F451 AS Computing Essential Knowledge Term Definition Example Hardware Physical components of a computer system Monitor, Base Unit Software Programs that allow the user to perform a task Input Device hardware that is used to put data into a computer Mouse, Keyboard, Scanner Output Device hardware to display/report information from a computer Projector, Printer Storage Device Stores data that has been collected for future use Hard Disk Secondary Storage Device Peripheral that allows storage of data over a long period of time Memory Stick Application Software Programs that allow user to do something useful/perform a useful task Spreadsheet, Word Processor Systems Software Controls the hardware of the computer. Gives a platform to run other software. Sensor Input device that detects physical quantities Thermistor Actuator Anything that gives a physical output Pump/Motor Data Raw Facts and figures Information Processed data that has meaning/context External Components Components that are outside the system unit of a PC Printer Internal Components Components that are inside the system unit of a PC CPU, RAM RAM RAM is Random Access Memory is a volatile. Contents are lost when powered off. It contains applications software being used and data used in the operating system. Changes to RAM are made as the device is being used, and access to RAM is very fast Last Updated : 10th March 2012 - Watford Boys Grammar School ROM ROM is Read Only Memory and is non-volatile. The contents are not erased when powered off. The ROM contains the start up program which allows a device to boot up the OS. The start up program is needed immediately when the device is powered on. The contents of ROM cannot be changed. IAS Immediate Access Store - RAM GUI A GUI is a graphical user interface which uses WIMP. A GUI is very processor intensive. WIMP Window Icons Menu Pointer. 4 components of a GUI. CLI A CLI is a command line interface. The user has to type in specific commands to operate the system. The user needs to be computer literate to use it as they have to remember all the commands and their syntax. CLI requires very little processing power. Menu Driven Interface A menu based interface is a list of on screen choices which leads to further menus which allows the user to choose an action from a set list of options. Does not allow user to access other parts of software. These are commonly used on a touch screen information terminal or a mobile phone. A menu based interface is easy and intuitive to use and requires little training or computer literacy. Mobile Phone. Touch screen information terminal. Natural Language Interface A natural language interface is where the user communicates with the computer in a human conversation type way. Used with some internet search engines and expert systems. Requires no training or computer literacy. Very difficult to program due to the ambiguous nature of human language. Expert System Expert System Advanced piece of software used to provide an answer to a specific problem. Often used in medical diagnosis and fault repairs on hardware. Consists of a Knowledge Base, Inference Engine and a HCI (usually a natural language interface) Inference Engine Interrogates the knowledge base to find an answer to a problem as part of an Expert System. Last Updated : 10th March 2012 - Watford Boys Grammar School Knowledge Base Experts in the field are interviewed to get information to create a knowledge base. The rules used to interrogate the knowledge base are collected in the rules base .The rules are used to interrogate the knowledge base using a set of algorithms stored in the inference engine Batch OS Often run during night time/weekends No need for human to be present Run in computer downtime when workers have gone home No need for instant response to inputs Processes large amounts of data in one go Similar data that requires similar processing Operating System Used to control the hardware of the system/resource management through software like hardware drivers/system software. Provides platform on which applications can run. Handles storage/management of files. Provides a user interface. Allow communication between user & hardware. Has utility programs used to carry out housekeeping on system. Utility Software Housekeeping programs which perform a common task. Programs to help the running of the hardware and protect the system. File handling Software Allows storage of files on secondary storage devices. Uses folders/directories/file extensions. Allows opening files/folders to retrieve data. Copying of files from. Deletion of files from storage. Allows security of files where needed. Real Time OS Data is processed instantly. System responds instantly to changes in input Multi user OS Allows more than 1 user to use the system simultaneously – e.g. a network operating system. One computer with many terminals allows more than one user at a time to access a central server. Each terminal given time slice... in turn - each time slice very small (1/100 of a second). Time slice cycles around each terminal at high speed allowing apparently simultaneous access to all users. Data is separated from terminals. Must have security provision/ individual user rights. Processing cheques/bills/pay rolls File handlers, Anti virus, Compression software Automatic Pilots on airplanes. Seat booking system – ensures 2 seats aren’t booked simultaneously Last Updated : 10th March 2012 - Watford Boys Grammar School Multi Tasking OS Allows more than one task to run apparently simultaneously. Each task is given an amount of processor time before going onto the next task. Processor is so fast that it seems as though the tasks are done simultaneously. Round robin system with each task allowed a small amount of time. User can switch between programs. Different programs available in different windows. Single user OS A single user OS allows one user at a time to use the system. It allocates each user with rights and keeps the user files separate Transparency Actions which are taken by the operating system without the user being aware of them. Waterfall Method Method of system lifecycle where each stage is fully completed before moving onto the next stage. Spiral Method Where analysis, design and implementation are done together and prototypes are produced by the programmer with the end user. This is iterative development. Feasibility Study Looks at if creating a new system/software application is worthwhile. Examines Technical, Social and Economic factors. Information Gathering Methods of finding out about current system. Questionnaire. Interviews. Observation. Collection and analysis of documentation. Installation Strategy Parallel/pilot/phased/direct installation. Devise training program. Purchase hardware. System must be tested with real data by end users. Write technical and user documentation. Software Maintenance Corrective. Adaptive. Perfective. User Guide/Documentation Manual which explains how to use system. Contains FAQs. Installation guide. Index. Glossary. Contents. Technical Documentation Written for future programmers. Contains Variable Names, Data Structure, how the code works, Procedures names, DFDs, Flowcharts, Entity Relationship Diagrams. Play a video or music track whilst using a word processor. Last Updated : 10th March 2012 - Watford Boys Grammar School Requirements Specification List of requirements of the client for who the new system is being produced. Consists of input, processing and output requirements. The client agrees to these so no confusion when program is finished. Design Specification Taking the requirements specification and designing the stages to produce the final system. Consists of input design (interface), output design, design of data structure, any diagrams such as Flowcharts, DFDs, ERDs. OCR Characters shapes are scanned and these shapes are turned into text e.g. scanning a printed page of text into a word processor document OMR Scanned page which reads the positions of marks on a document that are made in a specific place which denotes inputted data. Multiple choice tests or lottery tickets. Fast and accurate to process. Useful on multiple choice tests as answers are all objective – no area for debate. Can be processed in batches. Useful for partially sighted users to turn text into speech synthesis. Multiple Choice Test MICR Where special characters on document written using magnetisable ink which are both computer and human readable. Commonly used for printing account numbers on used on banking cheques Voice Recognition Computer system can interpret spoken word into commands appropriate for the application Useful for partially sighted/sight deficient users ALU Carries out arithmetic instructions. Carries out logical instructions. Acts as a gateway to processor. Control Unit Controls fetch/execute cycle. Manages execution of instructions by using control signals to other parts of computer. Synchronises actions (using inbuilt clock). Memory Unit Stores the OS/data currently in use and software currently in use Program Counter Stores the address of the next instruction and controls the sequence in which the instructions are executed. Memory Address Register Stores the address in memory currently being accessed Memory Data Register Stores the data being transferred to or from memory Current Instruction Register Stores the instruction currently being executed Last Updated : 10th March 2012 - Watford Boys Grammar School Accumulator Stores results of calculations performed Data Bus Transmit data between areas of the processor Control Bus Send control signals from control unit to other parts of the processor Address Bus Identification about where the data is being sent/coming from Buffer A small area of computer memory / temporary storage that holds data. Interrupt A signal or message sent to the processor that stops the current activity of the processor. Character Set The symbols that may be represented by a computer. Normally equates to the symbols on a keyboard. Each character on the keyboard has a binary code which is unique. ASCII has 1 byte per character. Unicode has 2 bytes. ASCII. Unicode Verification Checking input data with original data to ensure there have been no input errors Input same data twice and compare it Validation Validation ensures data meets certain rules. These are programmed in the software. Range Check A number between a maximum and minimum range >=1 and <=10 Format Check A field may required letters and numbers in a certain order Data entry for a NI number - LLNNNNNNL (L)etter, (N)umber. Presence Check Checks data has been entered into a field. Existence Check Barcode is read at supermarket till. That number is looked up on a database. If number is not on database then it must have been incorrectly inputted. Encoding Shortening a data input for faster and easier entry. Encryption Scrambled data to make it illegible to someone. Can be decrypted by using password. Helps make sensitive data more secure when transmitting it. (S)mall, (M)edium, (L)arge Last Updated : 10th March 2012 - Watford Boys Grammar School Backup A backup is a copy of a file and its structure on a portable medium kept away from originals so that if the original is corrupted it can be replaced. Important files needs be protected from deliberate or accidental data loss. Backup Strategy Copy of files to backup medium – eg. Memory stick, CDRW, DVDRW (not CD-Rom). Frequency of backup, Time backup is performed. Storage of backup medium in safe location. Archive Data is put onto long term storage and kept offline so that it can be referred to if necessary. Data is still available without taking up space on working storage. Disaster Recovery Procedures that ensure data and systems can be restored following a major disaster e.g. Fire in a building. LAN A local area network is a network covering a single building or site. WAN A WAN covers a wide geographical area crossing countries and continents. Handshake The exchange of signals between devices to signify that they are ready for communication. Rules/protocol will be agreed prior to the communication.. Without agreement on rules the two devices cannot understand each other’s signals. One device may not be ready for communication eg may be switched off Router Connects a LAN to a WAN Protocol A set of rules that governs communication between devices Logical Protocol The logical part of the protocol are things that are programmed in software such as baud rate the error correction used, and any compression techniques used. Physical Protocol The physical part of the protocol can be if data is transmitted wireless or hard-wired, Serial or parallel or the type of cabling used e.g. copper wire, or fibre optic, frequency of of wireless signal Baud Rate The speed in which data is transmitted between 2 devices or across a LAN/WAN. Small bit rate required for downloading text document. High bit rate required to watch video – time sensitive. Measured in bits per second. Last Updated : 10th March 2012 - Watford Boys Grammar School http Hyper Text Transfer Protocol. Protocol which governs how web pages are displayed over the internet. Parallel Transmission Multiple bits transmitted at a time down many wires eg. transferring data from CPU to hard disk which has time sensitivity of data transfer. Serial Transmission One bit transmitted at a time down a single wire Parity Bit When using parity the total number of 1’s in a byte must be either an odd or even number depending on the parity bit. This is the last bit in the byte. Method of error detection. Check Digit A digit on the end of a string of numbers that has been calculated based on an algorithm performed on the string of numbers. Used in error checking. Check Sum Blocks of bytes are added before transmission to give a sum. The sum is transmitted with the block. The same calculation is done on the data blocks at the destination and result is compared with the transmitted value. If different, there is a transmission error Echoing Data is transmitted. Received data is retransmitted back to sender. When received at source returned signal is compared to original. If there are any differences the data is retransmitted Simplex Communication in one direction only Duplex Communication in both directions simultaneously Half Duplex Communication in both directions but one at a time NIC Network Interface Card – Required to connect a PC to a network. NOS Network Operating System – OS required to manage the facilities of a network/LAN. Barcodes have a check digit to validate scanning. ISBN – Mod 11. Last Updated : 10th March 2012 - Watford Boys Grammar School Packet Switching Data split into packets sent onto network. Each packet finds the fastest route to destination. Packets must be reordered at destination/arrives in wrong order. Packets have identity on label. No established route for each packet. Doesn’t tie up parts of network. Maximises use of network. Data cannot be easily intercepted. Maximises use of network. Only as fast as its slowest packet! Circuit Switching Route reserved before transmission. Establishes a route along which to send data. Data sent down this route in its entirety. Can tie up large areas of network. Data Protection Act Data protection Act governs the storage of personal data electronically. It is required because Information is confidential and sensitive Information must be accurate Clients must have confidence that measures are taken to protect their data Ensure irrelevant data is not kept Concerns about identity theft/fraud Stops data being passed onto 3rd parties for marketing purposes. Computer Misuse Act Law that governs unauthorised access to data - Hacking Copyright Patents Act Law that governs pirating software/music/images. Last Updated : 10th March 2012 - Watford Boys Grammar School