Intriguing Notes by Adam
Intriguing Notes by Adam
Data representation
Error codes
o An error message generated by the computer
o The hexadecimal values refer to the memory location of the error
HTML (hypertext markup language) colour codes
o It is used when writing or developing web pages
o It is often used to represent text colour on the computer screen
o All colours can be made up of combinations of the three primary
colours (rgb)
o The different intensity of each colour is determined by its hexadecimal
value
MAC address
o It is a number which uniquely identifies a device on a network
o Refers to the NIC which is part of the device
o It is rarely changed
o It can be of 48/64 bits
o It is shown as 6 groups of two hexadecimal digits
o Two types of MAC addresses
Universally administered MAC address
Most common type
Set by manufacturer at factory
Rare for user to change this MAC address
Locally administered MAC address
Easy to change
Internet Protocol (IP) address
o It gives a unique address to each device connected to a network
identifying its location
o Assigned by the internet service protocol
o There are two versions of IP addresses:
IPv4
32 bits
Denary or hexadecimal
Uses decimal point
IPv6
128 bits
Broken down into 16 chunks
Hexadecimal
o Main advantages of IPv6 over IPv4:
Removes risk of IP address collisions
Has built in authentication checks
Allows for more efficient packet routes
o There are two types of IP addresses:
Static:
Remains the same each time a device logs onto the
internet
Remote servers which are hosting a website
An online database
A file transfer protocol server
Allows devices to be fully traceable
Allow for faster upload and download speeds
More expensive to maintain as the device has to be
running constantly for information
Dynamic:
Change each time a device logs onto the internet
Assigned by the ISP by using dynamic host configuration
protocol
Greater privacy
Less reliable addressing type
VoIP connection fails due to IP address change
Easier to debug
Easier to understand
It takes up less screen space
Less likely to make a mistake
Conversions to know:
0+0 = 0
0+1 = 1
1+1 = 0 (1 carry forward)
0+0+0 = 0
0+0+1 = 1
0+1+1 = 0 (1 carry forward)
1+1+1 = 1 (1 carry forward)
Overflow
The result of carrying out a calculation that produces a value that is too large
for the computer’s allocated size
E.g. Formation of a 9bit value on a 8 bit addition
Logical Shifts
Two’s Complement
Unicode
Sound
The amplitude of the sound wave is first determined at a set time interval
This gives an approximate representation of the sound wave
Each sample of the sound wave is then encoded as a series of binary digits
To convert it to byte:
Divide it by 8
Multiply result by 2
Images
Keywords
o Bitmap image: Images that are made up of pixels
o Image resolution: The number of pixels that make up an image
o Colour depth: The number of colours to represent each pixel
To convert it to byte
Divide it by 8
Bit: It is the smallest unit of data that a computer can process and store
Byte: It consists of 8 bits
Nibble: It consists of 4 bits
Kibibyte: 2^10 bits
Mebibyte: 2^20 bits
Gibibyte: 2^30 bits
Tebibyte: 2^40 bits
Pebibyte: 2^50 bits
Exbibyte: 2^60 bits
Data compression
It is necessary to compress data
o To save storage on devices like HDD/SSD
o It will take less time to transfer the file from one device to another
o It will take less time to stream a music or video file
o Reduces the time taken to upload or download files
o Not as much bandwidth is needed to transfer the file over the internet
o Reduced file size also reduce costs
There are two methods of data compression
o Lossy
A compression method that reduces the size of a file by
permanently removing data
Common lossy file compression algorithms are
MPEG-3
o Used for playing music
o Reduces 90% of audio file size
o Quality isn’t as sharp as the ones found in
CDs/DVD
MPEG-4
o Used for playing videos
o Still retains an acceptable quality of sounds and
videos
JPEG
o Used for bitmap image files
o Separates pixel colour from brightness
o Lossless
A compression method that reduces the size of a file by
temporarily altering the data
Common lossy file compression algorithms are
Run-Length Encoding
o An algorithm that groups repeating patterns and
indexes them
o Used to compress text and image files
o Reduces size of string of adjacent, identical data
by making it into two characters – the number of
occurrences of the data and it’s ascii/Unicode
code.
Data Transmission
Keywords
Data packet:
o Data that is transmitted over a network
Packet switching:
o A method of transmission in which a message is broken into many data
packets which can then be sent along pathways independently of each
other
The sender adds up all the 1-bits in the payload and stores this as a hex value
in the trailer before it is sent
Once the packet arrives the receiver recalculated the number of 1-bits in the
payload
The computer then checks this value against the one sent in the trailer
If both values match, there’s no error, otherwise the packet needs to be re-
sent
Packet switching
Errors can occur during data transmission due to interference leading to:
o Data loss
o Data gain
o Data change
There are several methods of detecting errors
o Parity check:
A type of error detection method that adds an additional bit to
each byte to create an odd or even sum
E.G. _001001
Before transmission:
The parity check is set to be either odd or even parity
If an odd parity is used
Then a 1 is added as parity bit. This is because all the 1s
in the byte now add up to an odd number
If an even parity check is used
Then a 0 is added as a parity bit. This is because all the
1s in the byte now add up to an even number
After transmission:
The receiving device will check each byte of data for
errors
If an odd parity check has been used and the device finds
a byte that has an even number of 1s, then it knows that
an error has occurred with this byte of data
The same can be said if an even parity check has been
used and an odd number of 1s
o Checksum
A type of error detection method that performs a calculation on
the data to create a checksum value
A checksum is calculated and added to the data before
transmission
After receiving the data, the receiving device calculated its own
checksum
If the two checksums match, the data is error-free; if they don’t,
an error is detected
o Echo check
A type of error detection method that sends a copy of the
transmitted data back to the sender to be compared with the
original data sent
The sending device compares the data it sent to the data it has
received back from the receiving device to see if they match
If they do, then no error has occurred
If they don’t match, then the sending device knows the data was
received with error
Check digit
Encryption
The CPU
Are used for processing and executing instructions and data that are input into
the computer so that the result can be output
A microprocessor is a type of integrated circuit on a single chip that usually
performs less functions as compared to a regular CPU
Components of CPU
Fetch-Decode-Execute cycle
Fetch
o This stage is for fetching the actual data or instructions from the
computer’s memory to the CPU
o Steps:
The PC stores the address of the next instruction to be
processed. This is copied to the MAR via address bus
MAR copies this address to the RAM via address bus
RAM uses the address sent to it to locate the data or instruction
that must be processed
RAM copies the data/instruction to MDR via data bus
MDR copies data/instruction to CIR via data bus
Program counter is incremented so that the address of the next
instruction is contained in it
Decode
o This stage is used to decode the data/instruction, which is carried out
by the CU using an instruction set
o An instruction set is a set of instructions written in low-level machine
code that tells the computer how to carry out specific functions. They
are the only instructions understood by CPU
Execute
o This stage used to carry out any final arithmetic or logical operations
and then finish executing the instruction
o ALU is responsible for such operations. Uses the accumulator to store
any interim values created during execution.
o After all calculations are finished the command is executed
The entire process repeats for each piece of data or instruction that needs to
be carried out by the CPU.
Cache:
o Cache is internal, temporary storage space inside the CPU itself. It
stores data and instructions which are used regularly by the CPU
o The CPU does not need to fetch regularly used data or instructions
from the RAM, instead, it simply uses the cache. This takes less time
and increases the CPUs performance
o The more cache a computer has, the more data/instructions it can
store nearby, which means less time is spent retrieving information.
So, a larger cache size can mean better CPU performance.
o However an extremely large cache would take more time to look
through while fetching information, causing significant delays which
would render the cache useless. So there must be a limit for the cache
size.
Clock:
o The system clock is located inside the CPU. Its job is to control the
processing speed and time taken to execute instructions as well as
control the time intervals between each task and synchronise the entire
FDE cycle. In short, it controls the number of FDE cycles completed
each second
o Clock speed is measured in Hertz. The average clock speed found in
most computers is 2 Gigahertz which is 2 billion instructions executed
per second.
o Higher clock speed means that more instructions are processed each
second, increasing the computer’s performance
o However, increasing the clock speed too much can cause the computer
to overheat
Cores:
o Cores are the components in the computer that run the FDE cycle.
Each core can run one cycle, i.e. process one instruction at a time
o A higher number of cores in a computer means that more instructions
can be processed at once. This allows a computer to multitask, which
increases the computer’s performance
Embedded systems
Input devices
Output devices
Sensors
Sensors are input devices that capture analogue data from their immediate
environment at set time intervals
Examples:
o Acoustic – sound levels of an environment – used in security systems
to detect intruders
o Accelerometer – Any forces of acceleration acting on environment –
Earthquake warnings
o Flow – The amount of fluids moving through an environment – pipes or
plumbing
o Gas – the amount and concentration of a gas – carbon monoxide
detectors in houses
o Humidity – the humidity levels in an environment – greenhouses to
ensure internal humidity is not too less or high
o Infra-red – Any infra-red rays present – security systems
o Level – the level or volume a fluid is at – amount of fuel in vehicles
o Light – the light levels of an environment – automatic lighting
o Magnetic field – any magnetic fields present in the environment –
detecting cars in parking lots or bridges
o Moisture – the moisture present in any environment – detecting
moisture levels in soil
o pH – the pH level of a substance – water bodies to check level of
pollution or detecting soil pH levels to ensure plant health
o Pressure – the pressure which is being exerted on the sensor –
security systems to detect intruders
o Proximity – how close an object is to the sensor – used in robots or
automatic doors
o Temperature – the temperature of the environment – automatic cooling
systems
Data storage
Primary storage
o Primary storage contains data that is directly accessible by the CPU
o RAM and ROM are examples of primary storage
Secondary storage
o Contains data that is not directly accessible by the CPU and is not
currently required by the CPU
o It is non-volatile which means that the data contained in it is not lost if
power is switched off
o It stores data that can be transferred to other computers if required
o Pen drives and CDs are examples of secondary storage devices
Primary storage
o RAM:
It stores data temporarily, making it a volatile method of data
storage. It stores the data and instructions that are currently
being used by the CPU. E.g. Program files for an application
that is currently open on the user’s computer
Easy to increase RAM’s size
Its contents are constantly changing based on what the CPU
requires
o ROM:
Permanent storage (non-volatile)
Stores programs that initially boot the computer. E.g. BIOS
Difficult to increase or decrease size of ROM
Secondary storage
o Secondary storage needs to be fetched into primary memory first, to be
accessed by the CPU. It can be of two types: internal, such as solid-
state drives or hard-disk drives, or external such as CDs or DVDs
o Magnetic storage:
Magnetic storage uses magnetised and demagnetised dots to
store data
A circle disk knows as a platter, spins very fast, with a read-write
head over it. The read/write head magnetises and
demagnetises dots on the platter as required
The platter is divided into tracks and sectors
The current state of a dot decides its stored value. Magnetised
= 1, demagnetised = 0.
E.g. Hard drive
o Optical storage:
Optical storage uses circular discs and laser to store data
The disc is rotated or spun with a read/write head over it, which
uses a laser beam.
The laser beam makes indentations on the surface of the disc
by burning data onto it. An indentation is known as a pit while
space between pits are called lands.
The pits and lands represent binary values. Pit = 1 Land = 0
Data is written in a spiral or circular pattern around the disc
E.g. CDs, DVDs, Blu-ray.
o Solid-state storage
Solid state storage is also knows as flash storage. It uses
transistors and cells to store data. These transistors and cells
are arranged on a semiconductor chip
Transistors are laid out to form a grid. They are used to form a
control gate which is above a floating gate, at each intersection
in the grid.
The transistors control the flow of electrons in the semiconductor
chip. They flow through the control gate to the floating gate,
where they are stored.
After storing the electrons, the binary value of the transistor
changes from 1 to 0
Typically a NAND or NOR structure is used for solid-state
storage
E.g. SSD, pen-drives
Virtual memory
Virtual memory is a sectioned-off segment of the hard disk drive, which acts
as an extension to the primary memory (RAM). It is required for when the
RAM is full but more data transfer needs to take place.
This is how it operates whenever required:
o Data in RAM is split into pages
o The pages which are not currently being used by CPU or which are not
immediately required are sent to the virtual memory. This clears up
space in the RAM.
o Any new data that the RAM now requires is imported from the
secondary storage
o Once the data in the RAM is no longer needed, it is sent back to
secondary storage. The pages the RAM initially sent to the virtual
memory are fetched back.
Virtual memory is important as the RAM is at risk of overloading from excess
data and crashing. Virtual memory helps ensure that this does not happen
Cloud storage
Cloud storage is data stored by a third-party remote server instead of in local
storage. It is accessible via the internet.
Cloud storage:
o Accessible everywhere, but ONLY if you have an internet connection
o No hardware cost, and you don’t have to manage your own hardware
o Backup of your data is easily available
o It is easy to increase and decrease the amount of storage space you
have
o Trusting a third party with personal data may be unsafe as they could
use it for malicious reasons
Local storage:
o Only accessible as long as you have your storage with you, but doesn’t
require the Internet
o You have to pay for your own hardware, as well as keep it secure
o Changing the storage size may be difficult
o There is no need to rely on a third-party. You are fully in control of your
own data which means there are less privacy issues
Types of software
The operating system plays many diverse roles in a computer system. It does
the following tasks:
o Managing files:
Allows the creation and deletion of folders ad directories to store
files.
Allows users to create, copy, open, close, move, delete, rename,
save and sort files.
o Handles interrupts:
Decides the appropriate time to run interrupts in order of
requirement
o Provides a user interface:
Allows data to be entered by and displayed to the user
User interfaces can be: Graphical user interface GUI, which
uses icons and pointers OR command line interface CLI, which
requires data to be entered as commands in a programming
language.
o Managing peripherals and drivers:
Manages and detects any peripherals, i.e. any connected input
or output devices. It additionally installs appropriate drivers
when a device is connected.
Driver: Software that is required for communication between two
devices externally connected, which translates code from one
device to another.
o Managing memory:
Manages data transfer to and from the memory (RAM)
Makes sure all currently running processes have enough
memory space to continue running properly
Keeps track of each memory location and records its status
(whether it is in use or not)
Ensures that two processes don’t try and access the same
memory location at once
Manages transfer of pages between virtual memory and RAM
o Managing multitasking:
Decides the order in which processes are meant to run, and how
long each instruction should spend getting processed
Organises a priority queue, to schedule instructions to be
processed in order of importance.
o Providing a platform for running applications
o Providing system security:
Oversees software updates and ensure all software are always
up to date
Runs anti-virus checks and sets up the firewall
Manages data backup and system restoration in case of data
loss
Manage each user accounts access
o Managing user accounts:
Helps each user have a separate username, password
Restricts access for each user as required
Keeps each users data separate
Interrupts
Translators
An IDE is an interface where users can write, edit and run programs easily.
An IDE always contains:
o An editor: Where code can be written and edited
o A runtime environment: Where the code’s outputs are shown and user
input is allowed
An IDE typically also contains other useful features, such as:
o A compiler or interpreter
o Error diagnostics
o Auto-completion of code
o Auto-correction of code
o Prettyprint, which colour-codes keywords
The internet and its uses
Websites and webpages on the world wide web must be accessible easily.
URL exist for this purpose. A URL is a text based address to uniquely identify
a web page. It contains 3 sections: the protocol, the domain name and the
web page/file name.
Web browsers
A web browser is used mainly for the purpose of rendering hypertext markup
language and displaying web pages to the user. It typically has other
functions as well, such as:
o Storing bookmarks and favourites
o Recording user history
o Allowing the user to open multiple tabs
o Storing cookies
o Providing navigation tools such as a button to reload, go back to the
previous/next page
o Providing an address bar
Web pages are stored in web servers. For a web browser to access their
HTML, retrieve it from the server and render it, it first requires the web
server’s IP address. This address is stored in a domain name server to which
a request must be sent first.
Steps to retrieve a web page are:
o The user types the URL of the website into their web browser’s address
bar.
o The web browser send the URL to a domain name server. The DNS
stores IP addresses of each web server
o The DNS searches in its database for the IP address corresponding to
the URL sent by the user. If the IP address is not found in one DNS, it
is sent to another DNS until it is found. If the URL’s corresponding IP
address is not found at all, an error message is displayed to the user
o When the DNS finds the corresponding IP address, it sends it back to
the web browser
After this, the hypertext transfer protocol – HTTP – is executed by the browser
to retrieve web pages from their web server and then render them. The
protocol consists of the following steps:
o The web browser sends a request to the web server asking for the web
pages by using its IP address to locate it
o The web server send back all HTML, CSS and active script
o The browser renders the code it receives.
Cookies
When a user visits a website, they may enter specific information that needs
to be entered again at later dates. For example, passwords and usernames.
However, it is an inconvenience to the user if this information must be entered
again each time. The web server uses cookies to store such information.
A cookie is a small text file that stores information about the user. There are
two types of cookies: session and permanent.
They are created by:
o Whenever the website is opened or revisited, the web server sends a
request for the cookie file
o The browser sends the cookie file so that details are automatically
entered.
Session cookies are temporarily stored in the primary memory. They are only
used as long as the browser is still open. As soon as the browser window is
closed, the cookie is deleted.
Persistent cookies are permanently stores in secondary storage. They are
stored until they are deleted by the user, or until they reach a specific
expiration date. They’re retrieved each time the browser window is opened.
Cookies can be used for:
o Saving personal details such as passwords and usernames
o Tracking user preferences
o Holding items in an online shopping cart
o Storing login details
Cookies can have certain privacy issues, as they store sensitive information.
They are:
o Cookies may store data without the user’s knowledge or permission
o Hackers can intercept the data and build a false user profile, leading to
identity theft
o Sensitive information in the cookie files may be intercepted
o Other websites may gain unauthorised access to certain cookies
o The computer may be hacked and cookie file’s information may be
visible to 3rd parties.
Digital currencies
Cyber attacks
There are multiple ways malicious third parties can hack into our data and use
it for their own purposes. The most common ones are listed below.
Brute force attacks:
o The perpetrator tries multiple combinations of passwords repeatedly in
order to guess it and hack into the user’s account. The passwords can
be guessed manually or by using software.
o Preventions:
Using biometrics
Using 2 factor authentication
Using passwords which are difficult to guess – contains symbols
Data interception:
o Data interception is done by using a packet sniffer software which the
perpetrator has previously installed on transmission hardware. For e.g.
it can be installed on a router.
o The packet sniffer looks through all data packets being transmitted
through that router or piece of hardware. If it finds any useful
information, such as passwords, it copies and sends it to the
perpetrator.
o Preventions:
Encrypting data
DDoS (Distributed denial of service)
o DDoS is an attack towards web servers typically done as revenge or to
demand ransom.
o The following steps take place:
The perpetrator sends out malware publicly so that as many
computers as possible download it by accident. Once
downloaded, it turns the computers into bots. The collection of
all computers is knows as a botnet
To carry out a DDoS attack, the perpetrator makes the malware
in the bots repeatedly send requests to a certain web server
The web server crashes due to overload of requests at once,
denying service to legitimate users.
Preventions
Use a proxy server
Use anti malware software.
Hacking:
o Hacking is the act of gaining unauthorised access to other’s data. This
can be done through vulnerabilities in networks such as open ports or
software bugs.
o Preventions:
2 factor authentication, biometrics, strong passwords
Regularly updating software to ensure it has no vulnerabilities
Using anti-malware software
Using a firewall
Malware
o Virus
It gets installed onto the secondary memory, where it proceeds
to replicate itself until there is no more storage left causing PC to
crash, also may corrupt data.
Preventions:
Anti-malware software
Firewalls
Mindfulness while clicking unknown links
Have data backup
o Worm
Once installed, it finds network vulnerabilities and uses them to
reduce bandwidth.
Preventions:
Anti-malware software
Firewalls
Mindfulness while clicking unknown links
o Spyware
Once installed, it can record physical actions taken by the user,
such as keyboard inputs. It sends this data to a third party,
which can cause sensitive typed information to be leaked
Preventions:
Anti-malware software
Firewalls
Using an on-screen keyboard as clicks cannot be
detected
Using auto-filled passwords instead of typing them out
o Adware
Spams ads and unwanted pop-ups on websites, apps or
externally
Preventions:
Anti-malware software
Firewalls
Mindfulness while clicking unknown links
o Ransomware
Encrypts the user’s data so that it is inaccessible and demands
money in exchange for the data to be unencrypted.
Preventions:
Anti-malware software
Firewalls
Have data backup
o Trojan Horse
Malware that is disguised as a genuine app that may trick users
into downloading it
Preventions:
Anti-malware software
Firewalls
Mindfulness while clicking unknown links
Pharming:
o A method used by perpetrators to gain access to sensitive information
such as passwords.
o The steps taken are as follows:
The user will be tricked into clicking a link which will start an
automatic malware download in their secondary storage
The next time the user enters a certain URL, such as the link to
bank’s website the malware will redirect them to a fake website
instead. The fake website will imitate the real one in order to
trick the user into believing that it is real
The user will enter personal information which will be sent to the
perpetrator
o Preventions:
Refrain from clicking unknown links or download suspicious
software
Ensure the website is genuine by checking its URL
Use anti-malware
Phishing
o Phishing is a method similar to pharming used for obtaining sensitive
information from users for perpetrators to use
o The perpetrator will send an email to the user, which will entice them
into clicking a fake website’s link and entering personal information
there.
o Preventions:
Refrain from clicking unknown links or download suspicious
software
Ensure the website is genuine by checking its URL
Social Engineering
o Social engineering is the act of manipulating or deceiving people to
obtain their personal information
o Preventions:
Don’t trust unknown people asking for sensitive information
Use access levels
Firewalls:
o Typically used for a personal computer to prevent suspicious programs
or data to enter or leave the computer
o It checks incoming and outgoing signals
o It filters data packets to prevent traffic and blocks any packets if
required
o It can whitelist or blacklist sites or data allowed to enter based on
criteria set by the user
o It can be hardware or software
Proxy servers:
o Typically used for protection of larger servers, to divert attacks on them
o It checks, logs and has the ability to block incoming and outgoing
signals
o It can whitelist or blacklist certain IP addresses and signals
o It processes client-side requests primarily
o It allows faster access to websites using cache
o It can hide a server’s internal network
Access levels
o Typically used in companies
o It provides each user with different permissions to data
o It limits access to data that can be viewed, and limits access to data
that can be changed or deleted
o It is usually linked to usernames or user IDs
Anti-Malware:
o It is a software that scans the computer it is installed on for malware
o It keeps a record of known malware
o It removes any suspicious software or malware
o It checks data before it is downloaded and stops the download or
warns user if it detects malware.
Passwords:
o Strong passwords which are changed often, are good defences against
data breaches
Biometrics:
o The required data for biometrics, such as fingerprints, is unique for
everyone, so it is difficult to replicate
Two step verification:
o In two step verification extra data is sent to the user’s device, which
has been pre-set by the user. It is difficult to obtain
o The data must be entered into one system, which is difficult to do from
remote locations.
Automated system
A device that is operated without human interaction
Sensors
o A type of input device that is used to capture data from its immediate
environment
Microprocessors
o An integrated circuit that is able to perform many of the functions of a
CPU
Actuators
o A mechanical part that causes another device or part to move
Industry
Advantages
o Faster than humans to take action
o Safer
o Low running cost
Disadvantages
o Expensive to set up
o Enhanced maintenance
o Computerised system; subject to cyber attacks
Agriculture
Advantages
o Reduced labour costs
o Safer
o Better control of irrigation process and of precious resources like water
Disadvantages
o Expensive to set up
o Enhanced maintenance (expensive)
Transport
Advantages
o Allows the same number of cars to use fewer parking spaces
o Avoids traffic disruption in cities
o Cars can fit into smaller spaces
Disadvantages
o Requires additional maintenance to ensure it correctly functions
Weather (stations):
Advantages
o Reduced labour costs
o Safer
o Better control of the irrigation process and of precious resources like
water
Disadvantages
o Expensive to set up
o Enhanced maintenance (expensive)
Lighting:
Advantages
o Possible to control light sources automatically
o Reduced energy consumption
o Longer bulb life
Disadvantages
o Expensive to set up
o Enhanced maintenance
Science:
Advantages
o Consistent and faster results
o Safer
o Fewer highly trained staff needed for each experiment
Disadvantages
o Expensive to set up
o Security risks
o Less flexible than using human technicians
Robotics:
A branch of computer science that looks at the creation and use of robots
Robots have a range of features:
o A mechanical structure or framework. This is the body of the robot
o Electrical components such as:
Sensors to record its environment, for e.g., the position of the
component it is building.
Microprocessors, to take the reading from the sensor and decide
the action to perform
Actuators, to make the robot move.
o They are programmable
o They are used in factory equipment, domestic robots and drones
Robots in medicine
Advantages
o Saves time for doctors and nurses
o Enables remote surgeries, reducing patient wait times
o Allows resource sharing among hospitals
Disadvantage
o Network failures can interrupt remote procedures, necessitating backup
systems
o Programming errors and security risks can cause harm
Robots in agriculture
Advantages
o Saves time
o Increases efficiency with 24/7 operation
o Ensures precision through satellite-guided automation
Disadvantages
o High initial costs and ongoing maintenance
o Potential job replacement for human workers
Robots in transport
Advantages
o Creates new jobs in system management
o Enhances efficiency and security
o Reduces risks in hazardous environments
Disadvantages
o High initial costs
o Security risks from potential tampering
o Job displacement for some workers
Robots in industry
Advantages
o Continuous operation 24/7
o Reduce human error and enhance accuracy
o Efficiency as automation speeds up production processes
Disadvantages
o High initial costs
o Potential job replacement for human workers
o Requires new skill sets for fewer workers to manage and maintain
robots
Robots in entertainment
There are different types of robots used for entertainment purposes:
o Interactive toys
o Teaching kids on building robots and program them to perform specific
tasks
o Help people learn about robotics and coding
Artificial Intelligence
Features of AI:
Machine learning:
o A computer program that can adapt its stored rules or processes
o It can be supervised or unsupervised
o Supervised: the user tells the machine what the data means
o Unsupervised: The data is input then the data learns from the program
and identifies which items of the data resemble one another
Expert system:
o A system that attempts to replicate the knowledge of an expert
o It is made up of:
A knowledge base: A list of facts stored in the expert system
A rules base: It stores the rules upon the knowledge in the
expert system
An inference engine – part of the expert system that makes
decisions
User interface – It outputs questions and statements to the user,
and allows the user to input data