CPU Architecture and Performance Factors
CPU Architecture and Performance Factors
fetch 1 Program
2 Program
Control
ALU 3 Program
Unit
4
5 Data
execute 6 Data
General Progra
Purpose m 7 Data
Registers Counter 8 Data
CPU ALU: Temporarily
stores arithmetic
and logic results
PC: Points to
the next MDR: Stores
instruction the actual data
Word
Operating
system
Browser
RAM vs ROM
RAM ROM
Random Access Read Only
What does it stand for? Memory Memory
Operating
system Computing
Running bootup
What is often stored in it? programs instructions
Data currently (Bootstrap)
being used
They are
They are lost
What happens to its contents when you retained
This type of
This type of
turn the power off? memory is
memory is Non-
Volatile
Volatile
Can you read and write data to it? Read & Write Read Only
Explain why computers need secondary storage
(Auxiliary Storage).
• RAM is volatile so all data is lost when power is switched off
• Secondary storage is required for permanent storage of software and data
• Magnetic: Mechanical parts move • Optical: Lasers read and write data
over the disks surface to read and • Solid State: Data is recorded onto
using light
write data magnetically solid memory chips without any
• Advantages: Cheap, very easily portable, moving parts
• Advantages: Cheap, vast storage takes up little space physically
capability, fast write speed • Advantages:
• Disadvantages: Less storage capacity Highly durable, no moving parts, very fast
compared to other types read/write speeds, no noisy fan, faster start
• Disadvantages: Lots of mechanical parts, Easily damaged / scratched, requires a CD up times
reader • Disadvantages:
durability an issue, sealed unit due to disk Slow write speeds Expensive at present, less storage
head and platter precision and not very capacity / physical size than traditional
• Uses: Songs, videos and other multi-media hard disks
portable storage, backup and archiving of data
Uses:
• Capacity:
Portable computers
• Uses: Personal computers, storage of vast
• CD-ROM – up to 720Mb
Military usage
quantities of data • DVD – up to 8.4Gb
Capacity:
• Blu-Ray – up to 50Gb
100GB – 16TB
• Capacity: 500GB - 6TB or greater
1.2 Data Representation - Images
Images
• Stored as Bitmap file as pixel
• Each Pixel of Image is made up of
a 1 or 0.
• Following information about
image is stored in file:
• Width of the picture in pixels.
• Number of bits used for each
Metadata: data about data - Certain information must be defined for
pixel
the bitmap image. E.g. width, height, pixels, colours,
• Colour of each pixel.
• Image Resolution = The
Colour depth
concentration of pixels in an image
How many bits will be used to store the colour for each pixel in the grid.
• Higher Resolution = More Pixels =
E.g. 8 bit (1011001) allows 256 different colours.
Larger File Size
• Lower Resolution = Less Pixels =
Smaller File Size. The greater the colour depth: The more realistic colours, The more data
needs to be stored and the larger the file size on disk
11
1.2 Data Representation - Sound Digital sound is broken down into thousands
of samples per second – each of these
Sound samples is then stored as binary data.
• The height/amplitude of the sound wave is measured The quality that the samples are stored with
• at regular intervals depends on different factors:
‒ Sample Frequency - The
• and converted to binary.
number of audio samples captured
• If the interval is smaller
every second
• More samples taken
‒ Sample Size/ Bit Depth - Number of
• more data to store
bits available for each sample
• larger files
‒ Bit Rate - The number of bits TAKEN
• the sound reproduced is closer to the original - better
IN A GIVEN TIME
quality. Compression: The method computers use to make files
smaller by reducing the number of bits (1’s and 0’s) used to
Sound exists as waves – however as computers only store the information. Can be used for any files including
understand binary values this needs to be converted into such sound and image files
Sounds created on a computer exist as digital information that Lossy compression: makes the file smaller by getting rid
of bits that aren’t really noticeable to the human eye. Once
is encoded as audio files
a file has been compressed using a lossy method, any bits
that are lost cannot be recovered.
Low sample rate Lossless compression: The file is reduced without losing
any quality so the original file can be restored.
High sample rate 12 lossless
Lossy compression usually has smaller file sizes than
1.2 Data Representation - Sound
How is sound stored in Binary?
Audio file is inputted through a microphone - broken down
into thousands of samples per second,
More samples recorded per second the higher the quality of
the audio file, but the more memory it will consume.
Each sound sample is stored as Binary Data.
The more bits per sample also increases the higher the quality
of the audio, on a CD the bit depth is usually 16 bits
Unicode
• Unicode has a much larger character set
• can represent many more characters/characters from all alphabets
• uses 16 bits
• It uses 2 bytes that give us 216 possibilities (65,536).
• This is used universally to represent many more languages than our
own
14
1.2 Data Representation Binary – Known as BASE 2 – Uses 2 digits (1 or 0) – This is why we
DOUBLE the headings in our tables when we convert binary to
denary and vice versa
Denary to Binary Conversion Hexadecimal is knows as BASE 16 - uses 16 digits (0-9 and A-F)
• Write out the column headings (128,64,32,16,8,4,2,1)
• Work out how to make the denary number from those HINT: A typical exam question will not give you the
columns. table headings so make sure you remember to use
• If you don’t use all the table headings DON’T just fill them these
with 0’s
20 denary is 10100 in Binary….. Exam questions usually give you 2 marks
Does 16 go in to 20? – yes – put a 1. 1 for correct answer
There is 4 left 1 for showing your working out
16 8 4 2 1 Does 8 go in to 4? – no – put a 0
1 0 1 0 0 Does 4 go in to 4? – yes put a 1. Binary Addition
If the result of the addition has
At this point we had no numbers
a 1 in the 9th bit then Result
left so we add 0’s 0+0=0
cannot be held in 1 byte (8 bits)
Binary to Denary Conversion 0+1=1
so will need to have a 2nd Byte.
• Write out the column headings (128,64,32,16,8,4,2,1) over the 1+0=1
binary number. 1 + 1 = 0 Carry 1
This is an OVERFLOW ERROR.
1 + 1 + 1 = 1 Carry 1
• Add all the column headings in which there is a 1
10000111 = 71 in Denary….. How? I added up the numbers
64above32 the 16
1’s in the
8 table….64+4+2+1
4 2 1
1 0 0 0 1 1 1 15
1.2 Data Representation HEXDECIMAL
BASE 16. Uses 0-9 and then A-F
Notice that we use the values A-F to represent 10-15
17
What is a Network? Pro Vs Cons
If one cable fails the other If the central device fails the
workstations are not affected whole network goes down
Mesh network- 2 advantages and
disadvantages
Advantages Disadvantages Terminal
• A MAC address (Media Access Control address) is a unique number that identifies the actual
device that is connected to the LAN.
• A MAC address does not change when you connect to the internet from different locations, it is
part of the network interface card (NIC) inside your device.
•
A MAC address looks like this: 3B:14:E6:39:0A:2C
• Every networked device in the world has a unique MAC address
Your IP address can change!
An IP address (Internet Protocol address) is the unique identification number given
to every device that is connected to the internet (WAN). It represents the unique
location on which you are connected to the internet
When connecting to the internet, you are assigned an IP address to use for your session. This is issued by
your network or ISP.
Advantages of Layers:
Layers are self-
contained (The functionality
of one layer can be edited
without affecting the
functionality of other layers)
Easier to troublehsoot
and correct networking
errors and problems
interoperability
between providers and
systems (Provides a universal
standard for hardware ad software
manufactures to follow so that their
devices will be able to communicate
with each other)
Forms of cyber attack
Cybercrime can take many forms including:
• Malware
• Phishing
• Brute Force
• Denial of Service
• Data Interception and theft
• SQL Injection
Malware
• Malicious Software
• Written to infect computer systems and commit crimes such as fraud
and ID theft
• E.g Virus, worms, Trojans, ransomware,
Spyware, adware etc.
How to protect from MALWARE
• Strong security software (firewalls, antivirus, spam filter, anti spyware)
• Enable OS and security software updates
• Staff training (opening attachments, downloading)
• Backup files
Malware Phishing Brute Force Denial of Service Data Interception and
theft SQL Injection
Phishing
Tricks you into handing over sensitive or personal information (login details, bank
details, etc.)
• A phishing email is one looks like a legitimate email, for example from
a bank or an organisation such as PayPal or eBay, but aims to take
personal details
• The website urges you to visit a bogus website and enter your personal
details, which are then captured by the phishers
How to protect from PHISHING
• Strong security software
• Spam filters
• Staff training (recognising fake emails,
not disclosing personal details,
not opening unknown attachments etc.)
Malware Phishing Brute Force Denial of Service Data Interception and
theft SQL Injection
• a mixture of numbers, lower and uppercase characters and • Research has shown that 20% of all passwords and
symbols (format check) PINs have never been changed
• You should never include your name, DOB or • Do you always change default passwords and PINs?
personal details
How to protect from BRUTE
FORCE ATTACKS
• Lockout policy (e.g. after 3 attempts)
• Progressive delays
• Staff training (e.g strong passwords *&*, letters, 231)
• Using challenge response
e.g I am not a Bot, CAPTCHA test
Some malware try guessing passwords e.g. going through all words in a
dictionary
Malware Phishing Brute Force Denial of Service Data Interception and
theft SQL Injection
SQL injection
• SQL is a database query language
• SQL injection takes advantage of web input forms to access or destroy
data
• SQL commands can be input into web forms instead of the expected
‘real’ data
• The aim is to view/change/delete data on a SQL database
Product Id: Display data
How to protect from SQL
INJECTION
• Validation on input boxes (e.g SQL codes)
• Setting Database permissions
• Penetration Testing (hack your own systems, to identify vulnerabilities
and loopholes)
penetration testing Network forensics network policies
anti-malware software
Operating Utility
systems programs
WIMP Interfaces
User Interface memory multitasking peripherals files
user access rights
Operating system software
Unit 3 Systems software and security
Operating system software
Unit 3 Systems software and security
Multi-tasking
• You may use your computer to do several tasks at
the same time with different software:
homework, playing music, messaging friends...
• There are many background
processes running on the
computer as well
User Interface memory multitasking peripherals files
user access rights
Peripheral management
• Allows a computer’s external devices to
communicate with the computer system.
• Controls external devices by sending them
commands
Cipher Shift of 3
The process of physically organising the mass storage device into the smallest
number of fragments with the same data files together
Encryption Defragmentation Compression Backup
Backup methods
• Full backup?
• Complete backup of everything which can be restored independently of any other
backup
• Takes greater time and disk space to create the backup
• Incremental backup?
• Records only the changes made since the last backup
• Can you combine both methods for a better strategy?
How are Computers used in
healthcare?
Copyright, Designs and Patents Act Copyright law protects the owner of a creative work from
(1988) having it illegally copied
Creative Commons Licensing A Creative Commons licence is used when an author is willing
to give people the right to share or use a work that they have
created