Friday, 12 December 2014

Enhancement day- My handout


Components in a computer:

Hard Drive

The hard drive’s job is to store everything you keep on your computer. Including documents, pictures, music, videos and even programs. Hard drives are very important and need to be kept safe. This is why most people have a backup system which is where they get another hard drive and copy all important files onto that. If a hard drive is damaged, everything is lost.

CPU/Processor

CPU stands for Central Processing Unit, which is also called a processor. It is located inside the computer case on the motherboard and its job is to carry out commands. Whenever you press a key, click the mouse or start and application you are sending instructions to the CPU. As the CPU carries put so many instructions so quickly it heats up. To make sure the CPU does not over heat, on top of it is a heat sink. This heat sink absorbs the heat from the CPU. A processor's speed is measured in megahertz (MHz), or millions of instructions per second; and gigahertz (GHz), or billions of instructions per second.

Motherboard

The motherboard is a computers main circuit board. It is a thin plate that holds the CPU, memory, connectors for the hard drive and optical drives, expansion cards to control the video and audio and connections to your computer ports, for example, USB ports. The motherboard connects directly or indirectly to every part of the computer.

RAM

RAM stand for Random Access Memory. RAM is your system's short-term memory. Whenever your computer performs calculations, it temporarily stores the data in the RAM until it is needed. The short-term memory disappears when the computer is turned off. In order to keep your document of file you need to save it. When you save a file the data is written to the hard drive as long-term memory. RAM is measured in megabytes (MB) or gigabytes (GB). The more RAM you have the more your computer can do, which is why people add extra RAM to improve performance.

Heat Sinks

Without heat sinks modern computers wouldn’t be able to run at the speed that they do. Heat sinks are very important as they stop the CPU from overheating. If they do over heat it can destroy the entire system which would cost a lot of money.  The heat sink cools down the processor after it runs multiple programs at once.

Thursday, 11 December 2014

Enhancement Day Powerpoint




What is a character set?


What is a character set?

Character set is a group of unique symbols used for display and printing
 
What is ASCII? What do the initials stand for?

ASCII uses 8 bit. In an ASCII file, each alphabetic, numeric, or special character is represented with a 7-bit binary number.

American Standard Code For Information Interchange.

Explain how ASCII is used to represent text in a computer system.

ASCII is a code for representing English characters as numbers, with each letter assigned a number from 0 to 127.

ASCII was based on an earlier code from 1963. What was this?

ASCII developed from telegraphic codes. Its first commercial use was as a seven-bit teleprinter code promoted by Bell data services.

What is UNICODE?

Unicode uses 16 bits, which means that it can represent more than 65,000 unique characters.

Explain the difference between the character sets of Unicode and ASCII

Unicode is a 16 bit and ASCII is 8 bit, therefore more symbols can be shown using Unicode.

Friday, 21 November 2014

Storage Devices

1. List of some computing devices that are available on today’s market. For each one explain the main storage device/method used.

Laptop- Memory Cards and Flash Drive
Phone- Memory Cards and Micro SD Cards
Ipad- Icloud and SSD cards

2. Complete the table below.

Device

Capacity

Speed of access

Portable?

Durable?

USB Memory Stick
 16GB/32GB/64GB...
 80MB/s
 Yes
yes
HDD - Hard Disk Drive
 30/40TB Large Capacity
fast
only external hard drives are
yes
CD
 700MB/80 mins music time
quick
yes

not really
DVD
 4.7GB typically
quick
yes

not really
Memory Card
 can go up to 32GB and more
fast
yes

sort of
SSD - Solid State Drive
 up to 1.7TB. large
fast
yes, external ones are
yes



3. Suggest an appropriate storage device for each of the following applications.

 Store a high definition movie

Blue ray/DVD

 Distribute some software that you've written

A computer

Transfer GCSE Media coursework between home and school

Memory stick/Flash drive/Floppy disk

 Storage area on a college network

Memory stick

4. Describe two factors that should be considered when selecting a suitable storage medium to use in a given situation.

5. Name one device that makes use of solid state memory storage.

6. Describe one benefit of using a magnetic storage device like a HDD compared to a
solid state device, such as an SSD for storing files on a network.





Monday, 10 November 2014

Fetch-Execute Cycle

1(a) What do the initials CPU stand for?

C: Central
P: Processing
U: Unit

(b) List three components of the CPU.

CPU, ALU (arithmetic logic unit) and registers


(c) In relation to computer architecture, what are buses?

Communication system that transfers data between components inside a computer. 

2(a) Program counter

Is a register in a computer processor that contains the address of the instruction being executed at the current time. 

(b) The address bus

An address bus is a computer bus (a series of lines connecting two or more devices) that is used to specify a physical address.

(c) The data bus

Is a computer subsystem that allows the transferring of data from one component to another.

(d) The decoder

Undoes the encoding so that the original information can be received.

 (e) The Arithmetic and Logic unit

In digital electronics, an arithmetic logic unit (ALU) is a digital circuit that performs integer arithmetic and logical operations. The ALU is a fundamental building block of the central processing unit of a computer, and even the simplest microprocessors contain one for purposes such as maintaining timers.

Thursday, 23 October 2014

Purpose and function of the CPU

1. In electronic systems, a heat sink is a passive heat exchanger that cools a device by dissipating heat into the surrounding medium. In computers, heat sinks are used to cool central processing units or graphics processors. A heat sink is what covers the microprocessor. It is needed because as the microprocessor does millions of calculations per second it gets very hot. The heat sink is used to cool down your computer by passing on the heat from a conductive gel to a piece of metal. 

2. The initials CPU stand for central processing unit.

The control unit is a component of a computer's CPU that directs operation of the processor. It tells the computer's memory, arithmetic/logic unit and input and output devices how to respond to a program's instructions. It is the main core of a computer where every command runs through and is routed to its appropriate location.

The ALU (Arithmetic and Logic unit) carries out mathematical and logical computations.

For example:
• Addition and subtraction
• Multiplication and division
• Logical tests
• Comparisons

Registers are memory locations within the CPU itself for storing data and instructions.
They are designed to be quickly accessed for fast data retrieval.

3. The fetch-decode-execute cycle.

Fetch:
      the first step the CPU carries out is to fetch some data and instructions from the main memory and then store them in it's own internal temporary memory areas. These memory areas are called registers.
Decode:
      the next step is for the CPU to register what it has just fetched. The CPU is designed to understand a specific set of commands. These are called 'instruction set' of CPU. Each CPU has a different instruction set. The CPU decodes the instruction and prepares various areas of the chip in readiness of the next step.
Execute:
      This is when data processing actually takes place. The instruction is carried out upon the data. Once it has been carried out, it is stored in another register. Once the execute stage is complete, the CPU sets itself up to repeat the cycle.





4.  List three common household devices, other than computers, which contain microprocessors:


  •       Mobile phones
  •       Calculators
  •       Watches

5. 

The control unit:

       It controls and monitors the hardware attached to the system to make sure that the command given to it by the application software are used. It controls the input and output of data so that the signals go to the right place at the right time. It controls the flow of data within the CPU (The fetch-decode-execute cycle)





Arithmetic Logic Unit:

      The ALU performs mathematical, logical, and decision operations in a computer and is the final processing performed by the processor. After the information has been processed by the ALU, it is sent to the computer memory. In some computer processors, the ALU is divided into an AU and LU. The AU performs the arithmetic operations and the LU performs the logical operations.


Machine cycle



Friday, 17 October 2014

Ethics


Ethics


  • WikiLeaks is an international online non-profit journalistic organisation which publishes private information, news leaks, and classified media.
  • Julian Assange is an Australian publisher journalist; he is the editor and chief of WikiLeaks. He had an early career in hacking from 2006. I do not agree that he should be sharing private information, however i agree that if the celebrity or other person that has the information has agreed to letting WikiLeaks have it then there's not much to stop it. 
  • Chelsea Elizabeth Manning is a United States Army soldier who was convicted in July 2013 of violations of the Espionage Act and other offences, after releasing the largest set of classified documents ever leaked to the public. She gave information to the enemies, so i don’t agree with her actions. 
  • Edward Joseph "Ed" Snowden is an American computer professional who leaked classified information from the National Security Agency, starting in June 2013. I don’t agree with anyone leaking information that is private and hacking National Security is a big offence so i do not agree with his actions.


Computing and the environment

Computing and the environment


•Computers benefit the environment because they don’t use paper from trees and you learn more complex study systems.

•To make computers more environmentally friendly we can extend their useful lifetimes and recycle old computers to make new parts for new computers. 

Freedom of Information Act

Freedom of Information Act 
  • The Freedom of Information Act gives you the right to access recorded information held by public sector organisations.
  • however, in some countries they don't use this
  • The Freedom of Information Act 2000 is an Act of Parliament of the Parliament of the United Kingdom that creates a public "right of access" to information held by public authorities.
  • It protects people’s information and prevents other people or hackers from taking it.
  • If you break the law then you could be in risk of a jail sentence.

Phishing and Spam

Phishing and Spam


  • Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details. 
  • Spam is the electronic equivalent of junk mail. 
  • Phishing and Spamming isnt ethical as it is scamming, usually spam (bad email) is cause of viruses on computers that hackers use to get information. Phishing is definatly not ethical as passwords, credit card details and usernames are your own private information. 
  • There are currently a few laws going through congress that deal with internet crimes. Phishing is one the crimes that are being discussed.

Online Privacy

Online Privacy


Maintaining privacy whilst online is essential in avoiding identity theft and fraud. Apart from these risks, however, there is personal information about you which you undoubtedly do not want to reveal to certain other people. 


The Risks

  • Identity theft
  • Blackmail/extortion
  • Defamation of character
  • Unsolicited selling and marketing
  • People using awareness of your activities and movements to act against you
  • Employers using the information to exploit you
You are legally entitled to request a copy of all the personal data that an organisation holds on you, known as a subject access request. The organisation is obliged to deliver the data within 40 calendar days, and may charge a fee of up to £10 to do so.

Monday, 13 October 2014

Freedom of Speech

Freedom of Speech

Freedom of speech is the political right to communicate one's opinions and ideas using one's body and property to anyone.

Every government restricts speech to some degree. Common limitations on speech relate to: libel, slander, obscenity, pornography, sedition, hate speech, classified information, copyright violation, trade secrets, non-disclosure agreements, right to privacy, right to be forgotten, and campaign finance reform.

Whether these limitations can be justified under the harm principle depends upon whether influencing a third party's opinions or actions adversely to the second party constitutes such harm or not.

Freedom of information is an extension of freedom of speech where the expression is the Internet. Freedom of information may also refer to the right to privacy in the context of the Internet. As with the right to freedom of expression, the right to privacy is a recognised as a human right. Freedom of information may also concern censorship in an information technology context, i.e. the ability to access Web content, without restrictions. 

Twitter


Private information: You may not publish or post other people's private and confidential information, such as credit card numbers, street address or Social Security/National Identity numbers, without their express authorization and permission.

Reliability

Reliability

Reliability is very important for owners of computer systems. For example; reliability is very important for banks because if the computers are not reliable they could break down, resulting in data being lost. With lost data money can be lost and records could be ruined. Also, reliability is very important for hospitals. Without reliability their computer systems can break or shut down. This means they will need to have a back up power system to keep their patients alive and healthy. If they do not have a back up then lives could be lost.

Friday, 10 October 2014

Netiquette

Netiquette

What is it?

The word netiquette is a combination of ’net’ (from internet) and ’etiquette’. It means respecting other users’ views and displaying common courtesy when posting your views to online discussion groups.

Basic Rules:


  • Refrain from personal abuse. 
  • Don't spam. 
  • Write clearly and succinctly.
  • Remember that your posts are public.
  • Stay on-topic
  • Don't expect other people to do your homework for you. If you're looking for technical help, for example, don't ask questions you could easily answer yourself by reading the manual or online help provided with the product. 
  • Do not post copyrighted material to which you do not own the rights. 
  • The site's owner has the final say in enforcing the rules.

Sunday, 28 September 2014

Homework

Homework


In the 1950's two devices would be invented that would improve the computer field and set in motion the beginning of the computer revolution. The first of these two devices was the transistor, invented in 1947.
Over the years social media has been a main development in communication. People from all over the world are able to contact others using social media sites such as twitter and tumblr. From old computers there are now many ways to get on the Internet, to communicate with others, on devices such as laptops, ipads, phones and more. Internet connections can be free in some places and very easy to access which is a big development from when computers were first made.
In the future there will be more social sites used for global communication and more devices, which can also be used for Internet connection. They will develop devices making it easier for communication and access to the Internet.

Friday, 26 September 2014

Data Protection Act

Data Protection Act

The Data Protection Act 1998 (DPA) is an Act of Parliament of the United Kingdom of Great Britain and Northern Ireland which defines UK law on the processing of data on identifiable living people.


Personal data shall be processed fairly and lawfully and, in particular, shall not be processed unless- at least one of the conditions in Schedule 2 is met, and in the case of sensitive personal data, at least one of the conditions in Schedule 3 is also met.
Personal data shall be obtained only for one or more specified and lawful purposes, and shall not be further processed in any manner incompatible with that purpose or those purposes.
Personal data shall be adequate, relevant and not excessive in relation to the purpose or purposes for which they are processed.
Personal data shall be accurate and, where necessary, kept up to date.
Personal data processed for any purpose or purposes shall not be kept for longer than is necessary for that purpose or those purposes.
About the rights of individuals e.g. personal data shall be processed in accordance with the rights of data subjects (individuals).
Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data.
Personal data shall not be transferred to a country or territory outside the European Economic Area unless that country or territory ensures an adequate level of protection for the rights and freedoms of data subjects in relation to the processing of personal data.

Three rights to data subjects

The data subject (the person whose data is stored) has consented ("given their permission") to the processing
Processing is necessary for the performance of, or commencing, a contract
Processing is required under a legal obligation (other than one stated in the contract)

What does a organisation have to do to ensure that it abides by the law?


The personal data should be relevant to the reason the data has been kept in the first place. It should be accurate and only used and kept if it is necessary. Also, when needed the information needs to be updated so the data is correct. To keep the data safe and used only for business, the rooms need to be locked, devices need to have a safe password and employees need to be kept under restraint from using and finding the data in any way it could be used in the wrong circumstances. Once the data is used, it needs to be deleted so the company or device doesn't have the personal information any more. It should only be kept for the certain amount of time it is needed for and shall not be kept longer than necessary. 



















Thursday, 25 September 2014

Legality

Legality


Hacking

Hacking is where an unauthorised person uses a network, Internet or modem connection to gain access past security passwords or other security to see data stored on another computer. Hackers sometimes use software hacking tools and often target, for example, particular sites on the Internet.

Data misuse and unauthorised transfer or copying

Copying and illegal transfer of data is very quick and easy using online computers and large storage devices such as hard disksmemory sticks and DVDs. Personal data, company research and written work, such as novels and textbooks, cannot be copied without the copyright holder's permission.

Copying and distributing copyrighted software, music and film

This includes copying music and movies with computer equipment and distributing it on the Internet without the copyright holder's permission. This is a widespread misuse of both computers and the Internet that breaks copyright regulations

The Data Protection Act

This was introduced to regulate personal data. This helps to provide protection against the abuse of personal information. Find out more about the Data Protection Act.

Copyright law

This provides protection to the owners of the copyright and covers the copying of written, musical, or film works using computers. FAST is the industry body which is against software theft. You can find out more about it in the copyright section.
There have been cases where laws such as Copyright have been used to crack down on file sharing websites or individuals who store and illegally distribute copyrighted material, e.g music. There is a massive problem with many people around the world obtaining copyrighted material illegally.

Close down chat rooms

Some chat rooms have been closed down due to abuses, especially where children are vulnerable. Some have moderators who help to prevent abuses. Advice about sensible use is important; especially to never give personal contact details or arrange meetings without extreme caution.

Monday, 15 September 2014

Definitions

Definitions 

Computer System: A computer system is one that is able to take a set of inputs, process them and create a set of outputs. This is done by a combination of hardware and software.

Hardware: Hardware is a generic term for any part of the computer that you can physically touch, pick up, hold, move around the room etc. In other words, hardware are the physical parts that make up the computer.

Software: Software are the applications and programming instructions that tell your computer what to do and enable you to use it for things

Input: A place where, or a device through which, energy or information enters a system or put data into a computer.

Output: An output device is a piece of hardware that is used to output data that has been previously entered into a computer or processing device.

Processing: Processing is the stage where the input data is manipulated in order to produce meaningful information. Processing can include a number of stages such as sorting, searching, calculations, graphing.

Storage: In computing a storage device, such as a hard drive or memory stick, is used to store data or information for future use.

Friday, 12 September 2014

Intro

Hello, my name is Jess and this is my GCSE Computer Science blog. On the first week of Computer Science we have learnt Binary Code. My name in Binary Code is:

01001010 01100101 01110011 01110011