0% found this document useful (0 votes)
34 views14 pages

Ict Cram ??

The document outlines the essential components of a computer, including hardware, input/output devices, and various storage types such as magnetic, optical, and solid-state storage. It also discusses the binary system used by computers for data processing and highlights security threats and methods for protecting data. Additionally, it emphasizes the importance of ethics in technology use to safeguard privacy and data integrity.

Uploaded by

hy373625
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views14 pages

Ict Cram ??

The document outlines the essential components of a computer, including hardware, input/output devices, and various storage types such as magnetic, optical, and solid-state storage. It also discusses the binary system used by computers for data processing and highlights security threats and methods for protecting data. Additionally, it emphasizes the importance of ethics in technology use to safeguard privacy and data integrity.

Uploaded by

hy373625
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Components of a computer

Casing
Central Processing Unit (CPU)
Random Access Memory (RAM)
Microprocessor
Motherboard
Graphics Processing Unit (Video Card)
Sound Card
Hard Drive
Optical Drives

Computer Hardware
●​ the physical touchable components that make up a typical computer system.
●​ Can be internal or externally found

- Contains a Central Processing Unit to process data (all computers have a CPU)

What is a computer
A computer is a type of electrical device which can take a set of inputs, process or compute
them and output this information back to the user.

- Electrical devices which do not process data and run computer software (like a torch) are not
computers.
- Gives results to the user such as on a screen, via a printer
Input devices:
-​ Mouse
-​ Keyboard
-​ Barcode scanner
-​ Joystick
-​ Microphone

Output devices:
-​ Speakers
-​ Computer monitor
-​ Headphones
-​ Printer

I/O devices:
-​ Digital camera
-​ Headphones with mic
-​ Multipurpose printer

Storage devices
Examples:
1.​ Solid state hard drive
2.​ Floppy disks
3.​ Usb
4.​ cd /dvd
5.​ Magnetic hard drive
6.​ Magnetic tape

Magnetic Storage

• Magnetic material is coated on the surface of a disk or tape that can be magnetized to
represent 0s and 1s
• Can be made of more than one disk, which is called a platter

Examples:
-​ Fixed / internal hard disk drive
-​ Portable Hard disk drives
-​ Magnetic tapes
Hard Disk Drive (HDD)

Features & Uses

• os, system software, application software


• data/files
• Used on PC, laptops, robots, control systems, servers to store software and data

Advantages
• Fast data transfer rate, and fast access to media
• Large memory capacities

Disadvantages
• Can be easily damaged due to many moving parts and incorrect shutdown procedures
• Read/write operation can be noisy compared to SSDs

Includes:
Fixed / Internal HDDs and
Portable HDD
• Backup data to prevent data loss
• Transfer data between computers

Magnetic tape

Features & Uses


• Very thin strip of plastic coated in a magnetic layer
• Data is stored in magnetic areas that represent 1s and 0s
• An example of serial access
• Batch processing; backup/archive data

Advantages
• Less expensive than HDD
• do not deteriorate much over time
• Huge data storage capacity
• Fast data transfer rate

Disadvantages
• Slow data access time
• When updating, another tape is needed
• Affected by magnetic fields
Optical Storage

- any storage type in which data is written and read with a laser.
- written in :
compact discs (CDs)
- 700MB
digital versatile discs (DVDs)
- 4.7GB.
- uses microscopic lands and pits
- pits are non reflective areas
- Lands are flat reflective areas that can be read by the laser in the CD player as the laser
passes over the surface to form a sequence of numbers.
- lands represent 1s and pits represent Os

CD-ROM AND DVD-ROM:


ROM= read only memory (non-volatile, permanent data that can only be
read, not written to)

Features and uses:


• Music (CD), HD movies (DVD), games
Used to:
• prevent the deletion or overwriting of important data

Advantages
• Holds more data than floppy disks
• Less expensive than HDDS

Disadvantages:
• Slower data transfer rate
• Slower data access time

CD-R AND DVD-R:


R = write only

Features and uses:


• Recordable once only
• Becomes a ROM once written content has been finalized
• used in home recordings of music and films
• Stores data to be kept for later use or to be transferred to another
computer

Advantages
• Cheaper than RW discs

Disadvantages:
• If an error in the data has occurred, then the disc has to be discarded

CD-RW AND DVD-RW:


RW = Rewritable media that can be written several times

Uses:

😡
• Record TV programmes STOP MIXING UP USES AND ADVANTAGE

• Used in CCTV

Advantages:
• Can be written over many times
• Can use different file formats each time it is rewritten

Disadvantages:
• Can be relatively expensive
• Possible to accidentally overwrite data

DVD-RAM:
RAM: allows simultaneous read and write operations to take place through
concentric tracks

Advantages
• Allows numerous read and write operations
• Great longevity
• Very large capacity
• allows simultaneous recording and viewing of programs in some video
recorders.

Disadvantages
• Not compatible/ recognized by many systems
• Relatively expensive
• Replaced by newer technologies like solid state

Blu-Ray Discs

Features and uses:


- Uses a blue laser instead of a red laser
→ allow the pits and lands to be much smaller
→ holds up to five times more data than a regular DVD.

- Can store and play HD movies, save data, backup hard drives and
camcorder to play movie footage.

Advantages:
• large storage capacity
• fast data transfer
• fast data access speed
• automatically come with a secure encryption system that prevents
piracy and copyright infringement

Disadvantages
• Relatively expensive
• Few movie titles in Blu-ray format
Solid state Storage

Features & Uses: TRANs- resistors


STORES DATA ELECTRICALLY +• No moving parts
• Store data by controlling the movement of electrons with chips
• The data is stored as 0s and 1s in millions of tiny transistors within the chip
• Each transistor can store a single bit this is so confusing????

Advantages
• No moving parts
• All data is retrieved at the same rate no matter where it is stored

Disadvantages
• Questionable longevity ← this feels too vague to actually be tested

Examples:
-​ Solid State Disks
-​ Memory Stick
-​ Flash memory - memory sticks, pen drives, memory card (ARE ALL
ROBUST)
-​ Micro flash memory

222 443 222 411 222 143 321 143 231 123

Solid State Disks


Features & Uses

• Used to replace HDDs


Advantages
• Faster boot time
• Faster read/write speeds
• Durable; no moving parts
• Lightweight and portable
Disadvantages
• More costly
• Lesser storage capacity
• Lower lifespan

Flash Memory - Memory Sticks / Pen Drives


Features & Uses
• Transporting files between computers or used as a backup storage
← same usage as portable hdd

• Used as a security device to prevent software piracy

Advantages
• portable and compact
• do not deteriorate much over time (magnetic tape)
• No additional software needed

Disadvantages
• No write-protect; easy to lose

Flash Memory - Memory Card


Features & Uses
• digital cameras, smartphones, MP3 players (BASICALLY SD CARD)

Advantages
• Very compact and can be easily removed
• do not deteriorate much over time
Disadvantages
• Expensive compared to HDDs
• Shorter life span
• Lower storage capacity than HDDs

Computers use digital signals. They are either on or off.


Computers use binary (a number system that only uses two digits: 1 (ON) and 0
(OFF) ) to process information and operate, store and transmit information.

WHY USED:

• Easier to read and write


• Uses less memory; more numbers can be stored
• Easier to input; less prone to errors
• Easier to convert to binary and vice versa
USES:

To represent color codes in html and css


To denote MAC (media access control) addresses which uniquely identity devices on a
network

No Binary Denary Number

1 10101000 168

2 11111000 248

3 10111000 184

4 11100000 224

128 64 32 16 8 4 2 1 Total

1 128 0 32 0 8 0 0 0 168

2 128 64 32 16 8 0 0 0 248

3 128 0 32 16 8 0 0 0 184

4 128 64 32 0 0 0 0 0 224

No Denary Binary Number

1 12 0001100

2 27 0011011

3 45 0101101

4 58 0111010

Use the conversion chart to show the steps:


64 32 16 8 4 2 1 Binary number

1 0 0 0 1 1 0 0 0001100

2 0 0 1 1 0 1 1 0011011
3 0 1 0 1 1 0 1 0101101

4 0 1 1 1 0 1 0 0111010

1 Mac Address [Link]

0 1 3 2 5 4 7 6 A B 6 E

0000 0001 0011 0010 0101 0100 0111 0110 1010 1011 0110 1110

2 Mac Address [Link]

0 0 1 A 3 F 9 B 4 C D E

0000 0000 0001 1010 0011 1111 1001 1011 0100 1100 1101 1110

No Binary number Hex color code

1 1111 1111 0000 1100 0101 1001 FF 0C 59

2 1110 1011 1111 0001 1110 1101 EB F1 ED

Why are security and ethics tied together?

Security and ethics are linked because ethical principles are there to ensure responsible
technology use, protecting rights, privacy and data integrity.
Data Threats
Online security risks include:
Hacking Phishing Vishing Smishing

1. Act of gaining • Legitimate-looking emails • Voicemail to trick user into • send out fake SMS text
unauthorised sent to users containing calling a number contained in a messages
access to a links or attachments that message or hold a call till • Asks recipients to log
computer system trick users to give away connected to a fake personnel on to a website or make
→ identity theft or personal data who claims to work for a a telephone call
misuse of personal • Disguised as legitimate legitimate company • Asks for personal
information services details such as
• Data can be • Leads to fraud or identity credit/debit card
Deleted or theft numbers and passwords
corrupted • Attachments ending to prize or access
-exe,.bat, .php,.com account

Pharming Viruses Malware Card fraud

• Malicious code installed on • Program code or software that • Viruses


user's computer or on web can replicate itself with intention • Worms ○​ Illegal use of a
server that redirects user to a of deleting or corrupting files and • Trojan credit or debit
fake website without further data on a computer to horses card
action taken malfunction and cause computer • Spyware ○​ Shoulder surfing
• Gives access to personal data 'crashes', effectively corrupting • Adware ○​ Card cloning
Leads to fraud or identity theft the entire operating system •Ransomware

Attributes phishing email

Misspelled words
public domain names
mismatched or suspicious links
generic greetings
poor grammar
fake sense of urgency or threats.

Methods of protecting data:


Biometrics Digital certificates SSL Encryption

Fingerprint scans • A pair of files stored • A protocol that allows data to be protecting data in case it
Signature on user's computer to sent and received securely over the is hacked or accessed
recognition ensure security of data internet illegally by transforming
Retina scans sent over the internet • SSL encrypts the data; only the data into an unreadable
Iris recognition • A public key + a user's computer and web server are format using an algorithm,
Face recognition private key able to make sense of what is being ensuring that only
Voice recognition transmitted authorized people can
Shows as https:// with a padlock decrypt it and gain access
symbol on the status bar to the original information.

Firewalls Two-factor authentication

• Exists between user's Two of these:


computer and an external (password or PIN code),
network (mobile phone or tablet),
• Help to keep out destructive (biometrics)
elements by filtering incoming One-time pass code sent by email or via mobile
and outgoing network traffic phone; key in code to confirm and proceed with
transaction
Used during:
• Online purchases which involve credit/debit card
payment

Misuse of personal information


Misinformation and fake news
Use of AI
Autonomous Technology

You might also like