Computer Science (Theory)
Computer Science (Theory)
1. Data Representation
1.1. Number Systems
Binary System
Base 2 number system
• It has two possible values only (0 and 1)
• 0 represents OFF, and 1 represents ON
**A point to be noted is that the most left bit is called the MSB (Most Significant Bit)
Denary System
• Base 10 number system
• Has values from 0 to 9 Hexadecimal (aka Hex)
• As can be seen it starts from 1 and then goes to 128 from left to right
• Now values with 1 are to be added together, giving the final answer, as for the example, it is 128 + 64 + 32 + 8 + 4 + 2 = 23 8
• Note that when the value itself is not divisible by 2, it is divided by the previous value of the current number and 1 is add ed to the remainder column for that
specific number
• When you reach 0, the remainder has to be read from bottom to top giving us the binary value ( as in this case, it is 1 0 0 0 1 1 1 0 )
Points to Note:
- 0+0=0
- 1+0/0+1=1
- 1 + 1 = 0 (1 carry)
- 1 + 1 + 1 = 1 (1 carry)
• Overflow When adding two values, if the solution exceeds the limit of given values,
e.g., the solution has 9 bits, but the question had 8 bits per value, the 9th bit (most left bit) is called overflow.
• This indicates that the memory doesn’t have enough space to store the answer to the addition done in the previous part.
**Note: We move from RHS to LHS, and when adding values, we use the rules given above.
If the bit crosses the limit (overflows), we put the value in brackets, denoting it is overflow.
Logical Shifts
• The logical shift means moving a binary value to the left or the right
• When doing a logical shift, keep in mind that the bit being emptied is going to become 0
-128 + 32 + 16 + 8 + 2 = -70
Memory Dumps
• Hexadecimal is used when developing new software or when trying to trace errors.
• Memory dump is when the memory contents are output to a printer or monitor.
Unicode
• ASCII does not contain all of the international languages thus, Unicode is used to solve this problem
• The first 128 values are the same as ASCII.
• Unicode supports up to four bytes per character, storing multiple languages and more data.
• To represent text in binary, a computer uses a character set, a collection of characters and the corresponding binary codes t hat represent them.
Sound
• Sound is analogue, and for it to be converted to digital form, it is sampled
• The sound waves are sampled at regular time intervals where the amplitude is measured.
• However, it cannot be measured precisely, so approximate values are stored
Sampling Resolution:
• The number of bits per sample is known as the sampling resolution (aka bit depth)
• Increasing the sampling resolution increases the accuracy of the sampled sound as more detail is stored about the amplitude o f the sound.
• Increasing the sampling resolution also increases the memory usage of the file as more bits are being used to store the data.
Sampling Rate
• The sampling rate is the number of sound samples taken per second, which is measured in Hertz (Hz)
• A higher sampling rate would allow more accurate sound as fewer estimations will be done between samples.
Images
Bitmap Images
• Bitmap images are made up of pixels
• A bitmap image is stored in a computer as a series of binary numbers
Colour Depth
• The number of bits representing each colour is called the colour depth.
• An 8-bit colour depth means that each pixel can be one of 256 colours (because 2 to the power of 8 = 256)
• A 1-bit colour depth means each pixel can store one colour (because 2 to the power of 1 is 2) - ( This is done as the bit can either be 0 or 1, with 0 being white
Image Resolution
• Image resolution refers to the number of pixels that make up an image; for example, an image could contain 4096 × 3072 pixels .
• Photographs with a lower resolution have less detail than those with a higher resolution.
• When a bitmap image is ‘ blurry ‘ or ‘ fizzy ’ due to having a low amount of pixels in it or when zoomed, it is known as bein g pixelated.
• High-resolution images use high amounts of memory as compared to low-resolution ones.
Conventional System
Name of memory size No. of Bytes Equivalent Denary Value
1 kilobyte (1KB) 10 3 1 000 bytes
1 megabyte (1MB) 10 6 1 000 000 bytes
1 gigabyte (1GB) 10 9 1 000 000 000 bytes
1 terabyte (1TB) 10 12 1 000 000 000 000 bytes
1 petabyte (1PB) 10 15 1 000 000 000 000 000 bytes
MP3
• It uses technology known as Audio Compression to convert music and other sounds into an MP3 file format
• This compression reduces the normal file size by 90%
○ Done using file compression algorithms, which use Perceptual Music Shaping
○ Removes sounds that the human ear cannot hear properly
○ Certain sounds are removed without affecting the quality, too much
• CD files are converted using File Compression Software
• Use lossy format as the original file is lost following the compression algorithm
MP4
• This format allows the storage of multimedia files rather than just sound
• Music, videos, photos and animations can be stored
• Videos could be streamed without losing any real discernible quality
Run-Length Encoding
• It reduces the size of a string of adjacent, identical data (e.g. repeated colours in an image)
• A repeating string is encoded into two values: the first value represents the number of identical data items (e.g. characters ), and the second value represents
the code of the data item (such as ASCII code if it is a keyboard character), e.g. ‘aaaaabbbbccddddd’ becomes “05 97 04 98 02 99 05 100.”
• RLE is only effective where there is a long run of repeated units/bits
• One difficulty is that RLE compression isn't perfect for strings like " cdcdcdcdcd".
• We use a flag to solve this; e.g., 255 can be made as the flag. Now 255 will be put before every repeating value, e.g. our pr evious example becomes 255 05 97
255 04 98 255 02 99 255 05 100 where 255 now indicates that the next character/set of characters is approaching
Advantages Disadvantages
There is no need to create a single line of communication Packets may be lost
Possible to overcome failed or busy nodes More prone to errors in real-time streaming
High data transmission speed Delay at the receiver while the packets are being reordered
Easy to expand package usage
Data Transmission
• Simplex data transmission is in one direction only (e.g. computer to printer)
• Half-duplex data transmission is in both directions but not at the same time (e.g., in a phone conversation where only one person speaks)
• Full-duplex data transmission is in both directions simultaneously (e.g. broadband connection on the phone line)
• Serial data transmission is when data is sent one bit at a time over a single wire
• Parallel data transmission is when data of several bits (1 byte) are sent down several wires at the same time.
Advantages Disadvantages
Automatically detected Transmission rate is less than 120 MB/sec
Only fit one way, prevents incorrect connections Maximum cable length is about 5 metres
Different data transmission rates
Backwards compatible
Industry-standard
• The LMB (Left-Most Bit) is the parity bit. As the number of 1s is even, the parity bit would be set to even.
• Any changes in bits would be identified through the rows and columns
Checksum
• Whenever a block of data needs to be sent, the sender would calculate the checksum value using a specific algorithm.
• Once the data has been sent, The receiver would calculate the checksum again with the same set of data and the same algorithm used before.
• The receiver would then compare the value received and the newly calculated value. If they aren’t matched, A request is made to re-send the data.
Echo Check
• Once the data has been sent, The receiver will send the data back to the sender for verification.
• The sender would compare the received and original data for errors.
• The only downside is that we wouldn’t know if the error occurred when sending the data or sending the data back for verificat ion.
Check Digits
• Check digits are calculated from all the other digits in the data (ex -codes).
• The check digit would be the last digit of the code.
• These are used to identify mistyping errors such as -
○ 6372 typed as 6379
○ 8432 typed as 842
2.4. Encryption
• Encryption is a process of turning the data into an unreadable form so it doesn’t make sense to hackers and other attackers.
Busses:
• Carry data through components.
• The following are its types.
○ Address bus – unidirectional
○ Data Bus – bi-directional
○ Control Bus – bi-directional
Memory Concept
• A computer’s memory is divided into partitions: Each partition consists of an address and its contents, e.g.
MEMORY LOCATION CONTENT
10101010 01010110
Instruction Set:
• An instruction set is a list of all the commands that a CPU can process, and the commands are machine code
Overclocking
Cache
• Cache memory is located within the CPU itself
• -- allows faster access to the CPU
• -- stores frequently used instructions and data that need to be accessed faster, which improves CPU performance
The larger the cache memory size, the better the CPU performance
Cores
• The more cores in the CPU, the better and faster the performance
• But if any number of cores are used, it could possibly slow down the system performance as the communication between each core increases, and so do the
data cables between each. Which in turn reduces the potential system performance.
• You might have heard about quad and dual cores, not septa or octa cores.
Three-dimensional Scanners
• 3D scanners can scan solid objects and produce a three-dimensional image
• Scanners take images at several points, x, y and z (lasers, magnetic, white light)
• The scanned images can be used in Computer-Aided Design (CAD) or in a 3D printer to produce a working model
Barcode readers/scanners
• A barcode is a series of dark and light parallel lines of varying thicknesses
• The numbers 0 -9 are each represented by a unique series of lines
• The left and right-hand sides of the barcode are separate using guard bars
• Allows barcode to be scanned in any direction
○ The barcode is read by a red laser or red LED
○ Light is reflected off the barcode; dark areas reflect little light, which allows the bars to be read
○ Reflected light is read by sensors (photoelectric cells)
○ The pattern is generated, which is converted to digital
Digital Cameras
• It is controlled by a microprocessor that adjusts the shutter speed, focuses the image, etc.
• Photo is captured when light passes through the lens onto a light sensitive cell
• The cell is made up of pixels
• The number of pixels determines the size of the file
Keyboards
• Connected to a computer with a USB connection or by wireless connection
• Each character has an ASCII value and is converted into a digital signal
• Slow method
• Prone to errors
Pointing devices
• Mouse/trackball
Traditional mechanical ball, connected by USB port
Microphones
• Used to input sound to a computer
• When a microphone picks up sound, a diaphragm vibrates, producing an electric signal
• The signal goes to a sound card and is converted into digital values and stored in a computer
• Voice recognition: voice is detected and converted into digital
Touchscreens
• Capacitive (medium cost tech)
○ Made up of many layers of glass
○ Creating electric fields between glass plates in layers
○ When the top layer of glass is touched, electric current changes
○ Co-ordinates where the screen was touched are determined by an on -board microprocessor
• Infra-red heat (expensive)
○ Use glass as the screen material
○ Needs a warm object to carry an input operation
• Infra-red optical (expensive)
○ Uses glass as screen material
○ Uses an array of sensors (grid form)
○ Point of contact is based on which grid co-ordinate is touched
• Resistive (inexpensive)
○ The upper layer of polyester, the bottom layer of glass
○ When the top polyester is touched, the top layer and bottom layer complete a circuit
○ Signals are then sent out, which are interpreted by a microprocessor to determine where the screen was touched
Sensors
• Devices that read or measure physical properties
• Data needs to be converted to digital
• Analogue-to-digital converter (ADC) converts physical values into digital
• Sensors and their purposes:
○ Acoustic - These sensors act like a microphone that converts sound to electric pulses.
○ Accelerometer - These sensors measure an object's acceleration or deceleration and motion.
○ Flow - This sensor measures the flow of liquid or gas.
○ Gas - These sensors measure the amount/level of any gas in the environment.
○ Humidity - This sensor measures the water vapour in the air or any sample.
○ Infra-red (active) - This IR sensor uses an invisible infrared beam. When the beam is broken/disturbed, it changes the amount of infrared light re aching
the detector.
○ Infra-red (passive) - These sensors detect the heat emitted by any object.
○ Level - This sensor detects the solids, liquids, or gas level.
○ Light - These devices use light-sensitive cells that generate electric current based on light brightness.
○ Magnetic field - This sensor detects the change in magnetic field.
○ Moisture - This type of sensor detects the water content wherever this sensor has been installed.
○ pH - This measures the acidity or alkalinity.
○ Pressure - This sensor measures the pressure applied
○ Proximity - This sensor detects the nearby objects around the sensor
○ Temperature - These sensors measure the temperature of the environment.
• **(Note: You do not need to know the working principle of the sensor. But have an idea of their purposes.)
Laser Printers
• Used to print flyers, high quality
• Use dry powder ink (toner) and static electricity to produce text and images
• Prints the whole page in one go
1. (steps 1-4 same as inkjet)
2. The printing drum is given a positive charge; as the drum rotates, a laser beam is scanned across it; removing the positive charge leaves negatively charged
areas which match the text/image
3. The drum is then coated with positively charged toner; it only sticks to negatively charged parts of the drum
4. A negatively charged sheet is rolled over the drum
3D Printers
• Used for models of cars
• Produce solid objects that work
• Built up layer by layer, using powdered resin, ceramic powder
• A design is made using Computer-aided Design (CAD)
2D and 3D Cutters
• 3D cutters can recognise objects in x, y, z direction
• 3D laser cutters can cut glass, crystal, metal, wood
Actuators
• The actuators convert electrical signals to mechanical processes.
• Used in many control applications involving sensors and devices (ADC and DAC)
Loudspeakers/Headphones
• Sound is produced by passing the digital data through a DAC, then through an amplifier, and then emerges from the loudspeaker
• Produced by voltage differences vibrating a cone in the speaker at different frequencies
Light Projectors:
• Two common types of light projectors:
○ Digital Light Projector (DLP)
○ LCD Projector
• Projectors are used to project computer output onto larger screens/interactive whiteboards
LCD Projectors
• Older technology than DLP
• A powerful beam of white light is generated from a bulb
• This beam of light is then sent to a group of chromatic-coated mirrors; these reflect the light at different wavelengths
• When the white light hits the mirrors, the reflected light has wavelengths corresponding to red, green, and blue
• These three different lights pass through three LCD screens; these screens show the image to be projected as millions of pixels in grayscale
• When the coloured light passes through the LCD screens, a red, green and blue version of the grey image emerges
• Finally, the image passes through the projector lens onto the screen
Primary Memory:
Random Access Memory (RAM)
• RAM is used by a system when it needs to store and access data that is actively being used or processed by the user immediately.
• Features of RAM
○ Volatile/temporary memory (contents lost if RAM is turned off)
○ Used to store; data, files
○ It can be written to or read from, and the contents of the memory can be changed
• The larger the size of the RAM, the faster the computer will operate
• RAM never runs out of memory and continues to run slow
• As RAM becomes full, the processor has to access the continually hard drive to overwrite old data on RAM with new data
• RAM is of two types:
○ DRAM (Dynamic RAM)
○ SRAM (Static RAM)
Virtual memory
• When RAM runs out of memory, there is a problem with memory management; thus, the system has a high chance of crashing. This is why virtual memory
comes into the picture.
• The virtual memory can be either HDD or SSD (these storages are discussed below)
Secondary Storage:
Hard Disk Drives (HDD)
• Data is stored in a digital format on the magnetic surface of the disks (platter)
• A number of read/write heads can access all of the surfaces of the disk
• Each platter will have two surfaces which can be used to store the data
• Data is stored on the surfaces in sectors and tracks
• HDD has very slow data access compared to RAM
Off-Line Storage:
CD/DVD Disks
• Laser (red) light is used to read and write data on the surface of the disk.
• A thin layer of metal alloy is used to store data.
Blu-ray Disks
• Uses a blue laser to carry out read-and-write operations
• The wavelength of laser light is less than CD and DVD (stores up to five times more data than DVD)
• Automatically come with secure encryption (prevent piracy and copyright infringement)
• Used as backup systems
Cloud Storage:
• Cloud storage is a method of data storage where data is stored on remote servers
• The same data is stored on more than one server in case of maintenance or repair, allowing clients to access data at any time. This is known as data
redundancy.
IP Addresses
• IP address allocation:
○ The network allocates IP addresses.
○ Two types of IP addresses:
▪ static
▪ dynamic.
• Static IP addresses:
○ Assigned manually to a device.
○ Does not change over time.
• Dynamic IP addresses:
○ Assigned automatically by a DHCP (Dynamic Host Configuration Protocol) server.
○ Changes periodically or when the device connects to a different network.
• IPv4 (Internet Protocol version 4):
○ Widely used protocol.
○ Consists of four groups of decimal numbers separated by dots (e.g., 192.168.0.1).
○ Provides approximately 4.3 billion unique addresses.
• IPv6 (Internet Protocol version 6):
○ Developed to address the limitations of IPv4.
○ Uses eight groups of hexadecimal numbers separated by colons (e.g., 2001:0db8:85a3:0000:0000:8a2e:0370:7334).
○ Provides an extremely large number of unique addresses (approximately 340 undecillion).
• Differences between IPv4 and IPv6:
○ Address format: IPv4 uses a 32-bit address, while IPv6 uses a 128-bit address.
○ Address space: IPv4 provides approximately 4.3 billion addresses, whereas IPv6 offers around 340 undecillion addresses.
○ Address allocation: IPv4 addresses are allocated manually using DHCP, while IPv6 addresses are primarily assigned using state less autoconfiguration.
Routers
• Router functionality:
○ A router is a networking device that directs data packets between different networks.
○ It determines the most efficient path for data transmission.
• Sending data to a specific destination on a network:
○ A router examines the destination IP address of incoming data packets.
○ It uses routing tables to determine the next hop or the next router on the path to the destination.
○ The router forwards the data packet to the appropriate next hop.
• Router's role in IP address assignment:
○ A router can act as a DHCP server (Dynamic Host Configuration Protocol) and assign IP addresses to devices on a local network .
○ It dynamically allocates IP addresses from a predefined range to connected devices.
○ DHCP allows for automatic IP address configuration and simplifies network management.
• Connecting a local network to the Internet:
○ A router serves as the gateway between a local network and the internet.
○ It connects the local network to an internet service provider (ISP) network.
○ The router receives data packets from devices on the local network and forwards them to the internet.
○ It also receives incoming data packets from the internet and routes them to the appropriate devices on the local network
System Software:
• these are a set of programs which control and manage the operations of hardware
• gives a platform for other software to run
• it is required to allow hardware and software to run without problems
• provides a human-computer interface (HCI) to the user
• controls the allocation and usage of hardware resources
Application Software:
• allows a user to perform specific tasks using the computer’s resources
• maybe a single program (for example, NotePad) or a suite of programs (for example, Microsoft Office)
• user can execute the software as and when they require and it is mostly not automatic
Examples
System Software:
• Compiler: Translates high-level language into machine code, allowing for direct use by a computer to perform tasks without re -compilation.
• Linker: Combines object files produced by a compiler into a single program, allowing the use of separately written code modules in the final
program.
• Device driver: Software that enables hardware devices to communicate with a computer's operating system, without which a device like a pri nter
would be unable to work.
• Operating system: Software that manages basic computer functions such as input/output operations, program loading and running, and security
management, making computers more user-friendly.
• Utility programs: Software that manages, maintains, and controls computer resources by carrying out specific tasks, such as virus checking, d isk
repair and analysis, file management, and security.
Application Software:
• Word Processor: Software used for manipulating text documents, including creating, editing, and formatting text with tools for copying, del eting,
spell-checking, and importing images.
• Spreadsheet: Organizes and manipulates numerical data using a grid of lettered columns and numbered rows, with each cell identified usin g a
unique combination of columns and rows. It can calculate using formulas, produce graphs, and do modelling and "what if" calcu lations.
• Database: Software used to organize, analyze, and manipulate data consisting of one or more tables that hold records and fields. It p rovides the
ability to query and report on data and add, delete, and modify records in a table.
• Control and Measuring Software: A program designed to interface with sensors and allow a computer or microprocessor to measure physical
quantities and control applications by comparing sensor data with stored data and altering process parameters accordingly.
• Apps: Software designed to run on mobile phones or tablets, downloaded from an "App Store" and ranging from games to sophisticate d software
such as phone banking. Common examples include video and music streaming, GPS, and camera facilities.
• Photo and Video Editing Software: Software that allows users to manipulate digital photographs or videos, including changing colour, brightness,
and contrast, applying filters and other enhancements, and creating transitions between clips.
• Graphics Manipulation Software: Software that allows the manipulation of bitmap and vector images, with bitmap graphics editors changing pixels
to produce a different image, while vector graphics editors manipulate lines, curves, and text to alter the stored image as r equired.
Interrupts
• An interrupt is a signal sent to the microprocessor, either from a device or software, prompting the microprocessor to pause its ongoing tasks and
handle the interrupt temporarily. Various factors can trigger interrupts, including:
• Timing signals: Scheduled signals prompt the microprocessor to pause and handle tasks at specific intervals.
• Input/Output processes: Events such as a disk drive or printer requiring additional data cause an interruption in the microprocessor's activities.
• Hardware faults: Issues like a paper jam in a printer, signalling the microprocessor to halt its operations and address the hardware problem .
• User interaction: Instances like a user pressing specific keys on a keyboard (e.g., ), leading to an interrupt in the system's operation.
• Software errors: Problems such as missing .exe files needed to initiate a program, conflicts like two processes accessing the exact memory l ocation,
or attempts to divide by zero. These errors trigger interrupts, prompting the microprocessor to handle the issues.
Backup Software
• Backup software is a utility software that helps create and manage backup copies of data files and programs.
• Manual backups using memory sticks or portable hard drives are good practices, but operating system backup utilities are also recommended.
• Backup utilities allow scheduling backups and only backup files if changes have been made to them.
• There could be three file versions for total security: the current version stored on the internal HDD/SSD, a locally backed -up copy on a portable SSD,
and a remote backup on cloud storage.
Security Software
• Security software is a utility software that manages access control, user accounts, and links to other utilities such as viru s and spyware checkers.
• It also protects network interfaces using firewalls to prevent unauthorized access.
• Security software uses encryption and decryption to ensure intercepted data is unreadable without a decryption key.
• It oversees software updates to verify legitimate sources and prevent malicious software from being installed.
• Access control and user accounts use IDs and passwords to secure user data and prevent unauthorized access.
Screensavers
• Screensavers display moving and still images on the monitor screen after computer inactivity.
• They were originally developed to protect CRT monitors from 'phosphor burn'.
• Screensavers are now mostly used for customizing a device and as a part of computer security systems.
• They automatically log out of the user after a certain period of inactivity.
• Some screensavers activate useful background tasks like virus scans and distributed computing applications.
Device Drivers
• Device drivers translate data into a format that can be understood by the hardware device they are associated with.
• Without the appropriate device driver, a hardware device cannot work with a computer and may not be recognised by the operati ng system.
• USB device drivers contain descriptors, which include a vendor ID (VID), product ID (PID) and unique serial number that allow the operating system
to identify the device.
• Serial numbers must be unique to avoid confusion if two devices with the same serial number are plugged into a computer simul taneously.
Running of Applications
• The computer starts its OS (booting up the computer) through the bootstrap loader.
• The BIOS (Basic Input/Output System) tells the computer the location of the OS in the storage.
• BIOS is often referred to as the firmware
Interrupts
• Signal that causes the operating system to stop what it’s doing and service a task
• Ensures important tasks are dealt with on a priority basis
• It can be a software or a hardware interrupt
• Peripherals like a keyboard & mouse can generate it
• Different interrupts have different levels of priority
• After interruption is dealt with, the previous process continues
Assembly Language
• Few programmers use assembly language to -
Make use of special hardware
Translators
Compiler
• Translates a program written in a high-level language into machine code
• Used without compiler
• Executable file of machine code produced
• One high-level language translated into several machine code instructions
• Used for general use
Interpreter
• Executes a high-language program a statement at a time
• No executable file of machine code produced
• One high-level language program statement may require several machine code instructions to be executed.
• Interpreted programs cannot be used without an interpreter
• Used when the program is being developed
Assembler
• Translates a low-level language program into machine code
• Executable file of machine code produced
• One low-level language translated into one machine code instructions
• It can be used without an assembler
• Used for general use
Web Browsers
• It is software used to connect to the internet
• It translates the HTML code
• ensures SSL & TLS security can be established
• Offers additional features like search history & ad blockers
Retrieval and Location of web pages
• The browser sends the URL to the domain name server (DNS)
• DNS stores the index and matches it with the IP
• IP is sent to the browser if it exists
• The browser sends a request to the IP of the webserver Browser interprets the HTML
Cookies
• Cookies are small files stored on the user’s computer
• They are used to track data about the users and autofill forms or give suggestions accordingly
• Types of Cookies -
Session Cookie Persistent Cookie
Temporary cookies are stored in the RAM till the browser is closed. Remembers the user’s login details so the user doesn’t have to log in every time they visit a
website
Doesn’t collect any information on the user Stored on the hard disk on the computer until their expiry date or the user deletes them
A good example is the virtual shopping basket on e-commerce
websites.
Blockchain Network
• Blockchain Network involves several interconnected computers where the transaction data is stored
• Hacking isn’t possible here as transaction details would be sent to all the computers, and the data can’t be changed without the consent of all the network
members
How do blockchains work
Every time a transaction takes place, A block is created. The block would contain -
• Data - Name of the sender and the receiver, amount of money and more
• Hash Value - Unique value generated by an algorithm
Data Interception:
• This involves stealing data by tapping into a wired or a wireless transmission line
○ Wardriving - The act of locating and using wireless internet connections illegally
○ Packet Sniffing - Uses Packet sniffers to examine packets sent over a line; all the data collected is sent back to the attacker
• Effect:
○ It can cause a computer to crash
○ Can delete or corrupt files/data
• To remove risk:
○ Install anti-virus software
○ Don’t use software from unknown sources
○ Be careful when opening emails from unknown
Hacking
• The act of gaining illegal access to a computer system
• Effect:
○ This leads to identity theft, gaining personal information
○ Data can be deleted, changed or corrupted
• To remove risk:
○ Firewalls Strong passwords/ user IDs
○ Use of anti-hacking software
○ Difference between hacking and cracking
○ Hacking breaks into computer systems to steal data
○ Cracking is when someone edits a program code, malicious
Malware
• Stands for Malicious Software. A few examples are -
○ Virus - A program that can replicate itself with the intention of deleting or corrupting files, causing a computer malfunction
○ Ransomware - Attackers encrypt the user’s data until a certain amount of money is paid
○ Adware - Displays unwanted ads on the user’s screen
○ Trojan Horse - Programs that are disguised as legitimate software
○ Spyware - Sends data about all the activities of the user to the attacker
○ Worms - Programs that can replicate themselves with the intention of corrupting the entire network instead of the computer alone
Phishing
• Attackers send legitimate-looking emails to bait the user into giving out their information.
• To remove risk:
○ Don’t open links from unknown receivers
○ Use anti-phishing tools
○ Block pop-up ads
○ Have an up-to-date browser
Pharming
Social Engineering
• Attackers create a social situation which leads to victims giving out their details (For example - Spam calls informing them that their account has been hacked)
• Two-Step Verification - Requires two methods of authentication to prove who the user is
• Automatic Software Updates - Latest updates contain patches which improve device security
• Spelling and Tone - Fake emails tend to have wrong spelling and grammar (amazonn instead of amazon), and the tone would also seem urgent
• Firewalls - Hardware or Software which monitors the traffic between a network and the user’s computer
• Proxy Servers - Acts as an intermediate between the user’s computer and the web server. They are used for -
○ Filtering Internet traffic
○ Keeping the user’s IP Address Confidential
○ Blocking access to certain websites
○ Attacks like DDoS and Hacking attack the proxy server, keeping the web server safe.
○ Acts as a firewall as well.
• Privacy Settings - Used to limit who can access and see a user’s profile
• SSL (Secure Socket Layer) - Set of rules used while communicating with other users on the internet.
6.2 Robotics
• Robotics is the branch of computer science that combines robot design, construction and operation.
• Isaac Asimov’s Laws of Robotics -
• A robot may not injure a human through action or inaction
• A robot must obey orders given by humans unless it comes into conflict with Law 1
• a robot must protect itself unless this conflicts with law 1.
• Characteristics of a robot -
• Ability to sense their surroundings
• Have a degree of movement
• Programmable
NOTE - ROBOTS DO NOT POSSESS AI; THEY TEND TO DO REPETITIVE TASKS RATHER THAN REQUIRING
HUMAN CHARACTERISTICS
Types of Robots
• Independent - Have no human intervention; they can completely replace humans
• Dependent - Needs human intervention through an interface, can supplement but can’t completely
replace humans
Types of AI
• Expert System - AI that is developed to mimic human knowledge and experiences. They are usually used
for answering questions using knowledge and inference.
• They have many applications, including chatbots, diagnosis in the medical industry, financial calculations
and so on
• Machine Learning is a subset of AI in which machines are trained to learn from past experiences.
Difference Between AI and Machine Learning
AI Machine Learning
Representation of human intelligence in Machines are trained to make decisions without being
machines programmed to
The aim is to build machines that think like The aim is to make machines learn through data
humans acquisitions