GR 10 Olev Exam Notes & Questions by Harshvardhan Sir Computer Science Cie Igcse
GR 10 Olev Exam Notes & Questions by Harshvardhan Sir Computer Science Cie Igcse
A DOCUMENT SCANNER:
The cover is first raised thenthe document is placed on a glass panel and then the cover is closed.
A bright light then illuminates the document - modern scanners use a type of xenon lamp which
produces a very bright white light.
A scan head moves across the document until the whole pagehas been scanned. An image of the
document is produced whichis then sent to alens using a series of mirrors.The lens focuses the
document image.
The focused image now falls onto a charge couple device (CCD) which consists of a number of
integrated circuits etched into silicon.
Essentially the CCD is made up of thousands of light-sensitive elements (or pixels). Each element
creates an electric charge when light falls on it. This charge is sent to the ADC to convert it into
digital values. Software produces a digital image from these digital values.
Application of 2D scanners at an airport:
2D scanners are used at airports to read passports. They make use of OCR technology to produce
digital images and select the text part and then automatically put the text into the correct fields of
an existing database.
At many airports the two-dimensional photograph in the passport is also scanned and stored as a
jpeg image. The passenger's face is also photographed using a digital camera (a 2D image is taken
so it can be matched to the image taken from the passport). The two digital images are compared
using face recognition/detection software. Key parts of the face are compared.
The face in the picture above shows several of the positions used by the face recognition software.
Each position is checked when the software tries to compare two facial
images.
Data such as:
• distance between the eyes
• width of the nose
• shape of the cheek bones
• length of the jaw line
• shape of the eyebrows are all used to identify a given face.
When the image from the passport and the image taken by the camera are compared, these key
positions on the face determine whether or not the twoimages represent the same face.
3D SCANNERS:
3D scanners scan solid objects and produce a tree-dimensional image. Since solidobjects have x, y
and z coordinates, these scanners take images at several points alongthese coordinates. A digital
image which represents the solid object is formed.
The scanned images can be used in COMPUTER AIDED DESIGN (CAD) orsent to a 3D printer to
produce a working model ofthe scanned image.
5 4 3 0 5 2
Guard Bars
L DD L L L D
0 1 1 0 0 0 1
Digital Cameras:
Digital cameras are controlled by a microprocessor which can automatically carry out the following
tasks:
• adjust the shutter speed • focus the image automatically • operate the flash
automatically
• adjust the aperture size • adjust the size of the image • remove 'red eye' when
the flash has been used
Working:
The photograph is captured when Light passes through the lens onto a Light sensitive cell (Sensor).
This cell is made up of tiny elements known as pixels. The numberof pixels determine the size
ofthe file used to store the photograph (e.g. a14-megapixel camera will need 42 megabytes to
store each raw (uncompressed) photograph. By reducing the resolution to, for example, a jpeg
Sensor Application
Temperature • control a central heating system
Sensor • control/monitor a chemical process
• control/monitor the temperature in a greenhouse
• control/monitor the moisture levels in soil in a greenhouse
Moisture/Humidity • control/monitor the humidity levels in the air in a greenhouse
Sensor • monitor dampness levels in an industrial application (e.g.,
monitor moisture in a paint spray booth in a car factory)
• switch street lighting on at night and off during the day
• monitor/control light levels in a greenhouse
Light Sensor • automatically switch on a car's headlights when it gets dark
• used in mobile phones to automatically help in increase or decrease screen
brightness
• turn on the windscreen wipers on a car automatically
Infra-Red/Motion
•detect intruders in a burglar alarm system
Sensor
• count people entering/leaving a building
• detect intruders in a burglar alarm system
Pressure Sensor • weigh things (e.g. check the weight of a vehicle)
• monitor/control a process where gas pressure is important
Acoustic /sound • pick up noise levels (e.g. footsteps) in a burglar alarm system
Sensor • detect the noise of liquids dripping in a pipe
Microphone
A microphone is used to input voice / sound into the computer
Working Principle:
When you speak, sound waves created by your voice carry energy toward the microphone.
Remember that sound we can hear is energy carried by vibrations in the air.
Inside the microphone, the diaphragm moves back and forth when the sound waves hit it.
The coil, attached to the diaphragm, moves back and forth as well.
The permanent magnet produces a magnetic field that cuts through the coil. As the coil moves
back and forth through the magnetic field, an electric current flows through it.
The electric current flows out from the microphone to an amplifier or sound recording device.
The electric current is sent through an ADC to convert the analogue current into digital / binary
pattern. This is then stored in a storage device.
Microphone is usually used for Speech Recognition and speech – to – text applications.
OLED
Organic LEDs use Carbon compounds. These are capable of emitting light as well as form the
display panel. Hence no need for a backlight. In the future OLEDs can be used to make thin
bendable displays.
Interactive Whiteboard: A device that uses a touchscreen to input data and a projector to project
visuals on itself.
3. PRINTERS
a. Character printers
b. Line printers
c. Page printers.
Non-Impact printers: These printers use techniques such as ink spray, heat, or laser etc.
Here characters are not formed by mechanical print.
a. Character printers: Print only one character at a time, like a typewriter. As a result, the
speed decreases.
DOT MATRIX PRINTER (Character Printer):
Old technology printers; make use of ink ribbon; mostly single coloured; the head consists of
a matrix of pins that hit the paper;
Advantages:
• They work with continuous stationery which means they can do very large print jobs
without any human interaction. • Multi-part stationery printing allowing more than one
document to be printed in one print using carbon copies in-between. • Very cheap. • Can
work in various atmospheres. • Can also print in Braille for the blind to touch and feel the
characters.
Disadvantages:
•Initial expenses are high. •Very noisy while printing. •Very slow and very low resolution as
characters are formed by dots
Applications:
• Mostly used to print bills in mini markets, shops, retail outlets, cafes etc.• Printing
payslips.
3 A check is made by the printer driver to ensure that the chosen printer is available to print
(e.g. is it busy, is it off line, is it out of ink, and so on)
4 The data is then sent to the printer and it is stored in the printer buffer
5 A sheet of paper is then fed into the main body of the printer; a sensor detects whether
paper is available in the paper feed tray - if it is out of paper (or the paper is jammed) then
an error message is sent back to the computer
6 As the sheet of paper is fed through the printer, the print head moves from side to side
across the paper printing the text or image; the four ink colours are sprayed in their exact
amounts to produce the desired final colour
7 At the end of each full pass of the print head, the paper is advanced very slightly to allow the
next line to be printed; this continues until the whole page has been printed
8 If there is more data in the printer buffer, then the whole process from stage 5 is repeated
until the buffer is finally empty
9 Once the printer buffer is empty, the printer sends an interrupt (see Section 4.3) to the
processor in the computer; this is a request for more data to be sent to the printer; the
whole process continues until the whole of the document has been printed
Advantages:
• Initial costs are cheap. • Good quality print resolution. • Less noisy. • Faster than dot
matrix printers.
Disadvantages:
• Ink cartridges expensive to buy. • Ink does not last as long as dot matrix printer or laser
printer.
Applications:
• Used at homes and offices for general printing. • Can be used to print photographs on
glossy paper.
2 The printer driver ensures that the data is in a format that the chosen printer can understand
3 A check is made by the printer driver to ensure that the chosen printer is available to print (e.g.
is it busy, is it off line, is it out of ink, and so on)
4 The data is then sent to the printer and it is stored in the printer buffer
5 The printing process involves a printing drum given a positive charge; as this drum rotates, a
laser beam is scanned across it removing the positive charge in certain areas; this leaves
negatively charged areas which exactly match the text/images of the page to be printed
6 The drum is then coated with positively charged TONER (powdered ink); since the toner is
positively charged, it only sticks to the negatively charged parts of the drum
8 The toner on the drum now sticks to the paper to produce the print
9 To prevent the paper sticking to the drum, the electric charge on the paper is removed after
one rotation of the drum
10 The paper finally goes through a fuser which is a set of heated rollers; the heat melts the ink so
that it fixes permanently to the paper
11 At the very end, a discharge lamp removes all the electric charge from the drum making it ready
to print the next page
Advantages:
• Very low noise. • Extremely fast. • Toner cartridges last long. • Very clear and high
resolution prints.
Disadvantages:
• Colour toner cartridges are expensive. • Ozone and volatile organic matter produced while
printing can be harmful in an office environment.
Applications:
Used in offices for quick and high quality prints.
The finalised drawing is imported into some special software that prepares it in a format which
is understood by the 3D printer
The solid object is built up layer by layer (often only 0 .1 mm thick); this can take several hours,
depending on the thickness of the layers, the material used and the size of the final object
The object is removed from the printer and is then prepared; for example, some use a jelly-
like support which needs to be washed away by immersion in water, some require the
removal of excess plastic powder and others require the cutting away of unused material; in
many cases, the object has to be left to 'cure' for a few hours
Advantages:
• Useful to print prototypes at ease. • variety of objects can be printer or made. • Spare
parts that are no longer available can be made.
Disadvantages:
• Initially expensive.
Applications:
Used in CAD so that individuals can come up with prototypes.
Thermal printers: They create print images on special heat sensitive paper by heated wires
in the print head.
Graph Plotters
Plotter: A plotter is a device that uses a mechanism to drive pens in defined horizontal-
vertical motions to produced combined text and graphics output on paper. They are ideal
for maps, plans, line diagrams, 3D drawings, CAD drawings etc.
Speaker
A speaker is an output device that outputs sound. Sound is stored in the computer as a binary or
digital file. When the file is played the digital values are converted an analogue voltage using DAC.
The voltage is amplified using an amplifier and sent to the speaker. The voltage variations make
the cone in the speaker vibrate producing sound.
Electrical signals: Sometimes the output from the computers can be electrical signals. They
are used to control devices such as heating systems (A/c), or alarms etc.
Robots: Electrical signals from a computer can be used to control a robot arm. Ex. Excavator
Actuators: Electrical signals from a computer can start or stop a device. Ex: Electric motor.
2D and 3D Cutters
A 3D laser cut is similar to a 2D cut except it is able to recognise the object in an x-y-z direction
rather than in just two dimensions. Solid objects like glass, wood, and metals can be easily cut
using 3D cutters.
The Internet: The International Network; the Internet can be described as a single network of
different networks in the world.
WWW: World wide website. This means that a website can be viewed / accessed from any
part of the word, once connected to the Internet. It is a part of the Internet where graphics,
sound, video, animation and text are used. A single word for all this mix of media is “hyper
text”.
ISP (Internet Service Provider):
The ISP provides a permanent connection to the Internet. When you log on, your modem dials
the number of the ISP and when your password is validated you are allowed to access their
server. Ex. Dhivehinet in Maldives. AOL in America, BT in Europe.
Web Browser: A web browser is a program that allows access to the Internet and view a
website. Ex. Internet Explorer, Netscape Navigator, Mozilla Firefox etc.
Features of web browser: search, history & favourites tool, navigation buttons, refresh etc.
Domain Name: A domain name is simply the name of an Intranet or Internet site or address.
Look at this URL (Uniform Resource Locator) - http://www.moe.edu.mv/olevelfee.pdf
http: indicates the protocol being used
www.moe.edu.mv: is the website name / domain name / web server name
olevelfee.pdf: is the name of a file available to download or view
Protocol: Is a set of rules in network communication. IP, TCP, FTP are a few types.
Internet Protocol: A set of rules observed in Internet communication.
IP Address: Every computer / device on the internet is assigned a unique address known as
the IP address. IP address may change within a network. IP addresses are usually assigned by
a web server. Likewise web servers and ISPs also have IP address. IP address is essential for
communication. The IP address of a web server / ISP is almost permanent and never changes.
The IP address is a 32 bit number, which is usually given in the decimal format. It has four
sections and the maximum number for each section is 255 (0-255).
The maximum number of combinations that could be achieved is 256 ^ 4 which sums up to
roughly 4, 294, 967, 296 computers / devices. This is over 4 billion. This is also called IPv4.
As the number of computers / devices connected to the Internet are ever increasing, there is
a fear that the number would cross 4 billion. Hence a new standard has been introduced to
name the devices. This is IPv6. It allows more devices to be on the internet without the fear of
ip address being exhausted.
The pattern used in IPv6 is 128 bit pattern in each section and the address has full 8 sections.
MAC Address: It is a unique number that identifies a device connected to the Internet. MAC
stands for Media Access Control. It consists of six parts. The first three represent the
Manufacturer ID and the next three represent the hardware ID. MAC addresses are
permanent and are given at the manufacturing unit.
HTML Structure:
Structure is the content of the webpage which is typed within html tags. The content wouldn’t
change. The structure does not mention how the content should appear on the webpage.
Ex: “Welcome to my page! Let’s see if we can learn css”
The above example shows the content and it is within the <p> </P tag.
All of the above forms the structure.
Home.html
<html>
<head>
<title>Home</title>
</head>
<h1This is the home page </h1>
<p>Welcome to my page! Let’s see if we can learn css</p>
<body>
My website is about me, my friends and family and my hobby.
</body>
</html>
HTML Presentation:
Presentation is the style of the document. It has instructions that tell how the content should
be presented.
Ex: <font color = “blue”> This is the home page </font>
This tag instructs that the content should appear in blue colour font.
If a website has 20 web pages, then defining the presentation in each page is time consuming
and a difficult task.
Instead a CSS (Cascading Style Sheet) file can be used, and presentation of each style could be
defined in the CSS file.
Once the CSS file’s link is typed in all the web pages, each web page will now start presenting
the content as defined in the CSS file.
Home.html Style.css
<html>
<head> body {
<title>Home</title> padding-left: 11em;
<link rel="stylesheet" href="style.css"> font-family: calibri, "Times New Roman",
</head> Times, serif;
<h1This is the home page </h1> color: black;
<p>Welcome to my page! Let’s see if we can learn css</p> background-color: #ff00ff }
<body>
My website is about me, my friends and family and my hobby.
</body>
</html>
Hypertext transfer protocol (http): Set of rules that should be observed when html files are
transferred across the Internet.
Data Transmission: It refers to the movement of data in the form of bits between two or more
digital devices.
Data can be transmitted using metal cables, fibre optic cables or via wireless connections.
Metal cables can be co-axial copper cable used in cable TV networks; or twisted pair cable used in
most LANs.
Fibre optic is a glass or fibre cable which transmits data in the form of a light signal. It is usually
very fast as light travels fast.
Wireless method of transmission use radio waves, infra-red waves, microwaves etc for data
transmission wirelessly. Satellites and mobile phone communications use microwaves.
Wi-fi is a most common method of data transmission.
Bandwidth: The rate of transfer of data. Usually measured in kilobits per second (kbps) or
kilobytes per second (KBps). 8kbps = 1KBps
Parallel transmission: In parallel transmission, all the bits of data are transmitted
simultaneously on separate communication lines. It is used between short distances. Integrated
circuits are the best example of the use of Parallel Transmission.
Advantages Disadvantages
Faster transmission of data Greater chance of error due to interference
Needs more cabling
Suitable only for short distances
Serial transmission:
In serial transmission, bits of data are transmitted serially one after the other. It requires only one
communication line rather than several lines to transmit data from sender to receiver.
Advantages Disadvantages
Less chance of errors Slower transmission of data
Less cabling required
Suitable for long distance transmission
When a device is plugged into a computer using one of the USB ports:
the computer automatically detects that a device is present (this is due to a small change
in the voltage level on the data signal wires in the cable)
the device is automatically recognised, and the appropriate DEVICE DRIVER is loaded up
so that computer and device can communicate effectively
if a new device is detected, the computer will look for the device driver which matches
the device; if this is not available, the user is prompted to download the appropriate
software.
Parity checks
Parity checks can be even (even number of 1 - bits) or odd (odd number of 1 -bits).
One of the bits is known as the parity bit.
Parity blocks allow an erroneous bit (following data transmission) to be identified.
If the parity of a byte of data hasn’t changed (but there is still an error following transmission),
then it is impossible using this method to identify where the error has occurred.
Even Parity (Even number of 1s) Odd Parity (Odd number of 1s)
0 1 1 0 1 1 0 0 1 1 1 0 1 1 0 0
Checksum
Data is sent in blocks.
An additional value, called the checksum, is sent at the end of the block of data.
The Checksum is based on the number of bytes in the block.
If the checksum at the receiver’s end doesn’t match the Checksum at the end of the data
block, then an error in transmission has occurred.
If the sum of the bits of data (Byte sum) is <=255 then the checksum is the same value itself.
If the sum of the bits of data is >255 then a method shown below is used to calculate the
checksum.
Example: Byte sum is 1185
Step 1. Let X = 1185
Step 2. Divide 1185 by 256, the answer is 4.629. So Y = 4.629
Step 3. Round Y to the nearest whole number, so Y = 4
Step 4. Multiply Y with 256 you get 1024, so Z = 1024
Step 5. Subtract Z from X (X - Z); 1185-1024 = 161.
Step 6. Checksum is 161
Calculate the checksum for a block of data with the byte sum 1450.
Echo check
Received data is returned to the sender by the receiving computer.
The sender compares the data sent with the data received back.
If different, then an error has occurred somewhere in the process.
2. Fire: Accidental or deliberate fire can damage the computer and all the data in
it.
Precaution: Use fire proof doors and windows, use fire extinguisher and use
smoke detectors / fire alarms.
3. Lightning: Lightning can also cause severe damage to the computer system.
Precaution: Use earth and lightning conductors.
4. Water: Water can also damage the computer and data in it (floods, cyclones
and tsunami)
Precaution: keep the computer system away from water; don’t bring coffee or
tea (liquids) near the computer or the keyboard.
5. Dust: Dust can cause interruptions in data flow as it might jam the connection
ports.
Precaution: Keep the doors closed, and use a vacuum cleaner if possible.
6. Heat: Higher temperature can damage the disks and the computer system.
Precaution: Use an Air conditioner; make sure exhaust fans in the systems work;
7. Electricity: Short circuits, low and high voltages can severely damage the
computer and the disks in it.
Precaution: Use UPS or current stabiliser; circuit breakers
7. Cookie: A cookie is a small text file that is stored on a user’s web browser. The
cookie is set by request by a web server to a web browser. A cookie is entirely
‘passive’ and does not contain software programmes, a virus or spyware.
Cookies actually remember the last settings a user chose on the website. This is
©A IS DA TA S EC UR ITY C OM P UTER SC I ENC E – 2 2 1 0 P age 2 of 6
easy as the user need not go to preferences and set preferences on the webpage
again. Cookies are harmless but spyware programs can make use of the
information which cookies contain and raise security issues.
Firewall: Firewalls can be either software or hardware. It sits between the user's
computer and an external network (e.g. the internet.) and filters information in
and out of the computer.
Limits of Firewall:
• It cannot prevent individuals, on internal networks, using their own modems
to bypass the firewall
©A IS DA TA S EC UR ITY C OM P UTER SC I ENC E – 2 2 1 0 P age 3 of 6
• Employee misconduct or carelessness cannot be controlled by firewalls (for
example, control of passwords or use of accounts)
• Users on stand-alone computers can choose to disable the firewall, leaving
their computer open to harmful 'traffic' from the internet.
Proxy Server: Proxy servers act as an intermediary between the user and a web
server
Web browser Web browser
sends request request forwarded
User’s Proxy Web
Computer Server Server
Web server Web server send
response is filtered back response to
proxy server
Functions of proxy server include:
• allowing the internet 'traffic' to be filtered; they can block access to a website
if necessary (similar type or reaction as a firewall)
• by using the feature known as a cache, they can speed up access to
information from a website; when the website is first visited, the home page is
stored on the proxy server; when the user next visits the website, it now goes
through the proxy server cache instead, giving much faster access
• keeping the user's IP address secret — this clearly improves security
• acting as a firewall
Authentication methods
Password: A most common method of verifying user authenticity by comparing
the input username / password with one securely stored in the computer.
Digital Signature: A digital code (generated and authenticated by public key
encryption) which is attached to an electronically transmitted document to
verify its contents and the sender's identity.
Biometrics: Biometrics is the technical term for body measurements and
calculations. It refers to metrics related to human characteristics. Biometrics
authentication is used in computer science as a form of identification and access
control
KEY
2. Asymmetric Encryption
Asymmetric encryption uses a pair of keys namely public key, and a
private key to encrypt and decrypt messages when communicating.
Public key is made available to everybody
Private key is only known to the server
Plain text which is encrypted by public key can be decrypted only by a
private key
Free software: It is software which is free to download to use along with its source code with
which it was made. Users are free to modify, copy and adapt the code. There is no copyright
involved.
Freeware: It is software that a user can download from the Internet for free. Users do not have
any access to the source code. Copyright laws apply and the user is not allowed to republish or sell
this software.
Shareware: It is software that a user can download for free but it is limited in features to use or
can be used with all features but for a limited period of time. After the lapse of the time period,
the user needs to purchase the software to continue to use it.
SOFTWARE
Software: It can be defined as a group of programs for doing a special task / job.
Program: A program can be defined as a set of instructions to solve a problem.
Categories:
All software can be broadly classified into three categories: Operating System (Systems software),
Application Software and Utility software.
Operating System (system software): It is the main software that manages the resources of a
computer system, mainly peripherals, processor, memory, and other software. Without the OS a
computer would be useless, so the first thing the computer looks on when it is switched on is for
the OS.
Examples: DOS, UNIX, WINDOWS XP, LINUX, MAC OS X, SYMBIAN etc.
The
No processor
Any data to
send to continues
printer? with its Human Computer
Interface (HCI)
tasks
Input and output Multitasking
Yes control
Memory
CPU Unit
Key I/O
Control Bus device
Input
Data Bus
and
Address Bus
Output
I/O
device
Bus: It is a distinct set of conductors carrying data and control signals within a computer system,
to which pieces of equipment may be connected.
Registers/circuits involved
The circuits used in the CPU during the cycle are:
Program Counter (PC) - an incrementing counter that keeps track of the memory address of
which instruction is to be executed next.
Memory Address Register (MAR) - the address in main memory that is currently being read
or written
Memory Buffer / Data Register (MBR / MDR) - a two-way register that holds data fetched
from memory (and ready for the CPU to process) or data waiting to be stored in memory
Current Instruction register (CIR) - a temporary holding ground for the instruction that has
just been fetched from memory
Accumulator - a register used to contain the results of an arithmetical or logical operation.
Control Unit (CU) - decodes the instruction in the CIR, selecting machine resources such as a
data source register and a particular arithmetic operation, and coordinates activation of
those resources
Arithmetic logic unit (ALU) - performs mathematical and logical operations
This address is then copied from the PC to the memory address register (MAR), this is done using the address bus
The contents (instruction) at the memory location (address) contained in MAR are then copied temporarily into the
memory data register (MDR)
The contents (instructions) of the MDR are then copied and placed into the current instruction register (CIR)
The value in the PC is then incremented by 1 so that it now points to the next instruction which has to be fetched
The instruction is finally decoded and then executed by sending out signals (via the control bus) to the various
components of the computer system
MPEG-4 (MP4) files are slightly different to MP3 files. This format allows the storage of multimedia
files rather than just sound. Music, videos, photos and animation can all be stored in the MP4
format. Videos, for example, could be streamed over the internet using the MP4 format without
losing any real discernable quality. MP4 is also lossy compressed file. It used both audio and image
compression to compress.
The same image stored in jpeg format would probably occupy between 0.6 megabytes and 1.8
megabytes. Jpeg relies on certain properties of the human eye and, up to a point, a certain
amount of file compression can take place without any real loss of quality. The human eye is
limited in its ability to detect very slight differences in brightness and in colour hues. For example,
some computer imaging software boasts that it can produce over 40 million different colours —
the human eye is only able to differentiate about 10 million colours.
A bus that carries signals relating to addresses between the processor and the
1.
memory. Address bus
A bus that carries signals between devices, memory and processor to
2.
coordinate tasks between them. Control bus
3. A bus that sends data between the processor, the memory unit and
input/output devices. Data bus
4. A bus that travels in both directions. Data / control bus
5. A bus that travels in one direction. Address bus
A register that increments and keeps track of the memory address of which
6.
instruction is to be executed next. Program counter
7. A register in main memory that holds the address of instruction currently being
read or written Memory address R
8. A two-way register that holds data fetched from memory (and ready for the
CPU to process) or data waiting to be stored in memory Memory Data R
9. A register that is a temporary holding ground for the instruction that has just
been fetched from memory Current Instruction R
10. A part of CPU that decodes the program instruction in the CIR, selecting
machine resources such as a data source register and a particular arithmetic
operation, and coordinates activation of those resources Control unit
11. A part of CPU that performs mathematical and logical operations Arithmetic Logical U
12. A register used to contain the results of an arithmetical or logical operation. Accumulator
13. A signal generated by a device or a program when an error occurs. Interrupt
1. Data bus carries signal relating to addresses between the processor and the memory. F
2. Control bus carries signals between devices, memory and processor to coordinate tasks
between them. T
3. Address bus sends data between the processor, the memory unit and input/output devices. F
4. Address bus travels in both directions. F
5. Data bus travels in both directions. T
6. Control bus travels in both directions. T
7. Program counter is an incrementing counter that keeps track of the memory address of which
instruction is to be executed next. T
8. Current Instruction register is the address in main memory that is currently being read or
written F
9. Memory Data Register is a two-way register that holds data fetched from memory (and ready
for the CPU to process) or data waiting to be stored in memory T
10. Memory Address Register is a temporary holding ground for the instruction that has just been
fetched from memory F
11. Arithmetic logic unit decodes the program instruction in the CIR, selecting machine resources
such as a data source register and a particular arithmetic operation, and coordinates activation
of those resources F
12. Control Unit performs mathematical and logical operations F
13. Accumulator is a register used to contain the results of an arithmetical or logical operation. T
14. Buffer is a signal generated by a device or a program when an error occurs.