0% found this document useful (0 votes)
7 views9 pages

SA1 Computer Science Revision

The document provides a comprehensive overview of computer science concepts including binary, decimal, and hexadecimal conversions, as well as data compression and digital image storage. It also covers hardware components like input devices, storage devices, and error detection methods. Additionally, it discusses the differences between various file formats and the functionality of sensors and microprocessors in systems like CCTV.

Uploaded by

emmabui25
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views9 pages

SA1 Computer Science Revision

The document provides a comprehensive overview of computer science concepts including binary, decimal, and hexadecimal conversions, as well as data compression and digital image storage. It also covers hardware components like input devices, storage devices, and error detection methods. Additionally, it discusses the differences between various file formats and the functionality of sensors and microprocessors in systems like CCTV.

Uploaded by

emmabui25
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

SA1 Computer Science revision

1.​ Binary to decimal/denary conversion


128 64 32 16 8 4 2 1
Method: Using the table above, each number will be proportional to each column.
Example: 11101110 (8 bits)
128 64 32 16 8 4 2 1
1 1 1 0 1 1 1 0
The equivalent denary number is 128 + 64 + 32 + 8 + 4 + 2 = 238.
Bit: the basic computing element that is either 0 or 1 and is formed from the words Binary
digit.

2.​ Denary/decimal to binary conversion:


Method: Subtraction of powers of 2 (that is 128, 64, 32, 16, and so on)
Example: 142
The denary number is made up of 128 + 8 + 4 + 2.
(that is 142 – 128 = 14; 14 - 8 = 6; 6 - 4 = 2; 2 - 2 = 0)
In each stage, subtract the largest possible power of 2 and keep doing this until reaches 0.
*Test: after getting the binary number, convert it back into denary using the method binary
to denary conversion above and check whether the number matches.

3.​ Binary to hexadecimal conversion:


Method:
●​ Split the binary number into groups of 4 bits.
●​ Use the binary, hexadecimal, and denary value table to find the equivalent
hexadecimal digits.
Example: 101111100001
Split it into groups of 4 bits: 1011​ 1110​ 0001
Use the table: B​ E​ 1

4.​ Binary to hexadecimal conversion:


Method:
●​ Use the binary, hexadecimal, and denary value table to find the equivalent denary
digits.
●​ Put the groups together to form the binary number.
Example: 45A

4: 0100; 5: 0101; A: 1010The binary number: 010001011010.

5.​ Hexadecimal to denary conversion:


The value headings of each hexadecimal digit: 4096, 256, 16, 1.
Method:
●​ Take each hexadecimal digit and multiply it by the heading values.
●​ Add all the resultant totals together to give the denary number.
*Remember: the hex digits A -> F need to be first converted to the values 10 -> 15 before
carrying out the multiplication.
Example: 45A into denary
Multiply each hex digit by its heading value:
256​ 16​ 1
4​ 5​ A
(4 x 256 = 1024) (5 x 16 = 80) (10 x 1 = 10) ​ (NOTE: A = 10)
Add the totals together: 1024 + 80 + 10 = 1114.

6.​ Denary to hexadecimal conversion:


Method: division by 16 until reaches 0.
Example: 2004

16 2004

16 125 remainder: 4

16 7 remainder: 13

0 remainder: 7
Write the remainders from bottom to top to get the hexadecimal number:
7​ 13​ 4
7​ D​ 4​ (D = 13)
*Binary, hexadecimal and denary value table:

Binary value Hexadecimal value Denary value

0000 0 0

0001 1 1

0010 2 2

0011 3 3

0100 4 4

0101 5 5

0110 6 6

0111 7 7

1000 8 8

1001 9 9

1010 A 10

1011 B 11

1100 C 12

1101 D 13

1110 E 14

1111 F 15

7.​ How many bits are there in 2 bytes:


1 byte is 8 bits.
2 bytes are 16 bits.

8.​ Image format (JPEG, PNG, PDF):


JPEG:
●​ Joint Photographic Expert Group (abbreviation of?)
●​ Lossy file compression (type of file compression)
●​ Distinguish certain color changes and hues. (function)
●​ Relies on the inability of the human eye. (fact)
●​ Used with image files. (fact)
PNG:
●​ Portable Network Graphic (abbreviation of?)
●​ Lossless file compression (type of file compression)
●​ Can handle graphics with transparent or semi-transparent backgrounds. (function)
●​ Versatile image file format (definition)
●​ Don’t need a license to open. (fact)
PDF:
●​ Portable Document Format (abbreviation of?)
●​ Lossless file compression (type of file compression)
●​ Present and exchange documents (function)
●​ Versatile file format (definition)
●​ In a manner independent of application software, hardware, and operating systems
(OS) (fact).

9.​ What are digital images?


●​ Composed of pixels.
●​ Contain a fixed number of rows and columns of pixels.
●​ Functions:
-​ Image reconstruction
-​ Image reformatting
-​ Wide range image data acquisition.

10.​How are digital images stored on computers, how many bits are there?
●​ Image is made of pixels.
●​ Each pixel stores one color.
●​ Each color has a unique binary value.
●​ The color/binary value of each pixel is stored in sequence.

11.​What is data compression? Ko


●​ Reducing the file size.
12.​Why must digital images be compressed before big emails? (Why must
you compress digital images before putting them in an email?)
●​ Reduces the storage space taken on the email server.
●​ Reduces the time taken to transmit to the destination.
●​ Reduces the amount of bandwidth needed to transmit.

13.​How many parity bits are used to detect errors? (Look at the error
correction part)
●​ 8 bits to detect errors.
Process:
●​ Parity can be set to odd or even.
●​ Data is split into blocks of 7 bytes.
●​ Sender counts the number of 1s/0s in each group.
●​ Each group is assigned a parity bit to match the parity/odd/even.
●​ Receiving device recounts the number of 1s/0s in each group/byte.
●​ And compares to parity used/odd/even and if it does not match the parity, an error
is reported.

14.​Describe one other method of error detection used in transmitting the


data.
Checksum:
●​ The checksum is calculated from the data.
●​ The calculation is done using an agreed algorithm.
●​ The checksum is transmitted with the data.
●​ Re-calculated checksum is then compared to the checksum sent with the data
block.
●​ If checksum values are different there is an error, and a request is made to re-send
the data.

Hardware Chapter 3:
15.​Input, output
●​ Main method of entering data into and getting data out of computer systems.
16.​Mouse, how does an optical mouse work?
An optical mouse shines a red light from a Light-Emitting Diode//LED underneath the
mouse. The light reflects from a surface through a lens in the mouse and is converted to a
value. This value is transmitted to the computer. The computer then determines the
direction and speed of the movement.

17.​Keyboards, how do circuit boards work on keyboards?


When the user presses a key on a keyboard, the key pushes the switch on the circuit board.
This completes a circuit. Signals are sent to the computer that uses the data to calculate
which key was pressed.

18.​Identify the 2 input devices.


●​ Microphone
●​ Touchscreen

19.​Explain why the LCD projector would be more appropriate than a


high-definition film
●​ LCD projector
●​ HD film: video of higher resolution and quality than standard-definition.
Justification:
●​ More visible pixels // higher resolution.
●​ Higher color contrast (in ambient lighting) // more vivid colors
●​ Uses less power, produces less heat.

20.​ Storage devices


●​ Hard disk (HDD)
Justification:
●​ Large capacity storage for videos/films that have large file sizes which require
large storage space.
●​ Long-lasting, able to be read and written multiple times. The copies can be
regularly accessed without breaking, although it may require a large number of
read/write operations.
●​ Relatively cheap per GB // cheaper than SSD per GB, due to the large capacity
required.

21.​Type of address
URL:
●​ Protocol.
●​ Domain name.
●​ Made up of letters, numbers, and symbols.
IP:
●​ IPV4:
-​ 12 numbers.
-​ Separated by full stops (.)
●​ IPV6:
-​ 32 numbers.
-​ Separated by colons (:)
MAC:
●​ First part is manufacturer ID.
●​ The second part is a serial number.
●​ Each part has 3 pairs of numbers.

22.​ Motions of sensors microprocessor. How do the sensor and


microprocessor work together to control the CCTV system? ***
●​ (Motion) sensor sends signals to the microprocessor.
●​ Analog signal is converted to digital.
●​ Microprocessor compares the signal to stored value.
●​ If it does not meet the stored value (and if the camera is not recording) the
microprocessor sends a signal (to the camera) to start recording
●​ If it does not meet the stored value the microprocessor starts/resets the timer.
●​ When the timer reaches 2 minutes the microprocessor sends a signal (to the
camera) to stop recording.
●​ The whole process is repeated continually/until turned off.

23.​ LED display screens and how they are used.


●​ LED: Made up of tiny light-emitting diodes (LEDs).
●​ Each LED is either red, green, or blue (RGB).
●​ By varying the electric current sent to each LED, its brightness can be controlled,
producing a vast range of colors.
Uses:
●​ Used for large outdoor displays due to the brilliance of the colors produced.

24.​ Primary memory. What is stored in primary memory?


●​ Includes ROM, RAM and cache memory.
●​ Directly addressable to the CPU.

25.​ What is secondary storage and how is it used?


●​ Includes HDD, SSD, DVD, memory stick, Biu-ray disc.
●​ Not directly addressable to the CPU.
●​ All are non-volatile devices.
●​ Can be external or internal to the computer.

26.​ MAC

Random test revision


1.​ Malware
●​ Pro grams (such as viruses, worms and Trojan horses) that are installed on a user’s
computer with the aim of deleting, corrupting or manipulating data illegally.
●​ How to prevent this?
-​ Being careful when downloading material from the internet.
-​ Not opening files or websites given in emails from unknown senders.
-​ Don’t use non-original software.
2.​ The difference between firewalls and proxy servers?
A firewall is used to define the perimeter of the network and to identify and block
potentially suspicious and malicious traffic.
A proxy helps to protect privacy and can help to enforce corporate policies regarding
internet browsing.
3.​ High level and low level language, benefits
●​
4.​ What is the operation of compiler and interpreter
5.​ Able to convert byte → terabyte → gigabyte → kilobyte → hexabyte → habitbyte
6.​ RAM and what kind of data is written to RAM?
●​ def(Read only memory (RAM)):
Primary memory that can be written to or read from
a.​ Data/instructions received from the remote control unit is stored in the RAM
7.​ Secondary storage
Can be Internal and external to computer
Not directly addressable by the CPU
Are all non-volatile devices
Examples include HDD,SDD, DVD

8.​ Images, computer image, computer resolution


9.​ Calculate file size in byte. Hotate storage devices store data by controlling the movement
of electrons within NAND or NQR chips.w many byte the image is?
10.​ What is solid stage storage?
a.​ SSD drive dont rely on magnetic properties;
b.​ SSD drive is storage device containing nonvotile flash memory, used in place of
hard disk because of its much greater speed.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy