0% found this document useful (0 votes)
16 views69 pages

CPU Architecture and Performance Factors

Uploaded by

operatorcode3
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views69 pages

CPU Architecture and Performance Factors

Uploaded by

operatorcode3
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd

UNIT 1

Von Neumann architecture:


Common CPU Components

fetch 1 Program

2 Program
Control
ALU 3 Program
Unit
4

5 Data
execute 6 Data
General Progra
Purpose m 7 Data
Registers Counter 8 Data
CPU ALU: Temporarily
stores arithmetic
and logic results

PC: Points to
the next MDR: Stores
instruction the actual data

CIR (Current Instruction MAR: Stores


Register): Holds the the address of Buses: are circuits that connect the CPU to other components
current instruction to be the data
Address bus - this allows to sends information about where
executed
data needs to go by sending an address to the memory.
Data bus – this allows to sends data to the memory or receives
data from the memory.
Fetch – Decode – Execute
• The CPU operates by repeating three
operations:
• FETCH – causes the next
instruction and any data involved
to be fetched from main memory
• DECODE – decodes the
instruction
• EXECUTE – carries out the
instruction
• Repeat…
Factors affecting CPU performance
The higher the clock speed,
the more instructions can be
executed per second

Clock speed Cache size


Cycles per second
measured in hertz Superfast working
memory

Number of cores The more cache memory there


is, the more data can be stored
The number of duplicate closer to the CPU
processors linked
together on a single chip
The more ‘higher level’ cache
The more cores there are, the Parallel processing/multitasking memory, the closer the data will
more processors there are be to the CPU
processing data at the same time
Embedded computers
• An embedded computer is a computer system built into
another device- to complete a specific task (It doesn’t
include unnecessary features) unlike a PC
• It has a single dedicated microprocessor that includes
dedicated, ROM, CPU, and I/O interfaces (connected to a
PCB)

SatNav, Microwave, Car, Dishwasher,


Burglar alarm, Washing machine…
How can cache, clock speed & cores
impact the speed of a CPU?
• The higher the clock speed, the
more instructions can be
executed per second
• The more cache memory there
is, the more data can be stored
closer to the CPU
• The more ‘higher level’ cache
memory, the closer the data will
be to the CPU
• The more cores there are, the
more processors there are
processing data at the same
time
Virtual memory
Hard Disk RAM
• Virtual memory is part of the
hard drive used as an extension
Documents
to RAM in use

• What are the advantages and Clipboard


disadvantages of using part of
the hard disk in this way? Excel

Word

Operating
system
Browser
RAM vs ROM
RAM ROM
Random Access Read Only
What does it stand for? Memory Memory
Operating
system Computing
Running bootup
What is often stored in it? programs instructions
Data currently (Bootstrap)
being used
They are
They are lost
What happens to its contents when you retained
This type of
This type of
turn the power off? memory is
memory is Non-
Volatile
Volatile

Can you read and write data to it? Read & Write Read Only
Explain why computers need secondary storage
(Auxiliary Storage).
• RAM is volatile so all data is lost when power is switched off
• Secondary storage is required for permanent storage of software and data

• Magnetic: Mechanical parts move • Optical: Lasers read and write data
over the disks surface to read and • Solid State: Data is recorded onto
using light
write data magnetically solid memory chips without any
• Advantages: Cheap, very easily portable, moving parts
• Advantages: Cheap, vast storage takes up little space physically
capability, fast write speed • Advantages:
• Disadvantages: Less storage capacity Highly durable, no moving parts, very fast
compared to other types read/write speeds, no noisy fan, faster start
• Disadvantages: Lots of mechanical parts, Easily damaged / scratched, requires a CD up times
reader • Disadvantages:
durability an issue, sealed unit due to disk Slow write speeds Expensive at present, less storage
head and platter precision and not very capacity / physical size than traditional
• Uses: Songs, videos and other multi-media hard disks
portable storage, backup and archiving of data
Uses:
• Capacity:
Portable computers
• Uses: Personal computers, storage of vast
• CD-ROM – up to 720Mb
Military usage
quantities of data • DVD – up to 8.4Gb
Capacity:
• Blu-Ray – up to 50Gb
100GB – 16TB
• Capacity: 500GB - 6TB or greater
1.2 Data Representation - Images
Images
• Stored as Bitmap file as pixel
• Each Pixel of Image is made up of
a 1 or 0.
• Following information about
image is stored in file:
• Width of the picture in pixels.
• Number of bits used for each
Metadata: data about data - Certain information must be defined for
pixel
the bitmap image. E.g. width, height, pixels, colours,
• Colour of each pixel.
• Image Resolution = The
Colour depth
concentration of pixels in an image
How many bits will be used to store the colour for each pixel in the grid.
• Higher Resolution = More Pixels =
E.g. 8 bit (1011001) allows 256 different colours.
Larger File Size
• Lower Resolution = Less Pixels =
Smaller File Size. The greater the colour depth: The more realistic colours, The more data
needs to be stored and the larger the file size on disk

11
1.2 Data Representation - Sound Digital sound is broken down into thousands
of samples per second – each of these
Sound samples is then stored as binary data.
• The height/amplitude of the sound wave is measured The quality that the samples are stored with
• at regular intervals depends on different factors:
‒ Sample Frequency - The
• and converted to binary.
number of audio samples captured
• If the interval is smaller
every second
• More samples taken
‒ Sample Size/ Bit Depth - Number of
• more data to store
bits available for each sample
• larger files
‒ Bit Rate - The number of bits TAKEN
• the sound reproduced is closer to the original - better
IN A GIVEN TIME
quality. Compression: The method computers use to make files
smaller by reducing the number of bits (1’s and 0’s) used to
Sound exists as waves – however as computers only store the information. Can be used for any files including
understand binary values this needs to be converted into such sound and image files
Sounds created on a computer exist as digital information that Lossy compression: makes the file smaller by getting rid
of bits that aren’t really noticeable to the human eye. Once
is encoded as audio files
a file has been compressed using a lossy method, any bits
that are lost cannot be recovered.
Low sample rate Lossless compression: The file is reduced without losing
any quality so the original file can be restored.
High sample rate 12 lossless
Lossy compression usually has smaller file sizes than
1.2 Data Representation - Sound
How is sound stored in Binary?
Audio file is inputted through a microphone - broken down
into thousands of samples per second,
More samples recorded per second the higher the quality of
the audio file, but the more memory it will consume.
Each sound sample is stored as Binary Data.
The more bits per sample also increases the higher the quality
of the audio, on a CD the bit depth is usually 16 bits

Lossy compression: makes the file smaller by getting rid of bits


that aren’t really noticeable to the human eye. Once a file has
been compressed using a lossy method, any bits that are lost
cannot be recovered. + can produce smaller file sizes. - No
good if 100% accuracy required e.g. text files
Compression: The method computers use to make files
Lossless compression: The file is reduced without losing any
smaller by reducing the number of bits (1’s and 0’s) used to
quality so the original file can be restored.
store the information. Can be used for any files including sound + Original file can be restored without losing any data. -
and image files Not all files can be compressed using lossless compression
13
1.2 Data Representation - Characters
Character Set
is used to describe the possible characters that can be represented in a
computer system. E.g A a, 123, @!”£, emoji’s

Ascii (American Standard Code for Information Interchange)


• Each character is given a binary code
• Uses 7 Bits this gives 128 possible characters
• Extended Ascii used 8 bits – 256 characters – enough for the English
language
• Some codes are reserved for control characters (eg TAB, Carriage
Return)

Unicode
• Unicode has a much larger character set
• can represent many more characters/characters from all alphabets
• uses 16 bits
• It uses 2 bytes that give us 216 possibilities (65,536).
• This is used universally to represent many more languages than our
own
14
1.2 Data Representation Binary – Known as BASE 2 – Uses 2 digits (1 or 0) – This is why we
DOUBLE the headings in our tables when we convert binary to
denary and vice versa

Denary is known as BASE 10 – Uses 10 digits (0-9)

Denary to Binary Conversion Hexadecimal is knows as BASE 16 - uses 16 digits (0-9 and A-F)
• Write out the column headings (128,64,32,16,8,4,2,1)
• Work out how to make the denary number from those HINT: A typical exam question will not give you the
columns. table headings so make sure you remember to use
• If you don’t use all the table headings DON’T just fill them these
with 0’s
20 denary is 10100 in Binary….. Exam questions usually give you 2 marks
Does 16 go in to 20? – yes – put a 1. 1 for correct answer
There is 4 left 1 for showing your working out
16 8 4 2 1 Does 8 go in to 4? – no – put a 0
1 0 1 0 0 Does 4 go in to 4? – yes put a 1. Binary Addition
If the result of the addition has
At this point we had no numbers
a 1 in the 9th bit then Result
left so we add 0’s 0+0=0
cannot be held in 1 byte (8 bits)
Binary to Denary Conversion 0+1=1
so will need to have a 2nd Byte.
• Write out the column headings (128,64,32,16,8,4,2,1) over the 1+0=1
binary number. 1 + 1 = 0 Carry 1
This is an OVERFLOW ERROR.
1 + 1 + 1 = 1 Carry 1
• Add all the column headings in which there is a 1
10000111 = 71 in Denary….. How? I added up the numbers
64above32 the 16
1’s in the
8 table….64+4+2+1
4 2 1
1 0 0 0 1 1 1 15
1.2 Data Representation HEXDECIMAL
BASE 16. Uses 0-9 and then A-F
Notice that we use the values A-F to represent 10-15

Denary to Hex Conversion


e.g. Convert 167 into Hexadecimal
1. Divide the number by 16: Binary to Hex Conversion
167/16= 10
2. Record the remainder:
To convert 10101011 into Hex, we can use the following steps:
Remainder = 7
1. Split into 2 nibbles: 1010 1011
So 10 in Hex is A and 7 in Hex is 7
2. Convert each nibble into decimal: 1010 = 10 1011 =11
Therefore the answer = A7
3. 10 in hex is A and 11 in Hex is B
4. Therefore 10101011 in Hex is AB
Convert Hex to Denary
• Take the hex number and split it
• Times the left by 16 and the right by 1
16 1
• Add these together to get Denary
• E.g. See table to convert 4C 4 C (12 in
denary)
4*16=64 12*1=12
16
64+12=76
1.2 Data Representation
Hex to Binary Conversion
To convert from Hexadecimal to Binary we can do the opposite,
where we convert each digit into a nibble.

To convert 3B into Binary, we can use the following steps:


1. Split into 2 digits: 3 B
2. Convert each digit into 4 bits (a nibble!):
3= 0011 B=1011
3. Therefore 3B in Binary is 00111011

17
What is a Network? Pro Vs Cons

Sharing resources such as Purchasing the


printers/internet saves network hardware
money can be expensive

You can access your files Managing a large


from any computer in the network is complicated
network
Viruses may be able to
Data is easy to back infiltrate the network and
up/Updates as it is infect every computer
stored centrally

Communication is Increased security risk


possible with others
What is a LAN? What is a WAN?
-Wide area Network
• LAN stands for Local Area
Network -Connects several LAN’s over a
• A LAN operates on a single large geographical area
site (Small geographical -Network of Networks
area) using their own cabling
systems -Resources supplied by a
• All the hardware for a LAN is “third party carrier”, such as
owned by the organisation British Telecom
• Connected using Hub/Switch
-Connected using routers
Advantages of client-server
networking

• All data can be backed up centrally rather than on


each individual computer
• Easier to install Software updates
• Security is better because data is held in one
location rather than all over the organisation
• Users can log in from any computer on the network
and access their data
Advantages of a P2P network
• Easier to set up – computers can simply be cabled together
• No special software/hardware is required to run the network
• No dependency on single computer (server)
• Individual computers can share a printer, router, modem and other
hardware
• Users can communicate directly with each other and share each
others’ files using sharing rights
Star network- 2 advantages and
disadvantages
Advantages Disadvantages

Fast data transfer as there are Requires additional hardware


fewer data collisions such as the central switch

If one cable fails the other If the central device fails the
workstations are not affected whole network goes down
Mesh network- 2 advantages and
disadvantages
Advantages Disadvantages Terminal

If you get a break in a connection Expensive to install extra


then you can route your traffic in cabling if using wired
an alternative direction connections

No single point of failure – It is a Network maintenance and


self-healing network administration is difficult

Expansion and modification can be Can involve redundant


done without disrupting the connections
network

Data can be transmitted from


different devices simultaneously
Factors affecting network performance

bits per second

Errors, collisions and


retransmission
What is a Virtual network?
• A virtual network is part of a LAN or WAN
• which is configured using software so that
only certain devices can see each other
• A LAN can be divided into a VLAN to allows
groups of users to share data
• No need for additional physical hardware
server and switches
• VPN is similar but it is set up within a WAN
such as the Internet
• Allows users around the world to log in,
work, and collaborate on their own private
network
What types of Network
hardware's are needed?
• Additional hardware is required to connect a stand-
alone computer to a LAN
• A Network Interface Card (NIC) in your computer or device
• A router or hub or switch, which provides access to a local
area network
• A modem may also be combined with the router in a single
device
What is MAC addressing

• A MAC address (Media Access Control address) is a unique number that identifies the actual
device that is connected to the LAN.

• A MAC address does not change when you connect to the internet from different locations, it is
part of the network interface card (NIC) inside your device.


A MAC address looks like this: 3B:14:E6:39:0A:2C
• Every networked device in the world has a unique MAC address
Your IP address can change!
An IP address (Internet Protocol address) is the unique identification number given
to every device that is connected to the internet (WAN). It represents the unique
location on which you are connected to the internet
When connecting to the internet, you are assigned an IP address to use for your session. This is issued by
your network or ISP.

If you take your laptop to McDonalds and connect to the


internet, the IP address will differ from when you
connected to the internet in Starbucks. This is because
the location you are using to connect to the internet has
changed.
An Internet Service Provider (ISP) will assign your home with
an IP address for your family to use. These are usually
dynamic address that may change from time to time, unless
you pay extra for a static address that never changes (used by
web servers).
An IP address may look like : 62.102.255.31 IPv4 originally used 32 bits (4 x8bit numbers)
Comparison of media types
Advantages Disadvantages
Copper coaxial • signal affected by electric
• tried and trusted technology and magnetic fields
cables (or • relatively inexpensive • low bandwidth
twisted pair) • very heavy cables
• very fast data transmission
• low loss of signal over distance
• not affected by magnetic or • high investment cost
Fibre optics electric fields • need for expensive optical
• require very little power transmitters and receivers
• more difficult to “tap into” than
copper cables
• no need for trailing wires (safer)
• data transmission rate less
• allows devices to be used
than wired systems
Wireless anywhere provided there is a
• signal can be blocked by
transmission signal
objects or walls
• easier to add devices to a
• higher security issues
network
What is a Domain Name System (DNS)?

• DNS technology allows you to type a name such as


google.co.uk into your web browser
• It translates the web address google.co.uk into an IP
address
• e.g. www.google.co.uk = 74.125.131.94
Describe the process of Packet switching works
Suppose you want to send a file of 3Mb across the Internet
The file is broken up into data “packets” of equal size (512 bytes)
When Sending:
• Each packet is given a header containing
• The IP (Internet Protocol) address it is going to
• The IP address it has come from
• The sequence number of the packet
• The number of packets in the whole communication
• Error checking data
When Receiving:
• re-orders the packets into the correct order
• Each packet is checked for errors
• Corrupt packets are requested to be resent
• acknowledge receipt of packets
• Any packets not acknowledged after a set time
interval will be automatically resent by the sending
computer
How does the Cloud work?
• The ‘Cloud’ is a term used to refer to resources, data
and information hosted on remote servers
• It enables users connected to any Internet-enabled computer to
access these files or services
• Where is the Cloud? Disadvantages
Advantages
• Important data “trusted” to third party
• You can access your data and
applications from anywhere at • Could be more vulnerable to hacking
any time • Pay for extra storage
• No need for local storage
• Backing up done by the service
provider
Network Protocols
Network Layers

Advantages of Layers:
Layers are self-
contained (The functionality
of one layer can be edited
without affecting the
functionality of other layers)

Easier to troublehsoot
and correct networking
errors and problems

interoperability
between providers and
systems (Provides a universal
standard for hardware ad software
manufactures to follow so that their
devices will be able to communicate
with each other)
Forms of cyber attack
Cybercrime can take many forms including:
• Malware
• Phishing
• Brute Force
• Denial of Service
• Data Interception and theft
• SQL Injection

Cyber attacks take advantage of what?:


• Human weakness or gullibility
• Technical weaknesses in computer systems, networks or digital devices
Malware Phishing Brute Force Denial of Service Data Interception and
theft SQL Injection

Malware
• Malicious Software
• Written to infect computer systems and commit crimes such as fraud
and ID theft
• E.g Virus, worms, Trojans, ransomware,
Spyware, adware etc.
How to protect from MALWARE
• Strong security software (firewalls, antivirus, spam filter, anti spyware)
• Enable OS and security software updates
• Staff training (opening attachments, downloading)
• Backup files
Malware Phishing Brute Force Denial of Service Data Interception and
theft SQL Injection

Phishing
Tricks you into handing over sensitive or personal information (login details, bank
details, etc.)
• A phishing email is one looks like a legitimate email, for example from
a bank or an organisation such as PayPal or eBay, but aims to take
personal details
• The website urges you to visit a bogus website and enter your personal
details, which are then captured by the phishers
How to protect from PHISHING
• Strong security software
• Spam filters
• Staff training (recognising fake emails,
not disclosing personal details,
not opening unknown attachments etc.)
Malware Phishing Brute Force Denial of Service Data Interception and
theft SQL Injection

Brute force attacks


• In a brute force attack, a hacker may go through a list of different
passwords (trial and error) until access to an account is gained
• Alternatively, the attacker may try every combination of characters until
the correct password is found
Network threats
Unit 3 Systems software and security Network threats
Unit 3 Systems software and security

Setting a secure password Default passwords


• Validation checks on a new password may specify • Most devices come with a default password or PIN
that it must be: to gain access
• between 10 and 15 characters (length check) • The default PIN is frequently 0000 or 1234

• a mixture of numbers, lower and uppercase characters and • Research has shown that 20% of all passwords and
symbols (format check) PINs have never been changed
• You should never include your name, DOB or • Do you always change default passwords and PINs?
personal details
How to protect from BRUTE
FORCE ATTACKS
• Lockout policy (e.g. after 3 attempts)
• Progressive delays
• Staff training (e.g strong passwords *&*, letters, 231)
• Using challenge response
e.g I am not a Bot, CAPTCHA test
Some malware try guessing passwords e.g. going through all words in a
dictionary
Malware Phishing Brute Force Denial of Service Data Interception and
theft SQL Injection

What is Denial of Service attacks


• A DoS attack attempts to flood a website server with an overwhelming
number of data requests
• How does DoS disrupt the website?
• flood the victim’s site with spam emails (an “email bomb”) or
• disrupt access to a victim’s website or entire geographical area by reconfiguring
software to crash network sites
• The motive is often revenge, blackmail or terrorism
How to protect from DENIAL OF
SERVICE ATTACKS
• Strong firewall
• Packet filters on routers
• Good network policies (e.g auditing, logging and monitoring- so you
can see what traffic is coming into a network)
Malware Phishing Brute Force Denial of Service Data Interception and
theft SQL Injection

Data interception and theft


• In 2014, the details of 125,000 students
of Staffordshire University were stolen
from a laptop left in a car

• “Eavesdropping” is used to intercept


data packets as they move across
networks
• Packets are inspected for useful data
that could be misused or sold
How to protect from DATA
INTERCEPTION AND THEFT
• Encryption
• Using virtual network
• Staff training (e.g using password, locking doors, logging off etc)
Malware Phishing Brute Force Denial of Service Data Interception and
theft SQL Injection

SQL injection
• SQL is a database query language
• SQL injection takes advantage of web input forms to access or destroy
data
• SQL commands can be input into web forms instead of the expected
‘real’ data
• The aim is to view/change/delete data on a SQL database
Product Id: Display data
How to protect from SQL
INJECTION
• Validation on input boxes (e.g SQL codes)
• Setting Database permissions
• Penetration Testing (hack your own systems, to identify vulnerabilities
and loopholes)
penetration testing Network forensics network policies
anti-malware software

Summary: How to Prevent threats


• penetration testing
• Network forensics
• network policies
• anti-malware software
• firewalls
• user access levels
• passwords
• encryption

Firewalls user access levels passwords


Social Engineering: People as a
Week point
Types of system software

Systems software Software Application software, are


includes the often called productivity
programs that are programs or end-user
dedicated to programs because they
managing the System Application enable the user to complete
computer hardware Software Software tasks

Operating Utility
systems programs

The systems software (particularly the OS) provides a platform for


Application software's to run)
User Interface memory multitasking peripherals files
user access rights

Functions of an operating system


• Provides a user interface
• Manages:
• memory
• multitasking
• peripherals
• files
• user access rights
User Interface memory multitasking peripherals files
user access rights

WIMP Interfaces
User Interface memory multitasking peripherals files
user access rights
Operating system software
Unit 3 Systems software and security
Operating system software
Unit 3 Systems software and security

Command Line Interfaces Menu-driven interfaces


• All user commands must be typed in as text • Less commonly used but still prevalent in
• No graphics some areas

• Quicker for expert users who know the commands


• Takes less space on the disk and in RAM
User Interface memory multitasking peripherals files
user access rights
Memory management
• Memory management is used
to allocate free memory to
programs that need it
• and free up memory where it is
not needed.
User Interface memory multitasking peripherals files
user access rights

Multi-tasking
• You may use your computer to do several tasks at
the same time with different software:
homework, playing music, messaging friends...
• There are many background
processes running on the
computer as well
User Interface memory multitasking peripherals files
user access rights

Peripheral management
• Allows a computer’s external devices to
communicate with the computer system.
• Controls external devices by sending them
commands

Device drivers: a program that controls a peripheral


device such as a printer, VDU, CD-ROM drive etc
User Interface memory multitasking peripherals files
user access rights

User and Access rights


User Interface memory multitasking peripherals files
user access rights

Disk and file management


• A system that is used by the operating
system to organise and keep track of files.
• A software that manages data files.
Encryption Defragmentation Compression Backup

What are utilities?


• The operating system controls and manages the
computer system (and its hardware) and creates a
GUI

• Utilities provide extra functionality that make it


easier to use and maintain the computer system

• They can be packaged as part of the operating


system or bought as stand-alone software programs
Encryption Defragmentation Compression Backup

What is an Encryption software?


• Encryption software is used to transform text so
that it cannot be read without knowing the key to decode it

XLI HEXE MW WIGYVI

“The data is secure”

Cipher Shift of 3
The process of physically organising the mass storage device into the smallest
number of fragments with the same data files together
Encryption Defragmentation Compression Backup

Backup methods
• Full backup?
• Complete backup of everything which can be restored independently of any other
backup
• Takes greater time and disk space to create the backup
• Incremental backup?
• Records only the changes made since the last backup
• Can you combine both methods for a better strategy?
How are Computers used in
healthcare?

• There are around 165,000 healthcare apps for


smartphones
• Wearable technology can offer
continuous, long-term monitoring
• What are the down side of this?
• This can lead to improvements in the
way that diseases like epilepsy, asthma
and diabetes are managed
What jobs can robots do?
• Accountants, cashiers, sports referees, legal
secretaries and cleaners are already being replaced
by robots
• Maidbot is a company building robots to clean hotel
rooms
• Another company has invented an automated
hamburger making machine
• The UK has lost 31,000 jobs in the legal profession
• It is estimated that by 2018 there will be 35 million service
robots ‘at work’
Robots as carers
• In Japan and South Korea,
childminding robots are being
developed
• What do you think the dangers are:
• “We already see the overuse of robots
looking after children –
we expect severe attachment disorders
that could wreak
havoc in our society” –
Noel Sharkey, professor of AI

Ethics: Not to do with something is legal or illegal but…

Something is right or wrong?


Cultural Issues- Digital Divide
• A society which is dependent on technology can create inequality. The
gap between those who have access to the latest technology and those
who do not is called the 'digital divide'.

• This has many implications:


• Economic
• Educational
• Social There are a number of projects that aim to increase access to
the internet and technology around the world such as the One
Laptop per Child (OLPC) project which aims to provide
affordable, modern technology to all children in developing
countries.
Environmental considerations
• Organisations such as schools and hospitals have an
obligation to dispose of old computers by recycling

• Some organisations will refurbish old but


working computers and sell them or donate
them to people who cannot afford to buy a
computer
• Older computers with CRT screens use up a lot
of energy when switched on, even when they
are not being used
• Computer manufacturers now design
equipment that uses as little energy as possible
5 Legislations
This Act specifies the rules about collecting and holding
The Data Protection Act (1998) data.

Designed to prosecute hackers who gain access to computer


Computer Misuse Act (1990)
systems without consent

Copyright, Designs and Patents Act Copyright law protects the owner of a creative work from
(1988) having it illegally copied

Creative Commons Licensing A Creative Commons licence is used when an author is willing
to give people the right to share or use a work that they have
created

In 2000, a new law was passed to give people access to data


Freedom of Information Act 2000
held by public authorities
What is Open source What is Proprietary
software? software?
• Open Source software is governed by
• Proprietary software is sold in the
the Open Source Initiative that says: form of a licence to use it
• Software is licensed for use but there is no • There will be restrictions on how the
charge for the licence. Anyone can use it
software can be used, for example the
• Open Source software must be distributed
with the source code so anyone can
license may specify only one concurrent
modify it user, or it may permit up to say, 50 users
• Developers can sell the software they on one site (site licence)
have created • The company or person who wrote the
• Any new software created from Open software will hold the copyright
Source software must also be ‘open’. This
means that it must be distributed or sold in • The users will not have access to the
a form that other people can read and also
edit
source code and will not be allowed to
modify the package and sell it to other
people.

You might also like