Combination Notes
Combination Notes
Combination Notes
HARDWARE:
CPU, Central Processing Unit – measured by clock speed.
Processing is dependent on the memory capabilities of the system. The more memory, the faster the
processing occurs.
The system unit is the collection of hardware components that includes the central processing unit, memory
and associated technology.
Set of electronic circuits responsible for controlling and processing data within the computer
‘brain’ of the computer
Accepts data from any input device and changes the data according to the instructions given to the user, the
results are then sent to the output device
CPU consists of tens of millions of electrical components located on thin silicon wafer called and integrated
circuit or silicon chip.
Several different types of chips e.g. Intel
In a PC, the CPU is contained on a single integrated circuit and is called the microprocessor.
In more powerful computers, the CPU may consist of more than one integrated circuit.
These integrated circuits are located on a flat printed circuit board inside the computer known as the
motherboard.
Motherboard also contains other integrated circuits for special functions such as storage, video,
arithmetic and sound.
Constantly undergoing development to make it more powerful.
CPU is made up of two components: the control unit and the arithmetic logic unit.
The control unit directs and coordinates the entire computer system.
Organizer directs the flow of data in the computer in the same way as traffic lights control the flow of
cars at an intersection.
Control unit selects and retrieves instructions from storage in sequence, interprets them and starts the
required operation.
Arithmetic logic unit is part of the CPU that carries out all the arithmetical and logical calculations.
Calculations include: addition, subtraction, multiplication and division.
Logical calculations have a true or false answer.
Operational characters include (>,<,=,>=,<=,<>)
Logical operators include (AND, OR, and NOT)
ALU contains several types of registers
Register is a temporary storage area for small amounts of data or instructions needed for processing.
Provides fast access to data.
Fetch-execute cycle/machine cycle is a cycle of events on a single instruction carried out by the CPU to process
data.
Before an execution is processed, the instructions and data are placed in memory.
CPU performs following steps for each instruction:
Control unit fetches the instructions from memory.
The control unit decodes the instructions (works out what to do) and makes the data available to
the arithmetic logic unit. The first two steps are called the instruction time or i-time.
The arithmetic logic unit performs the operation on the data.
The control unit places the result of the operation into memory or a register.
Steps three and four are called the execution time or e-time.
Most processors today use
In pipelining the CPU fetches a new instruction as soon as the preceding instruction moves onto the next
stage.
Pipelining speeds up the fetch-execute cycle as several instructions are being processed at the same time.
E.g. as one instruction is being fetched, a second is being decoded, a third is being executed and a fourth
is storing the results.
MEMORY
Holds data and programs before and after they have been processed by the CPU.
Memory is internal storage.
Integrated circuits located on the motherboard.
Secondary storage is external storage because the data is kept away from the motherboard and the CPU.
Memory consists of RAM, cache and rom.
RAM is where data and instructions are held temporarily.
Depends on a supply of electricity to maintain data storage.
When the power to the computer is shut off, everything in RAM is lost.
RAM is volatile memory.
Two main types of RAM:
DYNAMIC RAM is memory that must constantly be refreshed.
Most memory uses DRAM (pronounced 'dee-ram') chips as they are small, inexpensive and
simple.
Synchronous DRAM (SDRAM, pronounced 'ess-dee-ram') is a type of DRAM that is
synchronized with the CPU; it is faster than ordinary RAM.
STATIC RAM (SRAM, pronounced 'ess-ram') is memory that doesn't have to be updated or refreshed.
Faster access time compared to DRAM.
SRAM chips are more expensive.
SRAM is mainly found in portable computers.
CACHE is a temporary storage area used to store frequently requested data and instructions.
Makes the computer operate faster.
The larger the cache, the faster the computer will operate.
Two main types of cache.
CACHE MEMORY is high speed memory located between the RAM and the CPU.
Improves performance by using SRAM and reducing the need for the CPU to access the
slower DRAM chips.
A DISK CACHE stores the most recent data from the hard disk in RAM.
When the CPU needs access to data from the disk, it will first check the disk cache.
Disk cache improves the computer's performance because accessing data from RAM is a
thousand times faster than accessing a disk.
Effectiveness of cache is dependent on the amount of times that the CPU finds the data in the cache.
– This is called the HIT RATE.
ROM (random access memory) holds data and instructions that are fixed at the time of production and cannot
be changed by the user or the computer.
Permanent memory that only allows data to be retrieved (read) and not written into storage
(written).
Instructions stored in ROM are called firmware because they are somewhere between hardware and
software.
Data cannot be damaged or changed within a ROM.
Most PCs contain a small amount of ROM that stores the important programs such as booting the
computer and checking for input and output devices.
Instructions that allow the computer to communicate with input and output devices are called the
ROM BIOS (basic input/output system)
There are a number of different variations of ROM.
PROGRAMMABLE ROM (PROM) chips allow data and instructions to be entered only once and
cannot be reprogrammed.
The difference between ROM and PROM is that PROM is manufactured as blank memory
whereas with ROM the firmware is entered during the manufacturing process.
ERASABLE PROGRAMMABLE ROM (EPROM, pronounced 'ee-prom') chips can be erased and
reprogrammed by the manufacturer.
Exposing the chip to ultraviolet light wipes the memory in the EPROM.
Used in PCs and arcade machines.
Enables manufacturers to erase data on the ROM to cater for new firmware and the removal
of errors.
Non-Computer tools are used to support understanding how the processing in an information system, transforms
data into information.
Prior to computers, humans have performed most processing using rulers and calculators.
Documentation:
Detailed and structured description of instructions to be followed step by step e.g. instruction manuals
Graphical method of showing a system using a number of processes together with inputs, outputs and
storage
Documents essential details of the system such as the sequence, processes and precise rules for a
particular action
• What the task is and why it is required. The general statement should include the overall process and it’s
purpose.
• Who is responsible for the task and who performs the task? Each task assigned to a participant or group.
• Diagrams are able to communicate complex information and relationships between processes within a
system then using text.
• Data flow - Data flow arrows are used to show the movement of data between processes and external
entities
• External Entity - External Entities represent people or organizations, that process or receive data from
processes from a source or location
• Data store - Data stores represented as an open-ended rectangle is where data is stored. Can be either
computerized (e.g. Databases) or manual (e.g. hard disk, filing cabinets). The symbol doesn’t differentiate
between computer-based and non-computer based storage media
Social and ethical issues that arise from the processing of information include:
The wide spread use of information technology has raised a number of ethical issues for
people. These are some of the issues that relate specifically to processing data:
This type of processing raises issues of security and flexibility is about centralized processing and
distributing processing. One major concern when data is distributed is that computers will have a lower
security, when data is stored in only one device it can achieve a higher security. Therefore centralized
processing is more secure then distributing processing. The positive side to distributing processing is
more flexible and is not dependant on one central computer.
The ownership of processed data is about the ownership of the data; data is questioned on who it
belonged to and who are allowed to access it.
Transmitting and receiving is the transfer of data within and between information systems.
Throughout the presentation we will be discussing: communications within a computer, the role
of modems and area networks such as LAN and WAN.
Peripheral devices are linked to the CPU using expansion slots and ports.
Expansion Slot
An opening where a circuit board can be inserted into the motherboard to increase the
computers capabilities.
The circuit board that is inserted is called an expansion card or expansion board.
Ports
A port is a socket used to connect peripheral devices.
They use different connectors which are referred to as male and female.
Ports are either parallel or serial.
Parallel ports – transmits eight bits (one byte) at a time along eight parallel lines.
Serial ports ‘COM’ – transmits data one bit at a time using only one communication line.
Communications software
The transfer of files and commands between computers is governed by different protocols. Protocols
are like languages, computers need the same languages to talk to each other.
FTP
File Transfer Protocol is a protocol used for transferring files from one computer to another - typically
from your computer to a web server. FTP is the preferred method of exchanging files because it's faster
than other protocols like HTTP.
POP
Post Office Protocol, a protocol used to retrieve e-mail from a mail server. Most e-mail applications
(sometimes called an e-mail client) use the POP protocol.
SMTP
Simple mail transfer protocol, most e-mail systems that send mail over the Internet use SMTP to send
messages from one server to another, the messages can then be retrieved with an e-mail client using
POP. It is generally used to send messages from a mail client to a mail server.
1. The IP address looks up the recipients or contacts of the user. This is called a DNS lookup
meaning domain name server.
2. The senders SMTP server establishes a connection with the recipients.
3. After the SMTP has been collected it is passed through the corresponding POP or IMAP and
placed in the mailbox of the recipient for collection.
Software for transferring text, numeric, image, audio and video data
Most data is stored in files. During a files transfer, the sender splits the file into a sequence of
chunks or packets, each packet been sent individually. However, audio and video files are often
larger and they need to be displayed progressively over time. This is where a program uses
buffering to display videos and images in real time.
Audio and video playback or display requires a continuous and a steady supply of data.
E.g. Buffering video when playing it refers to the download of data or video/audio when it is still
paying. Buffering decompressed the data into its simplest form.
Transmitting and Receiving
Transmitting and receiving is the transfer of data and information within and
between information systems.
The hardware includes
Modems
Networks
internal components of the computer.
Modem
A modem allows data to be
transferred from one
computer to another.
Types of Modems
Optical Modems transmit data over optical fibre lines by converting electric signals
from computer into pulses of light.
Features in modems
Auto-answer, where the modem
will answer an incoming call.
Auto-disconnect, where the modem will disconnect automatically at the end of
a session.
Auto-dial, where the modem will take care of dialing.
Non-computer
Mail
Phone
Fax
Radio
television.
Types of Transmission
Packet switching
Is the transfer of data in small “packets”, each with a controlled format and made of
a maximum size, ranging from a few hundred bits to several thousand bits.
The data packets allow data to be checked and correctly reassembled and may take
different routes to their destinations.
Circuit switching
When a telephone call is made, a circuit-switching network is used. For the duration
of the call, one circuit or telephone line is set aside for that call. No one else can use
that telephone line during the duration of that call.
Types of data transmissions
Application/Uses
Synchronous transmissions are used when transmission speeds are very high above
1200 bps. This is used in direct communication between computers or between a
computer and a peripheral device. For example many laser printers use synchronous
transmission at 9600 baud.
It is efficient
has sophisticated error checking.
It is fast but expensive.
Baud Rate
The baud rate is a measure of times per second that a data communications signal
changes: with each change one or more bits of data can be transmitted. The time
Signal changes
1 0 0 0 01 1 10 1
Parity Bits
In both, Asynchronous and synchronous methods of data transfer, a parity bit may
be used for error checking. When parity checking is used, only seven bits from the
character byte are used to represent the character and the eighth bit is used for
parity checking. Parity can be set to odd, even or none. Parity can be odd, even or
none.
Modes of transmission
The Transmission of data between devices via a communication channel may be in one
of the three modes:
Simplex transmission
Half duplex transmission
Full duplex transmission
Simplex Transmission
This allows communication between devices in only one direction. For example
television signals.
Parallel Transmission
In parallel transmission, each bit has its own piece of wire along which it will travel.
Serial Transmission
In serial transmission, the bits move down the wire one at a time in single file.
Uses:
Effective for transmitting over short and long distances.
It is slower than parallel transmission.
Hardware
Hardware for transmitting and receiving includes modems and networks as well as the
internal components of the computer
Communication within the computer
Communication within a computer involves transferring data between peripheral
devices, the hard disk and the CPU. Every part of the computer is linked to the CPU
either directly or indirectly by a bus.
Bus
A bus consists of electrical circuits between input, storage, process and output
devices. The greater the width, the more data that can be transmitted at the one
time
The speed of the bus is also an important factor in the performance of the
computer. A faster bus will make the applications run faster. There are two
different types of buses.
An internal bus is located on the motherboard and links the CPU and memory..
An expansion bus connects peripheral devices to the CPU and memory. If the
expansion bus connects directly to the CPU and bypasses RAM it is called a local bus.
There are different types of expansion buses, such as ISA, EISA, VESA and PCI.
Ports
Information Processes and Technology transmitting
A port is a socket used to connect peripheral devices. Ports are either parallel or
serial.
Parallel ports transmit eight bits (one byte) at a time along eight parallel lines. They
are used to connect devices that send and receive large amounts of data such as
printers and disk drives.
Serial ports transmit data one bit at a time using only one communication line. Serial
ports are used to connect almost any peripheral device, such as a mouse, keyboard,
modern or plotter. The most common type of serial port is the RS-232.
Handshaking
The process of sending pre-arranged signals to define protocols between two
computers. It establishes compatibility, correct modulation and speed. When both
devices are switched on they perform two steps:
The modem performs a self-check.
Turns on “data set ready” to signal that it is ready for work.
Communications Protocol
Protocols are strict procedures for establishing and maintaining communication. Some
rules concern who will transmit first and how fast they will transmit data, error
checking, parity type to use and the number of bits that will make up a character.
Error Checking
When using telephone line and a modem the error can be one bit per 100,000
transmitted.
Optic fibre, the error rate will be less than one in one hundred million bits
transmitted.
2. Checksum
In this method, the number of „0‟ and „1‟ bits in a file or block of data is added
together and the sum (a redundancy value) is transmitted along with the file or data
block.
The receiving computer also adds the number of bits in the message and if its total
is different from the sum sent with the transmission, then an error is detected but
the position of error is not identified.
Error correction
Retransmission of damaged block is the only solution. If errors occur, only the
damaged block needs to be transmitted. Backward correction.
Forward error correction. This method is used for data correction at the receiving
end of transmission. It requires no request or reverse message to re-send a single or
block of data.
Networks
A network is three or more devices (nodes) connected in such a way that they can
communicate with each other.
NODE
In a network, each device is called a node. Node in a network can be a device such as
terminal, PC, desktop workstation or a larger computer.
HOST.
Some networks have a series of nodes linked to a central computer called the host.
File Server
is a dedicated computer with a large hard disk that holds files and software to be
accessed by other nodes or workstations in a network.
Network Server
is a device, which provides file management, printing, and communication facilities to
the other devices attached on the network.
Network Topologies
Topology refers to the arrangement or layout of nodes on a network.
Types of Topologies:
Bus
Star
Ring
Star network
The central station is very
important because if it fails,
the entire network goes down.
The signals are sent through
the central station and circuit
switched to the correct
receiving station over a
physical path.
Because all messages go
through the central
station, there can be
bottlenecks.
The failure of any outer station does not affect the network.
Ring Network
Traffic can be one way or two
way.
It does not require a main
computer to control the
network.
It can be very fast if two-way
traffic is allowed.
In this form of network the
transmission is broadcast and
the destination station is able
to recognise its address on a
signal and receive that signal.
Bus network
A major concern in any network is to avoid having two or more devices attempting to
transmit a signal at the same time. When this occurs it is termed as collision. With
collision, data loss or network crash can happen.
Token passing
Token passing is another method of controlling collision.
A token is only one, unique string of bits and on a network.
The token moves continuously around the network when no transmissions are
occurring.
When a node needs to transmit a signal, it must wait for the token and when it
appears, it is captured by the device and held while the message is transmitted.
Types of networks
In computer communications, there are two types of networks:
LAN: Local Area Network.
WAN: Wide Area Network
Types of LAN‟s
There are two types of LAN‟s:
Peer to Peer.
Server client.
Token ring
Token ring network was designed by IBM to overcome problems in ring networks.
In a ring network, a station has to wait for a lull before transmitting its message.
Uses twisted pair wire, and allow speed of up to 16million bps.
Up to 260 stations can be attached and many rings can be connected via bridges.
Dumb terminals do not contain a processor and usually consist of a keyboard and
monitor.
Softwore
Compression
Compression reduces the number of bits required to represent data. It compacts the
data so that it takes up less space on a disk and requires less time to download.
Compression is either
Lossy
lossless.
Electronic mail (email) allows communication with other users by sending and
receiving electronic messages using a computer. Email messages are often short and
are typed quickly. Messages are written offline and sent when the user logs onto the
LAN or the Internet. Attachments are computer files sent with email messages, such
as image, audio, video or text files.
Data encryption is used to prevent data from being intercepted and read during
transmission. The data is 'scrambled' so that it is meaningless to anyone other than
the recipient, who uses the same encryption software to convert it back.
Accuracy
Thee accuracy of information received from the Internet is not guaranteed. Must
compare data from a number of sources and determine which data is accurate
Security
One method to protect data from deliberate or accidental damage is the use of
certificates. A certificate o digital signature is an encrypted code that identifies a
particular personal Web site. It aims to ensure that unauthorised persons cannot
access data.
Acknowledgment
To cite an Internet source it is important to include the author's name, title of the
completed work, URL of the page and download date.
Privacy
This can be an issue when receiving information from the Internet. Some Web sites
use cookies to record information about visitors to their site. Some people argue
Transmitting and receiving is the process of transferring data and information within and between
information systems
• Conventional mail – makes it possible to send a letter and or parcel to the address of any
person around the world
• The Telephone – which transmits sounds or speech between distant places through the use of
telephone lines.
• Fax machine – this transmit and reproduces documents. It scans it as a document and converts
it into a bit – mapped image
• Radio – this allows people to receive up-to-date information and entertainment through the use
of a radio station.
• Television – this depicts the transmission and detection of images and sound using
electromagnetic waves that travel through the air.
• Ownership of processed data – organisations can use preference and habits to their commercial
advantage
• Bias in processing data can be caused by biased data being collected or incorrect, manipulation
of the data
• The type of processing raises issues of security. Securing data on one computer is easier than on
numerous computers, therefore centralised processing is more secure than distributed
processing
• Types of securing data include https (hypertext transfer protocol secure) and data
encryption
9.1 Tools for Displaying
Displaying: to show or exhibit; make visible – ‘the displaying information process outputs
information from an information system to an external entity within the system’s environment.’
Data can be displayed through the use of different technology. This can be seen in:
Hardware Paper based
Software
Electronically
Data can be displayed in different forms in consideration of its appropriation. These include:
Databases (computer tool): A collection of (usually) organized information in a regular structure
Word documents (computer tool): document processed through the use of the software Microsoft word
Booklets (non-computer tool): the displaying of information on a no. of pages/ in paper based form
Pamphlets (non-computer tool): a small book usually having a paper cover
Posters (non-computer tool): sign posted in a public place as an advertisement
Receipts (non-computer tool): a written acknowledgement that a specified article or sum of money has
been received as an exchange for goods or services
Folders (non-computer tool): An organizer that papers are kept in, usually with an index tab, to be
stored as a single unit in a filing cabinet
Mindmaps (non-computer tool and computer): a diagram used to represent words, ideas, tasks, or other
items linked to and arranged around a central key word or idea
Flowcharts (non-computer tool and computer): a diagram of the sequence of operations in a computer
program
Dataflow diagrams (non-computer tool and computer): A type of flow chart; a description of data and
the manual and machine processing performed on the data as it moves and changes from one stage to
the next
Hand-draw diagrams (non-computer tool): paperbased diagrams drawn by hand of the participnt’s. No
computer software or displaying involved.
Storyboard (non-computer tool and computer and traditional method of display): graphic organizers
such as a series of illustrations or images displayed in sequence for the purpose of pre-visualizing a
motion picture, animation, motion graphic or interactive media sequence, including website
interactivity.
TOOLS FOR DISPLAYING
DEFINITION:
Displaying is presenting the output from an information system to meet a given purpose. It is the presentation of
information in the form of text, numerals, and images audio and video, a range of software combinations are used to display
different types of information.
Displaying software:
- All applications software transmits and receives data within an individual computer. Special communications software is
used to send and receive data over networks and using modems.
communications software manages the transfer of data files and commands between computers
Reporting is the process of where Static data that is displayed on all reports is entered into controls
Data that changes during generation of a report is specified using a text box.
A text box can contain multiple fields.
Text boxes can be generating information as the report is being written.
i.e. = now () causes the date and time to be displayed and (page) displays the page number within the report.
Merging is a process where information from a database or other list into a standard document to produces
multiple personalized copies. Most standard documents is produced with in a word processor and fields from data
base or list are inserted .Each and every record within the data source is used to single personalized copy of the
standard document
Tables
Tables are used to split the displayed information into distinct cells. Each cell can contain text, images, hyperlinks
or any combination of HTML elements.HTML tables must be created within the body of an HTML document a <Th>
tag specifies a table heading. Each tag is followed by the to be displayed within the current cell.
A chart is a graphical representation of numerical data. They convert data in rows and columns into a picture that
can be read from a glance. Charts make data easy to understand.
Displaying – Hardware
Displaying is presenting the output from an information system to meet a given purpose. It is the
presentation of information in the form of text, numerals, images, audio and video. A range of
hardware and software combinations are used to display different types of information.
- Speakers.
Screens
Screens or monitors or display units are electronic display surfaces that provide immediate visual
feedback as to what the computer is doing. Screens are made up of thousands of tiny pixels that are
used to display text, numbers, images and video data. The two most commonly used screens are
monitors and flat screens.
Monitors
- Monitors use Cathode Ray Tube (CRT) technology, where a beam of electrons are fired onto
the inside of a screen that is coated in phosphor, when the electrons hit the phosphors the
phosphors then glows for a short amount of time.
- A raster scan then repeats this process to maintain an image, this process is called
‘refreshing’.
Flat Screens
- Do not use CRT technology, but use Liquid Crystal Display technology.
- Liquid Crystal Display compromises of a layer of the liquid crystal material between two
polarising sheets.
- Light is passed through the liquid crystal material and a current causes pixels to become
activated.
- LCD’s are advantageous as they produce very little light, take up less room than monitors,
use less power than CRT’s, produce no heat or glare and emit no radiation
- However, high quality LCD’s are expensive in comparison to CRT’s.
Printers
Printers are used as devices to represent data on paper, such as text, number and image data.
Printers vary in price according to the quality of the data output and type of printer. Printers can be
classified into two main categories: Impact printers and Non-Impact printers
Impact Printers
- Impact printers involve the process of producing an image on paper through a means of
physical contact.
- An example of impact printers includes the ‘Dot Matrix Printer’. Dot Matrix Printers form an
image using dots, through the process when a pin and printer ribbon ‘impact’ onto the
paper.
- Dot matrix printers can be described as cheap and noisy but reliable producing a resolution
of 60 dpi – 180 dpi(dots per inch)
Non-Impact Printers
- Non-impact printers produce an image using other methods rather than physical contact.
- Types of non-impact printers include laser and inkjet printers.
- Inkjet printers involve the process where characters are produced by spraying very fine
drops of ink onto paper. Inkjet printers produce high quality data output, are light and fairly
cheap with a resolution of 600dpi or more.
- Laser printers use information from the computer to fire a laser beam to charge an ink
drum, where it is then fused onto paper using heat and pressure to form images. Laser
printers are much more expensive but effective and can produce 600-1200dpi.
Speakers
Speakers are a common technology used to produce sound. Speakers can usually be found in most
personal computers and are used for many other things in today’s society.
- Speakers are most often connected to computers using a port and sound card.
- Speakers are used for producing sounds, music and as a means of voice output.
- Voice output can be achieved through speaking into a microphone then converted and
played back for the person to hear through speakers. Or voice synthesis where the artificial
production of human speech generates voice sounds to be heard by speakers.
Displaying
Displaying is presenting the output of data from an information system. It is the presentation of
information in the form of text, numerals, images, audio and video
• Storyboard – a series of frames each representing a different action or screen image. They can
be drawn on paper and tells the story of a presentation. The four types of storyboard layouts
are:
• Linear
• Hierarchical
• Non – linear
• Combination
• Communication Skills – presentations need to be effective, well organised, attractive and easy
to understand
• Visually impaired people need appropriate displays and Web designers should consider how
people with disabilities will be able to access their information
• Offensive material such as pornographic, racist and violent material is a major concern. Children
with Internet access can potentially view inappropriate material so parents and schools need to
prevent this by using blocking software like Net Nanny