighting on at night and off during the day
• monitor/control light levels in a greenhouse
Light Sensor • automatically switch on a car's headlights when it gets dark
• used in mobile phones to automatically help in increase or decrease screen
brightness
• turn on the windscreen wipers on a car automatically
Infra-Red/Motion
•detect intruders in a burglar alarm system
Sensor
• count people entering/leaving a building
• detect intruders in a burglar alarm system
Pressure Sensor • weigh things (e.g. check the weight of a vehicle)
• monitor/control a process where gas pressure is important
Acoustic /sound • pick up noise levels (e.g. footsteps) in a burglar alarm system
Sensor • detect the noise of liquids dripping in a pipe

• monitor pollution levels in a river or in the air


Gas Sensor • measure 02and C02 levels in a greenhouse
• check for C02 leaks in a power station
• monitor/control acidity/alkalinity levels in the soil in a greenhouse
Ph Sensor
• pollution/environmental monitoring in rivers
Magnetic Field any application where detection of changes in a magnetic field
Sensor is required (e.g. in cell phones, CDplayers, etc.)
• used in anti-lock braking systems in motor vehicles

Microphone
A microphone is used to input voice / sound into the computer
Working Principle:
 When you speak, sound waves created by your voice carry energy toward the microphone.
Remember that sound we can hear is energy carried by vibrations in the air.
 Inside the microphone, the diaphragm moves back and forth when the sound waves hit it.
 The coil, attached to the diaphragm, moves back and forth as well.
 The permanent magnet produces a magnetic field that cuts through the coil. As the coil moves
back and forth through the magnetic field, an electric current flows through it.
 The electric current flows out from the microphone to an amplifier or sound recording device.
The electric current is sent through an ADC to convert the analogue current into digital / binary
pattern. This is then stored in a storage device.
Microphone is usually used for Speech Recognition and speech – to – text applications.

©AIS INPUT DEVICES – WORKING PRINCIPLES COMPUTER SCIENCE Page 4 of 4


OUTPUT DEVICES AND THEIR WORKING PRINCIPLES
1. VDUs (Visual Display Unit) – The normal monitor or any display unit. Types: LCD and CRT
a. LCDs (Liquid Crystal Display) – seen on portable and laptop computers
b. CRTs (Cathode Ray Tube) – old type of monitors that used a picture tube, such as a TV

Monitor (Visual Display Unit – VDU)


CRT Monitor – Cathode Ray Tube; old technology; cathode rays involved; much electricity
consumed; harmful radiation; causes heat; very heavy; large size occupies space on desk.

LCD Monitor – Liquid Crystal Display


Liquid crystal display, a type of display used in digital watches and many portable
computers. LCD displays utilize two sheets of polarizing material with a liquid crystal
solution between them. An electric current passed through the liquid causes the crystals to
align so that light cannot pass through them. Each crystal, therefore, is like a shutter, either
allowing light to pass through or blocking the light. The display panel needs to be
illuminated by CCFL (cold cathode fluorescent Light) bulbs which are placed behind the
display panel.

TFT – Thin Film Transistor (Variant of LCD)


Thin film transistor, a type of LCD flat-panel display screen, in which each pixel is controlled
by three transistors coloured red, green and blue. The intensity of each determines the
colour seen by the human eye. TFT screens are sometimes called active-matrix LCDs. TFT is
an advanced version of LCD.
Advantages:
• Very light; • Consume little power; • Less glare; • Flat, so thin display panels

LED Monitor – Light Emitting Diode


LED monitor uses LCD panel to display information just like the LCD monitor does. The
display panel is illuminated by using LEDs. This is the only difference between LCD monitor
and LED monitor.
Both use same display technology.
LCD uses CCFL (cold cathode fluorescent Light bulbs) while LED uses LED to light the display
panel.
Advantages of using LED over CCFL:
1. LEDs reach their maximum brightness almost immediately (there is no need to 'warm up'
before reaching full efficiency)
2. LEDs give a whiter light which sharpens the image and make the colours appear more
vivid; CCFL had a slightly yellowish tint
3. LEDs produce a brighter light which improves the colour definition
4. Monitors using LED technology are much thinner than monitors using CCFL technology
5. LEDs last almost indefinitely; this makes the technology more reliable and means a more
consistent product
6. LEDs consume very little power which means they produce less heat as well as use less energy.

OLED
Organic LEDs use Carbon compounds. These are capable of emitting light as well as form the
display panel. Hence no need for a backlight. In the future OLEDs can be used to make thin
bendable displays.

OUTPUT DEVICES AIS COMPUTER SCIENCE Page 1 of 6


2. Graphical Display Units – larger than normal VDUs and used in combination with light pens.
Smart Boards, Projector based screens etc.

LCD Projector (Transmissive Technology):


LCD projectors are older than DLP; in an LCD projector, the light generated by LED passes through
an LCD display. Mirrors are used to reflect light back to the LCD screen. Three LCDs are used. Then
a grey scale image in red, green and blue format is produced. This is reversed from grey scale to
colour.

DLP Projector (Reflective Technology):


A DLP (Digital Light Processing) projector uses millions of tiny micro mirrors on a DLP chip. Based
on the light source, they generate a 0, 1 pattern. The micro mirrors can produce pixels in 1024
grey shades and this light passes through a colour filter and then falls on the DLP chip. The white
light is then split into RGB colours from which further colours are created and it is capable of
showing 16 million colours.

Interactive Whiteboard: A device that uses a touchscreen to input data and a projector to project
visuals on itself.

3. PRINTERS
a. Character printers
b. Line printers
c. Page printers.

Printers are also differentiated into two types:


Impact printers: In this type of printers the type head hits an inked ribbon against a paper
like a typewriter.

Non-Impact printers: These printers use techniques such as ink spray, heat, or laser etc.
Here characters are not formed by mechanical print.

a. Character printers: Print only one character at a time, like a typewriter. As a result, the
speed decreases.
DOT MATRIX PRINTER (Character Printer):
Old technology printers; make use of ink ribbon; mostly single coloured; the head consists of
a matrix of pins that hit the paper;
Advantages:
• They work with continuous stationery which means they can do very large print jobs
without any human interaction. • Multi-part stationery printing allowing more than one
document to be printed in one print using carbon copies in-between. • Very cheap. • Can
work in various atmospheres. • Can also print in Braille for the blind to touch and feel the
characters.
Disadvantages:
•Initial expenses are high. •Very noisy while printing. •Very slow and very low resolution as
characters are formed by dots
Applications:
• Mostly used to print bills in mini markets, shops, retail outlets, cafes etc.• Printing
payslips.

OUTPUT DEVICES AIS COMPUTER SCIENCE Page 2 of 6


b. Line printers: These printers print one line at a time. Some can print 2500 lines per
minute.
Advantages: very silent, very cheap when compared to laser printers.

INKJET PRINTER (Line Printer):


Inkjet PRINTERS are essentially made up of:
• a print head consists of nozzles which spray droplets of ink on to the paper to form
characters
• an ink cartridge or cartridges; • a stepper motor and belt which moves the print head
assembly across the page from side to side • a paper feed which automatically feeds the
printer with pages as they are required.
•The ink droplets are produced currently using two different technologies namely:
Thermal bubble technology OR Piezoelectric effect
Applications: used in houses, offices etc where there is less printing work.
Line printers
Ex: High speed ink jet printers.

Basic steps in printing process:


1 The data from the document is sent to a printer driver
2 The printer driver ensures that the data is in a format that the chosen printer can understand

3 A check is made by the printer driver to ensure that the chosen printer is available to print
(e.g. is it busy, is it off line, is it out of ink, and so on)
4 The data is then sent to the printer and it is stored in the printer buffer

5 A sheet of paper is then fed into the main body of the printer; a sensor detects whether
paper is available in the paper feed tray - if it is out of paper (or the paper is jammed) then
an error message is sent back to the computer
6 As the sheet of paper is fed through the printer, the print head moves from side to side
across the paper printing the text or image; the four ink colours are sprayed in their exact
amounts to produce the desired final colour

7 At the end of each full pass of the print head, the paper is advanced very slightly to allow the
next line to be printed; this continues until the whole page has been printed
8 If there is more data in the printer buffer, then the whole process from stage 5 is repeated
until the buffer is finally empty

9 Once the printer buffer is empty, the printer sends an interrupt (see Section 4.3) to the
processor in the computer; this is a request for more data to be sent to the printer; the
whole process continues until the whole of the document has been printed

Advantages:
• Initial costs are cheap. • Good quality print resolution. • Less noisy. • Faster than dot
matrix printers.
Disadvantages:
• Ink cartridges expensive to buy. • Ink does not last as long as dot matrix printer or laser
printer.
Applications:
• Used at homes and offices for general printing. • Can be used to print photographs on
glossy paper.

OUTPUT DEVICES AIS COMPUTER SCIENCE Page 3 of 6


c. Page printers: Page printers are non-impact, very high-speed printers capable of printing
a page at a time. The most common type is the Laser printer. They give excellent print
quality for text and graphics. They use toner cartridges, which contain a fine black powder
called toner.
Colour laser jets are expensive.
Applications: They are used in offices and other work places where a lot of printing work is
done.
Advantages: Almost silent, very fast, excellent graphics (1200 dpi)
Disadvantages: more expensive, large in size, very complex so repairing is costly, multiple
printing is not possible.

LASER PRINTER (Page Printer):


• Uses LASER light. • Uses the properties of static electricity.

Basic steps in printing process:


1 The data from the document is sent to a printer driver

2 The printer driver ensures that the data is in a format that the chosen printer can understand

3 A check is made by the printer driver to ensure that the chosen printer is available to print (e.g.
is it busy, is it off line, is it out of ink, and so on)

4 The data is then sent to the printer and it is stored in the printer buffer

5 The printing process involves a printing drum given a positive charge; as this drum rotates, a
laser beam is scanned across it removing the positive charge in certain areas; this leaves
negatively charged areas which exactly match the text/images of the page to be printed

6 The drum is then coated with positively charged TONER (powdered ink); since the toner is
positively charged, it only sticks to the negatively charged parts of the drum

7 A negatively charged sheet of paper is then rolled over the drum

8 The toner on the drum now sticks to the paper to produce the print

9 To prevent the paper sticking to the drum, the electric charge on the paper is removed after
one rotation of the drum

10 The paper finally goes through a fuser which is a set of heated rollers; the heat melts the ink so
that it fixes permanently to the paper

11 At the very end, a discharge lamp removes all the electric charge from the drum making it ready
to print the next page

Advantages:
• Very low noise. • Extremely fast. • Toner cartridges last long. • Very clear and high
resolution prints.
Disadvantages:
• Colour toner cartridges are expensive. • Ozone and volatile organic matter produced while
printing can be harmful in an office environment.
Applications:
Used in offices for quick and high quality prints.

OUTPUT DEVICES AIS COMPUTER SCIENCE Page 4 of 6


3D PRINTER (Additive technology):
3D PRINTERS are primarily used in COMPUTER-AIDED DESIGN (CAD) applications.
They can produce solid objects which actually work. The solid object is built up layer by layer
using materials such as plaster, resin, concrete, plastics, powdered metal or ceramic
powder.
3D printers can use Additive manufacturing technology, Direct 3D printing or Binder 3D
printing.

Steps to create a solid object using a 3D printer:

A design is made using computer-aided design (CAD) software

The finalised drawing is imported into some special software that prepares it in a format which
is understood by the 3D printer

The 3D printer is set up to allow the solid object to be made

The solid object is built up layer by layer (often only 0 .1 mm thick); this can take several hours,
depending on the thickness of the layers, the material used and the size of the final object

The object is removed from the printer and is then prepared; for example, some use a jelly-
like support which needs to be washed away by immersion in water, some require the
removal of excess plastic powder and others require the cutting away of unused material; in
many cases, the object has to be left to 'cure' for a few hours

Advantages:
• Useful to print prototypes at ease. • variety of objects can be printer or made. • Spare
parts that are no longer available can be made.
Disadvantages:
• Initially expensive.
Applications:
Used in CAD so that individuals can come up with prototypes.

Thermal printers: They create print images on special heat sensitive paper by heated wires
in the print head.

Graph Plotters
Plotter: A plotter is a device that uses a mechanism to drive pens in defined horizontal-
vertical motions to produced combined text and graphics output on paper. They are ideal
for maps, plans, line diagrams, 3D drawings, CAD drawings etc.

Types: 1. Flat bed plotter 2. Drum plotter


1. Flat bed plotter: In this the pen moves on the flat table, on which we put a paper.
2. Drum plotter: Here a roll of paper mounted on a drum can be moved back and forth
while the pen moves across the paper.

Applications: Geographical survey, maps, Richter scale-showing the intensity of the


earthquake.

OUTPUT DEVICES AIS COMPUTER SCIENCE Page 5 of 6


4. Voice based outputs – suitable for blind people to hear the typed material on a document.
A program can be used to do this. Head phones can be used to hear. Voice based outputs
are also extremely becoming popular in Washing Machines and other automated devices, to
alert the user.

Speaker
A speaker is an output device that outputs sound. Sound is stored in the computer as a binary or
digital file. When the file is played the digital values are converted an analogue voltage using DAC.
The voltage is amplified using an amplifier and sent to the speaker. The voltage variations make
the cone in the speaker vibrate producing sound.

Computer DAC Amplifier Loud speaker

Electrical signals: Sometimes the output from the computers can be electrical signals. They
are used to control devices such as heating systems (A/c), or alarms etc.
Robots: Electrical signals from a computer can be used to control a robot arm. Ex. Excavator
Actuators: Electrical signals from a computer can start or stop a device. Ex: Electric motor.

2D and 3D Cutters
A 3D laser cut is similar to a 2D cut except it is able to recognise the object in an x-y-z direction
rather than in just two dimensions. Solid objects like glass, wood, and metals can be easily cut
using 3D cutters.

OUTPUT DEVICES AIS COMPUTER SCIENCE Page 6 of 6


THE INTERNET

The Internet: The International Network; the Internet can be described as a single network of
different networks in the world.
WWW: World wide website. This means that a website can be viewed / accessed from any
part of the word, once connected to the Internet. It is a part of the Internet where graphics,
sound, video, animation and text are used. A single word for all this mix of media is “hyper
text”.
ISP (Internet Service Provider):
The ISP provides a permanent connection to the Internet. When you log on, your modem dials
the number of the ISP and when your password is validated you are allowed to access their
server. Ex. Dhivehinet in Maldives. AOL in America, BT in Europe.
Web Browser: A web browser is a program that allows access to the Internet and view a
website. Ex. Internet Explorer, Netscape Navigator, Mozilla Firefox etc.
Features of web browser: search, history & favourites tool, navigation buttons, refresh etc.

Domain Name: A domain name is simply the name of an Intranet or Internet site or address.
Look at this URL (Uniform Resource Locator) - http://www.moe.edu.mv/olevelfee.pdf
http: indicates the protocol being used
www.moe.edu.mv: is the website name / domain name / web server name
olevelfee.pdf: is the name of a file available to download or view

Protocol: Is a set of rules in network communication. IP, TCP, FTP are a few types.
Internet Protocol: A set of rules observed in Internet communication.
IP Address: Every computer / device on the internet is assigned a unique address known as
the IP address. IP address may change within a network. IP addresses are usually assigned by
a web server. Likewise web servers and ISPs also have IP address. IP address is essential for
communication. The IP address of a web server / ISP is almost permanent and never changes.

The IP address is a 32 bit number, which is usually given in the decimal format. It has four
sections and the maximum number for each section is 255 (0-255).

Ex: 192 . 168 . 1 . 15

The maximum number of combinations that could be achieved is 256 ^ 4 which sums up to
roughly 4, 294, 967, 296 computers / devices. This is over 4 billion. This is also called IPv4.
As the number of computers / devices connected to the Internet are ever increasing, there is
a fear that the number would cross 4 billion. Hence a new standard has been introduced to
name the devices. This is IPv6. It allows more devices to be on the internet without the fear of
ip address being exhausted.
The pattern used in IPv6 is 128 bit pattern in each section and the address has full 8 sections.

Ex: fe80 : ff2a : fe81 : 2034 : 2000 : f8ff : fe21 : 67cf

MAC Address: It is a unique number that identifies a device connected to the Internet. MAC
stands for Media Access Control. It consists of six parts. The first three represent the
Manufacturer ID and the next three represent the hardware ID. MAC addresses are
permanent and are given at the manufacturing unit.

©AIS THE INTERNET COMPUTER SCIENCE Page 1 of 2


HTML: Hyper text mark-up language
It is the authoring language used to create web pages on the World Wide Web.
HTML defines the structure and layout of a Web document by using a variety of tags and
attributes. Every html page starts with the <html> tag and ends with </html> tag.

HTML Structure:
Structure is the content of the webpage which is typed within html tags. The content wouldn’t
change. The structure does not mention how the content should appear on the webpage.
Ex: “Welcome to my page! Let’s see if we can learn css”
The above example shows the content and it is within the <p> </P tag.
All of the above forms the structure.
Home.html
<html>
<head>
<title>Home</title>
</head>
<h1This is the home page </h1>
<p>Welcome to my page! Let’s see if we can learn css</p>
<body>
My website is about me, my friends and family and my hobby.
</body>
</html>

HTML Presentation:
Presentation is the style of the document. It has instructions that tell how the content should
be presented.
Ex: <font color = “blue”> This is the home page </font>
This tag instructs that the content should appear in blue colour font.

If a website has 20 web pages, then defining the presentation in each page is time consuming
and a difficult task.
Instead a CSS (Cascading Style Sheet) file can be used, and presentation of each style could be
defined in the CSS file.
Once the CSS file’s link is typed in all the web pages, each web page will now start presenting
the content as defined in the CSS file.

Home.html Style.css
<html>
<head> body {
<title>Home</title> padding-left: 11em;
<link rel="stylesheet" href="style.css"> font-family: calibri, "Times New Roman",
</head> Times, serif;
<h1This is the home page </h1> color: black;
<p>Welcome to my page! Let’s see if we can learn css</p> background-color: #ff00ff }
<body>
My website is about me, my friends and family and my hobby.
</body>
</html>
Hypertext transfer protocol (http): Set of rules that should be observed when html files are
transferred across the Internet.

©AIS THE INTERNET COMPUTER SCIENCE Page 2 of 2


DATA TRANSMISSION

Data Transmission: It refers to the movement of data in the form of bits between two or more
digital devices.
Data can be transmitted using metal cables, fibre optic cables or via wireless connections.
Metal cables can be co-axial copper cable used in cable TV networks; or twisted pair cable used in
most LANs.
Fibre optic is a glass or fibre cable which transmits data in the form of a light signal. It is usually
very fast as light travels fast.
Wireless method of transmission use radio waves, infra-red waves, microwaves etc for data
transmission wirelessly. Satellites and mobile phone communications use microwaves.
Wi-fi is a most common method of data transmission.

Bandwidth: The rate of transfer of data. Usually measured in kilobits per second (kbps) or
kilobytes per second (KBps). 8kbps = 1KBps

Parallel transmission: In parallel transmission, all the bits of data are transmitted
simultaneously on separate communication lines. It is used between short distances. Integrated
circuits are the best example of the use of Parallel Transmission.

Advantages Disadvantages
Faster transmission of data Greater chance of error due to interference
Needs more cabling
Suitable only for short distances

Serial transmission:
In serial transmission, bits of data are transmitted serially one after the other. It requires only one
communication line rather than several lines to transmit data from sender to receiver.

Advantages Disadvantages
Less chance of errors Slower transmission of data
Less cabling required
Suitable for long distance transmission

Asynchronous and Synchronous Data Transmission


Asynchronous:
 Data is transmitted in discrete packets (usually 1 byte)
 Each packet of data is sent with control bits (start bit and end bit)
 The control bits allow the receiver to know when the data starts and ends
 The control bits prevent the packets of data getting mixed up
 Packets are sent intermittently (they have uneven time intervals between them)
 Slower than synchronous

©AIS DATA TRANSMISSION COMPUTER SCIENCE Page 1 of 3


Synchronous:
 A continuous stream of data
 The data is accompanied by timing signals (generated by an internal clock)
 The clock ensures the sender and receiver are in step with each other
 The receiver counts how many bits were sent over a period of time then reassembles
them into bytes (multiple bytes sent at once)
 Timings have to be accurate as there are no control bits
 Faster than asynchronous

Simplex Data Transmission:


Transmission of data in one direction only. Ex: data sent from a computer to a printer.

Half-Duplex Data Transmission:


Transmission of data in both directions but one side at a time through a single cable. Ex: Speaking
over a walky-talky

Full-Duplex Data Transmission:


Transmission of data in both directions at the same time through multiple cables. Ex: Talking over
a telephone, sending data in a LAN.

USB (Universal Serial Bus)


The UNIVERSAL SERIAL BUS (USB) is an asynchronous serial data transmission method.
Essentially, the USB cable consists of:
 a four-wire shielded cable
 two of the wires are used for power and the earth
 two of the wires are used in the data transmission.

When a device is plugged into a computer using one of the USB ports:
 the computer automatically detects that a device is present (this is due to a small change
in the voltage level on the data signal wires in the cable)
 the device is automatically recognised, and the appropriate DEVICE DRIVER is loaded up
so that computer and device can communicate effectively
 if a new device is detected, the computer will look for the device driver which matches
the device; if this is not available, the user is prompted to download the appropriate
software.

©AIS DATA TRANSMISSION COMPUTER SCIENCE Page 2 of 3


Advantages of USB Disadvantages of USB
Devices plugged into the computer are
automatically detected; device drivers are
automatically uploaded
The connectors can only fit one way; this prevents The maximum cable length is presently about 5
incorrect connections being made metres
considerable support is available to users
Several different data transmission rates are The present transmission rate is limited to less
supported than 500 megabits per second
Newer USB standards are backward compatible
with older USB standards

ERRORS IN DATA TRANSMISSION:

Parity checks
 Parity checks can be even (even number of 1 - bits) or odd (odd number of 1 -bits).
 One of the bits is known as the parity bit.
 Parity blocks allow an erroneous bit (following data transmission) to be identified.
 If the parity of a byte of data hasn’t changed (but there is still an error following transmission),
then it is impossible using this method to identify where the error has occurred.
Even Parity (Even number of 1s) Odd Parity (Odd number of 1s)
0 1 1 0 1 1 0 0 1 1 1 0 1 1 0 0

Automatic Repeat Request (ARQ)


 ARQ uses an acknowledgement to indicate data received correctly.
 A timeout is used which is the time allowed to elapse before an acknowledgement is
received.

Checksum
 Data is sent in blocks.
 An additional value, called the checksum, is sent at the end of the block of data.
 The Checksum is based on the number of bytes in the block.
 If the checksum at the receiver’s end doesn’t match the Checksum at the end of the data
block, then an error in transmission has occurred.
 If the sum of the bits of data (Byte sum) is <=255 then the checksum is the same value itself.
 If the sum of the bits of data is >255 then a method shown below is used to calculate the
checksum.
Example: Byte sum is 1185
Step 1. Let X = 1185
Step 2. Divide 1185 by 256, the answer is 4.629. So Y = 4.629
Step 3. Round Y to the nearest whole number, so Y = 4
Step 4. Multiply Y with 256 you get 1024, so Z = 1024
Step 5. Subtract Z from X (X - Z); 1185-1024 = 161.
Step 6. Checksum is 161

Calculate the checksum for a block of data with the byte sum 1450.

Echo check
 Received data is returned to the sender by the receiving computer.
 The sender compares the data sent with the data received back.
 If different, then an error has occurred somewhere in the process.

©AIS DATA TRANSMISSION COMPUTER SCIENCE Page 3 of 3


DATA SECURITY
Data Security: It is to keep the data safe and prevent if from accidental or
deliberate loss.

Two types of threats to data:


1. Physical / Environmental / Human threats
2. Computer / Program based threats

Physical / Environmental / Human threats


1. Theft: Theft is an act of crime where a computer system, disks, CDs etc are
stolen.
Precaution: Use proper security measures like locks, bolts, security guards,
burglar alarm system, spy cameras (CCTV), entry cards, less number of doors and
gates, magnetic locks, finger print lock systems etc.

2. Fire: Accidental or deliberate fire can damage the computer and all the data in
it.
Precaution: Use fire proof doors and windows, use fire extinguisher and use
smoke detectors / fire alarms.
3. Lightning: Lightning can also cause severe damage to the computer system.
Precaution: Use earth and lightning conductors.
4. Water: Water can also damage the computer and data in it (floods, cyclones
and tsunami)
Precaution: keep the computer system away from water; don’t bring coffee or
tea (liquids) near the computer or the keyboard.
5. Dust: Dust can cause interruptions in data flow as it might jam the connection
ports.
Precaution: Keep the doors closed, and use a vacuum cleaner if possible.
6. Heat: Higher temperature can damage the disks and the computer system.
Precaution: Use an Air conditioner; make sure exhaust fans in the systems work;
7. Electricity: Short circuits, low and high voltages can severely damage the
computer and the disks in it.
Precaution: Use UPS or current stabiliser; circuit breakers

©A IS DA TA S EC UR ITY C OM P UTER SC I ENC E – 2 2 1 0 P age 1 of 6


Computer / Program based threats
1. Theft: people can steal, copy, delete or modify our data. If important data is
lost then we have to face many problems. If personal data is lost or modified,
then it causes many problems. Think of some situations!
Precaution: Use passwords; use User Access Rights like restricted users, read
only users etc.
2. Virus: A virus is a computer program that usually corrupts or destroys our
data. Viruses could do more by hiding, renaming, corrupting files.
Precaution: Use an Antivirus program;
3. Hacking: hacking is unauthorised access to a secure computer, sometimes
using a network connection.
Consequences of hacking:
1. Data can be deleted, modified, copied, hidden etc
2. Personal data can be accessed and that data becomes no more personal
3. Bank account number, credit card number can be stolen
Precaution: Use firewall programs. Use data encryption while transferring data
through a communication link; disconnect systems from network when not in use.

4. Phishing: Using official-looking email to lure (attract) individuals to a fake


website in order to obtain their banking or credit card information for use in
identity theft. The email will ask the recipient to supply confidential
information, such as bank account details, PINs or passwords; these details are
then used by the owners of the website to conduct fraud.
Precaution: use of anti-phishing software

5. Pharming: The fraudulent practice done by a malicious code, directing Internet


users to a fake website that mimics the appearance of a legitimate one, in order to
obtain personal information such as passwords, account numbers, etc.
Precaution: use of anti-pharming software

6. Spyware: A type of software that monitors what you do on your computer


and then relays that information to someone else over the Internet. Some
programs track what kind of Web sites you visit and the results are shared with
advertising agencies.
Keylogger: A spyware that installs a program which records all the key strokes
that are pressed and relays the information to a hacker.
Precaution: use of anti-spyware software; use of virtual keyboard especially to
input usernames and passwords.

7. Cookie: A cookie is a small text file that is stored on a user’s web browser. The
cookie is set by request by a web server to a web browser. A cookie is entirely
‘passive’ and does not contain software programmes, a virus or spyware.
Cookies actually remember the last settings a user chose on the website. This is
©A IS DA TA S EC UR ITY C OM P UTER SC I ENC E – 2 2 1 0 P age 2 of 6
easy as the user need not go to preferences and set preferences on the webpage
again. Cookies are harmless but spyware programs can make use of the
information which cookies contain and raise security issues.

8. Wardriving: The act of locating and using wireless internet connections


illegally; it requires a laptop or a smart phone which is capable of picking up
wireless signals. It is possible for a user’s wireless network to be hacked and user
names and passwords stolen. It is also possible to steal a user’s internet time or
download limit by simply downloading large sized movies or software.
Precaution: use of firewall software; use of strong passwords to protect the wi-fi
router; frequent changing of passwords, use WEP key to secure wireless
connection;

9. Spam: This is sending loads of unacceptable junk mail to e-mail lists,


newsgroups, and so on. Spam is also mostly visible in public chat rooms.

10. Cracking: Cracking is the editing of a program source code so it fulfils a


particular condition. Ex: cracking a software to extend its trial period.

11. DOS attacks: In a (Denial of Service) attack an authorised user is denied of


using certain services. Ex: denied of changing date / time, wallpaper etc.

Firewall: Firewalls can be either software or hardware. It sits between the user's
computer and an external network (e.g. the internet.) and filters information in
and out of the computer.

Tasks carried out by a firewall include:


• examining the 'traffic' between the user's computer (or internal network) and
a public network (e.g. the internet)
• checking whether incoming or outgoing data meets a given set of criteria
• If the data fails the criteria, the firewall will block the 'traffic' and give the user
(or network manager) a warning that there may be a security issue
• logging all incoming and outgoing 'traffic' to be later checked by the user
• Criteria can be set to prevent access to certain undesirable sites; firewall can
keep a list of all undesirable IP addresses
• helping to prevent viruses or hackers entering the user's computer (or internal
network)
• warning the user if some software on their system is trying to access an
external data source (e.g. automatic software upgrade); the user is given the
option of allowing it to go ahead or requesting that such access is denied.

Limits of Firewall:
• It cannot prevent individuals, on internal networks, using their own modems
to bypass the firewall
©A IS DA TA S EC UR ITY C OM P UTER SC I ENC E – 2 2 1 0 P age 3 of 6
• Employee misconduct or carelessness cannot be controlled by firewalls (for
example, control of passwords or use of accounts)
• Users on stand-alone computers can choose to disable the firewall, leaving
their computer open to harmful 'traffic' from the internet.

Proxy Server: Proxy servers act as an intermediary between the user and a web
server
Web browser Web browser
sends request request forwarded
User’s Proxy Web
Computer Server Server
Web server Web server send
response is filtered back response to
proxy server
Functions of proxy server include:
• allowing the internet 'traffic' to be filtered; they can block access to a website
if necessary (similar type or reaction as a firewall)
• by using the feature known as a cache, they can speed up access to
information from a website; when the website is first visited, the home page is
stored on the proxy server; when the user next visits the website, it now goes
through the proxy server cache instead, giving much faster access
• keeping the user's IP address secret — this clearly improves security
• acting as a firewall

Authentication methods
Password: A most common method of verifying user authenticity by comparing
the input username / password with one securely stored in the computer.
Digital Signature: A digital code (generated and authenticated by public key
encryption) which is attached to an electronically transmitted document to
verify its contents and the sender's identity.
Biometrics: Biometrics is the technical term for body measurements and
calculations. It refers to metrics related to human characteristics. Biometrics
authentication is used in computer science as a form of identification and access
control

Encryption: It is the conversion of electronic data into another form, called


cipher text, which cannot be easily understood by anyone except authorized
parties. Basically there are two types of encryption techniques, namely
Symmetric and Asymmetric.

©A IS DA TA S EC UR ITY C OM P UTER SC I ENC E – 2 2 1 0 P age 4 of 6


1. Symmetric Encryption
 Symmetric cryptography uses a single key for encryption and decryption.
 Symmetric cryptography requires that both parties have the key.
 Key distribution is the inherent weakness in symmetric cryptography.

Example of a simple symmetric encryption technique:

PLAIN TEXT CYPHER TEXT PLAIN TEXT


Encrypt L zdqw wr vhqg d Decrypt
I want to send a I want to send a
secret message vhfuhw phvvdjh secret message

Shift each letter


by three positions

KEY

2. Asymmetric Encryption
 Asymmetric encryption uses a pair of keys namely public key, and a
private key to encrypt and decrypt messages when communicating.
 Public key is made available to everybody
 Private key is only known to the server
 Plain text which is encrypted by public key can be decrypted only by a
private key

©A IS DA TA S EC UR ITY C OM P UTER SC I ENC E – 2 2 1 0 P age 5 of 6


Security protocols

1. Secure Sockets Layer (SSL)


Secure Sockets Layer is a type of protocol (a set of rules used by computers to
communicate with each other across a network). This allows data to be sent and
received securely over the internet. When a user logs onto a website, SSL
encrypts the data — only the user's computer and the web server are able to
make sense of what is being transmitted. A user will know if SSL is being applied
when they see the small padlock in the address bar at the top of the screen
along with “https”.
In SSL, each party calculates the secret key individually using random values
known to each side. The parties then send messages encrypted using the secret
key.

Example SSL Handshake:

Stage Client / Browser Server


1 Sends “hello” and requests for SSL
Certificate
Asks the server to choose an
encryption algorithm
2 Replies “hello” and sends SSL
Certificate
Gets a public key from the server Chooses and informs client about
the encryption algorithm
Sends a public key
3 Verifies the SSL certificate by contacting a certificate authority
4 After verification both start sending and receiving encrypted messages using
SSL encryption

2. Transport Layer Security (TLS)


Transport Layer Security is a form of protocol that ensures the security and
privacy of data between devices and users when communicating over the
internet. It is essentially designed to provide encryption, authentication and data
integrity in a more effective way than SSL. When a website and client (user)
communicate over the internet, TLS is designed to prevent a third party hacking
into this communication.
It is made up of a record protocol (contains data being transferred) and a
handshake protocol (contains encryption algorithms for permitting
communication).

Session Caching: It is to establish a new connection or attempt to continue using


an existing connection to avoid wastage of time for a new session.

©A IS DA TA S EC UR ITY C OM P UTER SC I ENC E – 2 2 1 0 P age 6 of 6


COMPUTER ETHICS
It is a set of principles set out to regulate the use of computers.
Copyright ©: Copyright is a legal right that grants the creator of original work exclusive rights for
its use and distribution.
Software piracy: Software piracy means the illegal copying of computer software.
Plagiarism: Copying of a person’s idea or work and claiming it as their own.

# THE COPYRIGHT DESIGNS AND PATENTS ACT:


This act makes it a criminal offence to copy or steal software. It is also an offence to copy or
distribute software or any manuals which comes with it, without the permission or a licence from
the owner. It is also an offence to use purchased software covered by copyrights on more than
one machine at the same time. It is also illegal for an organisation to encourage, allow, compel or
pressure its employees to make or distribute copies of illegal software for use by the organisation.

Free software: It is software which is free to download to use along with its source code with
which it was made. Users are free to modify, copy and adapt the code. There is no copyright
involved.

Freeware: It is software that a user can download from the Internet for free. Users do not have
any access to the source code. Copyright laws apply and the user is not allowed to republish or sell
this software.

Shareware: It is software that a user can download for free but it is limited in features to use or
can be used with all features but for a limited period of time. After the lapse of the time period,
the user needs to purchase the software to continue to use it.

SOFTWARE
Software: It can be defined as a group of programs for doing a special task / job.
Program: A program can be defined as a set of instructions to solve a problem.
Categories:
All software can be broadly classified into three categories: Operating System (Systems software),
Application Software and Utility software.
Operating System (system software): It is the main software that manages the resources of a
computer system, mainly peripherals, processor, memory, and other software. Without the OS a
computer would be useless, so the first thing the computer looks on when it is switched on is for
the OS.
Examples: DOS, UNIX, WINDOWS XP, LINUX, MAC OS X, SYMBIAN etc.

Main features of an OS (See Figure 2)


 Manage system resources like processor, peripherals, memory.
 Allow the hardware devices to work, by installing software for each hardware (drivers).
 Manage the transfer of data from input devices to processor, memory, storage devices to
output devices.
 Allow other software to be installed and manage other application software.
 Allow other application software to interact with hardware for various purposes.
 Provide security by method of passwords and restrictions on users.
 Provide encryption, in some cases.
 Upload and download data between clients and servers.
 Manage network connections and communicate with other computers in the network.
 Allow multitasking and multi-user on a single PC by allocating processing time to the processor.

©AIS OS COMPUTER SCIENCE Page 1 of 2


Interrupt: An interrupt is a signal generated by a device or software and sent to the processor.
This stops the ongoing processes temporarily and requests the attention of the CPU to start or
stop a task associated with it.
A few examples when an interrupt can be generated:
 A paper jam occurs in a printer; hence the printer generates an interrupt
 A program was not responding due to a missing file
 The user pressed the CTRL + ALT + DEL key combination simultaneously
Interrupt handler: It handles interrupts, allows the immediate job requested by the interrupt to be
performed then lets the CPU continue the task it was previously doing before interruption.
Buffer: A buffer is a temporary memory area mostly found in printers, scanners, hard drives etc. It
is used to adjust the operational speed differences between the CPU and devices. Buffers and
interrupts work together to carry out many jobs in the computer.
The flowchart below shows how buffers and interrupts are used when a document is sent to a
printer.

The
No processor
Any data to
send to continues
printer? with its Human Computer
Interface (HCI)
tasks
Input and output Multitasking
Yes control

Data from the document Security (logon, Multiprogramming


to be printed is sent to passwords)

the printer buffer from Batch processing


Interrupt handling
the computer memory routines
Operating
System
Real-time processing Error handling
The contents of the printer
buffer are emptied to the
printer and the data from Memory Loading & running of
Management application software
the document is printed
Processor Managing user
Management accounts
Meanwhile the
No
processor is able File utilities (copy,
All data to carry out save, sort, delete)
sent to other tasks while
printer? the printer
buffer is being Figure 2
Yes emptied

When all the data has been


printed, the printer buffer
becomes empty, and an interrupt
signal is sent to the processor

The interrupt signal is sent to


request more data to be sent
to the printer

The current task is suspended


whilst the interrupt is serviced
Figure 1
©AIS OS COMPUTER SCIENCE Page 2 of 2
COMPUTER ARCHITECTURE AND THE FETCH – DECODE – EXECUTE CYCLE
Simple representation of Von-Neumann architecture:

Memory
CPU Unit

Key I/O
Control Bus device
Input
Data Bus
and
Address Bus
Output
I/O
device
Bus: It is a distinct set of conductors carrying data and control signals within a computer system,
to which pieces of equipment may be connected.

Bus type Description Direction of Signal


Carries signal relating to addresses between the
Address Bus Travels in one direction
processor and the memory
Sends data between the processor, the memory
Data Bus Travels in both directions
unit and input/output devices.
Carries signals between devices, memory and
Control Bus Travels in both directions
processor to coordinate tasks between them.

The Fetch-Decode-Execute cycle of a computer is the process by which a computer:


1. FETCH - fetches a program instruction from its memory,
2. DECODE - determines what the instruction wants to do,
3. EXECUTE - and carries out those actions.

Registers/circuits involved
The circuits used in the CPU during the cycle are:
 Program Counter (PC) - an incrementing counter that keeps track of the memory address of
which instruction is to be executed next.
 Memory Address Register (MAR) - the address in main memory that is currently being read
or written
 Memory Buffer / Data Register (MBR / MDR) - a two-way register that holds data fetched
from memory (and ready for the CPU to process) or data waiting to be stored in memory
 Current Instruction register (CIR) - a temporary holding ground for the instruction that has
just been fetched from memory
 Accumulator - a register used to contain the results of an arithmetical or logical operation.
 Control Unit (CU) - decodes the instruction in the CIR, selecting machine resources such as a
data source register and a particular arithmetic operation, and coordinates activation of
those resources
 Arithmetic logic unit (ALU) - performs mathematical and logical operations

©AIS COMPUTER ARCHITECTURE & FEC COMPUTER SCIENCE Page 1 of 2


The program counter (PC) contains the address of the memory location of the next instruction which has to be fetched

This address is then copied from the PC to the memory address register (MAR), this is done using the address bus

The contents (instruction) at the memory location (address) contained in MAR are then copied temporarily into the
memory data register (MDR)

The contents (instructions) of the MDR are then copied and placed into the current instruction register (CIR)

The value in the PC is then incremented by 1 so that it now points to the next instruction which has to be fetched

The instruction is finally decoded and then executed by sending out signals (via the control bus) to the various
components of the computer system

Detailed description of the Fetch-Decode-Execute Cycle


Example shows the processing of a single instruction: “Load 5”.
PC 1 1 Load 5
MAR 1 2 Add 6
The contents of the Program Counter, the address of the MDR 3 Store 7
next instruction to be executed, is placed into the Memory CIR 4
Address Register 5 12
6 8
7
PC 1 1 Load 5
The address is sent from the MAR along the address bus to MAR 1 2 Add 6
MDR Load 5 3 Store 7
the Main Memory. The instruction at that address is found
CIR 4
and returned along the data bus to the Memory Data 5 12
Register. 6 8
7
PC 2 1 Load 5
The MDR loads the Current Instruction Register with the MAR 1 2 Add 6
MDR Load 5 3 Store 7
instruction to be decoded / executed. At the same time the
CIR Load 5 4
contents of the Program Counter is increased by 1, to initiate 5 12
the next instruction to be executed. 6 8
7
PC 2 1 Load 5
MAR 5 2 Add 6
MDR 3 Store 7
The instruction is sent to the CU for decoding and now the
CIR Load 5 4
Address part of the instruction is copied into the MAR. 5 12
6 8
7
PC 2 1 Load 5
MAR 5 2 Add 6
The Address bus locates the address 5 and the Data bus MDR 12 3 Store 7
fetches the value “12” stored in address 5 and carries it to CIR Load 5 4
the MDR. 5 12
6 8
7
The data bus now carries the value 12 from MDR and stores
it in the accumulator. This ends one F-D-E-C

©AIS COMPUTER ARCHITECTURE & FEC COMPUTER SCIENCE Page 2 of 2


File Formats
Musical Instrument Digital Interface (MIDI)
Musical Instrument Digital Interface (MIDI) is always associated with the storage of music files.
However, MIDI files are not music and don't contain any sounds; they are very different to, for
example, MP3 files. MIDI is essentially a communications protocol that allows electronic musical
instruments to interact with each other. The MIDI protocol uses 8-bit serial transmission with one
start bit and one stop bit, and is therefore asynchronous.
A MIDI file consists of a list of commands that instruct a device (for example, an electronic organ,
sound card in a computer or in a mobile phone) how to produce a particular sound or musical
note. Each MIDI command has a specific sequence of bytes. The first byte is the status byte - this
informs the MIDI device what function to perform. Encoded in the status byte is the MIDI channel.
Two additional bytes are required, a PITCH BYTE, which tells the MIDI device which note to play,
and a VELOCITY BYTE, which tells the device how loud to play the note. When music or sound is
recorded on a computer system, these MIDI messages are saved in a file which is recognised by
the file extension .mid. If this .mid file is played back through a musical instrument, such as an
electronic keyboard, the music will be played back in an identical way to the original. The whole
piece of music will have been stored as a series of commands but no actual musical notes. This
makes it a very versatile file structure, since the same file could be fed back through a different
electronic instrument, such as an electric guitar, with different effects to the original.

MPEG-3 (MP3) and MPEG-4 (MP4)


MPEG-3 (MP3) uses technology known as AUDIO COMPRESSION to convert music and other
sounds into an MP3 file format. Essentially, this compression technology will reduce the size of a
normal music file by about 90 per cent. For example, an 80 megabyte music CD can be reduced to
8 megabytes using MP3 technology. MP3 files are used in MP3 players, computers or mobile
phones.
But how can the original music file be reduced by 90 per cent whilst still retaining most of the
music quality? This is done using file compression algorithms which use PERCEPTUAL MUSIC
SHAPING; this essentially removes sounds that the human ear can’t hear properly. For example, if
two sounds are played at the same time, only the louder one can be heard by the ear, so the
softer sound is eliminated. This means that certain parts of the music can be removed without
affecting the quality too much. Sound less than 20 Hz and above 20000 Hz are inaudible to human
ear. These sounds if exist are of no use as the human ear cannot perceive. Such sound is removed.
Hence file size decreases.
MP3 files use what is known as a LOSSY FORMAT since part of the original file is lost following the
compression algorithm. This means that the original file can't be put back together again.

MPEG-4 (MP4) files are slightly different to MP3 files. This format allows the storage of multimedia
files rather than just sound. Music, videos, photos and animation can all be stored in the MP4
format. Videos, for example, could be streamed over the internet using the MP4 format without
losing any real discernable quality. MP4 is also lossy compressed file. It used both audio and image
compression to compress.

©AIS File Formats COMPUTER SCIENCE Page 1 of 2


Joint Photographic Experts Group (JPEG)
When a photographic file undergoes file compression, the size of the file is reduced. The trade-off
for this reduced file size is reduced quality of the image. One of the file formats used to reduce
photographic file sizes is known as JPEG. This is another example of lossy file compression. Once
the image is subjected to the jpeg compression algorithm, a new file is formed and the original file
can no longer be constructed. Jpeg will reduce the RAW BITMAP image by a factor of between 5
and 15 depending on the quality of the original.
An image that is 2048 pixels wide and 1536 pixels high is equal to 2048 x 1536 pixels; in other
words, 3145 728 pixels. This is often referred to as a 3-megapixel image (although it is obviously
slightly larger). A raw bitmap can often be referred to as a TIFF or BMP image. The file size of this
image is determined by the number of pixels. In the previous example, a 3-megapixel image would
be 3 megapixels x 3 colours. In other words, 9 megabytes (each pixel occupies 3 bytes because it is
made up of the three main colours: Red, green and blue).

The same image stored in jpeg format would probably occupy between 0.6 megabytes and 1.8
megabytes. Jpeg relies on certain properties of the human eye and, up to a point, a certain
amount of file compression can take place without any real loss of quality. The human eye is
limited in its ability to detect very slight differences in brightness and in colour hues. For example,
some computer imaging software boasts that it can produce over 40 million different colours —
the human eye is only able to differentiate about 10 million colours.

Lossless and lossy file compression


Lossless file compression
With LOSSLESS FILE COMPRESSION, all the data bits from the original file are reconstructed when
the file is again uncompressed. This is particularly important for files where loss of any data would
be disastrous — for example, a spreadsheet file.

Example of Lossless Compression:


The phrase 'THIS SECTION SHOWS YOU HOW THIS WOULD WORK' consists of 35 memory units
(ignoring spaces). Repeated words, such as 'THIS' could be put into a data dictionary and be
replaced by Repeated word sections, such as 'HOW and 'OU' could be replaced by the numbers '2'
and '3'. Our phrase then becomes '1 SECTION S2S Y3 2 1 W3LD WORK'. Again, ignoring spaces, this
compressed form now uses only 23 memory units. This is about a 33% saving in file size. Obviously
if whole pages are to be stored, then repeated words and word sections become even more
numerous. This is clearly an example of lossless compression since the original phrase can be
reformed if necessary using the data dictionary and compressed file.

Lossy file compression


Lossy FILE COMPRESSION is very different to lossless file compression. With this technique, the file
compression algorithm eliminates unnecessary bits of data as seen in MP3 and jpeg formats. It is
impossible to get the original file back once it is compressed. This is why it is chosen for files where
removing certain bits doesn't detract from the quality.

©AIS File Formats COMPUTER SCIENCE Page 2 of 2


Input, Output & Storage Devices, File Compression – Name the following
1. If you use a keyboard to input data, you could become a victim of
2. Every character on the keyboard has a unique value called
3. A type of touch screen allows multiple touch
4. A type of touch screen that works with heat or light technology
5. A type of touch screen that works when two layers get into contact
6. A type of touch screen that has several layers of glass that act as a capacitor
7. A kind of barcode that can store large amount of information like urls
8. An output device that works with sound
9. An input device that works with sound
10. A device used in speech – to – text application
11. A device used in text – to – speech application
12. Software that compares the wave pattern of the spoken words and matches
them to wave patterns stored in memory thus producing relevant text.
13. An essential device used in a graphical user interface based operating system.
14. A device that creates a virtual screen to input text, drawings and capture
them.
15. A device that may have face recognition software to capture focused faces.
16. A sensor on which when light falls, each pixel interprets the amount of RGB
and sends this to the processor to create a digital image.
17. A type of printer that uses ink ribbon to print.
18. A type of printer that uses ink cartridges to print.
19. A type of printer that uses toner to print.
20. A type of printer that may use resin, or liquid metal to print and make objects.
21. A type of printer in which the drum is given a positive charge.
22. A type of printer that prints only one line at a time.
23. A type of printer that prints only one character at a time.
24. A type of printer that sprays positively charged plastic powder on a drum.
25. A type of display that uses transistors to display data on the screen.
26. A type of monitor that causes more radiation than other monitor types.
27. A type of monitor that has CCFL bulbs placed at the back to light the screen.
28. A type of display that can be bent.
29. A device that has millions of tiny mirrors on a single chip.
30. A sensor that is used to detect / measure light.
31. A sensor that is used to measure amount of water present in the air / clothes.
32. A sensor used to measure acidity in a given liquid.
33. A sensor used to detect moving beings.
34. A sensor used in traffic management system.
35. A sensor used in a burglar alarm system.
36. A sensor used to detect water drops dripping in a tunnel to detect leaks
37. A sensor used in an Air conditioner.

©Ahmadhiyya International School Page 1 of 12


Input, Output & Storage Devices, File Compression – Name the following

38. A memory chip that stores data temporarily


39. A memory chip that stores data permanently and data cannot be altered
40. A memory chip that stores data permanently but data in it can be altered
41. Optical storage that stores data permanently while data cannot be altered
42. A temporary memory area found in printers and scanners
43. Optical storage that has concentric tracks for parallel read and write operation
44. Optical storage that is first blank and after copying data becomes read only
45. Optical storage that uses dual layer technology and uses red lasers
46. Optical storage that can be called primary memory
47. Optical storage that uses red lasers but capacity is 700MB
48. Optical storage that uses blue / violet lasers for R/W operation
49. Optical storage that is re-usable but no parallel R/W operation
50. Optical storage that uses red laser, re-usable but capacity is 700MB
51. Optical storage used in satellite TV decoders to pause a live match
52. Optical storage that is 20GB to 100GB in sizes
53. Magnetic storage that is made of plastic and can store terabytes of data
54. Magnetic storage that is made of plastic but old and can store 1.44MB of data
55. Magnetic storage that is made of metal and has concentric tracks and sectors
56. Magnetic storage that is made of metal, and is portable / offline
57. Magnetic storage that is made of metal, and is the main storage for a computer
58. Electronic memory that is portable, small in size and used in digital cameras
59. Electronic memory storage device that is portable and used for backup
60. Memory chip that consists of millions of tiny transistors to store data
61. Storage device that consists of several memory chips replacing hard drives
62. A memory that is also called as volatile memory
63. A memory that is also called as non-volatile memory
64. A memory that stores start-up instructions and is fixed on a system board
65. The name of the start-up instructions found in a memory chip in computers
66. A memory that is re-usable and stores data as ON/OFF charges in transistors
67. A storage device that makes use of NAND memory chips
68. A storage device suitable to store huge information like an Encyclopaedia
69. A storage device that has no moving parts but fairly large storage capacity
70. An example of a compressed audio file
71. An example of a compressed video file
72. An example of a compressed photo file
73. A type of file compression where quality is reduced by removing some data
74. A type of file compression where quality is retained after uncompressing file
75. A type of file which does not store music but instructions on how to play music
76. A file compression where contents are removed and lost forever

©Ahmadhiyya International School Page 2 of 12


Input & Output Devices – Write “T” for true or “F” for false
1. You could be a victim of spyware if you use a keyboard to input data. ________
2. Every character on the keyboard has a unique ASCII value. ________
3. Resistive touch screen allows multiple touch. ________
4. Infra-red heat touch screen works when a hot body touches the screen. ________
5. Capacitive touch screen works on light technology. ________
6. Capacitive touch screen allows multiple touches. ________
7. Capacitive touch screen has two layers which come into contact when touched. ________
8. Capacitive touch screen has several layers of glass that act as a capacitor. ________
9. Resistive touch screen has two layers which come into contact when touched. ________
10. Barcode reader uses an LED or red laser light to scan a barcode. ________
11. A QR code is comparatively older technology than barcodes. ________
12. A QR code cannot store URLs. ________
13. A Microphone is an output device that works with sound. ________
14. A microphone is used in speech – to – text application. ________
15. A speaker is used in speech – to – text application. ________
16. A speaker is used in text – to – speech application. ________
17. The signal from a microphone goes to a sound card to convert it into digital. ________
18. Voice recognition software compares the wave pattern of the spoken words and matches
them to wave patterns stored in memory thus producing relevant text. ________
19. A smartphone is not capable or reading a QR code. ________
20. A mouse is an essential device in a command line interface based operating system. ________
21. An interactive whiteboard is a virtual board to write, draw and save them electronically. ________
22. A digital camera is equipped with a microprocessor. ________
23. A digital camera may or may not have face detection software. ________
24. The quality of the image taken by a digital camera depends on its megapixels only. ________
25. When light falls on to the CCD or CMOS sensor, each pixel in the sensor interprets
the amount of RGB and sends this to the processor. ________
26. A dot matrix printer uses toner to print. ________
27. A laser printer uses ink to print. ________
28. A 2D inkjet printer uses resin to print. ________
29. A 3D printer uses resin to print and make 3D objects. ________
30. A laser in a laser printer makes a pattern of negative charge on a positive charge drum. ________
31. A negatively charged toner is sprayed on the drum. ________
32. A negatively charged paper is fed into the printer. ________

©Ahmadhiyya International School Page 3 of 12


Input & Output Devices – Write “T” for true or “F” for false
33. Fuser rollers are used to remove all charge from the printer. ________
34. A laser printer is also called line printer. ________
35. An inkjet printer uses a ribbon to print. ________
36. An inkjet printer uses thermal or piezoelectric effect to spray ink on paper. ________
37. An inkjet printer is also called as a line printer as its print head prints one line at a time. ________
38. An inkjet printer does not use colour cartridges. ________
39. The long form of TFT is thin film technology. ________
40. A CRT monitor is thin and flat. ________
41. A CRT monitor uses transistors to display data on the screen. ________
42. A CRT monitor causes more radiation than a LCD / LED monitor. ________
43. LCD monitor makes use of TFT technology. ________
44. LCD monitor has CCFL bulbs placed at the back to light the screen. ________
45. LED monitor has CCFL bulbs placed at the back to light the screen. ________
46. LCD monitor and LED monitor use the same TFT screen. ________
47. OLED display uses CCFL bulbs to light the screen. ________
48. An LCD display panel can be bent. ________
49. An OLED display can be bent. ________
50. A DLP projector has millions of tiny mirrors on a single chip. ________
51. In both LCD and DLP projectors, grey scale image is converted to colour image. ________
52. A light sensor is used to detect / measure light around it. ________
53. A moisture / humidity sensor is not suitable to be used in a washing machine. ________
54. A pH sensor measures the level of water in a flask. ________
55. A motion sensor can be used in a burglar alarm system. ________
56. Infra-red heat sensors can be used in a burglar alarm system. ________
57. Infra-red light sensors can be used in traffic management system. ________
58. A temperature sensor can be used in an Air conditioner. ________
59. A sound sensor can be used to detect water drops dripping in a tunnel to detect leaks. ________
60. A microphone is an input device. ________
61. A touch screen is an input device. ________
62. A 3D cutter is an input device. ________
63. A projector is an input device. ________
64. A sensor is an input device. ________
65. A speaker is an input device. ________
66. A 3D scanner is an input device. ________

©Ahmadhiyya International School Page 4 of 12


Networks, Internet – Name the following

1. A unique Id given by a server to a computer in the internet is : Control bus


2. A unique Id given by a manufacturer to a network device is : Data bus
3. 192.168.1.35 is an example of a : IP addressontrol bus
4. FF:00:12:89:03:87 is an example of : MAC addresso
5. Users can dial a number using internet connection to talk over it Memory Data R
6. An example of a slow as well as expensive internet connection: Current Instruction R
7. An example of a fast internet connection: Control unit
8. The long form of e-mail is: Arithmetic Logical U
9. An agency / company that provides permanent connection to the internet: Accumulator
10. A set of rules in network communication: Interrupt
11. Exchange of signals between two devices to establish communication:
12. Long form of http is:
13. Long form of HTML is:
14. A facility in the internet that uses key words to retrieve matching websites:
15. HTML is made up of structure and:
16. The part of HTML that defines how data is to be arranged:
17. The part of HTML that defines how data is to be presented:
18. Websites that allow building of online communities:
19. Data is always transmitted as:
20. A program that shows the content of a website
21. Long form of URL is:
22. Technology used by digital media sharing websites:
23. A type of bookmarking where a user uses a “#” symbol mostly.
24. A method of sending bits of data to the user’s browser as the event takes
place.
25. A method of sending bits of data to the user’s browser when the user
requests
26. An essential process involved for smooth playing of a file while playing online.
27. A network that works on internet standards but is limited to the users within
an organization.
28. Internal restricted access network is the long form of:
29. International network is the long form of:

©Ahmadhiyya International School Page 5 of 12


Networks, Internet – Write “T” for true or “F” for false
1. Every system connected to the Internet need to have a unique Id. F
2. A unique Id given by a server to a computer is the MAC address. T
3. A unique Id given by a manufacturer to a network device is the MAC address.
4. 192.168.1.35 is an example of an IP address. F
5. IP address is permanent. T
6. MAC address is temporary. T
7. FF:00:12:89:03 is an example of MAC address T
8. Using VOIP facility a user can talk over walky-talky phones F
9. A dial-up connection is not preferred due to its slow connectivity. T
10. Large files can be quickly downloaded using a broadband connection. F
11. The long form of e-mail is emergency mail. F
12. The ISP provides permanent connection to the internet. F
13. A protocol is a set of rules in network communication. T
14. A handshake is a set of rules in network communication.
15. An essential protocol in the internet is http
16. An essential protocol in the internet is html
17. A search engine is a website
18. HTML is made up of structure and presentation
19. Structure defines the style in which the data is to be presented
20. Presentation defines the layout in which the page has to be setup
21. Social networking sites do not allow building of online communities
22. Data is transmitted usually in bits
23. Units of data is usually given in units of bytes per second
24. A blog is in short for a web log
25. A blog is a personal journal.
26. A web browser facilitates the viewing of a website content
27. A part of a URL indicates a protocol it uses
28. Another part of a URL indicates the web server name.
29. One more part of a URL indicates the operating system the server uses.
30. Digital media sharing websites use bit streaming technology.
31. Tagging is basically used to track a user on the internet.
32. In true / live streaming bits of data are sent live to the user’s browser as the event takes place.
33. In on-demand streaming bits of data are sent live to the user’s browser as the event takes
place.
34. Buffering is essential while playing a file online.
35. Interactive maps show both map view and satellite view of a place.
36. An intranet works on internet standards but is limited to the users within an organization.
37. The term internet comes from Internal restricted access network.
38. The term internet comes from international network.
39. The term intranet comes from international network.

©Ahmadhiyya International School Page 6 of 12


Computer Ethics, Input Devices, Validation, Verification – Name the following

1. A set of principles that define the use of computers. Control bus


2. A right that an owner has to make innumerable copies of his/her own work. Data bus
3. Taking someone else’s idea or material and claiming to be your own is: Data / control bus
4. Making illegal copies of legal copyright software is: Address bus
5. A type of software that allows the user to install, distribute and use it for free
of cost. Memory Data R
6. A type of software that provides both the software and the source code. Control unit
7. A type of software which allows a user to try before actually purchasing it. Accumulator
8. Automatic collection of data using sensors for a certain time period is:
9. A device that uses Red LED or laser light to read black and white lines on items
10. A device that contains a microchip and antenna with a working range of 5
metres and used on items in malls, or to track athletes
11. It uses unique characteristics of humans for authentication. Eg: retina scans.
12. A storage stripe found on a bank card.
13. Technology that allows printed text to be scanned, recognised and identified
for computer input.
14. A chip card that has greater protection than a stripe card.
15. A technology that reads pencil / pen marks on a piece of paper in a pre-
defined position.
16. A validation check that checks if data is in a particular pattern.
17. A validation check that checks if data contains the required number of
characters.
18. A validation check that checks if data is within an allowable limit.
19. A validation check that checks values like dates to be in a particular order.
20. A validation check that checks if a field is left blank.
21. A validation check that checks data input goes in line with the previously input
data.
22. The last digit of a barcode used to validate the input by recalculating is:
23. A method of verification where data is entered twice is:
24. A method of verification where original data is cross checked with the data
typed in the computer by just looking at both is:
25. A parity type check where total number of 1s must be an even number is:
26. A method of verification that makes use of acknowledgements and timeouts
to check for errors in transmissions.
27. A method of verification that involves byte sum and a calculation is:

©Ahmadhiyya International School Page 7 of 12


Computer Ethics, Input Devices, Validation, Verification – Write “T” for true or “F” for false

1. Computer ethics is a set of principles that configure the computer’s hardware. F


2. Copyright means that any person has the right to copy. T
3. Plagiarism is taking someone else’s idea or material and claiming to be your own. F
4. Software piracy makes all software private. F
5. According to rules each machine must have legal purchased licensed software installed. T
6. All software need not be purchased, only the OS needs to be legal. T
7. Free software allows the user to install, distribute and use the software for free of cost. T
8. Free software can be sold after bringing up changes. F
9. Freeware refers to software that provides both the software and the source code. T
10. Copyright law does not apply on freeware software. F
11. Shareware software is basically sharing the source code for other programmers. F
12. Shareware needs to be purchased at a later stage. F
13. Shareware gives full features or lasts forever. T
14. Copyright laws apply on shareware software.
15. Data logging is collecting data automatically using sensors.
16. One most suitable application of data logging is a burglar alarm system.
17. A barcode reader makes use of blue laser to read barcodes.
18. Weather data collection is a suitable application of a barcode reader.
19. Radio frequency identifiers contain a microchip and antenna and their range is 20 metres.
20. Biometrics involves use of unique characteristics of humans like retina scans.
21. A magnetic stripe is a small chip found on a bank card.
22. OCR technology allows printed text to be scanned and identified for computer input.
23. A smart card has greater protection than a magnetic stripe card.
24. An OMR reads pencil / pen marks on a piece of paper in a pre-defined position.
25. Reading bank cheques is a suitable application of OMR technology.
26. Range check validation checks if data is in a particular layout.
27. Length check validation checks if data contains the required number of characters.
28. Character type check checks if data is within an allowable range.
29. Format check checks values like dates to be in a particular format.
30. Limit check allows data to be input within a limit.
31. Presence check checks if data is compatible with the previously input data.
32. Compatibility check allows data to be compatible with the previously input data.
33. Compatibility check is the same as consistency check.
34. A check digit is the last digit of a barcode and is always the same number for a country.
35. Double entry is a method of validation where data is entered twice.
36. Visual check is to compare the original data with the data typed in the computer.
37. In even parity the total number of 1s must not be an even number.
38. Parity check is fool proof and it is 100% accurate to detect errors.
39. ARQ makes use of acknowledgements and timeouts to check for errors in transmissions.
40. Checksum is a method of verification that involves byte sum and a calculation.

©Ahmadhiyya International School Page 8 of 12


Fetch Decode Execute Cycle – Name the following

A bus that carries signals relating to addresses between the processor and the
1.
memory. Address bus
A bus that carries signals between devices, memory and processor to
2.
coordinate tasks between them. Control bus
3. A bus that sends data between the processor, the memory unit and
input/output devices. Data bus
4. A bus that travels in both directions. Data / control bus
5. A bus that travels in one direction. Address bus
A register that increments and keeps track of the memory address of which
6.
instruction is to be executed next. Program counter
7. A register in main memory that holds the address of instruction currently being
read or written Memory address R
8. A two-way register that holds data fetched from memory (and ready for the
CPU to process) or data waiting to be stored in memory Memory Data R
9. A register that is a temporary holding ground for the instruction that has just
been fetched from memory Current Instruction R
10. A part of CPU that decodes the program instruction in the CIR, selecting
machine resources such as a data source register and a particular arithmetic
operation, and coordinates activation of those resources Control unit
11. A part of CPU that performs mathematical and logical operations Arithmetic Logical U
12. A register used to contain the results of an arithmetical or logical operation. Accumulator
13. A signal generated by a device or a program when an error occurs. Interrupt

Data Transmission – Name the following


1. A transmission type that allows data to flow in one direction only.
2. Transmission of data between two phones is an example of :
3. A transmission type that allows data transmission to flow in both directions but
one side at a time.
4. Transmission of data between a computer and a printer is an example of:
5. A transmission type that allows data transmission to flow in both directions
simultaneously.
6. Transmission of data between a hard disk and RAM is an example of:
7. A slow type of transmission.
8. A transmission type that needs only one single cable to transmit data.
9. A transmission type that transmits many bits of data at a time.
10. A transmission type that has less chance of errors.
11. A transmission type that has more chance of errors.
12. A transmission type where signals are sent in a previously agreed pattern of
bits.
13. A transmission type where a timing signal is sent along with the data
transmitted.
14. A transmission type that sends both data bits and control bits.
15. An example of synchronous data transmission is:
16. A connectivity that enables a device to be automatically detected.

©Ahmadhiyya International School Page 9 of 12


Fetch Decode Execute Cycle – Write “T” for true or “F” for false

1. Data bus carries signal relating to addresses between the processor and the memory. F
2. Control bus carries signals between devices, memory and processor to coordinate tasks
between them. T
3. Address bus sends data between the processor, the memory unit and input/output devices. F
4. Address bus travels in both directions. F
5. Data bus travels in both directions. T
6. Control bus travels in both directions. T
7. Program counter is an incrementing counter that keeps track of the memory address of which
instruction is to be executed next. T
8. Current Instruction register is the address in main memory that is currently being read or
written F
9. Memory Data Register is a two-way register that holds data fetched from memory (and ready
for the CPU to process) or data waiting to be stored in memory T
10. Memory Address Register is a temporary holding ground for the instruction that has just been
fetched from memory F
11. Arithmetic logic unit decodes the program instruction in the CIR, selecting machine resources
such as a data source register and a particular arithmetic operation, and coordinates activation
of those resources F
12. Control Unit performs mathematical and logical operations F
13. Accumulator is a register used to contain the results of an arithmetical or logical operation. T
14. Buffer is a signal generated by a device or a program when an error occurs.

Data Transmission – Write “T” for true or “F” for false


15. Simplex data transmission allows data to flow in one direction only. F
16. Example of simplex data transmission is transmission of data between two phones. T
17. Half-duplex data transmission allows data to flow in both directions but one side at a time. F
18. Example of half-duplex data transmission is between a computer and a printer. F
19. Full-duplex data transmission allows data to flow in one direction only. T
20. Example of Full-duplex data transmission is transmission of data between a hard disk and RAM. T
21. Serial transmission is slower than parallel transmission. T
22. Parallel transmission needs only one single cable to transmit data. F
23. Serial transmission transmits many bits of data at a time. T
24. Serial transmission has less chance of errors. F
25. Parallel transmission has less chance of errors. F
26. In asynchronous transmission, signals are sent in a previously agreed pattern of bits. F
27. In synchronous transmission, a timing signal is sent along with the data transmitted
28. In asynchronous transmission, data bits and control bits are sent.
29. USB is a method of synchronous data transmission.
30. USB is a parallel standard of transmission of data.
31. USB port enables a connected device to be automatically detected.

©Ahmadhiyya International School Page 10 of 12


Security, Programming Languages – Name the following
Modifying the code of software so that it won’t ask for a license or a serial
1.
number.
2. A computer program that needs a carrier to spread.
An attack where a user types in a website address but the browser is diverted
3. to a fake website
An attack where user clicks on a link in the mail received, but the browser is
4.
diverted to a fake website
5. Key logger is an example of
An offensive way of getting a person’s login details by looking over while the
6.
person keys in the details
Software used to delete any such malicious program installed which usually
7. diverts a browser to a fake website.
Software used to delete or check for any such illegal mails that look legal and
8. may contain links to fake websites.
9. Software which is an effective tool to detect and delete viruses.
10. Software which is an effective tool to prevent any hacking attempts.
11. Software that detects and deletes any spy files.
12. An effective way to restore data in case it gets lost or corrupted is
13. Data loss or corruption of data can be caused due to
14. Unknown, unnecessary mails filling up a mail box is
15. A program that can keep a list of illegal ips and websites and block them is
16. A specially configured computer that can keep a list of illegal ips and websites
and block them is
17. A computer that can help to speed up the access of information from a
website by using a cache is
18. A safe method of sending data to a web server by encrypting data is
19. A website can be considered secure if it starts with
20. An encryption that provides security as well as checks for privacy of data is
21. Exchange of signals between devices to get ready for communication is
22. An encryption type where key distribution is the biggest problem is:
23. An encryption type that uses different key to encrypt and decrypt messages is:
24. The piece of text before encryption is called as:
25. The piece of text after encryption is called as:
26. An example of low level language is:
27. A language that uses English instructions is:
28. A language that is made up of 0s and 1s is:
29. A software that is needed to convert a HLL or LLL program to machine code:
30. A software that converts HLL instructions as soon as it is typed:
31. A software that converts HLL instructions in the end in a single step:
32. A software that converts a LLL (Q No.27) to machine code is:

©Ahmadhiyya International School Page 11 of 12


Security, Programming Languages – Write “T” for true or “F” for false
33. Hacking is modifying the code of software so that it won’t ask for a license or a serial number.
34. A virus is a computer program but it does not need a carrier to spread.
35. In a pharming attack, a user types in a website but browser diverts to a fake website
36. In a phishing attack, a user types in a website but browser diverts to a fake website
37. Wardriving is an act where a user gets an email with a link, clicking the link opens a fake
website
38. Spyware is an example of key logger
39. Shoulder surfing is a way of getting a person’s login details by looking over while it is keyed in
40. Anti-phishing software could be used to delete viruses in a computer.
41. Anti-pharming software could be used to remove key loggers.
42. Anti-virus software is an effective tool to stop hacking.
43. A firewall prevents any hacking attempts and blocks such IP addresses.
44. A firewall could be used to prevent a wardriving attack.
45. Anti-spyware software prevents any spyware attack, detects and deletes spyware.
46. Installing anti-phishing software can prevent a person from being a victim of shoulder surfing.
47. Taking regular backups is an effective way to restore data in case it gets lost or corrupted.
48. Hardware crash can cause loss of data or corruption of data.
49. Phishing attack can also cause corruption of data files.
50. Password protecting a computer system or data files is also a precautionary method of safety.
51. The aim of spamming a computer is to delete files in it.
52. Spam is unnecessary mails from unknown companies or individuals in the mail box.
53. A cookie is a spy file which sends information a programmer regarding internet usage.
54. A hardware firewall is more powerful than a software firewall.
55. A firewall can keep a list of illegal ips and websites and block them.
56. A proxy server can keep a list of illegal ips and websites and block them.
57. A proxy server can help to speed up the access of information from a website by using a cache
58. The long form of SSL is secret sending layer.
59. SSL is a safe method of sending data to a web server by encrypting data.
60. Presence of “http” in a website address indicates it is safe to send information.
61. The long form of TLS is Tele Layer Secret.
62. TLS ensures privacy of data besides security while sending.
63. Handshake is the exchange of signals between devices before getting ready for communication.
64. Symmetric encryption faces the biggest problem with key distribution.
65. Asymmetric encryption uses the same key to encrypt and decrypt.
66. Plain text is the text before encryption.
67. Assembly language is an example of low level language.
68. Assembly language need not be converted to machine code.
69. High level language program is also called source code.
70. A compiler translates assembly language into machine code.
71. An interpreter creates another file after translation called as object code.
72. An interpreter is good to use as mistakes can be corrected faster.

©Ahmadhiyya International School Page 12 of 12

You might also like