Exam_Topics_Detailed_Explanation
Exam_Topics_Detailed_Explanation
Chapter 1:
Number systems are ways to represent numbers in different forms. The most common number
systems are:
- Binary (Base-2): Uses two symbols, 0 and 1. Each digit represents a power of 2.
- Decimal (Base-10): Uses ten symbols, 0 through 9. Each digit represents a power of 10.
- Hexadecimal (Base-16): Uses sixteen symbols, 0-9 and A-F, where A=10, B=11, ..., F=15. Each
- Octal (Base-8): Uses eight symbols, 0-7. Each digit represents a power of 8.
This topic covers how digital systems represent text, sound, and images:
Detailed Explanation of Topics
- Text: Represented using character encoding standards like ASCII (American Standard Code for
Unicode: A more comprehensive encoding that can represent characters from almost all writing
- Sound: Represented as digital audio files by sampling sound waves at discrete intervals.
Bit Depth: Number of bits used to represent each sample, which affects the audio resolution.
- Images: Represented using pixels, where each pixel has a color value.
Secondary Storage: Non-volatile memory like hard drives, SSDs (Solid State Drives), CDs, etc.
Lossy Compression: Reduces file size by removing some data, which may result in loss of quality
Lossless Compression: Reduces file size without losing any data (e.g., PNG for images, FLAC for
audio).
Detailed Explanation of Topics
Chapter 2:
- Types:
Serial Transmission: Sends data one bit at a time over a single channel.
- Methods:
Half-Duplex: Data flows in both directions, but not simultaneously (e.g., walkie-talkies).
- Parity Check: Adds a parity bit to the data to make the number of 1s either even (even parity) or
- Checksum: Adds a checksum value to the data, calculated by summing the data values.
- Cyclic Redundancy Check (CRC): Uses polynomial division to detect changes to raw data.
Detailed Explanation of Topics
2.3 Encryption
Encryption is the process of converting data into a code to prevent unauthorized access.
- Symmetric Encryption: Uses the same key for encryption and decryption (e.g., AES).
- Asymmetric Encryption: Uses a pair of keys, a public key for encryption and a private key for
Chapter 4:
- Types of Software:
System Software: Manages hardware and runs applications (e.g., operating systems like Windows,
Linux).
Application Software: Performs specific user tasks (e.g., word processors, web browsers).
- Interrupts:
Software Interrupts: Generated by programs when they need to request system services.
- Translators:
Compilers: Translate high-level code to machine code all at once, creating an executable file.
Interpreters: Translate high-level code to machine code line by line, executing each line
immediately.