Free Essay

Comp Txt

In:

Submitted By mibdhaan
Words 49691
Pages 199
1

2

Acknowledgements
p.1 tr ©iStockphoto.com/Dennys Bisogno, etc t = top, b = bottom, l = left, r = right, c = centre
Computer hardware and software brand names mentioned in this book are protected by their respective trademarks and are acknowledged.
Scratch is developed by the Lifelong Kindergarten Group at the MIT Media Lab. See http://scratch.mit.edu Every effort has been made to trace all copyright holders, but if any have been inadvertently overlooked the publishers will be pleased to make the necessary arrangements at the first opportunity.
Although every effort has been made to ensure that website addresses are correct at time of going to press, Hodder Education cannot be held responsible for the content of any website mentioned in this book. It is sometimes possible to find a relocated web page by typing in the address of the home page for a website in the URL window of your browser.

Photo credits
p.1 © peno – Fotolia; p.15 © Dmitrydesigner/Fotolia; p.16 ©iStockphoto.com/Karl
Yamashita; p.57 © Romanchuck – Fotolia; p.58 t © C Squared
Studios/Photodisc/Getty Images, m ©Dmitriy Melnikov - Fotolia.com, b © Popova
Olga/Fotolia; p.59 © picsfive – Fotolia; p.65 © Manfred Schmidt – Fotolia.com;
p.67 © dja65 – Fotolia; p.68 © Konstantin Shevtsov – Fotolia; p.69 t © Miguel
Navarro/Stone/Getty Images, b © Piero Cruciatti/Alamy; p.73 © Jamdesign/Fotolia;
p.78 and 79 © adisa – Fotolia; p.81 © Mykola Mazuryk – Fotolia; p.82 t © Mauro
Rodrigues/Fotolia, b ©Martin Dohrn/Science Photo Library; p.83 © Norman Chan –
Fotolia; p.85 © Studio 10 /Alamy; p.86 © Brennan JB7 produced by Martin Brennan;
p.87 © Sergojpg/Fotolia; p.88 and 110 b © Jürgen Fälchle/Fotolia; p.108 t ©
Andrew Brown/Fotolia, b © Stanford Eye Clinic/Science Photo Library; p.114 ©
Tan Kian Khoon – Fotolia.

3

Hachette UK’s policy is to use papers that are natural, renewable and recyclable products and made from wood grown in sustainable forests. The logging and manufacturing processes are expected to conform to the environmental regulations of the country of origin.
Orders: please contact Bookpoint Ltd, 130 Milton Park, Abingdon, Oxon OX14 4SB.
Telephone: (44) 01235 827720. Fax: (44) 01235 400454. Lines are open 9.00–5.00,
Monday to Saturday, with a 24-hour message answering service. Visit our website at www.hoddereducation.com ® IGCSE is the registered trademark of Cambridge International Examinations
© David Watson and Helen Williams 2014
First published in 2014 by
Hodder Education
An Hachette UK Company
London NW1 3BH
Impression number 5 4 3 2 1
Year 2015 2014 2013
All rights reserved. Apart from any use permitted under UK copyright law, no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording, or held within any information storage and retrieval system, without permission in writing from the publisher or under licence from the Copyright Licensing Agency Limited. Further details of such licences (for reprographic reproduction) may be obtained from the
Copyright Licensing Agency Limited, Saffron House, 6–10 Kirby Street, London
EC1N 8TS.
Cover photo © Scanrail – Fotolia
Third edition typeset in 11/13 pt Galliard Roman by Aptara Inc.
Printed in Dubai
A catalogue record for this title is available from the British Library
ISBN 978 1471809309 eISBN 978 1471809323

4

Contents
Introduction

Section 1 Theory of computer science
Chapter 1 Binary systems and hexadecimal
1.1 Introduction
1.2 The binary system
1.3 Measurement of the size of computer memories
1.4 Example use of binary
1.5 The hexadecimal system
1.6 Use of the hexadecimal system

Chapter 2 Communication and internet technologies
2.1 Introduction
2.2 Data transmission
2.3 Error-checking methods
2.4 Internet technologies

Chapter 3 Logic gates and logic circuits
3.1 Introduction
3.2 Logic gates
3.3 Truth tables
3.4 The function of the six logic gates
3.5 Logic circuits
3.6 Logic circuits in the real world

Chapter 4 Operating systems and computer architecture
4.1 Introduction
4.2 Operating systems
4.3 Interrupts
4.4 Computer architecture
4.5 The fetch–execute cycle

Chapter 5 Input and output devices
5.1 Introduction
5

5.2 Input devices
5.3 Output devices

Chapter 6 Memory and data storage
6.1 Introduction
6.2 File formats
6.3 Lossless and lossy file compression
6.4 Memory and storage
6.5 How to estimate the size of a file

Chapter 7 High- and low-level languages
7.1 Programming languages
7.2 Translators
7.3 What happens when things go wrong?

Chapter 8 Security and ethics
8.1 Introduction
8.2 Security and data integrity
8.3 Cookies
8.4 Loss of data and data corruption
8.5 Firewalls and proxy servers
8.6 Security protocols
8.7 Encryption
8.8 Applications
8.9 Computer ethics
8.10 Free software, freeware and shareware

Section 2 Practical problem-solving and programming
Chapter 9 Problem-solving and design
9.1 Introduction
9.2 Algorithms
9.3 Test data
9.4 Validation and verification
9.5 Using trace tables
9.6 Identifying and correcting errors
9.7 Producing algorithms
6

Chapter 10 Pseudocode and flowcharts
10.1 Introduction
10.2 Assignment
10.3 Conditional statements
10.4 Loop structures
10.5 Input and output statements
10.6 Standard actions
10.7 Examples of algorithms in pseudocode
10.8 Standard flowchart symbols

Chapter 11 Programming concepts
11.1 Introduction
11.2 Programming
11.3 Declaration and use of variables and constants
11.4 Basic data types
11.5 How to make your program work

Chapter 12 Data structures: arrays and using pre-release material 12.1 Introduction
12.2 Arrays
12.3 Using pre-release material

Chapter 13 Databases
13.1 Introduction
13.2 What are databases used for?
13.3 The structure of a database
13.4 Practical use of a database
Index

7

Introduction
Aims
This textbook has been written to provide the knowledge, understanding and practical skills that a student would need for the Cambridge International Examinations
Computer Science IGCSE and GCE O Level courses.
The textbook is part of a package which includes a student CD-ROM. A teacher’s
CD-ROM is also available separately which includes additional guidance and other useful information (see later in this introduction).
This book and accompanying student CD-ROM provide:
• practice end-of-chapter questions which include questions from past Cambridge
International Examinations papers
• activities which give students additional guidance and practice
• sample program solutions for programming activities
• hints and tips where these provide additional help and knowledge.
Although this book has been written with the Cambridge International
Examinations syllabus in mind, it can still be used as a useful reference textbook for other GCSE computing courses. It is also a useful source of information for those students starting an A level computer science course – especially at AS level.

Using the book
The textbook contains 13 chapters. Although it is possible for some elements of the practical problem-solving chapters to be examined in Paper 1 (Theory of Computer
Science), and vice versa, the sections for the theory work are in Chapters 1 to 8 and the practical work in Chapters 9 to 13. The book has been split into Section 1
(Theory of computer science) and Section 2 (Practical problem-solving and programming) to follow the Cambridge International Examinations syllabus as closely as possible.
Activities are shown throughout the books as follows:

Activity 1.1

Student CD-ROM
The accompanying student CD-ROM contains additional guidance to enhance the learning process in a number of key areas in the textbook. The CD-ROM uses animation and verbal commentary wherever this is found helpful in the learning process. The CD-ROM includes sample program solutions for the programming activities. 8

Where book topics are included in the CD-ROM the following symbol is used:

Teacher’s CD-ROM
An additional teacher’s CD-ROM is available to accompany this textbook. This CDROM includes the following material:
• possible responses to sample examination and other questions
• each question part suggests a level of difficulty
• expected responses to the questions at that level are included
• additional notes on why the responses meet the required level only
• answers to the end-of-chapter questions in this textbook and to some of the activities where relevant
• program files in Python and Java for activities and end-of-chapter questions.
• a scheme of work to help teacher’s plan their two-year computer science course; this scheme includes:
• chapter numbers from the book
• topic to be covered from the chapter
• approximate time allocation advised to cover the topic
• Cambridge International Examinations syllabus reference
• relevant page numbers from the textbook
• activities found in the textbook to help in the teaching process
• any additional notes to help plan the lessons.
The teacher’s CD-ROM has not been through the Cambridge endorsement process.
David Watson and Helen Williams
September 2014

9

Section 1 Theory of computer science
Chapters
1 Binary systems and hexadecimal
2 Communication and internet technologies
3 Logic gates and logic circuits
4 Operating systems and computer architecture
5 Input and output devices
6 Memory and data storage
7 High- and low-level languages
8 Security and ethics

10

11

1 Binary systems and hexadecimal
In this chapter you will learn about:
• the binary system
• measurement of computer memories
• the hexadecimal system
• how to convert numbers between different number base systems

1.1 Introduction
As you progress through this book you will begin to realise how complex computer systems really are. By the time you reach Chapter 12 you should have a better understanding of the fundamentals behind computers themselves and the software that controls them.
However, no matter how complex the system, the basic building block in all computers is the binary number system. This system is chosen since it consists of 1s and 0s only. Since computers contain millions and millions of tiny ‘switches’, which must be in the ON or OFF position, this lends itself logically to the binary system. A switch in the ON position can be represented by 1; a switch in the OFF position can be represented by 0.

1.2 The binary system
We are all familiar with the denary (base 10) number system which counts in multiples of 10. This gives us the well-known headings of units, 10s, 100s, 1000s and so on:

The BINARY SYSTEM is based on the number 2. Thus, only the two ‘values’ 0 and 1 can be used in this system to represent each digit. Using the same method as denary, this gives the headings of 20, 21, 22, 23 and so on. The typical headings for a binary number with eight digits would be:

A typical binary number would be:
11101110
12

1.2.1 Converting from binary to denary
It is fairly straightforward to change a binary number into a denary number. Each time a 1 appears in a column, the column value is added to the total. For example, the binary number above is:
128 + 64 + 32 + 8 + 4 + 2 = 238 (denary)
The 0 values are simply ignored.

Activity 1.1
Convert the following binary numbers into denary: a 00110011 b 01111111 c 10011001 d 01110100 e 11111111 f 00001111 g 10001111 h 11110000 i 01110000 j 11101110

1.2.2 Converting from denary to binary
The reverse operation, converting from denary to binary, is slightly more complex.
There are two basic ways of doing this. The first method is ‘trial and error’ and the second method is more methodical and involves repetitive division.

Method 1
Consider the conversion of the denary number, 107, into binary. This method involves placing 1s in the appropriate position so that the total equates to 107:

Method 2
This method involves successive division by 2. The remainders are then read from
BOTTOM to TOP to give the binary value. Again using 107, we get:
13

Figure 1.1

Activity 1.2
Convert the following denary numbers into binary (using both methods): a41 b67 c86 d100 e111 f127 g144 h189 i200 j255

1.3 Measurement of the size of computer memories A binary digit is commonly referred to as a BIT; 8 bits are usually referred to as a
BYTE.
The byte is the smallest unit of memory in a computer. Some computers use larger bytes but they are always multiples of 8 (e.g. 16-bit systems and 32-bit systems). One byte of memory wouldn’t allow you to store very much information; therefore memory size is measured in the following multiples:
Table 1.1
Name of memory size

Number of bits Equivalent denary value

1 kilobyte (1 KB)

210

1 024 bytes
14

1 megabyte (1 MB)

220

1 048 576 bytes

1 gigabyte (1 GB)

230

1 073 741 824 bytes

1 terabyte (1 TB)

240

1 099 511 627 776 bytes

1 petabyte (1 PB)

250

1 125 899 906 842 624 bytes

(Note: 1024 × 1024 = 1048576 and so on.)
To give some idea of the scale of these numbers, a typical data transfer rate using the internet is 32 megabits (i.e. 4 MB) per second (so a 40 MB file would take 10 seconds to transfer). Most hard disk systems in computers are 1 or 2 TB in size (so a
2 TB memory could store over half a million 4 MB photos, for example).
It should be pointed out here that there is some confusion in the naming of memory sizes. The IEC convention is now adopted by some organisations. Manufacturers of storage devices often use the denary system to measure storage size. For example,
1 kilobyte = 1000 byte
1 megabyte = 1000000 bytes
1 gigabyte = 1000000000 bytes
1 terabyte = 1000000000000 bytes and so on.
The IEC convention for computer internal memories (including RAM) becomes:
1 kibibyte (1 KiB) = 1024 bytes
1 mebibyte (1 MiB) = 1048576 bytes
1 gibibyte (1 GiB) = 1073741824 bytes
1 tebibyte (1 TiB) = 1099511627776 bytes and so on.
However, the IEC terms are not universally used and this textbook will use the more conventional terms shown in Table 1.1. This also ties up with the Cambridge
International Examinations computer science syllabus which uses the same terminology as in Table 1.1.

1.4 Example use of binary
This section gives an example of a use of the binary system. We will introduce the idea of computer REGISTERS; this subject is covered in more depth in Chapter 4. A register is a group of bits; it is often depicted as follows:

Figure 1.2
15

When computers (or microprocessors) are used to control devices (such as robots), registers are used as part of the control system. The following example describes how registers can be used in controlling a simple device.
A robot vacuum cleaner has three wheels, A, B and C. A rotates on a spindle to allow for direction changes (as well as forward and backward movement); B and C are fixed to revolve around their axles to provide only forward and backward movement, and have an electric motor attached:

Figure 1.3
An 8-bit register is used to control the movement of the robot vacuum cleaner:

Figure 1.4
If the register contains 1 0 1 0 1 0 1 0 this means ‘motor B is ON and motor C is ON and both motors are turning to produce FORWARDS motion’. Effectively, the vacuum cleaner is moving forwards.

Activity 1.3 a What would be the effect if the register contained the following values? i10011000 ii 1 0 1 0 0 1 0 1 iii 1 0 1 0 0 1 1 0
16

b What would the register contain if only motor C was ON and the motors were turning in a BACKWARDS direction? c What would the register contain if motor B and motor C were both ON but
B was turning in a backward direction and C was turning in a forward direction? d What would be the effect if the register contained the following?
11111111

1.5 The hexadecimal system
The HEXADECIMAL SYSTEM is very closely related to the binary system. Hexadecimal
(sometimes referred to as simply ‘hex’) is a base 16 system and therefore needs to use 16 different ‘values’ to represent each digit.
Because it is a system based on 16 different digits, the numbers 0 to 9 and the letters
A to F are used to represent each hexadecimal (hex) digit. (A = 10, B = 11, C = 12,
D = 13, E = 14 and F = 15.) Using the same method as denary and binary, this gives the headings of 160, 161, 162, 163 and so on. The typical headings for a hexadecimal number with five digits would be:

Since 16 = 24 this means that FOUR binary digits are equivalent to each hexadecimal digit. Table 1.2 summarises the link between binary, hexadecimal and denary.
Table 1.2
Binary value

Hexadecimal value

Denary value

0000

0

0

0001

1

1

0010

2

2

0011

3

3

0100

4

4

0101

5

5

0110

6

6

0111

7

7

1000

8

8

1001

9

9

1010

A

10
17

1011

B

11

1100

C

12

1101

D

13

1110

E

14

1111

F

15

1.5.1 Converting from binary to hexadecimal and from hexadecimal to binary
Converting from binary to hexadecimal is a fairly easy process. Starting from the right and moving left, split the binary number into groups of 4 bits. If the last group has less than 4 bits, then simply fill in with 0s from the left. Take each group of 4 bits and convert it into the equivalent hexadecimal digit using Table 1.2. Look at the following two examples to see how this works.

Example 1
101111100001
First split this up into groups of 4 bits:
1011 1110 0001
Then, using Table 1.2, find the equivalent hexadecimal digits:
B

E

1

Example 2
10000111111101
First split this up into groups of 4 bits:
10

0001

1111

1101

The left group only contains 2 bits, so add in two 0s:
0010

0001

1111

1101

Now use Table 1.2 to find the equivalent hexadecimal digits:
2

1

F D

Activity 1.4
Convert the following binary numbers into hexadecimal: a11000011 18

b11110111 c1001111111 d10011101110 e000111100001 f100010011110 g0010011111110 h0111010011100 i1111111101111101 j00110011110101110
Converting from hexadecimal to binary is also very straightforward. Using the data in
Table 1.2, simply take each hexadecimal digit and write down the 4-bit code which corresponds to the digit.

Example 3
4

5

A

Using Table 1.2, find the 4-bit code for each digit:
0100 0101 1010
Put the groups together to form the binary number:
010001011010

Example 4
B F 0

8

Again just use Table 1.2:
1011 1111 0000 1000
Then put all the digits together:
1011111100001000

Activity 1.5
Convert the following hexadecimal numbers into binary: a6C b59 cAA dA00 e40E fBA6 g9CC 19

h40AA iDA47 j1AB0

1.5.2 Converting from hexadecimal to denary and from denary to hexadecimal
To convert a hexadecimal number to denary is fairly straightforward. Take each hexadecimal digit and multiply it by its value. Add the totals together to obtain the denary value.

Example 1
4

5

A

First multiply each digit by its value:

Add the totals together: denary number = 1 1 1 4

Example 2
C 8

F

First multiply each digit by its value:

Add the totals together: denary number = 3 2 1 5

Activity 1.6
Convert the following hexadecimal numbers into denary: a6B b9C c4A dFF e1FF fA01 gBB4 20

hCA8 i12AE jAD89
To convert from denary to hexadecimal is a little more difficult. As with the conversion from binary to denary, there are two very similar methods that can be used. Again, the first method is ‘trial and error’ and the second method is more methodical and involves repetitive division.

Method 1
Consider the conversion of the denary number, 2004, into hexadecimal. This method involves placing hexadecimal digits in the appropriate position so that the total equates to 2004:

A quick check shows that: (7 × 256) + (13 × 16) + (4 × 1) gives 2004.

Method 2
This method involves successive division by 16. The remainders are then read from
BOTTOM to TOP to give the hexadecimal value. Again using 2004, we get:

Figure 1.5

Activity 1.7
Convert the following denary numbers into hexadecimal (using both methods): a98 b227 c490 d511 e826 f1000 g2634
21

h3743 i4007 j5000

1.6 Use of the hexadecimal system
This section reviews five uses of the hexadecimal system. The information in this chapter gives the reader sufficient grounding in each topic at this level. Further material can be found by searching the internet, but be careful that you don’t go off at a tangent.

1.6.1 Memory dumps
Since it is much easier to work with: B 5 A 4 1 A F C rather than: 1 0 1 1 | 1 0 0 1 | 1 0 1 0 | 0 1 0 0 | 0 0 0 1 | 1 0 1 0 | 1 1 1 1 | 1 1 0 0 hexadecimal is often used when developing new software or when trying to trace errors in programs. The contents of part of the computer memory can hold the key to help solve many problems. When the memory contents are output to a printer or monitor, this is known as a MEMORY DUMP:

Figure 1.6
A program developer can look at each of the hexadecimal codes (as shown in Figure
1.6) and determine where the error lies. The value on the far left shows the memory location so that it is possible to find out exactly where in memory the fault occurs.
This is clearly much more manageable using hexadecimal rather than using binary.
It’s a very powerful fault-tracing tool, but requires considerable knowledge of computer architecture in order to interpret the results.

1.6.2 HyperText Mark-up Language (HTML)
22

HYPERTEXT MARK-UP LANGUAGE (HTML) is used when writing and developing web pages. HTML isn’t a programming language but is simply a mark-up language. A mark-up language is used in the processing, definition and presentation of text (for example, specifying the colour of the text).
HTML uses which are used to bracket a piece of code; for example, starts a standard cell in an HTML table, and ends it. Whatever is between the two tags has been defined. Here is a short section of HTML code:

Small car
Used car sales
Cars from $500
Cash sales only

HTML code is often used to represent colours of text on the computer screen. The values change to represent different colours. The different intensity of the three primary colours (red, green and blue) is determined by its hexadecimal value. For example: • # FF 00 00 represents primary colour red
• # 00 FF 00 represents primary colour green
• # 00 00 FF represents primary colour blue
• # FF 00 FF represents fuchsia
• # FF 80 00 represents orange
• # B1 89 04 represents tan and so on producing almost any colour the user wants. There are many websites available that allow a user to find the HTML code for the colour needed.

Activity 1.8
Using the internet, find the HTML codes for a number of colours.
Try entering HTML code into the computer and see how the colours and font types can be changed to good effect.
Make use of websites, such as www.html.am/ to produce your own web pages. 23

With a little practice, you can import/embed images into your own design of web page using freely available software.
Remember this is not a programming language. It is simply a mark-up language, so very little programming skill is required to use HTML.

1.6.3 Media Access Control (MAC)
A MEDIA ACCESS CONTROL (MAC) ADDRESS refers to a number which uniquely identifies a device on the internet. The MAC address refers to the network interface card (NIC) which is part of the device. The MAC address is rarely changed so that a particular device can always be identified no matter where it is.
A MAC address is usually made up of 48 bits which are shown as six groups of hexadecimal digits (although 64-bit addresses are also known):
NN – NN – NN – DD – DD – DD or NN:NN:NN:DD:DD:DD where the first half (NN – NN – NN) is the identity number of the manufacturer of the device and the second half (DD – DD – DD) is the serial number of the device. For example: 00 – 1C – B3 – 4F – 25 – FE is the MAC address of a device produced by the Apple Corporation (code: 001CB3) with a serial number of 4F25FE. Sometimes lower case hexadecimal letters are used in the MAC address: 00-1c-b3-4f-25-fe.
Other manufacturer identity numbers include:
• 00 – 14 – 22 which identifies devices made by Dell
• 00 – 40 – 96 which identifies devices made by Cisco
• 00 – A0 – C9 which identifies devices made by Intel, and so on.

Types of MAC address
It should be pointed out that there are two types of MAC address: the UNIVERSALLY
ADMINISTERED MAC ADDRESS (UAA) and the LOCALLY ADMINISTERED MAC
ADDRESS (LAA).
The UAA is by far the most common type of MAC address and this is the one set by the manufacturer at the factory. It is rare for a user to want to change this MAC address. However, there are some occasions when a user or an organisation wishes to change their MAC address. This is a relatively easy task to carry out but it will cause big problems if the changed address isn’t unique.
There are a few reasons why the MAC address needs to be changed using LAA:
• Certain software used on mainframe systems needs all the MAC addresses of devices to fall into a strict format; because of this, it may be necessary to change the MAC address of some devices to ensure they follow the correct format.
• It may be necessary to bypass a MAC address filter on a router or a firewall; only
24

MAC addresses with a certain format are allowed through, otherwise the devices will be blocked.
• To get past certain types of network restrictions it may be necessary to emulate unrestricted MAC addresses; hence it may require the MAC address to be changed on certain devices connected to the network.

1.6.4 Web addresses
Each character used on a keyboard has what is known as an ASCII CODE
(AMERICAN STANDARD CODE FOR INFORMATION INTERCHANGE). These codes can be represented using hexadecimal values or decimal values. Figure 1.7 shows part of an ASCII table.

25

Figure 1.7
A good example of the use of ASCII codes is the representation of a web address (or
URL, which stands for uniform resource locator) such as www.hodder.co.uk which becomes (using hexadecimal values):

(Note: the % sign is used to denote that hexadecimal is being used.)

Activity 1.9
Using the ASCII code table (Figure 1.7) convert the following URLs into the
26

equivalent hexadecimal: a www.cie.org.uk b www.cie.org.uk/computer_science c https://www.hodder.co.uk d www.HodderEducation.co.uk e http://www.ucles.ac.uk/computing.htm
Sometimes the hexadecimal addresses are used in the address of files or web pages as a security feature. It takes longer to type in the URL using the hexadecimal codes, but it has the advantage that you are unlikely to fall into the trap of copying and pasting a ‘fake’ website address.

1.6.5 Assembly code and machine code
Computer memory can be referred to directly using machine code or assembly code.
This can have many advantages to program developers or when carrying out troubleshooting. Machine code and assembly code are covered in much more detail in Chapter 7; here we are simply interested in how hexadecimal fits into the picture.
Using hexadecimal makes it much easier, faster and less error prone to write code compared to binary. Using true machine code (which uses binary) is very cumbersome and it takes a long time to key in the values. It is also very easy to mistype the digits in a ‘sea of 1s and 0s’. Here is a simple example:
STO FFA4
A5E4

FFA4

(assembly code)
(machine code using hexadecimal values)

1010 0101 1110 0100 1111 1111 1010 0100

(machine code using binary)

Machine code and assembly code are examples of low-level languages and are used by software developers when producing, for example, computer games. As you will find in Chapter 7, although they look cumbersome, they have many advantages at the development stage of software writing (especially when trying to locate errors in the code). 27

2 Communication and internet technologies In this chapter you will learn about:
• serial and parallel transmission
• error checking after transmission
• web browsers and internet service providers
• http and HTML

2.1 Introduction
When data is sent from one device to another, it is important to consider how that data is transmitted. It is also important to ensure that the data hasn’t been changed in any way.
The internet has now become an integral part of all of our lives. This chapter will consider some of the important technologies going on in the background which support the internet.

2.2 Data transmission
Data transmission can be either over a short distance (for example, from computer to printer) or over longer distances (for example, over a telephone network).
Essentially, three factors need to be considered when transmitting data (each factor has to be agreed by both sender and receiver for this to work without error):
• the direction of the data transmission (i.e. in one direction only or in both directions) • the method of transmission (how many bits are sent at the same time)
• the method of synchronisation between the two devices.

2.2.1 Simplex, half-duplex and full-duplex is in one direction only (i.e. from sender to receiver).
Example: data being sent from a computer to a printer.
HALF-DUPLEX DATA TRANSMISSION is in both directions but not at the same time
(i.e. data can be sent from ‘A’ to ‘B’ or from ‘B’ to ‘A’ along the same line, but not at the same time). Example: a phone conversation between two people where only one person speaks at a time.
FULL-DUPLEX DATA TRANSMISSION is in both directions simultaneously (i.e. data can be sent from ‘A’ to ‘B’ and from ‘B’ to ‘A’ along the same line, both at the same time). Example: broadband connection on a phone line.
SIMPLEX DATA TRANSMISSION

28

2.2.2 Serial and parallel data transmission
SERIAL DATA TRANSMISSION is when data is sent, one bit at a time, over a single wire or channel (bits are sent one after the other in a single stream).

Figure 2.1
(Note: bits can be transmitted as simplex, half-duplex or full-duplex.)
This method of data transmission works well over long distances. However, data is transmitted at a slower rate than parallel data transmission. Since only one wire or channel is used, there is no problem of data arriving at its destination out of synchronisation. An example of its use is sending data from a computer to a modem for transmission over a telephone line.
PARALLEL DATA TRANSMISSION is when several bits of data (usually 1 byte) are sent down several wires or channels at the same time; one wire or channel is used to transmit each bit.

Figure 2.2
(Note: bits can be transmitted as simplex, half-duplex or full-duplex.)
This method of data transmission works very well over short distances (over longer distances, the bits can become ‘skewed’ – this means they will no longer be synchronised). It is, however, a faster method of data transmission than serial.
An example of its use is when sending data to a printer from a computer using a ribbon connector.

29

Figure 2.3 Ribbon connector

Activity 2.1
Describe what is meant by: a serial, half-duplex data transmission b parallel, full-duplex data transmission c serial, simplex data transmission.
A common use for serial data transmission is discussed in Section 2.2.4 (Universal
Serial Bus (USB)).
Parallel data transmission is used in the internal electronics of the computer system. The pathways between the CPU and the memory all use this method of data transmission. Integrated circuits, buses and other internal components all use parallel data transmission because of the need for high speed data transfer. The use of 8-bit,
16-bit, 32-bit and 64-bit buses, for example, allow much faster data transmission rates than could be achieved with single channel serial data transfer. An internal clock is used to ensure the correct timing of data transfer; it is essentially synchronous in nature (see Section 2.2.3) and the short distances between components mean that none of the issues described earlier have any real impact on the accuracy of the data.
Chapter 4 covers the internal architecture of computer systems (including the role of buses) and this should be read in conjunction with the information given above.

2.2.3 Asynchronous and synchronous data transmission ASYNCHRONOUS DATA TRANSMISSION refers to data being transmitted in an agreed bit pattern. Data bits (1s and 0s) are grouped together and sent with CONTROL BITS:

30

Figure 2.4
This means that the receiver of the data knows when the data starts and when it ends.
This prevents data becoming mixed up; without these control bits, it would be impossible to separate groups of data as they arrived.
SYNCHRONOUS DATA TRANSMISSION is a continuous stream of data (unlike asynchronous data which is sent in discrete groups). The data is accompanied by timing signals generated by an internal clock. This ensures that the sender and receiver are synchronised with each other.
The receiver counts how many bits (1s and 0s) were sent and then reassembles them into bytes of data. The timing must be very accurate here since there are no control bits sent in this type of data transmission. However, it is a faster data transfer method than asynchronous and is therefore used where this is an important issue (for example, in network communications).

2.2.4 Universal Serial Bus (USB)
The UNIVERSAL SERIAL BUS (USB) is an asynchronous serial data transmission method. It has quickly become the standard method for transferring data between a computer and a number of devices. Essentially, the USB cable consists of:
• a four-wire shielded cable
• two of the wires are used for power and the earth
• two of the wires are used in the data transmission.
When a device is plugged into a computer using one of the USB ports:
• the computer automatically detects that a device is present (this is due to a small change in the voltage level on the data signal wires in the cable)
• the device is automatically recognised, and the appropriate DEVICE DRIVER is loaded up so that computer and device can communicate effectively
• if a new device is detected, the computer will look for the device driver which matches the device; if this is not available, the user is prompted to download the appropriate software.

31

Figure 2.5 USB cable
Even though the USB system has become the industrial standard, there are still a number of benefits ( ) and drawbacks ( ) to using this system:
Table 2.1
Devices plugged into the computer are

automatically detected; device drivers are automatically uploaded
The connectors can only fit one way; this The maximum cable length is prevents incorrect connections being made presently about 5 metres
This has become the industry standard; this means that considerable support is available to users



Several different data transmission rates are supported

The present transmission rate is limited to less than 500 megabits per second

Newer USB standards are backward compatible with older USB standards

The older USB standard (e.g.
1.1) may not be supported in the near future

2.3 Error-checking methods
Following data transmission, there is always the risk that the data has been corrupted
32

or changed in some way. This can occur whether data is being transmitted over short distances or over long distances.
Checking for errors is important since computers aren’t able to check that text is correct; they can only recognise whether a word is in their built-in dictionary or not.
Look at the following text:
Can you raed tihs?
‘I cnduo’t bvleiee taht I culod aulaclty uesdtannrd waht I was rdnaieg. Unisg the icndeblire pweor of the hmuan mnid, aocdcrnig to rseecrah at Cmabridge
Uinervtisy, it dseno’t mttaer in waht oderr the lterets in a wrod are, the olny irpoamtnt tihng is taht the frsit and lsat ltteer be in the rhgit pclae. The rset can be a taotl mses and you can sitll raed it whoutit a pboerlm.
Tihs is bucseae the huamn mnid deos not raed ervey ltteer by istlef, but the wrod as a wlohe.
Aaznmig, huh? Yeah and I awlyas tghhuot slelinpg was ipmorantt! See if yuor fdreins can raed tihs too’
(From an unknown source at Cambridge University)
Whilst you probably had little problem understanding this text, a computer would be unable to make any sense of it.
This is why error checking is such an important part of computer technology. This section considers a number of ways that can be used to check for errors so that you don’t end up with text as shown in the example above!
A number of methods exist which can detect errors and, in some cases, actually correct the error. The methods covered in this section are:
• parity checking
• automatic repeat request (ARQ)
• checksum
• echo checking.

2.3.1 Parity checking
PARITY CHECKING is one method used to check whether data has been changed or corrupted following transmission from one device or medium to another device or medium. A byte of data, for example, is allocated a PARITY BIT. This is allocated before transmission takes place. Systems that use EVEN PARITY have an even number of 1bits; systems that use ODD PARITY have an odd number of 1-bits.
Consider the following byte:

33

Figure 2.6
If this byte is using even parity, then the parity bit needs to be 0 since there is already an even number of 1-bits (in this case, 4).
If odd parity is being used, then the parity bit needs to be 1 to make the number of
1-bits odd.
Therefore, the byte just before transmission would be: either (even parity)

Figure 2.7 or (odd parity)

Figure 2.8
Before data is transferred, an agreement is made between sender and receiver regarding which of the two types of parity are used. This is an example of a
PROTOCOL.

Activity 2.2
Find the parity bits for each of the following bytes: a1101101 b0001111 c0111000 d1110100 e1011011 even parity used even parity used even parity used odd parity used odd parity used
34

If a byte has been transmitted from ‘A’ to ‘B’, and even parity is used, an error would be flagged if the byte now had an odd number of 1-bits at the receiver’s end.

Example 1

Figure 2.9
In this case, the receiver’s byte has three 1-bits, which means it now has odd parity whilst the byte from the sender had even parity (four 1-bits). This clearly means an error has occurred during the transmission of the data.
The error is detected by the computer recalculating the parity of the byte sent. If even parity has been agreed between sender and receiver, then a change of parity in the received byte indicates that a transmission error has occurred.

Activity 2.3
Which of the following bytes have an error following data transmission? a11101101 b01001111 c00111000 d11110100 e11011011 even parity used even parity used even parity used odd parity used odd parity used

In each case where an error occurs, can you work out which bit is incorrect? Naturally, any of the bits in Example 1 could have been changed leading to a transmission error. Therefore, even though an error has been flagged, it is impossible to know exactly which bit is in error. (Your last answer in Activity 2.3 should have been ‘NO’ since there isn’t enough information to determine which bit has been changed.) 35

One of the ways around this problem is to use PARITY BLOCKS. In this method, a block of data is sent and the number of 1-bits are totalled horizontally and vertically (in other words, a parity check is done in both horizontal and vertical directions). As Example 2 shows, this method not only identifies that an error has occurred but also indicates where the error is.

Example 2
In this example, nine bytes of data have been transmitted. Agreement has been made that even parity will be used. Another byte, known as the PARITY BYTE, has also been sent. This byte consists entirely of the parity bits produced by the vertical parity check. The parity byte also indicates the end of the block of data.
The following table shows how the data arrived at the receiving end:
Table 2.2

A careful study of Table 2.2 shows the following:
• byte 8 (row 8) has incorrect parity (there are three 1-bits)
• bit 5 (column 5) also has incorrect parity (there are five 1-bits).
First of all, the table shows that an error has occurred following data transmission.
Secondly, at the intersection of row 8 and column 5, the position of the incorrect bit value (which caused the error) can be found.
This means that byte 8 should have the value:

Figure 2.10
36

which would also correct column 5 giving an even vertical parity (now has four 1bits).
This byte could therefore be corrected automatically as shown above, or an error message could be relayed back to the sender asking them to retransmit the block of data. One final point: if two of the bits change value following data transmission, it may be impossible to locate the error using the above method. For example, using
Example 1 again:

Figure 2.11
This byte could reach the destination as:

Figure 2.12 or: Figure 2.13 or: Figure 2.14
All three are clearly incorrect; but they have retained even parity so this wouldn’t have triggered an error message at the receiving end. Clearly we need to look at other methods to complement parity when it comes to error checking transmitted data.

Activity 2.4
The following block of data was received after transmission from a remote computer; odd parity being used by both sender and receiver. One of the
37

bits has been changed during the transmission stage. Locate where this error is and suggest a corrected byte value.
Table 2.3

2.3.2 Automatic Repeat Request (ARQ)
AUTOMATIC REPEAT REQUEST (ARQ) is another method used to check whether data has been correctly transmitted.
It uses an ACKNOWLEDGEMENT (a message sent by the receiver indicating that data has been received correctly) and TIMEOUT (this is the time allowed to elapse before an acknowledgement is received).
If an acknowledgement isn’t sent back to the sender before timeout occurs, then the message is automatically resent.

2.3.3 Checksum
CHECKSUM is another way to check if data has been changed or corrupted following data transmission. Data is sent in blocks and an additional value, the checksum, is also sent at the end of the block of data.
To explain how this works, we will assume the checksum of a block of data is 1 byte in length. This gives a maximum value of 28 – 1 (i.e. 255). The value 0000 0000 is ignored in this calculation. Example 3 explains how a checksum is generated.

Example 3
If the sum of all the bytes in the transmitted block of data is 255, then the checksum is found using the simple algorithm in Figure 2.15.

Figure 2.15
Suppose the value of X is 1185, then tracing through the algorithm, we get:
X = 1185
1 1185/256 = 4.629
2 Rounding down to nearest whole number gives Y = 4
3 Multiplying by 256 gives Z = Y * 256 = 1024
4 The difference (X – Z) gives the checksum: (1185 – 1024) = 161
5 This gives the checksum = 161
When a block of data is about to be transmitted, the checksum for the bytes is first of all calculated. This value is then transmitted with the block of data. At the receiving end, the checksum is recalculated from the block of data received. This calculated value is then compared to the checksum transmitted. If they are the same value, then the data was transmitted without any errors; if the values are different, then a request is sent for the data to be retransmitted.
39

Activity 2.5
Calculate the checksum for blocks of data with the following byte sums: a 148 b 905 c 1450 d 4095

2.3.4 Echo check
With ECHO CHECK, when data is sent to another device, this data is sent back again to the sender. The sender compares the two sets of data to check if any errors occurred during the transmission process.
As you will have no doubt worked out, this isn’t very reliable. If the two sets of data are different, it isn’t known whether the error occurred when sending the data in the first place, or if the error occurred when sending the data back for checking!
However, if no errors occurred then it is another way to check that the data was transmitted correctly.

2.4 Internet technologies
The internet is a world-wide system of computer networks and computers. All computers attached to the internet can communicate with each other providing a number of rules and protocols are adhered to.

2.4.1 Internet Service Provider (ISP)
Each user makes use of an INTERNET SERVICE PROVIDER (ISP); these are companies that provide the user with access to the internet. A monthly fee is usually charged for this service. The ISP will set up a user account which will contain a username and a password; most ISPs also give the user an email address.
Before ISPs became common in the 1990s, internet access was usually limited to users who were part of a university or a government agency.

2.4.2 Internet Protocol (IP) Address
Each device on the internet is given a unique address known as the INTERNET
PROTOCOL (IP) ADDRESS. This is a 32-bit number which is usually written in the form: 109.108.158.1
A home computer is given an IP address when it connects to the internet. This is assigned by the ISP and is unique for that particular internet session. The only IP
40

addresses that remain fairly unchanged are web servers.
An IP address can be used instead of typing in the full URL. For example: http://109.108.158.1 would take you straight to the device corresponding to this address.

IP addresses and MAC addresses
You will recall the term MEDIA ACCESS CONTROL (MAC) ADDRESS from Chapter 1.
This is a unique number that identifies a device connected to the internet. So what is the difference between an IP address and a MAC address? The IP address gives the location of a device on the internet, whereas the MAC address identifies the device connected to the internet.
You can think of the IP address as the address of the house you live in (it will have some unique way of identifying it, such as a post or zip code). Using this example, the
MAC address can be thought of as a way of uniquely identifying each person living in that house. It is possible to move house (so your IP address will change) but the same people will be living in the new house (so their MAC addresses will remain unchanged). 2.4.3 HyperText Mark-up Language (HTML)
HYPERTEXT MARK-UP LANGUAGE (HTML) is used when writing and developing web pages. HTML isn’t a programming language but is simply a mark-up language. A mark-up language is used in the processing, definition and presentation of text (for example, specifying the colour of the text).
HTML uses which are used to bracket a piece of code; for example, starts a standard cell in an HTML table, and ends it. Whatever is between the two tags has been defined. Here is a short section of HTML code:

Small car
Used car sales
Cars from $500
Cash sales only

HTML structure and presentation
When writing HTML code, it is very important to realise that there is a difference between the structure and the presentation.
41

STRUCTURE is the essential part of the HTML document; it includes the semantics
(meaning) and structural mark-up of the document.
PRESENTATION is the style of the document; i.e. how the document will look (or even sound if it includes multimedia elements).
These two features must be kept separate throughout the designing of a web page.
At the end of the design process, the author should have an HTML document (which contains the structure and the actual content) and a separate CSS (CASCADING STYLE
SHEET) file. The css file will contain everything to control the actual presentation of the web page.
Some of the used to create a css file have been shown already in the
HTML example shown above. The following section shows an example of how these can be used to create a stylesheet called example2.css. This is then used in a web page document. The tags (h1, h3 and p) all define how the document will look when this css file (stylesheet) is attached.

Figure 2.16 This shows how the css file (example2.css) is created for use in the document below; h1, h3 and p have all been defined, so when the file is attached below, a web browser knows how to display this web page

Figure 2.17

2.4.4 Hypertext transfer protocol (http)
42

HYPERTEXT TRANSFER PROTOCOL (HTTP) is a set of rules that must be obeyed when transferring files across the internet. When some form of security (e.g. SSL certification or encryption – see Chapter 8) is used, then this changes to https (you in the status bar). The letter s after http refers to also often see the padlock sign http over secure. It is slower to use https than http; https is usually only adopted where sensitive or private data is being transferred across the internet.

2.4.5 Web browsers
A WEB BROWSER is software which allows a user to display a web page on their computer screen. Web browsers interpret or translate the HTML code from websites and show the result of the translation. This can often be in the form of videos, images or sound. Most web browsers share the following features:
• they have a HOME page
• they have the ability to store a user’s favourite websites/pages
• they keep a history of the websites visited by the user
• they give the ability to go backward and forward to websites opened.
Users can either click on a link, such as www.hoddereducation.co.uk/igcse or they can type in the uniform resource locator (URL) manually.
The web browser will break up the URL into three parts:

The web browser translates the web server name into an IP address (see Section
2.4.2) which is part of the URL. The HTML code is returned and is shown as a correctly formatted page on the computer screen. It is also possible that cookies may be sent from the web browser to the web server when the code is executed.
(Note: please refer to Section 8.3 for more information about the use of cookies.)

43

3 Logic gates and logic circuits
In this chapter you will learn about:
• logic gates
• truth tables
• logic circuits
• use of Boolean algebra.

3.1 Introduction
Electronic circuits in computers, many new memories and controlling devices are made up of thousands of LOGIC GATES. Logic gates take binary inputs and produce a binary output. Several logic gates combined together form a LOGIC CIRCUIT and these circuits are designed to carry out a specific function.
The checking of the output from a logic gate or logic circuit is done using a TRUTH
TABLE.
This chapter will consider the function and role of logic gates, logic circuits and truth tables. Also a number of possible applications of logic circuits will be considered. A reference to BOOLEAN ALGEBRA will be made throughout the chapter, but this is really outside the scope of this textbook. However, Boolean algebra will be seen on many logic gate websites and is included here for completeness.

3.2 Logic gates
Six different logic gates will be considered in this chapter:

44

Figure 3.1 Logic gate symbols

3.3 Truth tables
Truth tables are used to trace the output from a logic gate or logic circuit. The NOT gate is the only logic gate with one input; the other five gates have two inputs.
When constructing truth tables, all possible combinations of 1s and 0s which can be input are considered. For the NOT gate (one input) there are only 21 (2) possible binary combinations. For all other gates (two inputs), there are 22 (4) possible binary combinations. For logic circuits, the number of inputs can be more than 2; for example three inputs give a possible 23 (8) binary combinations. And for four inputs, the number of possible binary combinations is 24 (16). It is clear that the number of possible binary combinations is a multiple of the number 2 in every case.
To summarise in table form:
Table 3.1 Truth tables for two, three and four inputs

3.4 The function of the logic gates
3.4.1 NOT gate

45

Figure 3.2

Description:
The output, X, is 1 if: the input, A, is 0

Truth table:
Table 3.2
Input
A

Output
X

0

1

1

0

How to write this:
X = NOT A (logic notation)
X=ā

(Boolean algebra)

3.4.2 AND gate

Figure 3.3

Description:
The output, X, is 1 if: both inputs, A and B, are 1

Truth table:
Table 3.3
Inputs

Output
46

A

B

X

0

0

0

0

1

0

1

0

0

1

1

1

How to write this:
X = A AND B (logic notation)
X=a·b

(Boolean algebra)

3.4.3 OR gate

Figure 3.4

Description:
The output, X, is 1 if: either input, A or B, is 1

Truth table:
Table 3.4
A

Inputs
B

Output
X

0

0

0

0

1

1

1

0

1

1

1

1

How to write this:
X = A OR B (logic notation)
X=a+b

(Boolean algebra)
47

3.4.4 NAND gate (NOT AND)

Figure 3.5

Description:
The output, X, is 1 if: input A AND input B are NOT both 1

Truth table:
Table 3.5
A

Inputs
B

Output
X

0

0

1

0

1

1

1

0

1

1

1

0

How to write this:
X = A NAND B (logic notation)
(Boolean algebra)

3.4.5 NOR gate (NOT OR)

Figure 3.6

Description:
The output, X, is 1 if: neither input A nor input B is 1

48

Truth table:
Table 3.6
A

Inputs
B

Output
X

0

0

1

0

1

0

1

0

0

1

1

0

How to write this:
X = A NOR B

(logic notation)
(Boolean algebra)

3.4.6 XOR gate

Figure 3.7

Description:
The output, X, is 1 if:
(input A is 1 AND input B is 0)
OR
(input A is 0 AND input B is 1)

Truth table:
Table 3.7
A

Inputs
B

Output
X

0

0

0

0

1

1

1

0

1
49

1

1

0

How to write this:
X = A XOR B (logic notation)
(Boolean algebra)
(Note: this is sometimes written as:

Activity 3.1
Find out why

and

both represent the

same logic gate.
(Note: the three symbols in the Boolean algebra have the following meaning:
. represents the AND operation
+ represents the OR operation a bar above the letter, e.g. ā, represents the NOT operation.)

3.5 Logic circuits
When logic gates are combined together to carry out a particular function, such as controlling a robot, they form a logic circuit.
The output from the logic circuit is checked using a truth table. There now follows three examples which show:
• how to produce a truth table
• how to design a logic circuit from a given logic statement/Boolean algebra
• how to design a logic circuit to carry out an actual safety function.

3.5.1 Example 1
Produce a truth table for the following logic circuit (note the use of • at junctions):

50

Figure 3.8
There are three inputs to this logic circuit, therefore there will be eight possible binary values which can be input.
To show step-wise how the truth table is produced, the logic circuit has been split up into three parts and intermediate values are shown as P, Q and R.

Part 1
This is the first part of the logic circuit; the first task is to find the intermediate values
P and Q.

Figure 3.9
The value of P is found from the AND gate where the inputs are A and B. The value of Q is found from the NOR gate where the inputs are B and C. An intermediate truth table is produced using the logic function descriptions in Section 3.4.
51

Table 3.8

Part 2
The second part of the logic circuit has P and Q as inputs and the intermediate output,
R:

Figure 3.10
This produces the following intermediate truth table. (Note: even though there are only two inputs to the logic gate, we have generated eight binary values in part 1 and these must all be used in this second truth table.)
Table 3.9
P

Inputs
Q

Output
R

0

1

1

0

0

0

0

0

0

0

0

0

0

1

1

0

0

0

1

0
52

1
1

0

1

Part 3
The final part of the logic circuit has R and C as inputs and the final output, X:

Figure 3.11
This gives the third intermediate truth table:
Table 3.10
R

Inputs
C

Output
X

1

0

1

0

1

1

0

0

0

0

1

1

1

0

1

0

1

1

1

0

1

1

1

0

Putting all three intermediate truth tables together produces the final truth table which represents the original logic circuit:
Table 3.11

53

The intermediate values can be left out of the final truth table, but it is good practice to leave them in until you become confident about producing the truth tables. The final truth table would then look like this:
Table 3.12

Activity 3.2
Produce truth tables for each of the following logic circuits. You are advised to split them up into intermediate parts to help eliminate errors. a 54

Figure 3.12 b Figure 3.13 c 55

Figure 3.14 d Figure 3.15 e 56

Figure 3.16

3.5.2 Example 2
A safety system uses three inputs to a logic circuit. An alarm, X, sounds if input A represents ON and input B represents OFF; or if input B represents ON and input C represents OFF.
Produce a logic circuit and truth table to show the conditions which cause the output X to be 1.
The first thing to do is to write down the logic statement representing the scenario in this example. To do this, it is necessary to recall that ON = 1 and OFF = 0 and also that 0 is usually considered to be NOT 1.
So we get the following logic statement:

Figure 3.17
Note: this statement can also be written in Boolean algebra as:
The logic circuit is made up of three parts as shown in the logic statement. We will
57

produce the logic gate for the first part and the third part. Then join both parts together with the OR gate.

Figure 3.18
Now combining both parts with the OR gate gives us:

Figure 3.19
There are two ways to produce the truth table:
• trace through the logic circuit using the method described in Example 1 (Section
3.5.1)
• produce the truth table using the original logic statement; this second method has the advantage that it allows you to check that your logic circuit is correct.
We will use the second method in this example:
Table 3.13
58

(Note: it is optional to leave in the intermediate values or to remove them giving a four-column truth table with headings: A, B, C, X.)

Activity 3.3
Draw the logic circuits and complete the truth tables for the following logic statements and Boolean algebra statements: a X = 1 if (A = 1 OR B = 1) OR (A = 0 AND B = 1) b Y = 1 if (A = 0 AND B = 0) AND (B = 0 OR C = 1) c T = 1 if (switch K is ON or switch L is ON) OR (switch K is ON and switch M is OFF) OR (switch M is ON) d e R = 1 if (switch A is ON and switch B is ON) AND (switch B is ON or switch C is OFF)

3.5.3 Example 3
A wind turbine has a safety system which uses three inputs to a logic circuit. A certain combination of conditions results in an output, X, from the logic circuit being equal to 1. When the value of X = 1 then the wind turbine is shut down.
The following table shows which parameters are being monitored and form the three inputs to the logic circuit.
Table 3.14

59

The output, X, will have a value of 1 if any of the following combination of conditions occur:
• either turbine speed 80°C
• or turbine speed > 1000 rpm and wind velocity > 120 kph
• or bearing temperature 120 kph.
Design the logic circuit and complete the truth table to produce a value of X =1 when any of the three conditions above occur.
This is a different type of problem to those covered in Examples 1 and 2. This time a real situation is given and it is necessary to convert the information into a logic statement and then produce the logic circuit and truth table. It is advisable in problems as complex as this to produce the logic circuit and truth table separately
(based on the conditions given) and then check them against each other to see if there are any errors.

Stage 1
The first thing to do is to convert each of the three statements into logic statements.
Use the information given in the table and the three condition statements to find how the three parameters, S, T and W, are linked. We usually look for the key words
AND, OR and NOT when converting actual statements into logic.
We end up with the following three logic statements: i turbine speed 80°C logic statement: (S = NOT 1 AND T = 1) ii turbine speed > 1000 rpm and wind velocity > 120 kph logic statement: (S = 1 AND W = 1) iii bearing temperature 120 kph logic statement: (T = NOT 1 AND W = 1)

Stage 2
This now produces three intermediate logic circuits: i 60

Figure 3.20 ii Figure 3.21 iii Figure 3.22
Each of the three original statements were joined together by the word OR. Thus we need to join all of the three intermediate logic circuits by two OR gates to get the final logic circuit.
We will start by joining (i) and (ii) together using an OR gate:

Figure 3.23
61

Finally, we connect the logic circuit in Figure 3.23 to Figure 3.22 to obtain the answer: Figure 3.24
The final part is to produce the truth table. We will do this using the original logic statement. This method has the bonus of allowing an extra check to be made on the logic circuit in Figure 3.24 to see whether or not it is correct. It is possible, however, to produce the truth table straight from the logic circuit in Figure 3.24.
There were three parts to the problem, so the truth table will first evaluate each part. Then, by applying OR gates, as shown below, the final value, X, is obtained: i (S = NOT 1 AND T = 1) ii (S = 1 AND W = 1) iii (T = NOT 1 AND W = 1)
We find the outputs from parts (i) and (ii) and then OR these two outputs together to obtain a new intermediate, which we will label part (iv).
We then OR parts (iii) and (iv) together to get the value of X.
Table 3.15

62

Activity 3.4
Two scenarios are described below. In each case, produce the logic circuit and complete a truth table to represent the scenario. a A chemical process is protected by a logic circuit. There are three inputs to the logic circuit representing key parameters in the chemical process.
An alarm, X, will give an output value of 1 depending on certain conditions in the chemical process. The following table describes the process conditions being monitored:
Table 3.16

An alarm, X, will generate the value 1 if: either reaction rate < 40 mol/l/sec or concentration > 4 mol AND temperature > 115°C or reaction rate >= 40 mol/l/sec AND temperature > 115°C b A power station has a safety system controlled by a logic circuit. Three inputs to the logic circuit determine whether the output, S, is 1. When S =
1 the power station shuts down.
63

The following table describes the conditions being monitored.
Table 3.17

Output, S, will generate a value of 1, if: either gas temperature > 160°C AND water temperature 120°C AND reactor pressure > 10 bar

3.6 Logic circuits in the real world
Anybody with an electronics background who is reading this chapter will be aware that the design of logic circuits is considerably more complex than has been described. This chapter has described in detail some of the fundamental theories used in logic circuit design. This will give the reader sufficient grounding to cover all existing
(I)GCSE and O level syllabuses. However, it is worth finally discussing some of the more advanced aspects of logic circuit design.
Electronics companies need to consider the cost of components, ease of fabrication and time constraints when designing and building logic circuits. We will mention two possible ways electronics companies can review logic circuit design:
1 One method is to use ‘off-the-shelf’ logic units and build up the logic circuit as a number of ‘building blocks’.
2 Another method involves simplifying the logic circuit as far as possible; this may be necessary where room is at a premium (e.g. in building circuit boards for use in satellites to allow space exploration).

3.6.1 Using logic ‘building blocks’
One very common ‘building block’ is the NAND gate. It is possible to build up any logic gate, and therefore any logic circuit, by simply linking together a number of
64

NAND gates. For example, the AND, OR and NOT gates can be built from these gates as shown below:
The AND gate:

Figure 3.25
The OR gate:

Figure 3.26
The NOT gate:

Figure 3.27

Activity 3.5
By drawing the truth tables, show that the three circuits above can be used to represent AND, OR and NOT gates.

Activity 3.6 a Show how the following logic circuit could be built using NAND gates only. Also complete truth tables for both logic circuits to show that they produce identical outputs.
65

Figure 3.28 b Show how the XOR gate could be built from NAND gates only. c Complete a truth table for your final design to show it that it produces the same output as a single XOR gate.

Activity 3.7
Show by drawing a truth table which single logic gate has the same function as the following logic circuit made up of NAND gates only.

Figure 3.29

3.6.2 Simplification of logic circuits
The second method involves the simplification of logic circuits. By reducing the number of components, the cost of production can be less. This can also improve reliability and make it easier to trace faults if they occur.
The following example (Figure 3.30) can be simplified to a single gate. You are asked to show how this can be done in Activity 3.8.
66

Figure 3.30

Activity 3.8
Show by drawing a truth table which single logic gate has the same function as the logic circuit drawn in Figure 3.30.

Activity 3.9
Complete the truth table for the following logic circuit and then consider what simplified design could replace the whole logic circuit.

Figure 3.31

67

4 Operating systems and computer architecture In this chapter you will learn about:
• operating systems
• interrupts and buffers
• computer architecture and the von Neumann computer model
• the fetch–execute cycle.

4.1 Introduction
All modern computers have some form of operating system which users generally take for granted. The operating system makes it possible to communicate with the software and hardware that make up a typical computer system.
There are many ways of representing computer architecture, but one of the more common ones is known as the von Neumann model which will be fully described in this chapter.

4.2 Operating systems
The OPERATING SYSTEM (OS) is essentially software running in the background of a computer system. It manages many of the basic functions which are shown in Figure
4.1. Obviously not all operating systems carry out everything shown in the figure but it gives some idea of the importance and complexity of this software. Without it, most computers would be very user-unfriendly and the majority of users would find it almost impossible to work with computers on a day-to-day basis.

68

Figure 4.1
One of the most common examples of an operating system is known as Windows and is used on many personal computers. Other examples include: Linux, Android, UNIX and DOS. Windows is an example of a single-user multitasking operating system – this means only one user can use the computer at a time but can have many applications open simultaneously. How operating systems actually work is beyond the scope of this textbook.
When a computer is first powered up, the initiating programs are loaded into memory from the ROM (read only memory) chip. These programs run a checking procedure to make sure the hardware, processor, internal memory and bios (basic input–output system) are all functioning correctly. If no errors are detected, then the operating system is loaded into memory.
It is worth mentioning here that simple devices with embedded microprocessors don’t always have an operating system. Household items, such as cookers, microwave ovens and washing machines only carry out single tasks which don’t vary. The input is usually a button pressed or a touchscreen option selected which activates a simple hardware function which doesn’t need an operating system to
69

control it.

Activity 4.1
Find out how appliances fitted with microprocessors can be controlled and activated by web-enabled devices such as smart phones.

4.3 Interrupts and buffers
An INTERRUPT is a signal sent from a device or from software to the processor. This will cause the processor to temporarily stop what it is doing and service the interrupt. Interrupts can occur when, for example:
• a disk drive is ready to receive more data
• an error has occurred, such as a paper jam in a printer
• the user has pressed a key to interrupt the current process – an example could be keys pressed simultaneously
• a software error has occurred – an example of this would be if an .exe file couldn’t be found to initiate the execution of a program.
Once the interrupt signal is received, the processor either carries on with what it was doing or stops to service the device/program that generated the interrupt.
Interrupts allow computers to carry out many tasks or to have several windows open at the same time. An example would be downloading a file from the internet at the same time as listening to some music from the computer library. Whenever an interrupt is serviced, the status of the current task being run is saved. This is done using an INTERRUPT HANDLER and once the interrupt has been fully serviced, the status of the interrupted task is reinstated and it continues from the point prior to the interrupt being sent.
BUFFERS are used in computers as a temporary memory area. These are essential in modern computers since hardware devices operate at much slower speeds than the processor. If it wasn’t for buffers, processors would spend the majority of their time idle, waiting for the hardware device to complete its operation. Buffers are essentially filled from the processor or memory unit and whilst these are emptied to the hardware device, the processor carries on with other tasks. Buffers are used, for example, when streaming a video from the internet. This ensures that the video playback doesn’t keep on stopping to wait for data from the internet.
Buffers and interrupts are often used together to allow standard computer functions to be carried out. These functions are often taken for granted by users of modern computer systems. Figure 4.2 shows how buffers and interrupts are used when a document is sent to a printer.

70

Figure 4.2

Activity 4.2
Find out how buffers and interrupts are used when sending data to memories such as DVDs and solid state (e.g. pen drive).
71

Activity 4.3
Find out how buffers are used when streaming a video or music from the internet to your computer.

Activity 4.4
Investigate the many ways that hardware and software can cause an interrupt to occur. Are ALL interrupts treated equally or do some have priority over others?

4.4 Computer architecture
Very early computers were fed data whilst the machines were actually running. They weren’t able to store programs; consequently, they weren’t able to run without human intervention. In about 1945, John von Neumann developed the idea of a stored program computer, often referred to as the VON NEUMANN ARCHITECTURE concept.
His idea was to hold programs and data in a memory. Data would then move between the memory unit and the processor.
There are many diagrams which show von Neumann architecture. Figures 4.3 and
4.4 show two different ways of representing this computer model. The first diagram is a fairly simple model whereas the second diagram goes into more detail.
Figure 4.3 shows the idea of how a processor and memory unit are linked together by connections known as BUSES. This is a simple representation of von Neumann architecture. These connections are described in Table 4.1.

72

Figure 4.3
Table 4.1 describes the function of each of the three buses shown in Figure 4.3.
Buses essentially move data around the computer and also send out control signals to make sure everything is properly synchronised.
Table 4.1
Type of Description of bus bus Data/signal direction address carries signals relating to addresses (see later) unidirectional between the processor and the memory bus (signals travel in one direction only) data bus sends data between the processor, the memory unit and the input/output devices

bi-directional
(data can travel in both directions) control carries signals relating to the control and unidirectional coordination of all activities within the computer (signals travel in bus (examples include: the read and write functions) one direction only) 73

Figure 4.4 shows a slightly more detailed diagram of the von Neumann architecture.
It brings to our attention another new concept in this computer model – the idea of
ADDRESSES and REGISTERS. Addresses indicate where the data is stored and registers are needed so that data can be manipulated within the computer.

Figure 4.4
An address is the location of where data can be found in a computer memory. Each address in the memory is unique. The addresses aren’t actually shown in Figure 4.4, but they are contained in the part of the diagram labelled memory unit. The actual function of the addresses is discussed in Section 4.4.1.
You will notice a number of items shown in the diagram known as registers: MAR,
MDR, ALU, PC and CIR. These are a little more complex and their function will be fully described in the following pages. But essentially a register is simply a highspeed storage area within the computer. All data must be represented in a register before it can be processed. For example, if two numbers are to be added, both numbers must be stored in registers and the result of the addition must also be stored in a register.

Activity 4.5
Draw up a summary table that shows how buses, registers and addresses are all connected together. This can be done by doing a desk-top exercise:
• Use a sheet of A0 (flipchart size) paper and draw a large outline of the
74











FIVE main components shown in Figure 4.4.
Cut coloured arrows out of cardboard to show the buses and place on the diagram you’ve just drawn; the data and control buses will be easy to fit. However, you will need to do a little bit of thinking to decide how the address bus fits into your diagram.
Cut the five registers out of cardboard and place them on the large A0 outline. Above the memory unit, place an example of some memory addresses and their contents.
Cut out some 8-bit binary numbers representing your addresses and contents. Finally by moving data around you should be able to see how buses, addresses and registers all interconnect; you get further help in doing this desk-top exercise when you read Sections 4.4.1 to 4.4.4.
Try to find out how simple operations like addition can be carried out using your desk-top exercise.

4.4.1 Memory unit
The computer memory unit is made up of a number of partitions. Each partition consists of an ADDRESS and its CONTENTS. The example shown here uses 8 bits for each address and 8 bits for the content. In a real computer memory, the address and its contents are actually much larger than this.
The address will uniquely identify every LOCATION in the memory and the contents will be the binary.
Table 4.2
Address

Contents

1111 0000

0111 0010

1111 0001

0101 1011

1111 0010

1101 1101

1111 0011

011 1011

1111 1100

1110 1010

1111 1101

1001 0101

1111 1110

1000 0010
75

1111 1111

0101 0101

Figure 4.4 showed five examples of registers. Their function will be described later on, but for now, the abbreviations stand for:
• MAR memory address register
• MDR memory data register
• ALU arithmetic and logic unit
• PC program counter
• CIR current instruction register.
Let us now consider how the two registers (MAR and MDR) shown in the memory unit are used.
Consider the READ operation. We will use the memory section shown in Table
4.2. Suppose we want to read the contents of memory location 1111 0001; the two registers are used as follows:
• The address of location 1111 0001 to be read from is first written into the MAR
(memory address register):

Figure 4.5
• A ‘read signal’ is sent to the computer memory using the control bus.
• The contents of memory location 1111 0001 are then put into the MDR (memory data register):
(Look at Table 4.2 to confirm this.)

Figure 4.6
Now let us consider the WRITE operation. Again we will use the memory section shown in Table 4.2. Suppose this time we want to show how the value 1001 0101 was written into memory location 1111 1101.
• The data to be stored is first written into the MDR (memory data register):

Figure 4.7
76

• This data has to be written into the memory location with the address 1111 1101; so this address is now written into the MAR:

Figure 4.8
• Finally, a ‘write signal’ is sent to the computer memory using the control bus and this value will then be written into the correct memory location.
(Again confirm this by looking at Table 4.2.)

Activity 4.6
Use your model created in Activity 4.5 to show how the two operations, read and write, are carried out in the von Neumann architecture.

4.4.2 Processor
The PROCESSOR contains the ARITHMETIC AND LOGIC UNIT (ALU). The ALU allows arithmetic (e.g. add, subtract, etc.) and logic (e.g. AND, OR, NOT, etc.) operations to be carried out. How this is used is explained in Section 4.5.

4.4.3 Control unit
The CONTROL UNIT controls the operation of the memory, processor and input/output devices. It contains the CURRENT INSTRUCTION REGISTER (CIR) and the PROGRAM
COUNTER (PC). The CIR contains the current instruction during processing. The PC contains the address of the next instruction to be executed.
Essentially, the control unit reads an instruction from memory (the address of the location where the instruction can be found is stored in the Program Counter (PC)).
This instruction is then interpreted. During that process, signals are generated along the control bus to tell the other components in the computer what to do.
How this all fits together with the other components of the von Neumann model is discussed in Section 4.5.

4.4.4 Input and output devices
The input and output devices are discussed in Chapter 5 and are the main method of entering data into and getting data out of computer systems. Input devices convert external data into a form the computer can understand and can then process (e.g. keyboards, touchscreens and microphones). Output devices show the results of computer processing in a humanly understandable form (e.g. printers, monitors and loudspeakers). 77

How all of these five registers are used by a typical computer system can be found in Section 4.5 – the fetch–execute cycle. Again other textbooks and websites will all have different ways of showing how this cycle operates. The important thing is to get a good general understanding of how the cycle functions.

4.5 The fetch–execute cycle
To carry out a set of instructions, the processor first of all FETCHES some data and instructions from memory and stores them in suitable registers. Both the address bus and the data bus are used in this process. Once this is done, each instruction needs to be decoded before finally being EXECUTED. This is all known as the FETCH–EXECUTE
CYCLE and is the last part of this puzzle.

Fetch
In the fetch–execute cycle, the next instruction is fetched from the memory address currently stored in the Program Counter (PC) and is then stored in the Current
Instruction Register (CIR). The PC is then incremented (increased by 1) so that the next instruction can be processed.
This is then decoded so that each instruction can be interpreted in the next part of the cycle.

Execute
The processor passes the decoded instruction as a set of control signals to the appropriate components within the computer system. This allows each instruction to be carried out in its logical sequence.
Figure 4.9 shows how the fetch–execute cycle is carried out in the von Neumann computer model. As with most aspects of computer science, there will be slight variations on this diagram if other textbooks or websites are consulted. The main aim is to end up with a clear understanding of how this cycle works.

78

Figure 4.9
Figure 4.9 shows the actual stages that take place during the fetch–execute cycle, showing how each of the registers and buses are used in the process (the first five boxes are part of the fetch cycle and the last box is part of the execute cycle).

Activity 4.7
• It is worth trying to do a desk-top exercise to carry out a series of instructions using the fetch–execute cycle. Do some research and decide on four or five operations (add, subtract, etc.) and give the 8-bit binary codes. Then create a memory map as shown in Activity 4.5.
• Once this is done, use the five registers you created in Activity 4.5 and new 8-bit binary values to trace out exactly what happens as instructions
79

are fetched and executed in your computer model.

80

5 Input and output devices
In this chapter you will learn about:
• input devices
• applications of input devices
• output devices
• applications of output devices.

5.1 Introduction
Computer systems would be of little real use without a method of input or output.
This chapter reviews how a number of input and output devices work. It also considers a variety of applications which make use of these devices.
The input devices covered include:
• scanners
• barcode readers/scanners
• quick response (QR) code readers
• digital cameras
• keyboards
• pointing devices (such as a mouse)
• microphones
• touchscreens
• sensors
• interactive whiteboards.
The output devices covered include:
• inkjet printers
• laser printers
• 3D printers
• 2D/3D cutters
• actuators
• loudspeakers
• LCD/LED monitors
• projectors (LCD and DLP).

5.2 Input devices
5.2.1 Scanners
SCANNERS are either two-dimensional (2D) or three-dimensional (3D).
81

Two-dimensional scanners
These types of scanner are the most common form and are generally used to input hard-copy (paper) documents. The image is converted into an electronic form which can be stored in a computer.
A number of stages occur when scanning a document:

Figure 5.1
Computers equipped with OPTICAL CHARACTER RECOGNITION (OCR) software allow the scanned text from the document to be converted into a TEXT FILE FORMAT.
This means the scanned image can now be edited and manipulated by importing it into a word processor.
If the original document was a photograph or image, then the scanned image forms an image file such as JPEG (see Section 6.2.3).
82

Three-dimensional scanners
3D scanners scan solid objects and produce a three-dimensional image. Since solid objects have x, y and z coordinates, these scanners take images at several points along these three coordinates. A digital image which represents the solid object is formed. The scanned images can be used in COMPUTER AIDED DESIGN (CAD) or, more recently, sent to a 3D printer (see Section 5.3.3) to produce a working model of the scanned image.
There are numerous technologies used in 3D scanners – lasers, magnetic resonance, white light, and so on. It is beyond the scope of this book to look at these in any great depth; however, the second application that follows describes the technology behind one form of 3D scanning.

Application of 2D scanners at an airport
2D scanners are used at airports to read passports. They make use of OCR technology to produce digital images which represent the passport pages. Because of the OCR technology, these digital images can be manipulated in a number of ways.
For example, the OCR software is able to review these images, select the text part and then automatically put the text into the correct fields of an existing database. It is possible for the text to be stored in ASCII format (see Chapter 1) – it all depends on how the data is to be used.
At many airports the two-dimensional photograph in the passport is also scanned and stored as a jpeg image. The passenger’s face is also photographed using a digital camera (a 2D image is taken so it can be matched to the image taken from the passport). The two digital images are compared using face recognition/detection software. Key parts of the face are compared.

83

Figure 5.2
The face in Figure 5.2 shows several of the positions used by the face recognition software. Each position is checked when the software tries to compare two facial images. Data such as:
• distance between the eyes
• width of the nose
• shape of the cheek bones
• length of the jaw line
• shape of the eyebrows are all used to identify a given face.
When the image from the passport and the image taken by the camera are compared, these key positions on the face determine whether or not the two images represent the same face.

Application of 3D scanning – computed tomographic (CT) scanners
(CT) SCANNERS are used to create a 3D image of a solid object. This is based on TOMOGRAPHY technology which basically builds up an image of the solid object through a series of very thin ‘slices’. Together these 2D
‘slices’ make up a representation of the 3D solid object.
Each slice is built up by use of X-rays, radio frequencies or gamma imaging; although a number of other methods exist. Each ‘slice’ is then stored as a digital image in the computer memory. The whole of the solid object is represented digitally in the computer memory.
Depending on how the image is formed, the type of tomographic scanner can have different names. For example:
COMPUTED TOMOGRAPHIC

• X-rays

CT scanners computerised tomography

• radio frequencies MRI
SPECT
• gamma rays

magnetic resonance imaging single photon emission computed tomography.

Figure 5.3 shows a simple example of how tomography works.

84

Figure 5.3

5.2.2 Barcode readers/scanners
A barcode is a series of dark and light parallel lines of varying thickness. The numbers 0 to 9 are each represented by a unique series of lines. Various barcode methods for representing these digits exist. The example we shall use adopts different codes for digits appearing on the left and for digits appearing on the right (known as
UPC (Universal Product Code) version A).
The actual left-hand and right-hand sides of the barcode are separated using guard bars. The structure of these guard bars is shown in Figure 5.4. Figure 5.5 is an example of a barcode showing the left-hand side and right-hand side and the three sets of guard bars.
Each digit is represented by bars of 1 to 4 blocks thick as shown in Figure 5.6.

Figure 5.4

85

Figure 5.5

Figure 5.6
The barcode to represent the number 5 4 3 0 5 2 would therefore be as shown in
Figure 5.7.

Figure 5.7
86

Each digit is made up of two dark lines and two light lines. The width representing each digit is the same, thus the speed of scanning isn’t important. The digits on the left have an odd number of dark elements and always begin with a light bar; the digits on the right have an even number of dark elements and always begin with a dark bar.
This arrangement allows a barcode to be scanned in any direction.

Activity 5.1 a Using the data in Figure 5.6, design the barcodes for: i 9 0 0 3 4 0 (three digits on the left; three digits on the right) ii 1 2 5 7 6 6 4 8 (four digits on the left; four digits on the right) iii 0 5 8 8 9 0 2 9 1 8 (five digits on the left; five digits on the right). b Look at some barcodes on a variety of products and see how many fit the above system; for those that don’t, try to draw up a table similar to that in Figure 5.6 to show the barcode for each digit.
So what happens when a barcode is scanned?
• The barcode is first read by a red laser or red LED (LIGHT EMITTING DIODE).
• Light is reflected back off the barcode; the dark areas reflect little or no light which allows the bars to be read.
• The reflected light is read by sensors (photoelectric cells).
• As the laser or LED light is scanned across the barcode, a pattern is generated which is converted into digital data – this allows the computer to understand the barcode. • For example: the digit ‘3’ on the left generates the pattern L D D D D L D (where
L = light and D = dark); this has the binary equivalent of 0 1 1 1 1 0 1 (where L =
0 and D = 1).
Barcode readers are most commonly found at the checkout in supermarkets. There are several other input and output devices at the checkout:
Table 5.1
Input/output
device

How it is used

keypad

to key in the number of same items bought; to key in a weight; to key in the number under the barcode if it cannot be read by the barcode reader/scanner

screen/monitor to show the cost of an item and other information speaker to make a beeping sound every time a barcode is read correctly; but also to make another sound if there is an error when reading the barcode
87

printer

to print out a receipt/itemised list

magnetic stripe reader

to read the customer’s credit/debit card

touchscreen

to select items by touching an icon (such as fresh fruit which may be sold loose without packaging)

So the barcode has been read, then what happens?
• The barcode number is looked up in the stock database (the barcode is known as the KEY FIELD in the stock item record); this key field uniquely identifies each stock item.
• When the barcode number is found, the stock item record is looked up.
• The price and other stock item details are sent back to the checkout (or POINT OF
SALE TERMINAL (POS)).
• The number of stock items in the record is reduced by one each time the barcode is read. • This new value for number of stock items is written back to the stock item record.
• The number of stock items is compared to the re-order level; if it is less than or equal to this value, more stock items are automatically ordered.
• Once an order for more stock items is generated, a flag is added to the record to stop re-ordering every time the stock item barcode is read.
• When new stock items arrive, the stock levels are updated in the database.
Advantages of using barcodes to the management include:
• much easier and faster to change prices on stock items
• much better, more up-to-date sales information/sales trends
• no need to price every stock item on the shelves (this reduces time and cost to the management) • allows for automatic stock control
• possible to check customer buying habits more easily by linking barcodes to, for example, customer loyalty cards.
Advantages of using barcodes to the customers include:
• faster checkout queues (staff don’t need to remember/look up prices of items)
• errors in charging customers are reduced
• the customer is given an itemised bill
• cost savings can be passed on to the customer
• better track of ‘sell by dates’ so food should be fresher.
The barcode system is used in many other areas. For example, it can be utilised in libraries where barcodes are used in books and on the borrower’s library card.
Every time a book is taken out, the borrower is linked to the book automatically. This allows automatic checking of when the book is due to be returned, for example.
88

Activity 5.2
Find out more about how barcodes can be used in a library. Consider the types of files needed and how the system can track where books are in the library, which books are out on loan, which customer has borrowed a book and so on.

Activity 5.3
Carry out some research and find out about as many different barcode applications as you can. Try to find out why barcodes are used in each application and determine the advantage of using this type of technology.

5.2.3 Quick response (QR) codes
Another type of barcode is the QUICK RESPONSE (QR) CODE. This is made up of a matrix of filled-in dark squares on a light background.
For example, the QR code in Figure 5.8 contains the message: ‘computer science textbook – CIE syllabus’.
To make a comparison, normal barcodes (as described in Section 5.2.2) can hold up to 30 digits; QR codes can hold over 7000 digits. This obviously gives greater scope for the storage of information.

Figure 5.8
Because of modern smart phones, which allow internet access on the move, QR codes can be scanned anywhere. This allows advertising of products on trains, buses, shopping malls and many other places. By using the built-in camera facility on modern phones and downloading the appropriate application (or app), it is possible to read the QR code. The code may contain a website link or some form of advertising (e.g. special offers on pizzas).
For example, the QR code in Figure 5.9 contains a phone number and an advertisement for free pizzas if ordered today. On scanning the QR code, the phone number and advertisement will appear on the mobile phone’s screen. Advantages of
QR codes include:
89

Figure 5.9
• there is no need for the user to write down or key in a website address; scanning the QR code does this automatically
• QR codes can store website addresses/URLs that appear in magazines, trains, buses or even on business cards, giving a very effective method of advertising.

5.2.4 Digital cameras
Digital cameras have essentially replaced the more traditional camera that used film to record the photos. The film required developing and then printing before the photographer could see the result of their work. This made these cameras expensive to operate since it wasn’t possible to delete unwanted photographs.
Modern digital cameras simply link to a computer system via a USB port or by using Bluetooth (which enables wireless transfer of photographic files).

Figure 5.10 Digital camera
These cameras are controlled by a microprocessor which can automatically carry out the following tasks:
• adjust the shutter speed
• focus the image automatically
• operate the flash automatically
• adjust the aperture size
• adjust the size of the image
• remove ‘red eye’ when the flash has been used
90

and so on.
The photograph is captured when light passes through the lens onto a lightsensitive cell. This cell is made up of tiny elements known as pixels. The number of pixels determines the size of the file used to store the photograph (e.g. a 14megapixel camera will need 42 megabytes to store each raw (uncompressed) photograph). By reducing the resolution to, for example, a jpeg image, the storage requirement is reduced to 4 megabytes (see Section 6.2.3). The quality of the photograph also depends on many other factors, such as:
• the type of lens used
• the lighting and so on.
Mobile phones have caught up with digital cameras as regards number of pixels.
The drawback is usually poor lens quality and limited memory for the storage of photos. But this may all change in the next few years.

5.2.5 Keyboards
Keyboards are by far the most common method used for data entry. They are used as the input device on computers, tablets, mobile phones and many other electronic items. The keyboard is connected to the computer either by using a USB connection or by wireless connection. In the case of tablets and mobile phones, the keyboard is often
VIRTUAL or a type of TOUCHSCREEN technology.

Figure 5.11 Keyboard
As explained in Chapter 1, each character on a keyboard has an ASCII value. Each character pressed is converted into a digital signal, which the computer interprets.
Keyboards are a relatively slow method of data entry and are also prone to errors.
But they are probably still the easiest way to enter text into a computer. However, frequent use of these devices can lead to injuries, such as REPETITIVE STRAIN INJURY
91

(RSI) in the hands and wrists.
Ergonomic keyboards can help to overcome this problem – these have the keys arranged differently as shown in Figure 5.12. They are also designed to give more support to the wrists and hands when doing a lot of typing.

Figure 5.12 Ergonomic keyboard

5.2.6 Pointing devices
The selection of an application often requires the user to ‘click’ on an icon. Selection of the icon is usually done with a POINTING DEVICE (such as a MOUSE or a
TRACKERBALL) or by using a touchscreen.
The mouse is probably still the most common pointing device and comes in various forms:
• the more traditional type with a mechanical ball arrangement; connected to the computer through a USB port
• the more modern type that use red LEDs to detect movement in the x-y direction; these are a type of optical mouse
• mice that use either of the above types of technology but use a wireless connection to the computer.

Figure 5.13 Trackerball
Whatever type of mouse is used it will require an area of desk space to allow movement. They often require a mouse mat since some surfaces, such as paper, prevent the correct operation of the device. Depending on the type of computer, the mouse is fitted with one or two buttons to allow for selection and other functions.
Many designs of mouse have a scroll wheel to allow rapid movement up and down the screen.
92

Trackerballs are seen more often in an industrial environment – such as a control room. Because they don’t need to move, the trackerball doesn’t need any desk space or special surface. The operator is also less likely to suffer from injuries such as
RSI. A ball on the top of the trackerball is moved to control a cursor on the screen.
As with the mouse, buttons are used to select icons and to carry out other functions.
Most laptop computers have a built-in TOUCH PAD. This contains a tactile sensor which allows the user to control a cursor by simply moving a finger over the surface of the pad. Buttons to the left and right of the pad act in the same way as buttons on a mouse. However, by simply tapping the surface this acts as a quick method of selection on many touch pads.

5.2.7 Microphones
Microphones are used to input sound to a computer. For example:
• doing a ‘voice over’ in a presentation
• part of a speech recognition system
• part of a voice recognition system
• enabling a disabled person to communicate with a computer.
Microphones are either built into the computer or are external devices connected through the USB port or using wireless connectivity.

Figure 5.14 Microphone
93

When a microphone picks up sound, a diaphragm vibrates producing an electric signal. This signal goes to a sound card and is converted into digital values and stored in the computer.
If the microphone is being used in a VOICE RECOGNITION system, the user’s voice is detected and then converted into digital. A few words spoken produce a digital wave pattern. Software compares this wave pattern to wave patterns stored in memory to see if they match. If they match, then the person has been correctly identified. Only certain words can be used since the system is designed to recognise only a few key phrases (e.g. a user may be asked to say their name). This technology can be used in security systems.
SPEECH RECOGNITION is a different and more complex technology. This again uses a microphone to input words spoken by a user. But this time the software doesn’t try to recognise the person talking. The spoken words are recognised and shown on a screen, input into a word processor or used in other application. The basic differences to voice recognition are described below.
1 Suppose a person says the word ‘HUT’; the sound card in the computer will convert the sound wave into a digital form:

Figure 5.15
2 The software takes the digital image (shown in Figure 5.15) and breaks it up into phonemes (these are the smallest elements that make up a language); in this case ‘H
UH T’.
3 These phonemes are compared with words found in the built-in dictionary:

Figure 5.16
4 The word ‘HUT’ would then be suggested by the software in whatever application is being run.
5 This, of course, is a very simple example and the whole concept of speech
94

recognition is very complex. In trying to recognise which words are being spoken, the software has to take into account different dialects, different accents and so on.
Just to indicate how difficult this is, consider the following well-known example:
The two phrases: ‘recognise speech’ and ‘wreak a nice beach’, if spoken quickly, are almost identical. Using phonemes, they become:
‘r eh k ao g n ay z / s p iy ch’ and ‘r eh k / ay / n ay s / b iy ch’
One way round this is to ‘train’ the computer to understand a cross-section of people; but some problems are difficult to resolve. Human beings have problems with dialects and accents; so it should come as no surprise that this continues to challenge the software developers of speech recognition systems.

Activity 5.4
Describe how speech recognition could be used to: a teach language skills to people who have difficulty in learning b teach a person to say words in a foreign language.
Both voice recognition and speech recognition can be used in various other applications. For example, voice recognition is used in cars to allow the driver to say commands: ‘make warmer’, ‘switch on GPS’ or ‘open window’. Key words have to be used so that the software can compare voice patterns with the limited dictionary of words already stored. These systems are becoming increasingly sophisticated so that normal speech in the car doesn’t trigger an unwanted response by the computer. Newer systems can also be set up to only respond to commands from the driver.

Activity 5.5
Consider the pluses and minuses of using voice recognition in a car. Is it safer? For example, it may allow a driver to respond to an email while driving etc. Try to develop this argument and draw a valid conclusion from your findings.

5.2.8 Touchscreens
Touchscreens are now a very common form of input device. They allow simple touch to launch an application or to carry out many of the functions of pointing devices such as a mouse.
One of the main uses of touchscreen technology is in mobile phones. At present, there are three major types of touchscreen technologies applied to mobile phone screens: • capacitive
95

• infra-red
• resistive.
We will consider how each of these technologies work and what their main benefits and drawbacks are.

Figure 5.17

96

Figure 5.18

97

Figure 5.19

5.2.9 Sensors
SENSORS are devices which read or measure physical properties. These can include temperature, pressure, acidity and so on. Real data is ANALOGUE in nature – this means it is constantly changing and doesn’t have a discrete value. Analogue data usually requires some form of interpretation; for example, the temperature measurement on a mercury thermometer requires the user to look at the height of the mercury to work out the temperature. The temperature can therefore have an infinite number of values depending on the precision of how the height of the mercury is measured. Equally an analogue clock face requires the user to look at the hands on
98

the clock face. The area swept out by the hands allows the number of hours and minutes to be interpreted. There are many other examples.
However, computers cannot make any sense of these physical quantities and the data needs to be converted into a digital format. This is usually achieved by an
ANALOGUE TO DIGITAL CONVERTER (ADC). This device converts physical values into discrete digital values.

Figure 5.20
When the computer is used to control devices, such as a motor or a valve, it is necessary to use a DIGITAL TO ANALOGUE CONVERTER (DAC) since these devices need analogue data to operate in many cases. Frequently, an ACTUATOR is used in these control applications. Although these are technically output devices, they are mentioned here since they are an integral part of the control system. An actuator is an electromechanical device such as a relay, solenoid or motor. Note that a solenoid is an example of a digital actuator; part of the device is connected to a computer which opens and closes a circuit as required. When energised, the solenoid may operate a plunger or armature to control, for example, a fuel injection system. Other actuators, such as motors and valves, may require a DAC so that they receive an electric current rather than a simple digital signal direct from the computer.
Table 5.2 shows a number of common sensors and examples of applications that use the named sensors.
Table 5.2
Sensor

Application

temperature

• control a central heating system
• control/monitor a chemical process
• control/monitor the temperature in a greenhouse

moisture/humidity • control/monitor the moisture levels in soil in a greenhouse • control/monitor the humidity levels in the air in a greenhouse • monitor dampness levels in an industrial application
(e.g., monitor moisture in a paint spray booth in a car factory) 99

light

• switch street lighting on at night and off during the day
• monitor/control light levels in a greenhouse
• automatically switch on a car’s headlights when it gets dark infra-red/motion

• turn on the windscreen wipers on a car automatically
• detect intruders in a burglar alarm system
• count people entering/leaving a building

pressure

• detect intruders in a burglar alarm system
• weigh things (e.g. check the weight of a vehicle)
• monitor/control a process where gas pressure is important acoustic/sound

• pick up noise levels (e.g. footsteps) in a burglar alarm system • detect the noise of liquids dripping in a pipe

gas (e.g. O2 or
CO2)

• monitor pollution levels in a river or in the air
• measure O2 and CO2 levels in a greenhouse
• check for CO2 leaks in a power station

pH

• monitor/control acidity/alkalinity levels in the soil in a greenhouse • pollution/environmental monitoring in rivers

magnetic field

• any application where detection of changes in a magnetic field is required (e.g. in cell phones, CD players, etc.)
• used in anti-lock braking systems in motor vehicles

Sensors are used in both monitoring and control applications. There is a subtle difference between how these two methods work:

100

Figure 5.21
Examples of monitoring include:
• monitoring a patient in a hospital for vital signs such as heart rate, temperature, etc.
• monitoring of intruders in a burglar alarm system
• checking the temperature levels in a car engine
• monitoring pollution levels in a river.
Examples of control include:
• turning street lights on at night and turning them off again during daylight
• regulating the temperature in a central heating/air conditioning system


changing the traffic lights at a road junction

• operating anti-lock brakes on a car when necessary
• regulating the environment in a greenhouse.
101

5.2.10 Monitoring applications
Burglar alarm system

Figure 5.22
A burglar alarm monitoring system will carry out the following actions:
• The system is activated by keying in a password on a keypad.
• The infra-red sensor picks up the movement of an intruder in the building.
• The acoustic sensor picks up sounds such as footsteps or breaking glass.
• The pressure sensor picks up the weight of an intruder coming through a door or through a window.
• The sensor data is passed through an ADC if it is in an analogue form to produce digital data.
• The computer/microprocessor will sample the digital data coming from these sensors at a given frequency (e.g. every five seconds); the data is compared with the stored values by the computer/microprocessor.
• If any of the incoming data values are outside the acceptable range, then the computer sends a signal to:
• a siren to sound the alarm, or
• a light to start flashing.
• A DAC is used if the devices need analogue values to operate them.
• The alarm continues to sound/lights continue to flash until the system is reset with a password. Monitoring of patients in a hospital
• A number of sensors are attached to the patient; these measure vital signs such as: temperature, heart rate, breathing rate, etc.
• These sensors are all attached to a computer system.
• The sensors constantly send data back to the computer system.
• The computer samples the data at frequent intervals.
• The range of acceptable values for each parameter is keyed in to the computer.
• The computer compares the values from the sensors with those values keyed in.
102

• If anything is out of the acceptable range, a signal is sent by the computer to sound an alarm.
• If data from the sensors is within range, the values are shown in either graphical form on a screen and/or a digital read out.
• Monitoring continues until the sensors are disconnected from the patient.

5.2.11 Control applications
Control of street lighting

Figure 5.23

Figure 5.24
This next sequence shows how a microprocessor is used to control the operation of a street lamp. The lamp is fitted with a light sensor which constantly sends data to the microprocessor. The data value from the sensor changes according to whether it is sunny, cloudy, raining or it is night time etc.
• The light sensor sends data to the ADC interface.
• This digitises the data and sends it to the microprocessor.
• The microprocessor samples the data every minute (or at some other frequency
103









rate).
If the data from the sensor < value stored in memory:
• a signal is sent from the microprocessor to the street lamp
• and the lamp is switched on.
The lamp stays switched on for 30 minutes before the sensor readings are sampled again (this prevents the lamp flickering off and on during brief heavy cloud cover, for example).
If the data from the sensor >= value stored in memory:
• a signal is sent from the microprocessor to the street lamp
• and the lamp is switched off.
The lamp stays switched off for 30 minutes before sensor readings are sampled again (this prevents the lamp flickering off and on during heavy cloud cover, for example). Activity 5.6
Draw a flow diagram to show the steps in how a microprocessor controls the switching off and on of a street lamp. Remember to include a method to stop the lamp switching on and off every few seconds.

Anti-lock braking systems (on cars)
ANTI-LOCK BRAKING SYSTEMS (ABS) on cars use magnetic field sensors to stop the wheels locking up on the car if the brakes have been applied too sharply.
• When one of the car wheels rotates too slowly (i.e. it is locking up), a magnetic field sensor sends data to a microprocessor.
• The microprocessor checks the rotation speed of the other three wheels.
• If they are different (i.e. rotating faster), the microprocessor sends a signal to the braking system:
• and the braking pressure to the affected wheel is reduced
• the wheel’s rotational speed is then increased to match the other wheels.
• Checking the rotational speed using these magnetic field sensors is done several times a second and the braking pressure to all the wheels can be constantly changing to prevent any of the wheels locking up under heavy braking; this is felt as a ‘judder’ on the brake pedal as the braking system is constantly switched off and on to equalise the rotational speed of all four wheels.
• If one of the wheels is rotating too quickly, braking pressure is increased to that wheel until it matches the other three.

Activity 5.7
Find out more details about how the ABS system works and how it is
104

modified in modern systems such as traction control.
Investigate other uses of magnetic field sensors.

5.2.12 Interactive whiteboards
Interactive whiteboards are devices that allow computer images to be displayed on a whiteboard using a digital projector. They also allow a user to write on the whiteboard and the text or drawings produced are then stored in an electronic form for later use. Basically the information which is hand-drawn or hand-written can be stored so nothing from, for example, a meeting is lost.
Suppose a new car has been designed and its image has been projected onto the whiteboard from a computer-stored file. It is possible for this image to be annotated by adding labels, a description or even changes to the design for later use. The annotated version can then be saved in an electronic form to allow these changes to be made.

Figure 5.25
It is also possible to run software on the whiteboard and users can interact by simply using their fingers on the whiteboard surface. This allows the user to demonstrate all of the features of the software to, for example, a group of people at a meeting or even a demonstration of a new game in a shopping mall. Any application that runs on a computer can be used on an interactive whiteboard. It is even possible to surf the net, annotate a spreadsheet or demonstrate a drawing package, for example, in real time.
The whole audience can see what is happening and even become actively involved in the demonstration.

5.3 Output devices
105

5.3.1 Inkjet printers
INKJET PRINTERS are essentially made up of:
• a print head which consists of nozzles which spray droplets of ink on to the paper to form characters
• an ink cartridge or cartridges; either a group of cartridges for each colour (blue, yellow and magenta) and a black cartridge or one single cartridge containing all three colours + black (Note: some systems use six colours.)
• a stepper motor and belt which moves the print head assembly across the page from side to side
• a paper feed which automatically feeds the printer with pages as they are required.

Figure 5.26 Inkjet printer
The ink droplets are produced currently using two different technologies.
• Thermal bubble: tiny resistors create localised heat which makes the ink vaporise.
This causes the ink to form a tiny bubble; as the bubble expands, some of the ink is ejected from the print head onto the paper. When the bubble collapses, a small vacuum is created which allows fresh ink to be drawn into the print head. This continues until the printing cycle is completed.
• Piezoelectric: a crystal is located at the back of the ink reservoir for each nozzle.
The crystal is given a tiny electric charge which makes it vibrate. This vibration forces ink to be ejected onto the paper; at the same time more ink is drawn in for further printing.
When a user wishes to print a document using an inkjet printer, the following sequence of events takes place. Whatever technology is used, the basic steps in the printing process are the same.
Table 5.3
Stage Description of what happens in process
106

1

The data from the document is sent to a printer driver

2

The printer driver ensures that the data is in a format that the chosen printer can understand

3

A check is made by the printer driver to ensure that the chosen printer is available to print (e.g. is it busy, is it off line, is it out of ink, and so on)

4

The data is then sent to the printer and it is stored in a temporary memory known as a printer buffer (see Section 4.3)

5

A sheet of paper is then fed into the main body of the printer; a sensor detects whether paper is available in the paper feed tray – if it is out of paper (or the paper is jammed) then an error message is sent back to the computer

6

As the sheet of paper is fed through the printer, the print head moves from side to side across the paper printing the text or image; the four ink colours are sprayed in their exact amounts to produce the desired final colour

7

At the end of each full pass of the print head, the paper is advanced very slightly to allow the next line to be printed; this continues until the whole page has been printed

8

If there is more data in the printer buffer, then the whole process from stage 5 is repeated until the buffer is finally empty

9

Once the printer buffer is empty, the printer sends an interrupt
(see Section 4.3) to the processor in the computer; this is a request for more data to be sent to the printer; the whole process continues until the whole of the document has been printed

5.3.2 Laser printers
LASER PRINTERS differ greatly from inkjet printers in the way they print pages. They use dry powder ink rather than liquid ink and make use of the properties of static electricity to produce the text and images. Unlike inkjet printers, laser printers print the whole page in one go (inkjet printers print the page line by line).
Their advantage is the speed at which they can carry out large print jobs (e.g. 2000 leaflets) and the fact that they don’t run out of ink halfway through.

107

Figure 5.27 Laser printers
The following table describes briefly the stages that occur when a document is printed using a laser printer:
Table 5.4
Stage Description of what happens in process
1

The data from the document is sent to a printer driver

2

The printer driver ensures that the data is in a format that the chosen printer can understand

3

A check is made by the printer driver to ensure that the chosen printer is available to print (e.g. is it busy, is it off line, is it out of ink, and so on)

4

The data is then sent to the printer and it is stored in a temporary memory known as a printer buffer (refer to Section 4.3 for more details) 5

The start of the printing process involves a printing drum being given a positive charge; as this drum rotates, a laser beam is scanned across it removing the positive charge in certain areas; this leaves negatively charged areas which exactly match the text/images of the page to be printed

6

The drum is then coated with positively charged TONER
(powdered ink); since the toner is positively charged, it only sticks to the negatively charged parts of the drum

7

A negatively charged sheet of paper is then rolled over the drum
108

8

The toner on the drum now sticks to the paper to produce an exact copy of the page sent to the printer

9

To prevent the paper sticking to the drum, the electric charge on the paper is removed after one rotation of the drum

10

The paper finally goes through a fuser which is a set of heated rollers; the heat melts the ink so that it fixes permanently to the paper 11

At the very end, a discharge lamp removes all the electric charge from the drum making it ready to print the next page

Applications of inkjet and laser printers
The choice of whether to use an inkjet printer or laser printer depends on which features make it the most appropriate output device for the given application.
INKJET PRINTERS are best for one-off photos or where only a few pages of good quality, colour printing are needed; the small ink cartridges or small paper trays would not be an issue with such applications.
LASER PRINTERS produce high quality printouts and are very fast when making multiple copies of a document; any application that needs high-volume printing (in colour or monochrome) would choose the laser printer (for example, producing a large number of high quality flyers or posters for advertising) – they have two advantages: they have large toner cartridges and large paper trays (often holding more than a ream of paper).

Activity 5.8
Find out how the operation of colour laser printers differs from the operation of monochrome laser printers.

5.3.3 3D printers
3D PRINTERS are primarily used in COMPUTER-AIDED DESIGN (CAD) applications.
They can produce solid objects which actually work. The solid object is built up layer by layer (refer to Section 5.2.1 for more details) using materials such as powdered resin, powdered metal, paper or ceramic powder.
The motorcycle in Figure 5.29 was made using an industrial 3D printer. It was made from many layers (0.1 mm thick) of powdered metal using a technology known as BINDER 3D PRINTING.

109

Figure 5.28 3D printer










The following describes some of the features of 3D printing:
Various types of 3D printers exist; they range from the size of a microwave oven up to the size of a small car.
3D printers use ADDITIVE manufacturing (i.e. the object is built up layer by layer); this is in sharp contrast to the more traditional method of SUBTRACTIVE manufacturing (i.e. removal of material to make the object). For example, making a statue using a 3D printer would involve building it up layer by layer using powdered stone until the final object was formed. The subtractive method would involve carving the statue out of solid stone (i.e. removing the stone not required) until the final item was produced. Similarly, CNC machining removes metal to form an object; 3D printing would produce the same item by building up the object from layers of powdered metal.
Direct 3D printing uses inkjet technology; a print head can move left to right as in a normal printer. However, the print head can also move up and down to build up the layers of an object.
Binder 3D printing is similar to direct 3D printing. However, this method uses two passes for each of the layers; the first pass sprays dry powder and then on the second pass a binder (a type of glue) is sprayed to form a solid layer.
Newer technologies are using lasers and UV light to harden liquid polymers; this further increases the diversity of products which can be made.

110

Figure 5.29 Motorcycle

How to create a solid object using a 3D printer
There are a number of steps in the process of producing an object using these 3D printers. The steps are summarised in Figure 5.30.

Figure 5.30

Uses of 3D printing
111

3D printing is regarded as being possibly the next ‘industrial revolution’ since it will change the manufacturing methods in many industries. The following list is just a glimpse into what we know can be made using these printers; in the years to come, this list will probably fill an entire book:
• prosthetic limbs made to exactly fit the recipient
• items to allow precision reconstructive surgery (e.g. facial reconstruction following an accident); the parts made by this technique are more precise in their design since they are made from exact scanning of the skull
• in aerospace, manufacturers are looking at making wings and other parts using 3D technology; the bonus will be lightweight precision parts
• in fashion and art – 3D printing allows new creative ideas to be developed
• making parts for items no longer in production, e.g. suspension parts for a vintage car. These are just a few of the exciting applications which make use of this new technology. Activity 5.9
Do a search on the internet to find new and innovative 3D printer applications. Have a class discussion on how these printers could herald the start of a new ‘industrial revolution’.

5.3.4 2D and 3D cutters
A three-dimensional (3D) laser cutter works in a similar way to a two-dimensional
(2D) cutter. The main difference is that the 3D cutter can recognise an object in the xy-z direction rather than just x-y.
3D laser cutters can cut the following materials:
• glass
• crystal
• metal
• polymer
• wood.
Very complex designs can be cut since the cutters are controlled by computers and very sophisticated software.
A 3D cutter can cut beyond the surface of the material and produce very intricate designs. It is interesting to contrast this method of shaping objects with 3D printers, although it is true to say that not all the materials which can undergo 3D cutting can be used in 3D printing methods.
112

5.3.5 Actuators
These are covered in detail in Section 5.2.9. ACTUATORS are used in many control applications involving sensors and devices such as ADC and DAC.

5.3.6 Loudspeakers/headphones
Sound is produced from a computer by passing the digital data through a DIGITAL TO
ANALOGUE CONVERTER (DAC) and then through an AMPLIFIER; finally the sound emerges from a (loud)SPEAKER.
The sound is produced by voltage differences vibrating a cone in the speaker housing at different frequencies and amplitudes:

Figure 5.31
The rate at which the DAC can translate the digital output into analogue voltages is known as the SAMPLING RATE. If the DAC is a 16-bit device, then it can accept numbers between +32 767 (216 – 1) and –32 768 (216); the digital value containing all zeros is ignored. The speed at which these values can be converted is the sampling rate.
Most textbooks indicate that the standard sampling rate is 44 100 samples per second. This basically means that the the DAC can convert 44 100 values in the range
+32 767 to –32 768 every second.
Suppose a CD is being produced to contain a number of music tracks. Each piece of music is sampled 44 100 times a second. Each sample is 16 bits. Since the music is in stereo this also needs to be taken into consideration.
The above information means that 44 100 × 2 × 16 = 1 411 200 bits per second sampling (the number ‘2’ is used in the calculation to account for the sound being in stereo). Since 1 byte = 8 bits, this equates to 1 411 200/8 bytes per second.
This works out at 176 400 bytes per second.

Activity 5.10 a Calculate how much memory is needed to store a four-minute music track using the number of bytes needed per second from above.
Convert your answer into megabytes (using the data from Chapter 1).
113

b If the CD has a capacity of 800 megabytes, how many four-minute songs could be stored on the CD?

5.3.7 LCD and LED monitors
The days of the old cathode-ray monitors are almost gone. Most monitors and television sets these days are made using LIQUID CRYSTAL DISPLAY/DIODE (LCD) technology. This means that the front layer of the monitor is made up liquid crystal diodes; these tiny diodes are grouped together in threes or fours which are known as pixels
(picture elements). The three colours which are grouped together use red, green and blue diodes. Those systems that use groups of four include a yellow diode – this is said to make the colours more vivid.
Modern LCD monitors are back lit using LIGHT EMITTING DIODE (LED) technology. This gives the image better contrast and brightness. Before the use of
LEDs, LCD monitors used a cold cathode fluorescent lamp (CCFL) as the backlighting method.
Essentially, CCFL uses two fluorescent tubes behind the LCD screen which supplies the light source. When LEDs are used, a matrix of tiny LEDs is used behind the LCD screen. Because LCD doesn’t emit any light, some form of back-lit technology needs to be used.
LEDs have become increasingly more popular because of a number of advantages over older CCFL technology:
• LEDs reach their maximum brightness almost immediately (there is no need to
‘warm up’ before reaching full efficiency)
• LEDs give a whiter light which sharpens the image and make the colours appear more vivid; CCFL had a slightly yellowish tint
• LEDs produce a brighter light which improves the colour definition
• monitors using LED technology are much thinner than monitors using CCFL technology • LEDs last almost indefinitely; this makes the technology more reliable and means a more consistent product
• LEDs consume very little power which means they produce less heat as well as using less energy.
Future LED technology is making use of ORGANIC LIGHT EMITTING DIODES
(OLEDS). These use organic materials (made up of carbon compounds) to create semi-conductors which are very flexible. Organic films are sandwiched between two charged electrodes (one is a metallic CATHODE and the other a glass ANODE). When an electric field is applied to the electrodes they give off light. This means that no form of backlighting is required. This allows for very thin screens.
It also means that there is no longer a need to use LCD technology, since OLED is a self-contained system.
114

As can be seen in Figure 5.32, OLEDs allow the screen to be curved. This ensures a good picture from any angle.

Figure 5.32
But the important aspect of the technology is how thin this makes the screen. It is now possible, using OLED technology, to bend screens to any shape. If this is adopted by mobile phone manufacturers, it will be possible to develop phones which can wrap around your wrist – much like a watch strap.
Imagine screens so thin that they can be folded up and placed in your pocket until they are needed. Or how about using folding OLED displays attached to fabrics creating ‘smart’ clothing (this could be used on outdoor survival clothing where an integrated circuit, mobile phone, GPS receiver and OLED display could all be sewn into the clothing)?
Advantages of using OLED compared with existing LEDs and LCDs include:
• the plastic, organic layers of an OLED are thinner, lighter and more flexible than the crystal structures used in LEDs or LCDs
• the light-emitting layers of an OLED are lighter; OLED layers can be made from plastic rather than the glass used in LED and LCD screens
• OLEDs give a brighter light than LEDs
• OLEDs do not require backlighting like LCD screens – OLEDs generate their own light • since OLEDs require no backlighting, they use much less power than LCD screens
(most of the LCD power is used to do the backlighting); this is very important in battery-operated devices such as mobile phones
• since OLEDs are essentially plastics, they can be made into large, thin sheets (this
115

means they could be used on large advertising boards in airports, subways, and so on) • OLEDs have a very large field of view, about 170 degrees, which makes them ideal for use in television sets and for advertising screens.

Activity 5.11
Carry out some research into OLED technology (there are numerous internet sites to help you) and answer the following questions: a Why are inkjet printers helping to keep down the cost of OLED screens? b How are different colours generated using OLED technology? c How is the brightness of the display controlled? d OLEDs refresh 1000 times faster than LCDs; why would this be an advantage? Where could it be used to great effect?
LCD/LED screens are used on many hand-held devices with touchscreens, such as mobile phones, tablets and game consoles. The technology behind such screens was discussed at great length in Section 5.2.8.
Modern LCD screens are very thin and very lightweight and are very responsive to touch. Obviously, the new technologies described above will change the way we use these hand-held devices in the very near future.

5.3.8 Light projectors
There are two common types of light projector:
• digital light projectors (DLP)
• LCD projectors.
Projectors are used to project computer output onto larger screens or even onto interactive whiteboards. They are often used in presentations and in multimedia applications. The following two sections describe the basic differences behind these projector technologies. Digital Light Projectors (DLP)
The use of millions of micro mirrors on a small DIGITAL LIGHT PROJECTOR (DLP) chip is key to how these devices work.
The number of micro mirrors and the way they are arranged on the DLP chip determines the resolution of the digital image. When the micro mirrors tilt towards the light source, they are ON. When the micro mirrors tilt away from the light source, they are OFF. This creates a light or dark pixel on the projection screen. The micro mirrors can switch on or off several thousand times a second creating various grey shades – typically 1024 grey shades can be produced (for example, if the mirror
116

switches on more often than it switches off, it will produce a lighter shade of grey).
This is known as the grey scale image.
A bright white light source (e.g. from a xenon bulb) passes through a colour filter on its way to the DLP chip. The white light is split into the primary colours: red, green and blue – the DLP projector can create over 16 million different colours. The
ON and OFF states of each micro mirror are linked with colours from the filter to produce the coloured image.
The whole concept is a little like reverse black and white photography. With DLP technology, the grey scales are interpreted as colours rather than grey representing colours as used in photography.

LCD projectors
These are older technology than DLP. Essentially a high-intensity beam of light passes through an LCD display and then onto a screen. How this works in principle is described below.
• A powerful beam of white light is generated from a bulb or LED inside the projector body.
• This beam of light is then sent to a group of chromatic-coated mirrors; these reflect the light back at different wavelengths.
• When the white light hits these mirrors, the reflected light has wavelengths corresponding to red, green and blue light components.
• These three different coloured light components pass through three LCD screens; these screens show the image to be projected as millions of pixels in a grey scale.
• When the coloured light passes through the LCD screens, a red, green and blue version of the grey image emerges.
• These images are then combined using a special prism to produce a full colour image – this final image consists of millions of colours (each shade of grey in the original image produces a different shade in each of the colour images).
• Finally the image passes through the projector lens onto a screen.

117

6 Memory and data storage
In this chapter you will learn about:
• file formats such as MIDI, MP3 and jpeg
• file compression techniques
• primary, secondary and off-line storage
• magnetic, optical and solid-state media.

6.1 Introduction
There are many file formats used to store data, be this text, images or sound, in computer systems. This chapter will consider how file compression is used to save memory when storing different types of files.
All computer systems have primary memory and secondary memory storage. The main technologies used are magnetic, optical and solid state. Storage devices which use each of these technologies will be described later in this chapter, together with a number of applications.

6.2 File formats
A number of different file formats are used in computer systems. We will look at the following ones:
• Musical Instrument Digital Interface (MIDI)
• MP3
• MP4
• jpeg
• text and number format.

6.2.1 Musical Instrument Digital Interface (MIDI)
MUSICAL INSTRUMENT DIGITAL INTERFACE (MIDI) is always associated with the storage of music files. However, MIDI files are not music and don’t contain any sounds; they are very different to, for example, MP3 files. MIDI is essentially a communications protocol that allows electronic musical instruments to interact with each other. The MIDI protocol uses 8-bit serial transmission with one start bit and one stop bit, and is therefore asynchronous (see Section 2.2.3).
A MIDI file consists of a list of commands that instruct a device (for example, an electronic organ, sound card in a computer or in a mobile phone) how to produce a particular sound or musical note. Each MIDI command has a specific sequence of bytes. The first byte is the status byte – this informs the MIDI device what function to perform. Encoded in the status byte is the MIDI channel. MIDI operates on 16
118

different channels, which are numbered 0 to 15.
Examples of MIDI commands include:
• note on/off: this indicates that a key (on an electronic keyboard) has been pressed/released to produce/stop producing a musical note
• key pressure: this indicates how hard the key has been pressed (this could indicate loudness of the music note or whether any vibrato has been used, and so on).
Two additional bytes are required, a PITCH BYTE, which tells the MIDI device which note to play, and a VELOCITY BYTE, which tells the device how loud to play the note.
When music or sound is recorded on a computer system, these MIDI messages are saved in a file which is recognised by the file extension .mid.
If this .mid file is played back through a musical instrument, such as an electronic keyboard, the music will be played back in an identical way to the original. The whole piece of music will have been stored as a series of commands but no actual musical notes. This makes it a very versatile file structure, since the same file could be fed back through a different electronic instrument, such as an electric guitar, with different effects to the original. However, to play back through an instrument such as a guitar would need the use of SEQUENCER SOFTWARE, since the MIDI files wouldn’t be recognised in their ‘raw’ form.
Both the electronic instruments and the computer need a MIDI interface to allow them to ‘talk’ to each other. It was mentioned earlier that the MIDI operates on 16 channels. In fact the computer can send data out on all 16 MIDI channels at the same time. For example, 16 MIDI devices, each set up for a different MIDI channel, could be connected to the computer. Each device could be playing a separate line in a song from the sequencer software, effectively creating an electronic orchestra. This implementation is being used more and more today in the recording studio, by major orchestras and in musical scores used in films.
Because MIDI files don’t contain any audio tracks, their size, compared with an
MP3 file, is considerably smaller. For example, a 10 megabyte MP3 file only requires about 10 kilobyte file size when using the MIDI format. This makes them ideal for devices where memory is an issue; for example, storing ring tones on a mobile phone.

6.2.2 MPEG-3 (MP3) and MPEG-4 (MP4)
MPEG-3 (MP3) uses technology known as AUDIO COMPRESSION to convert music and other sounds into an MP3 file format. Essentially, this compression technology will reduce the size of a normal music file by about 90 per cent. For example, an 80 megabyte music CD can be reduced to 8 megabytes using MP3 technology.
MP3 files are used in MP3 players, computers or mobile phones. Files can be downloaded from the internet, or CDs can be converted to MP3 format. The CD files are converted using FILE COMPRESSION software. Whilst the music quality can never match the ‘full’ version found on a CD, the quality is satisfactory for most general
119

purposes.
But how can the original music file be reduced by 90 per cent whilst still retaining most of the music quality? This is done using file compression algorithms which use
PERCEPTUAL MUSIC SHAPING; this essentially removes sounds that the human ear can’t hear properly. For example, if two sounds are played at the same time, only the louder one can be heard by the ear, so the softer sound is eliminated. This means that certain parts of the music can be removed without affecting the quality too much.
MP3 files use what is known as a LOSSY FORMAT (see Section 6.3.2) since part of the original file is lost following the compression algorithm. This means that the original file can’t be put back together again. However, even the quality of MP3 files can be different since it depends on the BIT RATE – this is the number of bits per second used when creating the file. Bit rates are roughly between 80 and 320 kilobits per second; usually 200 or higher gives a sound quality close to a normal CD.
MPEG-4 (MP4) files are slightly different to MP3 files. This format allows the storage of multimedia files rather than just sound. Music, videos, photos and animation can all be stored in the MP4 format. Videos, for example, could be streamed over the internet using the MP4 format without losing any real discernable quality. Activity 6.1
A CD is being used to store music. Each minute’s worth of recording takes up 12 megabytes. a The CD contains nine tracks which are the following length (in minutes): 3,
5, 6, 4, 5, 2, 7, 8, 8. How much memory would these nine tracks occupy on the CD? b If the CD was downloaded to a computer and then all the tracks were put through an MP3 compression algorithm, how much memory would the nine tracks now occupy (you may assume a 90 per cent file reduction size)? c Find the average size of each of the MP3 tracks, and then estimate how many MP3 files could be stored on an 800 megabyte CD.

6.2.3 Joint Photographic Experts Group (jpeg) files Look at the following five photographs of the same car wheel:

120

Figure 6.1
The resolution of the photographs is reduced from A to E. Photographs A and B are very sharp whilst photograph D is very fuzzy and E is almost unrecognisable. This is the result of changing the number of PIXELS per centimetre used to store the image
(that is, reducing the PICTURE RESOLUTION).
When a photographic file undergoes file compression, the size of the file is reduced. The trade-off for this reduced file size is reduced quality of the image. One of the file formats used to reduce photographic file sizes is known as JPEG. This is another example of lossy file compression. As with MP3 format, once the image is subjected to the jpeg compression algorithm, a new file is formed and the original file can no longer be constructed. Jpeg will reduce the RAW BITMAP image by a factor of between 5 and 15 depending on the quality of the original.
An image that is 2048 pixels wide and 1536 pixels high is equal to 2048 × 1536 pixels; in other words, 3 145 728 pixels. This is often referred to as a 3-megapixel image (although it is obviously slightly larger). A raw bitmap can often be referred to as a TIFF or BMP image (file extension .TIF or .BMP). The file size of this image is determined by the number of pixels. In the previous example, a 3-megapixel image would be 3 megapixels × 3 colours. In other words, 9 megabytes (each pixel occupies 3 bytes because it is made up of the three main colours: red, green and blue). TIFF and BMP are the highest image quality because, unlike jpeg, they are not in a compressed format.
The same image stored in jpeg format would probably occupy between 0.6 megabytes and 1.8 megabytes.
Jpeg relies on certain properties of the human eye and, up to a point, a certain amount of file compression can take place without any real loss of quality. The human eye is limited in its ability to detect very slight differences in brightness and in colour hues. For example, some computer imaging software boasts that it can produce over 40 million different colours – the human eye is only able to differentiate about 10 million colours.

Activity 6.2 a An image is 1200 pixels by 1600 pixels. Calculate: i the total number of pixels in the original image ii the number of bytes occupied by this file
121

iii the file size of the jpeg image (in kilobytes) if the original image was reduced by a factor of 8. b A second image is 3072 pixels by 2304 pixels. Calculate: i the total number of pixels in the original image ii the number of bytes occupied by this file iii the file size of the jpeg image (in megabytes) if the original image was reduced by a factor of 5. iv How many uncompressed files of the size calculated in part (ii) could be stored on a 4-gigabyte memory card? v How many compressed files of the size calculated in part (iii) could be stored on the same 4-gigabyte memory card?

Activity 6.3
The very sharp image A in Figure 6.1 was blown up to about six times its size: Figure 6.2
Find out why this initially sharp image now appears fuzzy at this
122

magnification.
How can this problem be overcome?

6.2.4 Text and number file formats
Text and numbers can be stored in a number of formats. Text is usually stored in an
ASCII format (see Section 1.6.4).
When using spreadsheets or databases, for example, numbers can be stored in a number of different formats:
• real, e.g. 2.71678
• integer, e.g. 3
• date, e.g. 12/08/2016
• time, e.g. 19:45:50
• currency, e.g. R$ 15.50
It is important that the correct format is chosen if some form of processing is to be done. If number files undergo any form of file compression, then it tends to be lossless. Since it very important that none of the information/data is lost (see Section
6.3).
If ASCII format is used to store text on a file, then the table in Figure 1.7 is used to store each of the characters. For example, the word COMPUTER would be stored as either: 67 79 77 80 85 84 69 82 or %43 %4F %4D %50 %55 %54 %45 %52
(the first code is in denary and the second in hexadecimal).
Text files can also undergo file compression. These use complex algorithms that work on redundancy or repeated sections of words (e.g. OU in yOUr, cOUntry or mOUntain). The following section shows, in very simple terms, how this could work:
The phrase ‘THIS SECTION SHOWS YOU HOW THIS WOULD WORK’ consists of 35 memory units (ignoring spaces). Repeated words, such as ‘THIS’ could be put into a data dictionary and be replaced by ‘1’. Repeated word sections, such as ‘HOW’ and ‘OU’ could be replaced by the numbers ‘2’ and ‘3’. Our phrase then becomes ‘1 SECTION S2S Y3 2 1 W3LD WORK’.
Again, ignoring spaces, this compressed form now uses only 23 memory units.
This is about a 33% saving in file size. Obviously if whole pages are to be stored, then repeated words and word sections become even more numerous. Compression algorithms take many things into account when creating these compressed files – but this is outside the scope of this textbook.
This is clearly an example of lossless compression since the original phrase can be reformed if necessary using the data dictionary and compressed file.

6.3 Lossless and lossy file compression
123

6.3.1 Lossless file compression
With LOSSLESS FILE COMPRESSION, all the data bits from the original file are reconstructed when the file is again uncompressed. This is particularly important for files where loss of any data would be disastrous – for example, a spreadsheet file.

6.3.2 Lossy file compression
LOSSY FILE COMPRESSION is very different to lossless file compression. With this technique, the file compression algorithm eliminates unnecessary bits of data as seen in MP3 and jpeg formats.
It is impossible to get the original file back once it is compressed. This is why it is chosen for files where removing certain bits doesn’t detract from the quality.

6.4 Memory and storage
Memory and storage devices can be split up into three distinct groups:
• primary memory
• secondary storage
• off-line storage.
Figure 6.3 shows how these all link together:

Figure 6.3
We will now consider each of the three parts in the diagram.

6.4.1 Primary memory
124

Random Access Memory (RAM)
The features of RANDOM ACCESS MEMORY (RAM) are:
• it is volatile/temporary memory (the contents of the memory are lost when the power to the RAM is turned off)
• it is used to store:
• data,
• files, or
• part of the operating system that are currently in use
• it can be written to or read from and the contents of the memory can be changed.
In general, the larger the size of RAM the faster the computer will operate. In reality, the RAM never runs out of memory; it continues to operate but just gets slower and slower. As the RAM becomes full, the processor has to continually access the hard disk drive to overwrite old data on RAM with new data. By increasing the RAM size, the number of times this access operation is carried out is reduced, making the computer run faster.
RAM is much faster to write to or read from than other types of memory; but its main drawback is its volatility.

Figure 6.4 RAM
Buffers were introduced in Chapter 4 (see Section 4.3). These often use RAM since they need to be a fast memory and the data only needs to be held temporarily.
As outlined earlier, buffers allow the processor to do other tasks while slower peripheral devices send data to and receive data from the computer.
There are currently two types of RAM technology:
• dynamic ram (DRAM)
• static RAM (SRAM).

Dynamic RAM (DRAM)
Each DYNAMIC RAM (DRAM) chip consists of a number of transistors and capacitors. Each of these parts is tiny since a single RAM chip will contain millions of transistors and capacitors. The function of each part is:
• capacitor – this holds the bits of information (0 or 1)
• transistor – this acts like a switch; it allows the chip control circuitry to read the capacitor or change the capacitor’s value.

125

Figure 6.5 DRAM
This type of RAM needs to be constantly REFRESHED (that is, the capacitor needs to be recharged every 15 microseconds otherwise it would lose its value). If it wasn’t refreshed, the capacitor’s charge would leak away very quickly, leaving every capacitor with the value 0.
DRAMs have a number of advantages over SRAMs:
• they are much less expensive to manufacture than SRAM
• they consume less power than SRAM
• they have a higher storage capacity than SRAM.

Static RAM (SRAM)
A big difference between SRAM and DRAM is that this type of memory doesn’t need to be constantly refreshed.
It makes use of ‘flip flops’ which hold each bit of memory.
SRAM is much faster than DRAM when it comes to data access (typically, access time for SRAM is 25 nanoseconds and for DRAM is 60 nanoseconds).
DRAM is the most common type of RAM used in computers, but where absolute speed is essential, then SRAM is the preferred technology. For example, the processor’s MEMORY CACHE is the high speed portion of the memory; it is effective because most programs access the same data or instructions many times. By keeping as much of this information as possible in SRAM, the computer avoids having to access the slower DRAM.

126

Figure 6.6 SRAM

Read Only Memory (ROM)
The main features of READ ONLY MEMORY (ROM) can be summarised as follows:
• they are non-volatile/permanent memories (the contents of the memory remain even when the power to the ROM is turned off)
• they are often used to store the start-up instructions when the computer is first switched on (for example, ROM might store the basic input/output system (BIOS))
• the data or contents of a ROM chip can only be read; they cannot be changed.

Application
We will now consider an application, other than a computer, where both RAM and
ROM chips are used.
A remote-controlled toy car has a circuitry which contains both RAM and ROM chips. The remote control is a hand-held device.
We will consider the function of each type of memory independently:
• ROM
• stores the factory settings such as remote control frequencies
• stores the ‘start-up’ routines when the toy car is first switched on
• stores the set routines; for example, how the buttons on the hand-held device control turning left, acceleration, stopping, and so on.
• RAM
• the user may wish to program in their own routines; these new instructions would be stored in the RAM chip
• the RAM chip will store the data/instructions received from the remote control
127

unit.

Activity 6.4
Describe how ROM and RAM chips could be used in the following devices: a a microwave oven b a refrigerator c a remote-controlled model aeroplane; the movement of the aeroplane is controlled by a hand-held device.

6.4.2 Secondary storage
Hard Disk Drives (HDD)
HARD DISK DRIVES (HDD) are probably still the most common method used to store data on a computer.
Data is stored in a digital format on the magnetic surfaces of the disks (or platters, as they are frequently called). The hard disk drive will have a number of platters which can spin at about 7000 times a second. A number of read–write heads can access all of the surfaces in the disk drive. Normally each platter will have two surfaces which can be used to store the data. These read–write heads can move very quickly – typically they can move from the centre of the disk to the edge of the disk
(and back again) 50 times a second.

Figure 6.7
Data is stored on the surface in sectors and tracks (see Figure 6.8 on next page). A sector on a given track will contain a fixed number of bytes.
Unfortunately, hard disk drives have very slow data access when compared to, for example, RAM. Many applications require the read–write heads to constantly seek
128

for the correct blocks of data; this means a large number of head movements. The effects of LATENCY then become very significant. Latency is defined as the time it takes for a specific block of data on a data track to rotate around to the read–write head. Users will sometimes notice the effect of latency when they see messages such as
‘please wait’ or, at its worst, ‘not responding’.

Solid-state Drives (SSD)
Latency is an issue in HDDs as described earlier. SOLID-STATE DRIVES (SSD) remove this issue considerably. They have no moving parts and all data is retrieved at the same rate. They don’t rely on magnetic properties; the most common type of solid-state storage devices store data by controlling the movement of electrons within
NAND chips. The data is stored as 0s and 1s in millions of tiny transistors within the chip. This effectively produces a non-volatile rewritable memory.

Figure 6.8
However, a number of solid-state storage devices sometimes use
ELECTRONICALLY ERASABLE PROGRAMMABLE READ-ONLY MEMORY (EEPROM) technology. The main difference is the use of NOR chips rather than NAND. This makes them faster in operation but devices using EEPROM are considerably more expensive than those that use NAND technology. EEPROM also allows data to be read or erased in single bytes at a time. Use of NAND only allows blocks of data to be read or erased. This makes EEPROM technology more useful in certain applications where data needs to be accessed or erased in byte-sized chunks.
129

Because of the cost implications, the majority of solid-state storage devices use
NAND technology. The two types are usually distinguished by the terms FLASH (use
NAND) and EEPROM (use NOR).
So what are the main benefits of using SSD rather than HDD? The main benefits of
SSDs are summarised below:
• they are more reliable (no moving parts to go wrong)
• they are considerably lighter (which makes them suitable for laptops)
• they don’t have to ‘get up to speed’ before they work properly
• they have a lower power consumption
• they run much cooler than HDDs (these last two points again make them very suitable for laptop computers)
• because they have no moving parts, they are very thin
• data access is considerably faster than HDD.
The main drawback of SSD is the questionable longevity of the technology. Most solid state storage devices are conservatively rated at only 20 GB write operations per day over a three-year period – this is known as SSD endurance. For this reason,
SSD technology is not used in servers, for example, where a huge number of write operations take place every day. However, this issue is being addressed by a number of manufacturers to improve the durability of these solid-state systems.

6.4.3 Off-line storage
Off-line storage includes:
• CD/DVD/DVD-RAM (optical storage systems)
• Blu-ray disks (optical storage systems)
• USB flash memory/memory sticks/SD-XD cards (solid state storage systems)
• removable/external hard disk drives (magnetic storage systems).

CD/DVD disks and DVDS are described as OPTICAL STORAGE DEVICES. Laser light is used to read data and to write data in the surface of the disk.
Both CDs and DVDs use a thin layer of metal alloy or light-sensitive organic dye to store the data. As can be seen in Figure 6.9, both systems use a single, spiral track which runs from the centre of the disk to the edge.
The data is stored in ‘pits’ and ‘bumps’ on the spiral track. A red laser is used to read and write the data. CDs and DVDs can be designated R (write once only) or
RW (can be written to or read from many times).
CDS

130

Figure 6.9
DVD technology is slightly different to that used in CDs. One of the main differences is the use of DUAL-LAYERING which considerably increases the storage capacity. Basically, this means that there are two individual recording layers. Two layers of a standard DVD are joined together with a transparent (polycarbonate) spacer, and a very thin reflector is also sandwiched between the two layers. Reading and writing of the second layer is done by a red laser focusing at a fraction of a millimetre difference compared to the first layer.

Figure 6.10
Standard, single layer DVDs still have a larger storage capacity than CDs because the ‘pit’ size and track width are both smaller. This means that more data can be stored on the DVD surface. DVDs use lasers with a wavelength of 650 nanometres;
CDs use lasers with a wavelength of 780 nanometres. The shorter the wavelength of the laser light, the greater the storage capacity of the medium.

DVD-RAM
DVD-RAM uses a very different technology to CDs and DVDs. They have the following features:
• Instead of a single, spiral track, they use a number of concentric tracks (see Figure
6.11).
• Use of concentric tracks allows simultaneous read and write operations to take place. 131

• They allow numerous read and write operations (up to 100 000 times) and have great longevity (over 30 years) which makes them ideal for archiving.

Figure 6.11

Blu-ray disks
BLU-RAY DISKS are another example of optical storage media. However, they are fundamentally different to DVDs in their construction and in the way they carry out read–write operations.

Figure 6.12







The main differences are: a blue laser, rather than a red laser, is used to carry out read and write operations; the wavelength of blue light is only 405 nanometres (compared to 650 nm for red light) using blue laser light means that the ‘pits’ and ‘bumps’ can be much smaller; consequently, Blu-ray can store up to five times more data than normal DVD
Blu-ray uses a single 1.1 mm thick polycarbonate disk; normal DVDs use a sandwich of two 0.6 mm thick disks using two sandwiched layers can cause BIREFRINGENCE (light is refracted into two separate beams causing reading errors); because Blu-ray uses only one layer, the disks don’t suffer from birefringence
132

• Blu-ray disks automatically come with a secure encryption system which helps to prevent piracy and copyright infringement.
Table 6.1 summarises the main differences between CDs, DVDs and Blu-ray.
Table 6.1

(Note: nm = 10−9 metres and µm = 10−6 metres.)
All these optical storage media are used as back-up systems (for photos, music and multimedia files). This also means that CDs and DVDs can be used to transfer files between computers. Manufacturers often supply their software using CDs and DVDs.
When the software is supplied in this way, the disk is usually in a read-only format.
The most common use of DVD and Blu-ray is the supply of movies or games. The memory capacity of CDs isn’t big enough to store most movies.

The future of optical media
In recent times both the CD and DVD are showing signs of becoming obsolete. Many computer systems now come with USB connectors only and no DVD or CD drive.
The main method of transferring files between devices has become the flash memory.
Many people now store all their music in the following ways:
• on hard disk drive systems (set up as sound systems as shown in Figure 6.13)
• in MP3 format on:
• a computer/tablet
• their mobile phone
• a portable music player (such as iPod®)
• using the ‘cloud’ to store all their files so they can access their music from anywhere in the world
• by ‘streaming’ their music from the internet; provided the user has an internet connection, they can access music through a laptop computer, mobile phone, tablet or any other receiving device.

133

Figure 6.13
It is also a similar story for movies where streaming is becoming increasingly more common. Many television sets are now set up as ‘smart’ TVs – this means it is now possible to stream movies or television programmes ON DEMAND without the need for any DVD or Blu-ray players. In effect, the television set has become the central computer with a link to the internet using wireless connection.
Floppy disks met the same fate in the early twenty-first century. How often do you see floppy disks nowadays? It is very likely that CDs and DVDs will meet the same fate and will be replaced by one of the systems described above or something entirely new.

Activity 6.5
Do some research, using this book and the internet, to find out all the different ways to store music files and movie files.
Draw a table and show all the benefits and drawbacks of each of the methods you have identified.
Storage method

Benefits

Drawbacks

USB flash memories
MEMORY STICKS/FLASH MEMORIES (also known as pen drives) use solid-state technology (see Figure 6.14).
They usually connect to a computer through the USB port (see Section 2.2.4).
Their main advantage is that they are very small, lightweight devices which make them suitable as a method for transferring files between computers. They can also be used as small back-up devices for music or photo files, for example.
Complex or expensive software, such as an Expert System, often uses memory
134

sticks as a DONGLE. The dongle contains additional files which are needed to run the software. Without this dongle, the software won’t work properly. It therefore prevents illegal or unauthorised use of the software, and also prevents copying of the software since, without the dongle, it is useless.

Figure 6.14
Digital cameras (see Section 5.2.4) use a slightly different form of solid-state memory, known as XD (eXtreme Digital) or SD (Secure Digital) cards. The technology is essentially the same as memory sticks. These memory cards allow photos to be transferred from camera to computer via the USB port. Many printers and computers also have card slots allowing the device to read the memory card directly. Each memory card is made up of NAND chips (see Section 6.4.2) and, as with all solid-state memories, there are no moving parts.
All solid-state memories need to be treated with some care. If they are removed from a device before being made safe (for example, while still in the middle of a read–write operation), data on the memory card or stick can be corrupted. In extreme cases, the memory card or stick become totally unusable. It is essential to wait for the message: ‘it is now safe to remove your device’ if plugged into a computer. With mobile phones or digital cameras, it is usually advisable to switch them off before removal of the card.

Removable hard disk drives
REMOVABLE HARD DISK DRIVES are essentially HDD but can be connected to the computer using one of the USB ports. In this way, they can be used as a back-up device or as another way of transferring files between computers.

6.5 How to estimate the size of a file
Estimating the size of a text file is relatively straightforward. In Chapter 1 we introduced the idea of ASCII code. Each character from the keyboard has a value of 1 byte. 135

Suppose we typed in the following message:
This is text from the computer science text book and then saved it under the filename ‘sample_text_for_book’. If we then looked at the properties of the file just saved, we would see:

Figure 6.15
If we count the number of characters in the text typed in, we get the number 48. This exactly matches the file size shown in the screenshot in Figure 6.15 – so each character equals 1 byte. We can therefore use this to estimate the size of a text file.
Obviously there are other codes stored with the file which make its real size slightly different, but we aren’t concerned about that in this section of the book.
Earlier on in the chapter we looked at file sizes for photos and for sound. This is obviously a little more complex, but we saw that one pixel, for example, occupies 3 bytes of memory.
Suppose we imported the photograph shown in Figure 6.16 into a document.

136

Figure 6.16
Looking at the properties of the photograph, we find this:

Figure 6.17
The photograph was 424 by 256 pixels which confirms the file size of 325 632 bytes
(318 kilobytes).

Activity 6.6
137

a Using Notepad, type in the following message:
This text should have a file size of over 100 bytes. We can check this by saving the file and then looking at the file properties.
Save your file and then look at its properties and find out the file size of the text you typed in. Was it the value you expected? b Import a photo into a word processor and check the original file size against the file size of the document. Then import about 3K of text and recheck the file size of the new document.
Was the file size as you predicted?

Activity 6.7
Estimate the size of a file for each of the following: a Text file containing 256 characters. b Word processor document containing 1000 characters and a small image which is 256 × 256 pixels in size (assume an extra 14KB for other document features). c A database is to contain a person’s name and their address. i Decide the maximum number of characters you would need to input a name and an address. ii Estimate the maximum size of file needed to store the name and address. d A security system contains a password (16 characters long), a username
(20 characters long), a small photo (256 × 640 pixels in size) and a security question (up to 72 characters long). Estimate the file size needed to store all this data.

138

7 High- and low-level languages
In this chapter you will learn about:
• programming languages
• high-level languages
• low-level languages
• translators
• compilers
• interpreters
• assemblers.

7.1 Introduction
People use many different languages to communicate with each other. In order for two people to understand each other they need to speak the same language or another person, an interpreter, is needed to translate from one language to the other language.
Programmers use many different programming languages to communicate with computers. Computers only ‘understand’ their own machine code. A program needs to be translated into machine code before it can be ‘understood’ by a computer.

7.2 Programming languages
7.2.1 What is a program?
Programs are our way of telling a computer what to do, how to do it and when to do it. This enables a single computer to perform many different types of task. A computer can be used to stream videos, write reports, provide weather forecasts and many, many other jobs.
An example of a simple task that can be performed by a computer is the provision of a multiplication tables test. Figure 7.1 shows a simple program to set this up and
Figure 7.2 shows an example of the test in use.

139

Figure 7.1 Program written in Scratch

Figure 7.2 Program in use

Activity 7.1
Find at least ten different tasks that computer programs perform in your school. 140

A COMPUTER PROGRAM is a list of instructions that enable a computer to perform a specific task. Computer programs can be written in high-level languages or low-level languages, depending on the task to be performed and the computer to be used. Most programmers write programs in high-level languages.

7.2.2 High-level languages
High-level languages enable a programmer to focus on the problem to be solved and require no knowledge of the hardware and instruction set of the computer that will use the program. Many high-level programming languages are portable and can be used on different types of computer.
High-level languages are designed with programmers in mind; programming statements are easier to understand than those written in a low-level language. This means that programs written in a high-level language are easier to:
• read and understand as the language used is closer to human language
• write in a shorter time
• debug at the development stage
• maintain once in use.
The following snippet of program to add two numbers together is a single program statement written in a typical high-level language. It shows how easy it is to understand what is happening in a high-level language program:
Sum := FirstNumber + SecondNumber

There are many different high-level programming languages in use today including
C++, Delphi, Java, Pascal, Python, Visual Basic and many more. Once a programmer has learnt the techniques of programming in any high-level language, these can be transferred to working in other high-level languages.

Activity 7.2
High-level programming languages are said to be problem oriented. What type of problems are the languages named above used for? Find out about five more high-level languages. Name each programming language and find out what it is used for.

7.2.3 Low-level languages
Low-level languages relate to the specific architecture and hardware of a particular type of computer. Low-level languages can refer to machine code, the binary instructions that a computer understands, or an assembly language that needs to be translated into machine code.
141

Assembly languages
Few programmers write programs in an assembly language. Those programmers who do, do so for the following reasons:
• to make use of special hardware
• to make use of special machine-dependent instructions
• to write code that doesn’t take up much space in primary memory
• to write code that performs a task very quickly.
The following snippet of program to add two numbers together is written in a typical assembly language and consists of three statements:
LDA
ADD
STO

First
Second
Sum

In order to understand this program the programmer needs to know that
• LDA means load the value of the variable into the accumulator
• ADD means add the value of another variable to the value stored in the accumulator • STO means replace the value of the variable by the value stored in the accumulator. Activity 7.3
Find out about two assembly languages. Name each assembly language and find out what type of computer it is used for.

Machine code
Programmers do not usually write in machine code as it is difficult to understand and it can be complicated to manage data manipulation and storage.
The following snippet of program to add two numbers together is written in typical machine code, shown in both hexadecimal and binary, and consists of three statements: 142

Figure 7.3
As you can see, this is not easy to understand in binary! Machine code is usually shown in hexadecimal (see Section 1.5).

Activity 7.4
Find out about two different types of machine code. Name each chip set the machine code is used for and find the codes for load, add and store.

7.3 Translators
Computer programs can exist in several forms.
Programs are written by humans in a form that people who are trained as computer programmers can understand. In order to be used by a computer, programs need to be translated into the binary instructions, or machine code, that the computer understands. Humans find it very difficult to read binary (hexadecimal is easier to understand) and computers can only perform operations written in binary.

Figure 7.4 Translation
A program must be translated into binary before a computer can use it; this is done by
143

a utility program called a translator. There are several types of translator program in use; each one performs a different task.

Compilers
A COMPILER is a computer program that translates a program written in a high-level language (HLL) into machine code so that it can be directly used by a computer to perform a required task. Once a program is compiled the machine code can be used again and again to perform the same task without recompilation.
The high-level program statement
Sum := FirstNumber + SecondNumber

becomes the following machine code instructions when translated
0001
0100
0000

00010010
00010011
00011010

Interpreters
An INTERPRETER is a computer program that reads a statement from a program written in a high-level language, performs the action specified and then does the same with the next statement and so on.

Assemblers
An ASSEMBLER is a computer program that translates a program written in an assembly language into machine code so that it can be directly used by a computer to perform a required task. Once a program is assembled the machine code can be used again and again to perform the same task without re-assembly.
The assembly language program statements
LDA
ADD
STO

First
Second
Sum

become the following machine code instructions when translated
0001
0100
0000

00010010
00010011
00011010
144

Table 7.1 Summary of translation programs
Compiler

Interpreter

Translates a high-level Executes a high-level language program into language program a machine code. statement at a time.

Assembler
Translates a low-level language program into machine code.

An executable file of machine code is produced. No executable file of
An executable file of machine code is produced. machine code is produced. One high-level language statement can be translated into several machine code instructions. One high-level language program statement may require several machine code instructions to be executed. Compiled programs are used without the compiler. Interpreted programs
Assembled programs cannot be used without the can be used without interpreter. the assembler.

One low-level language statement is usually translated into one machine code instruction. A compiled program is An interpreter is often used An assembled usually distributed for when a program is being program is usually general use. developed. distributed for general use. 7.4 What happens when things go wrong?
As programs are written by humans, they may contain errors. There are several different types of error. A SYNTAX ERROR is where a program statement doesn’t obey the rules of the programming language. A program cannot be translated if it contains syntax errors. A LOGIC ERROR is where the program doesn’t do what the programmer wanted it to do. Logic errors are found when a program is being run.

7.4.1 Syntax errors
When a program is being compiled, if any syntax errors are found no translated program is produced. Instead, a list of all the errors in the whole program is produced. The programmer corrects these errors and recompiles the program.
When a program is being interpreted, the interpreter performs the actions specified by each statement until a syntax error is found. The programmer is then alerted to the place in the program where the error was found. The error is corrected by the programmer and the interpretation continues until the next error is found or the task is completed. 145

7.4.2 Logic errors
When a program is being run, if it doesn’t do what it should do there is a logic error.
These can be found by tracing what the program does and using test data with expected results – see Chapter 9.

7.4.3 Using an Integrated/Interactive Development
Environment (IDE)
Most high-level programming languages offer the use of an IDE for program development. This contains an editor with an interpreter and/or compiler together with debugging tools, which can improve the speed of program development.

Figure 7.5 Python IDE

Activity 7.5
Have a look at the development environment you are using for programming
– is it an IDE? What facilities are offered to help with program development? 146

End-of-chapter questions
1 Use the words below to complete the following sentences. assembler compiler interpreter
To translate a program written in a high-level language, you can use a ________ or an ________. To translate a program written in a low-level language you must use an ________.
2
Table 7.2
Program A

Program B

BEGIN
VAR First, Second: INTEGER
READ First, Second
First:= First + Second
WRITE First
END

INP
STA FIRST
INP
STA SECOND
LDA FIRST
ADD SECOND
STA FIRST
OUT
FIRST DAT
SECOND DAT

a Which program is easier to understand? b Why is it easier to understand? c Which program is written in a high-level language?
3 Give three advantages of writing a program in a high-level language rather than using a low-level language.
4 Give three advantages of writing a program in a low-level language rather than using a high-level language.
5 Explain what a compiler does and what an interpreter does. In your explanation include a description of the differences between them.
6 Choose which type of translator you would use to develop a program written in a high-level programming language. Give three reasons to support your choice.
7 Look at these two pieces of code:

147

a Which of these pieces of code is written in a high-level language?
[1]
b Give one benefit of writing code in a high-level language.
[1]
c Give one benefit of writing code in a low-level language.
[1]
d High-level languages can be compiled or interpreted.
Give two differences between a compiler and an interpreter.
[2]
Cambridge IGCSE Computer Studies 7010/0420 Paper 12 Q13 June 2012

148

8 Security and ethics
In this chapter you will learn about:
• keeping data safe from accidental or malicious damage
• keeping data safe from unauthorised users
• use of passwords, firewalls, proxy servers, SSL, TLS and encryption
• risks posed by phishing and pharming
• security safeguards when carrying out online transactions
• computer ethics.

8.1 Introduction
Keeping data safe is extremely important for a number of reasons. It may be personal data that you want to keep within your family or your close friends, or commercial data, such as passwords and bank account details, which need to be kept safe to protect your money.
Data can be corrupted or deleted either through accidental damage or through a malicious act. There are many ways to keep data safe and some of the methods available will be covered in this chapter.
There is also a short section on computer ethics since this is becoming an increasingly important topic for discussion.

8.2 Security and data integrity
Whether a user is working on an off-line computer or on a computer connected to the internet, keeping data safe is very important.
Data is threatened by malicious software, hackers or accidental damage. This section covers a number of different security risks and considers ways to overcome or minimise them.
Each security risk, together with its description, possible effects and risk mitigation will be set out as follows:

149

Figure 8.1

8.2.1 Hacking

Figure 8.2
Note the difference between CRACKING and HACKING.
Hacking is breaking into a computer system to steal personal data without the owner’s consent or knowledge (e.g. to steal a password file).
Cracking is where someone edits a program source code (i.e. looks for a ‘back door’ in the software so that the code can be exploited or changed for a specific purpose). This is usually done for a malicious purpose (e.g. legitimate software could be altered by a cracker to perform a different task e.g. send a user to a specific website). 150

Essentially, hacking isn’t necessarily harmful whilst cracking is ALWAYS totally illegal and is potentially very damaging.

8.2.2 Viruses

Figure 8.3

8.2.3 Phishing

151

Figure 8.4

8.2.4 Pharming

Figure 8.5

8.2.5 Wardriving

152

Figure 8.6

8.2.6 Spyware/key-logging software

153

Figure 8.7

8.3 Cookies
A COOKIE is a packet of information sent by a web server to a web browser.
Cookies are generated each time the user visits the website. A message is frequently displayed saying ‘cookies are required to access this site’ (or some equivalent message). Every time a user visits the website, cookies will have collected some key information about the user. They are able to carry out user tracking and also maintain user preferences (for example, when a user buys a CD on a music website, the cookies will have remembered the user’s previous buying habits and a message like this often follows: ‘Customers who bought items in your Recent History also bought:
YYYY’).
Cookies aren’t programs but are simply pieces of data. They can’t actually perform any operations. They only allow the detection of web pages viewed by a user on a particular website and store user preferences, as described above.
The information gathered by cookies forms an ANONYMOUS USER PROFILE and doesn’t contain personal information (such as credit card numbers or passwords).
Because of the information they do collect, however, they are subject to privacy and security concerns.
154

8.4 Loss of data and data corruption
Section 8.2 considered a number of security issues which could lead to loss of data or the corruption of data.
This section covers the potential impact on data caused by:
• accidental mal-operation
• hardware malfunction
• software malfunction on a computer system. In each case:
• safeguards
• recovery methods to prevent the loss or corruption of data are considered.

Figure 8.8

8.5 Firewalls and proxy servers
A FIREWALL can be either software or hardware. It sits between the user’s computer and an external network (e.g. the internet) and filters information in and out of the
155

computer.

Figure 8.9
Tasks carried out by a firewall include:
• examining the ‘traffic’ between the user’s computer (or internal network) and a public network (e.g. the internet)
• checking whether incoming or outgoing data meets a given set of criteria
• if the data fails the criteria, the firewall will block the ‘traffic’ and give the user
(or network manager) a warning that there may be a security issue
• logging all incoming and outgoing ‘traffic’ to allow later interrogation by the user
(or network manager)
• criteria can be set to prevent access to certain undesirable sites; the firewall can keep a list of all undesirable IP addresses
• helping to prevent viruses or hackers entering the user’s computer (or internal network) • warning the user if some software on their system is trying to access an external data source (e.g. automatic software upgrade); the user is given the option of allowing it to go ahead or requesting that such access is denied.
The firewall can be a hardware interface which is located somewhere between the computer (or internal network external link) and the internet connection. It is often referred to in this case as a GATEWAY. Alternatively, the firewall can be software installed on a computer; in some cases, this is part of the operating system.
However, there are certain circumstances where the firewall can’t prevent potential harmful ‘traffic’:
• it cannot prevent individuals, on internal networks, using their own modems to bypass the firewall
• employee misconduct or carelessness cannot be controlled by firewalls (for example, control of passwords or use of accounts)
• users on stand-alone computers can chose to disable the firewall, leaving their computer open to harmful ‘traffic’ from the internet.
All of these issues require management control or personal control (on a single computer) to ensure that the firewall is allowed to do its job effectively.
PROXY SERVERS act as an intermediary between the user and a web server:

156

Figure 8.10
Functions of proxy servers include:
• allowing the internet ‘traffic’ to be filtered; they can block access to a website if necessary (similar type or reaction as a firewall)
• by using the feature known as a CACHE, they can speed up access to information from a website; when the website is first visited, the home page is stored on the proxy server; when the user next visits the website, it now goes through the proxy server cache instead, giving much faster access
• keeping the user’s IP address secret – this clearly improves security
• acting as a firewall.

8.6 Security protocols
We will now consider two forms of security protocols when using the internet:
• Secure Sockets Layer (SSL)
• Transport Layer Security (TLS).
SECURE SOCKETS LAYER (SSL) is a type of protocol (a set of rules used by computers to communicate with each other across a network). This allows data to be sent and received securely over the internet.
When a user logs onto a website, SSL encrypts the data – only the user’s computer and the web server are able to make sense of what is being transmitted. A user will in the know if SSL is being applied when they see https or the small padlock status bar at the top of the screen. So what happens when a user wants to access a secure website and receive and send data to it?

157

Figure 8.11
TRANSPORT LAYER SECURITY (TLS) is similar to SSL but is a more recent security system. TLS is a form of protocol that ensures the security and privacy of data between devices and users when communicating over the internet. It is essentially designed to provide encryption, authentication and data integrity in a more effective way than its predecessor SSL.
When a website and client (user) communicate over the internet, TLS is designed to prevent a third party hacking into this communication causing problems with data security. TLS is formed of two layers:
• record protocol: this part of the communication can be used with or without encryption (it contains the data being transferred over the internet).
• handshake protocol: this permits the website and the client (user) to authenticate each other and to make use of encryption algorithms (a secure session between client and website is established).
Only the most recent web browsers support both SSL and TLS which is why the older SSL is still used in many cases. But what are the main differences between SSL and TLS since they both effectively do the same thing?
• It is possible to extend TLS by adding new authentication methods.
• TLS can make use of SESSION CACHING which improves the overall performance
158

compared to SSL (see Section 8.6.1).
• TLS separates the handshaking process from the record protocol (layer) which holds all the data.

8.6.1 Session caching
When opening a TLS session, it requires a lot of computer time (due mainly to the complex encryption keys being used – see Section 8.7). The use of session caching can avoid the need to utilise so much computer time for each connection. TLS can either establish a new session or attempt to resume an existing session; using the latter can considerably boost system performance.

8.7 Encryption
Encryption is used primarily to protect data in case it has been hacked. Whilst encryption won’t prevent hacking, it makes the data meaningless unless the recipient has the necessary decryption tools described below.
There are two types of encryption:
• symmetric
• asymmetric or public key.

8.7.1 Symmetric encryption
SYMMETRIC ENCRYPTION is a secret key which can be a combination of characters.
If this key is applied to a message, its content is changed which makes it unreadable unless the recipient also has the decryption key.
One key is needed to encrypt a message and another key is needed to decrypt a message. It is obviously important that the sender and receiver have the same encryption and decryption key. There is clearly a security risk here, since the sender has to supply the key to the recipient. This key could be intercepted by, for example, a hacker which puts the security of the encrypted message at risk. This situation is referred to as the KEY DISTRIBUTION PROBLEM .
So the question is, how can both sender and receiver have the required key without sending it electronically in some way? The following routine shows how this is done.
Follow it through, and you will see that both sender and recipient end up with a key which is effectively secret, but didn’t involve sending the actual key electronically.
Table 8.1
Stage Sender

Recipient

1

The recipient uses the same algorithm and also chooses a

The sender uses an encryption algorithm (see Section 8.7.3) and

159

chooses a value

value

e.g. X = 2 (this is kept secret)

e.g. Y = 4 (this is also kept secret) This value of X is put into a simple algorithm: The value of Y is put into the same algorithm:

7X (MOD 11)

7Y (MOD 11)

(MOD gives the remainder when dividing a number by 11)

(MOD gives the remainder when dividing a number by 11)

This gives:

This gives:

72 (MOD 11) = 49 (MOD 11)

74 (MOD 11) = 2401 (MOD 11)

which gives the value:

which gives the value:

5 (i.e. 4 remainder 5)

3 (i.e. 218 remainder 3)

3

The sender now sends the value just calculated (i.e. 5) to the recipient The recipient now sends the value just calculated (i.e. 3) to the sender

4

This new value is put into the same This new value is put into the algorithm – the new value replaces same algorithm – the new value
‘7’:
replaces ‘7’:

2

3X (MOD 11)

5Y (MOD 11)

This gives:

This gives:

32 (MOD 11) = 9 (MOD 11)

54 (MOD 11) = 625 (MOD 11)

which gives the value:

which gives the value:

9 (i.e. 0 remainder 9)

9 (i.e. 56 remainder 9)

Thus both sender and recipient end up with the same encryption and decryption key of 9. This gives us the basis of how an encryption key can be generated.

Activity 8.1
Use the following sender and receiver values to check that the system described in Table 8.1 works: a sender uses the value x = 3 and receiver uses the value y = 5 b sender uses the value x = 7 and receiver uses the value y = 6
Table 8.1 refers to an ENCRYPTION ALGORITHM . As we will see in Section 8.7.3, messages are put through an encryption algorithm to produce a message in encrypted
160

form. This algorithm uses an encryption key to produce a message which appears meaningless unless the same key is applied to ‘unlock’ the original message. The key is referred to as an encryption key or a decryption key depending whether it is used to encrypt the message or to decrypt the message.
The next section discusses the types of encryption keys.

8.7.2 Asymmetric encryption
The risks surrounding symmetric encryption keys have already been discussed. A more secure method is to use ASYMMETRIC or PUBLIC KEY encryption. A PRIVATE
KEY and a public key are both needed:
• public key is made available to everybody
• private key is only known by the computer user.
Both types of key are needed to encrypt and decrypt messages. Imagine a user on computer A wants to send a private message to a user on computer B; how is asymmetric encryption used?

Figure 8.12
The encryption keys are often generated by using a HASHING ALGORITHM . This is actually very different to an encryption algorithm. The hashing algorithm takes a message or a key and translates it into a string of characters usually shown in hex
161

notation (the length of the string depends on the algorithm being used). This essentially makes the message or key almost impossible to read if it is somehow intercepted by, for example, a hacker. The same hashing algorithm has to be applied at both ends (sender and receiver) for the message or key to be understood.
In summary, the encryption algorithm converts messages using an encryption key into ‘meaningless’ text; the same key has to be used to decrypt the message. These keys can, however, be intercepted which makes the encryption process less secure.
To overcome this problem, a hashing algorithm is applied to the message or key, producing a string of characters which are virtually impossible to ‘break’ if intercepted. This considerably increases the security of the whole process when sending personal or sensitive data across, for example, the internet. The use of hashing and encryption is further discussed in Section 8.7.4.
An example of a well-known hashing algorithm is MD4 which generates a 128-bit string whenever a value is run through it. For example, the following 16-digit code:
1234 5678 9012 3456 would produce the following value when put through the MD4 hashing algorithm:
543FC7DDEA0CF5EAF84279CBADCA180D
(Note: this contains 32 hexadecimal digits (i.e. 128 bits) – see Section 1.5.)
Strings which are 128 bits long give 3 × 1038 possible combinations which makes them very secure. Some newer systems use 256-bit strings which have 1 × 1077 possible combinations. Older systems employ strings which are only 56 bits in length, which gives them only 7 × 1016 possibilities – this has become relatively easy to break since modern computers are so fast at number crunching!
But it is clear that the larger the key size, the more secure the encryption will be.

Activity 8.2
Using the internet, carry out a search for MD4 and MD5 hashing algorithm generators (e.g. http://www.online-convert.com/).
Then try various numbers, letters and messages to see how the 128-bit code varies. Even just changing a few letters in a message can have a dramatic effect on the 128-bit value. For example:
‘This is an example’: 1F312F813B628926E44A0C899161F4A8
‘This is another example’: 2EAEB50E8870FD5418366CE235107F21
Try out a number of examples for yourself.

8.7.3 Plain text and cypher text
PLAIN TEXT (sometimes written as a single word ‘plaintext’) is described as the text or normal representation of data before it goes through an encryption algorithm.
CYPHER TEXT (sometimes written as ‘cyphertext’ or ‘ciphertext’) is the output from an encryption algorithm:
162

Figure 8.13

8.7.4 Authentication
AUTHENTICATION is used to verify that data comes from a trusted source. It works with encryption to strengthen internet security.
Examples include:

163

Figure 8.14

8.7.5 Denial of service attacks
A denial of service attack (DoS) is an attempt at preventing users from accessing part of a network, notably an internet server. This is usually temporary but may be a very damaging act or a big breach of security. It doesn’t just affect networks; an individual can also be a target for such an attack.
The attacker may be able to prevent a user from:
• accessing their emails
• accessing websites/web pages
• accessing online services (such as banking).
One method of attack is to flood the network with useless traffic. How does this cause the problem?
When a user types in or clicks on a URL of a website (using their web browser), a request is sent to the internet server which contains the website or web page.
Obviously, the server can only handle a finite number of requests. So if it becomes overloaded by an attacker sending out thousands of requests, it won’t be able to service the user’s legitimate request. This is effectively a denial of service.
This can happen to a user’s email account, for example, by an attacker sending out many spam messages to their email account. Internet Service Providers (ISPs) only allow a specific data quota for each user. Consequently, if the attacker sends out very large or many hundreds of emails to the user’s account, it will quickly get clogged up and the user won’t be able to receive legitimate emails.
An individual user or a website can guard against these attacks to some degree by:
• using an up-to-date malware/virus checker
164

• setting up a firewall to restrict traffic to and from the internet server or user’s computer • applying email filters to manage or filter out unwanted traffic or spam emails.
Signs that a user can look out for to see if they are a victim of one of these attacks include: • slow network performance (opening files or accessing certain websites)
• unavailability or inability to access particular websites
• large amounts of spam mail reaching the user’s email account.

8.8 Applications
Online banking and shopping are all at risk from many of the security issues described earlier on.
We will now consider some of the ways banks protect their customers from online fraud. The following notes are in addition to safeguards such as encryption, SSL, virus scanners and many of the other ways described in the earlier part of this chapter and refer to additional features you might see as part of a bank’s security system.
When a customer logs on to a banking website and carries out a transaction, encryption is used to protect the customer’s personal details. However, banks carry out a number of other procedures to give additional protection. Not all of the methods described would be used by one bank. However, the notes give some idea of the type of safeguards that might be encountered when a customer logs on to a bank’s website.
1 Many banks use a 10- or 12-digit code unique to the customer:

Figure 8.15
2 You may then be asked to input three random numbers from a four-digit PIN and/or three characters from a 10-character password (this will vary from bank to bank, of course):

165

Figure 8.16
3 Some systems use a hand-held device into which the customer inserts their card.
They will be asked to enter their PIN. The device will then generate an eight-digit code which the customer types into the web page of the bank.
This eight-digit code is generated from an internal clock and PIN. The bank’s server and the time are both synchronised with the hand-held device; the server also stores the PIN. The bank’s server will therefore know if the eight-digit code entered is correct. Each eight-digit code is only valid for a few minutes before it has to be redone.
This system defeats hackers and spyware since the code will change every time the customer logs on to the bank’s website.

Figure 8.17
166

4 Some banking systems ask the customer to key in parts of their password using drop-down boxes. This is an attempt to defeat spyware/key-logging software. Each of the requested characters from the password are entered by selecting a character from a drop-down menu using a mouse, thus eliminating the use of a keyboard.

Figure 8.18
5 Once all these stages have been passed, some systems then ask for personal data, such as:
• ‘You last logged into the system on 15th September 2015. Is that correct?’
• ‘Your mobile phone number is: 9777 111 2222. Is that correct?’
• ‘What is your mother’s maiden name?’
6 Assuming the customer successfully negotiates all of the security ‘hurdles’, they will be sent to a home page on the website. Once you are there, it is important to only use the bank’s navigation tools rather than the ones at the top of the screen.
Otherwise you will be logged out of the system, and you will need to go through all the earlier steps again.

8.9 Computer ethics
COMPUTER ETHICS is a set of principles set out to regulate the use of computers.
Three factors are considered:
• INTELLECTUAL PROPERTY RIGHTS – this covers, for example, copying of software without the permission of the owner
• PRIVACY ISSUES – this covers, for example, hacking or any illegal access to another person’s personal data
• effect of computers on society – this covers factors such as job losses, social impacts and so on.
Use of the internet has led to an increase in plagiarism – this is when a person takes another person’s idea/work and claims it as their own. Whilst it is perfectly fine to quote another person’s idea, it is essential that some acknowledgement is made so that the originator of the idea is known to others. This can be done by a series of references at the end of a document or footnotes on each page where a reference needs to be made. Software exists that can scan text and then look for examples of plagiarism by searching web pages on the internet.
167

The ACM (Association for Computer Machinery) and IEEE (Institute of Electrical and Electronics Engineers) have published the following code of ethics:
1. to accept responsibility in making decisions consistent with the safety, health and welfare of the public, and to disclose promptly the factors that might endanger the public or the environment;
2. to avoid real or perceived conflicts of interest whenever possible, and to disclose them to affected parties when they do exist;
3. to be honest and realistic in stating claims or estimates based on available data;
4. to reject bribery in all its forms;
5. to improve the understanding of technology; its appropriate application, and potential consequences;
6. to maintain and improve our technical competence and to undertake technological tasks for others only if qualified by training or experience, or after full disclosure of pertinent limitations;
7. to seek, accept, and offer honest criticism of technical work, to acknowledge and correct errors, and to credit properly the contributions of others;
8. to treat fairly all persons and to not engage in acts of discrimination based on race, religion, gender, disability, age, national origin, sexual orientation, gender identity, or gender expression;
9. to avoid injuring others, their property, reputation, or employment by false or malicious action;
10. to assist colleagues and co-workers in their professional development and to support them in following this code of ethics.
Reproduced with kind permission of the IEEEE

8.10 Free software, freeware and shareware
Apart from the usual commercial software (such as spreadsheets and word processors) which are all sold in shops for a profit, there is a group of software which causes much confusion among many users. This group consists of:
• free software
• freeware
• shareware.
The final part of this chapter will explain the fundamental differences between these types of software.

8.10.1 Free software
168

Users have the freedom to run, copy, change or adapt free software. Examples include: F-spot (photograph manager), Scribus (DTP) and Abiword (word processor). The originators of this type of software stress this is based on liberty and not price. This means that a user is guaranteed the freedom to study and modify the software source code in any way to suit their requirements.
Essentially a user is allowed to do the following:
• run the software for any legal purpose they wish
• study the source code and modify it as necessary to meet their needs
• pass the software (in either original or modified form) on to friends, family or colleagues. A user of the software doesn’t need to seek permission to do any of the above actions since it isn’t protected by any copyright restrictions. However, it is important to realise that there are certain rules that need to be obeyed. The user
• cannot add source code from another piece of software unless this is also described as free software
• cannot produce software which copies existing software subject to copyright laws
• cannot adapt the software in such a way that it infringes copyright laws protecting other software
• may not use the source code to produce software which is deemed offensive by third parties.

8.10.2 Freeware
FREEWARE is software a user can download from the internet free of charge. Once it has been downloaded, there are no fees associated with using the software (examples include: Adobe, Skype or media players).
Unlike free software, freeware is subject to copyright laws and users are often requested to tick a box to say they understand and agree to the terms and conditions governing the software. This basically means that a user is not allowed to study or modify the source code in any way.

8.10.3 Shareware
In this case, users are allowed to try out some software free of charge for a trial period. At the end of the trial period, the author of the software will request that you pay a fee if you like it. Once the fee is paid, a user is registered with the originator of the software and free updates and help are then provided. Very often, the trial version of the software is missing some of the features found in the full version, and these don’t become available until the fee is paid.
Obviously, this type of software is fully protected by copyright laws and a user must make sure they don’t use the source code in any of their own software.
169

Permission needs to be obtained before this software is copied and given to friends, family or colleagues.

Activity 8.3
A software company offers a suite of shareware programs (containing a spreadsheet, word processor, database and drawing package).
What are the benefits to:
• the company
• the customer of offering software packages as shareware?
(Note: ethical issues are raised as electronic communication continues to grow.
Earlier in this chapter, issues such as hacking, viruses and other malware were considered. All of these put users at risk when using the internet or indeed any electronic device which transmits and receives data over a live link (e.g. mobile phones, tablets and other devices).
Many users are aware that computers can undergo hacking or virus attack (and any of the other security issues outlined earlier) but don’t seem to be aware that devices such as mobile phones are also vulnerable to attack by hackers and other people intent on causing harm to users of electronic devices.)

170

Section 2 Practical problem-solving and programming Chapters
9 Problem-solving and design
10 Pseudocode and flowcharts
11 Programming concepts
12 Data structures: arrays and using pre-release material
13 Databases

171

172

9 Problem-solving and design
In this chapter you will learn about:
• computer systems and sub-systems
• top-down design
• structure diagrams
• flowcharts
• pseudocode
• library routines
• sub-routines
• algorithms
• standard methods of solution
• test data
• validation and verification
• using trace tables
• identifying and correcting errors
• producing algorithms
• the effectiveness of a solution.

9.1 Introduction
In order to build a computer system that performs a specific task or solves a given problem, the task or problem has to be clearly defined, showing what is going to be computed and how it is going to be computed. This chapter introduces the tools and techniques that are used to design a software solution that together with the associated computer hardware will form a computer system.

9.1.1 What is a computer system?
A COMPUTER SYSTEM is made up of software, data, hardware, communications and people; each computer system can be divided up into a set of sub-systems. Each subsystem can be further divided into sub-systems and so on until each sub-system just performs a single action.
Computer systems can be very large or very small or any size in between; most people interact with many different computer systems during their daily life without realising it. For example, when I wake up in the morning I use an app on my smart phone for my alarm, I then check the weather forecast on my computer before I drive to work. The alarm program is a very small computer system; when I check the weather forecast I obtain information from one of the largest computer systems in the world. 173

Activity 9.1
Identify at least five computer systems you frequently use in your daily life.
See if you can decide the size of each system.

9.1.2 Tools and techniques
In order to understand how a computer system is built up and how it works, it is often divided up into sub-systems. This division can be shown using top-down design to produce structure diagrams that demonstrate the modular construction of the system.
Each sub-system can be developed by a programmer as sub-routine or an existing library routine may be already available for use. How each sub-routine works can be shown by using flowcharts or pseudocode.

Top-down design
TOP-DOWN DESIGN is the breaking down of a computer system into a set of subsystems, then breaking each sub-system down into a set of smaller sub-systems, until each sub-system just performs a single action. This is an effective way of designing a computer system to provide a solution to a problem, since each part of the problem is broken down into smaller more manageable problems. The process of breaking down into smaller sub-systems is called ‘stepwise refinement’.
This structured approach works for the development of both large and small computer systems. When large computer systems are being developed this means that several programmers can work independently to develop and test different subsystems for the same system at the same time. This reduces the development and testing time.

Structure diagrams
In order to show top-down design in a diagrammatic form, structure diagrams can be used. The STRUCTURE DIAGRAM shows the design of a computer system in a hierarchical way, with each level giving a more detailed breakdown of the system into sub-systems.

Alarm app for a smart phone
Consider the alarm app computer system for a smart phone. This could be divided into three sub-systems, setting the alarm, checking for the alarm time, sounding the alarm. These sub-systems could then be further sub-divided; the structure diagram makes the process clearer.

174

Figure 9.1 Structure diagram for alarm app

Activity 9.2
Break down the ‘check time’ sub-system from the smart phone alarm app into further sub-systems.

Activity 9.3
Draw a structure diagram for cleaning your teeth.

Flowcharts
A FLOWCHART shows diagrammatically the steps required for a task (sub-system) and the order that they are to be performed. These steps together with the order are called an ALGORITHM . Flowcharts are an effective way to communicate the algorithm that shows how a system or sub-system works. How to construct flowcharts is covered in Chapter 10.
Have a look at a flowchart for the checking-for-the-alarm-time sub-system.

175

Figure 9.2 Flowchart for checking-for-the-alarm-time sub-system

Pseudocode
PSEUDOCODE is a simple method of showing an algorithm, using English-like words and mathematical operators that are set out to look like a program. How to write algorithms in pseudocode is covered in Chapter 10.
Have a look at the pseudocode for the checking-for-the-alarm-time algorithm.

176

Figure 9.3 Pseudocode for the checking-for-the-alarm-time algorithm

Library routines
A LIBRARY ROUTINE is a set of programming instructions for a given task that is already available for use. It is pre-tested and usually performs a task that is frequently required. For example, the task ‘get time’ in the checking-for-the-alarmtime algorithm would probably be readily available as a library routine.

Sub-routines
A SUB-ROUTINE is a set of programming instructions for a given task that forms a subsystem, not the whole system. Sub-routines written in high-level programming languages are called ‘procedures’ or ‘functions’ depending on how they are used.
See Chapter 11 for further details.

9.2 Algorithms
An ALGORITHM sets out the steps to complete a given task. This is usually shown as a flowchart or pseudocode. Anyone who studies the flowchart or algorithm should be able to work out the purpose of the task.

Activity 9.4
Have a look at the flowchart and pseudocode below. What is the purpose of the algorithm that they both represent?
What would be output if the numbers 7 and 18 were input?

177

Figure 9.4 Flowchart

Figure 9.5 Pseudocode
For more complicated tasks just inspecting the flowchart or pseudocode may not be
178

an accurate way of determining its purpose; a more structured thorough approach is required. This will require the use of test data and trace tables.
Some tasks are required frequently and there are standard methods of completing them, for example, taking the square root of a number or sorting a list of names into alphabetical order. These standard solutions can be provided by a high-level programming language as a standard function or procedure, for example, mathematical functions such as max or min. Library routines are also available for standard methods such as sorting or searching.

9.3 Test data
In order to determine whether a solution is working as it should, it needs to be tested.
Usually before a whole system is tested each sub-system is tested separately.
Algorithms can be tested by a person working through them using any data that is required and seeing what the result is; computer programs can be tested by running them on a computer using any data that is required and seeing what result is output. In order to test a solution thoroughly it may need to be worked through several times with different sets of test data.
A SET OF TEST DATA is all the items of data required to work through a solution.
The set of test data used in the activity above was 7 and 18.
Testing needs to be done to prove that the solution works correctly. In order to do this a set of test data should be used together with the result(s) that are expected from that data. The type of test data used to do this is called NORMAL DATA, this should be used to work through the solution to find the actual result(s) and see if these are the same as the expected result(s).
For example, here is a set of normal test data for an algorithm to record the percentage marks from 10 end-of-term examinations for a student and find their average mark:
Normal test data: 50, 50, 50, 50, 50, 50 50, 50, 50, 50
Expected result: 50

Activity 9.5
Provide another set of test data and its expected result.
Testing also needs to be done to prove that the solution does not give incorrect results. In order to do this, test data should be used that will be rejected as the values are not suitable. This type of test data is called ERRONEOUS or ABNORMAL TEST
DATA; it should be rejected by the solution.
For example erroneous/abnormal data for an algorithm to record the percentage marks from 10 end-of-term examinations for a student and find their average mark could be:
Erroneous/abnormal data: –12, eleven
179

Expected results: these values should be rejected

Activity 9.6
Provide some more erroneous/abnormal data for this algorithm and its expected results.
When testing algorithms with numerical values, sometimes only a given range of values should be allowed. For example, percentage marks should only be in the range
0 to 100. The algorithm should be tested with EXTREME DATA, which, in this case, are the largest and smallest marks that should be accepted. Extreme data are the largest and smallest values that normal data can take.
Extreme data: 0, 100
Expected results: these values should be accepted
There is another type of test data called BOUNDARY DATA; this is used to establish where the largest and smallest values occur. For example, for percentage marks in the range 0 to 100, the algorithm should be tested with the following boundary data; at each boundary two values are required, one value is accepted and the other value is rejected.
Boundary data for 0 is –1, 0
Expected results: –1 is rejected, 0 is accepted

Activity 9.7
Provide boundary data for the upper end of the range; assume that the percentage marks are always whole numbers.

Activity 9.8
The end-of-term examinations are now marked out of 20. Provide the following: a two sets of normal data and their expected results b some erroneous/abnormal data and their expected results c two sets of boundary data and their expected results.

9.4 Validation and verification
In order for computer systems to only accept data inputs that are reasonable and accurate, every item of data needs to be examined before it is accepted by the system.
Two different methods, with very similar sounding names, are used. For data entry,
VALIDATION is performed automatically by the computer system to ensure that only
180

data is that is reasonable is accepted and VERIFICATION is used to check that the data does not change as it is being entered.

9.4.1 Validation
Validation is the automated checking by a program that data is reasonable before it is accepted into a computer system. Different types of check may be used on the same piece of data; for example an examination mark could be checked for reasonableness by using a range check, a type check and a presence check. When data is validated by a computer system, if the data is rejected a message should be output explaining why the data was rejected and another opportunity given to enter the data.

Figure 9.6 Data entry error message
There are many different types of validation checks including:
• range checks
• length checks
• type checks
• character checks
• format checks
• presence checks
• check digits.
A RANGE CHECK checks that only numbers within a specified range are accepted. For example percentage marks between 0 and 100 inclusive.
A LENGTH CHECK checks either:
181

• that data contains an exact number of characters, for example that a password must be exactly eight characters in length so that passwords with seven or fewer characters or nine or more characters would be rejected or • that the data entered is a reasonable number of characters, for example a family name could be between two and 30 characters inclusive so that names with one character or 31 or more characters would be rejected.
A TYPE CHECK checks that the data entered is of a given data type, for example number of brothers or sisters would be an integer (whole number).
A CHARACTER CHECK checks that when a string of characters is entered it does not contain any invalid characters or symbols, for example a name would not contain characters such as %, and a telephone number would only contain digits or (, ), and
+.
A FORMAT CHECK checks that the characters entered conform to a pre-defined pattern, for example in Figure 9.6 the cub number must be in the form CUB9999.
A PRESENCE CHECK checks to ensure that some data has been entered and the value has not been left blank, for example an email address must be given for an online transaction.

182

Figure 9.7 Presence check error message
A CHECK DIGIT is the final digit included in a code; it is calculated from all the other digits in the code. Check digits are used for barcodes, product codes, International
Standard Book Numbers (ISBN) and Vehicle Identification Numbers (VIN).
Check digits are used to identify errors in data entry caused by mis-typing or misscanning a barcode. They can usually detect the following types of error:
• an incorrect digit entered, for example 5327 entered instead of 5307
• transposition errors where two numbers have changed order, for example 5037 instead of 5307
• omitted or extra digits, for example 537 instead of 5307 or 53107 instead of 5307
• phonetic errors, for example 13, thirteen, instead of 30, thirty.

183

Figure 9.8 ISBN 13 code with check digit
An example of a check digit calculation is ISBN 13, where the 13th digit of the ISBN code is calculated using the following algorithm.
1 Add all the odd numbered digits together, excluding the check digit.
2 Add all the even numbered digits together and multiply the result by 3.
3 Add the results from 1 and 2 together and divide by 10.
4 Take the remainder, if it is zero use this value, otherwise subtract the remainder from 10 to find the check digit.

Figure 9.9 ISBN
Using the ISBN above 9 7 8 0 3 4 0 9 8 3 8 2 without its check digit:
1 9 + 8 + 3 + 0 + 8 + 8 = 36
2 3(7 + 0 + 4 + 9 + 3 + 2) = 75
3 (36 + 75)/10 = 11 remainder 1
4 10 – 1 = 9 the check digit.
To check that an ISBN 13 digit code is correct a similar process is followed.
1 Add all the odd numbered digits together, including the check digit.
2 Add all the even number of digits together and multiply the result by 3.
3 Add the results from 1 and 2 together and divide by 10.
4 The number is correct if the remainder is zero.
Using the ISBN above 9 7 8 0 3 4 0 9 8 3 8 2 9 with its check digit:
184

1 9 + 8 + 3 + 0 + 8 + 8 + 9 = 45
2 3(7 + 0 + 4 + 9 + 3 + 2) = 75
3 (45 + 75)/10 = 12 remainder 0
4 Remainder is 0 therefore number is correct.

Activity 9.9 a Find the check digit for the ISBN 978190612400. b Are these ISBNs correct? i 9718780171500 ii 9781234567897

Activity 9.10
• Find an ISBN, then show that its check digit is correct.
• Working in pairs find two ISBNs each, copy one down with a transposition error and the other one correctly. Swap your ISBNs and see if you can find the one with the error.
• Look at a correct ISBN, can you think of an error that this system will not identify and explain with an example why this is the case?

Activity 9.11
Find out about the modulo 11 check digit calculation and how it is used for
VINs.

Activity 9.12
Find out how limit checks and consistency checks are used.

Activity 9.13
Which validation checks could you use for the following? You may decide that more than one validation check is required. a Entering a telephone number. b Entering a student’s name. c Entering a part number in the form XXX999, where X must be a letter and
9 must be a digit.

9.4.2 Verification
Verification is checking that data has been accurately copied onto the computer or transferred from one part of a computer system to another.
185






Verification methods include: double entry screen/visual check parity check checksum. For DOUBLE ENTRY the data is entered twice, sometimes by different operators; the computer system compares both entries and outputs an error message requesting that the data is entered again if they are different.

Figure 9.10 Double entry
A SCREEN/VISUAL CHECK is a manual check completed by the user who is entering the data. When the data entry is complete the data is displayed on the screen and the user is asked to confirm that it is correct before continuing. The user either checks the data on the screen against a paper document that is being used as an input form or confirms from their own knowledge if the data is about them.
Parity checks and checksums are discussed in Sections 2.3.1 and 2.3.3.

9.5 Using trace tables
A thorough, structured approach is required to find out the purpose of an algorithm, which involves recording and studying the results from each step in the algorithm.
This will require the use of test data and trace tables.
Consider the algorithm represented by the following flowchart:

186

Figure 9.11 Flowchart to trace
A TRACE TABLE can be used to record the results from each step in an algorithm; it is used to record the value of an item (variable) each time that it changes. This manual exercise is called a DRY RUN. A trace table is set up with a column for each variable and a column for any output. For example:
187

Table 9.1 Trace table

Test data is then used to dry run the flowchart and record the results on the trace table. Test data: 9, 7, 3, 12, 6, 4, 15, 2, 8, 5
Table 9.2 Completed trace table for flowchart

It can be seen from the output that the algorithm selects the largest and the smallest numbers from a list of 10 positive numbers. The same trace table could have been used if the algorithm had been shown using pseudocode.

188

Figure 9.12 Pseudocode for the same algorithm to trace

Activity 9.14
Use the trace table below and the test data 4, 8, 19, 17, 3, 11, 6, 1, 13, 9 to record a dry run of the pseudocode.
Table 9.3 Trace table to complete for the pseudocode

189

9.6 Identifying and correcting errors
Activity 9.15
Use a trace table and the test data 400, 800, 190, 170, 300, 110, 600,
150, 130, 900 to record another dry run of the pseudocode or flowchart.
Your completed trace table should look like this:
Table 9.4 Completed trace table

190

There is an error as the smallest number has not been identified.

Activity 9.16
Use a trace table and some negative test data to record another dry run of the pseudocode or flowchart. What error have you found?
The algorithm only works for numbers between 0 and 100; a better algorithm could look like this:

191

Figure 9.13 A better algorithm
This algorithm is very similar and works for a much larger range of numbers but it still does not work for every set of numbers. In order to do this the algorithm needs to be rewritten to allow the largest and smallest numbers to be tested against numbers that appear in the list. Figure 9.14 shows this.
192

193

Figure 9.14 A much better algorithm

Activity 9.17
Change the pseudocode so it works for every set of numbers like the flowchart above.

9.7 Producing algorithms
9.7.1 Stages in producing an algorithm
1 Make sure that the problem is clearly specified.
2 Break the problem down into sub-problems; if it is complex, you may want to consider writing an algorithm for each sub-problem. Most problems, even the simplest ones can be divided into:
• set up
• input
• processing
• output of results.
3 Decide on how any data is to be obtained and stored, what is going to happen to the data and how any results are going to be displayed.
4 Decide on how you are going to construct your algorithm, using a flowchart or pseudocode. 5 Construct your algorithm, making sure that it can be easily read and understood by someone else. This involves setting it out clearly and using meaningful names for any data stores. The algorithms that you have looked at so far in this chapter were not designed with readability in mind because you needed to work out what the problem being solved was.
6 Use several sets of test data (normal, abnormal and boundary) and trace tables to find any errors.
7 If any errors are found, repeat the process until you think that your algorithm works perfectly. Have a look at a more readable flowchart showing the algorithm to select the largest and smallest numbers from a list of 10 numbers.

194

195

Figure 9.15 A readable algorithm
More practice on producing algorithms is given in Chapter 10.

9.7.2 The effectiveness of a solution
There are many different solutions to the same problem. In order to consider the effectiveness of a given solution ask the following questions.
1 Does the solution work for all sets of data?
2 Does the solution have any unnecessary processes that are never used?
3 Are any actions repeated more often than necessary?
4 Can the solution be simplified and still work as well?

Activity 9.18
Consider the following algorithm written in pseudocode to check if a child is old enough or tall enough to go on a theme park ride. Comment on its effectiveness. Figure 9.16 Pseudocode to check the height and age of a child

196

End-of-chapter questions
1 Name and describe the components of a computer system.
2 A computer system is to be developed to provide a modulo 11 check digit for numbers from four to 20 digits in length. Provide a structure diagram for this computer system.
3 A phone app is being developed to split the cost of a restaurant bill between a given number of people. It is being designed to work for up to 12 diners and for bills from $10 to $500. a What validation checks should be used for the number of diners and the size of the bill? b Provide two sets of normal data and their expected results. c Provide some abnormal/erroneous data. d Identify the boundary data required and the expected results.
4 Explain what is meant by validation and verification.
5 The following data is to be entered onto an online form:
• name
• date of birth
• password
• phone number.
For each item state, with reasons, the validation and verification checks that should be used.
6 Using ISBN 13: a Find the check digit for ISBN 978034098382 b Are these ISBNs correct?
9780521170653
9780596158086
7 The following algorithm shown as a flowchart checks the sizes of a consignment of
10 parcels. The dimensions of each parcel are input in centimetres.

197

198

Figure 9.17 Flowchart a Use this data and the trace table to dry run the algorithm.
15, 10, 20, 17, 32, 10, 30, 35, 30, 15, 30, 28, 25, 25, 20, 15, 40, 20, 12, 10

Table 9.5 Trace table to complete b What are the rules required to accept a parcel? c Comment on the effectiveness of the algorithm.
8 This algorithm written in pseudocode adds up 10 positive numbers. It contains several errors.

199

Figure 9.18 Pseudocode for algorithm a Identify all the errors in the algorithm. b Comment on the effectiveness of the algorithm. c Rewrite the algorithm so that it is effective and error free. d Set up a trace table and some test data to dry run your rewritten algorithm. e Identify which items of your test data are normal, erroneous and extreme.
9 State two different validation checks and give an example of their use. Each example should be different.
[4]
Cambridge IGCSE Computer Studies 7010/0420 Paper 12 Q9(b) June 2012
10 New software is often developed using top-down (modular) design.
Give three benefits of using this method of development.
[3]
Cambridge IGCSE Computer Studies 7010/0420 Paper 13 Q2 November 2012
11 A program requires the user to type in a user ID which must be in the form:
XX999999
where X stands for any letter, and 9 stands for any digit. a Name two possible validation checks that could be applied to this user ID.
[2]
b Name a validation check that could not be used on this occasion. Give a reason for your choice.
[2]
200

Cambridge IGCSE Computer Studies 7010/0420 Paper 13 Q5 November 2012

201

10 Pseudocode and flowcharts
In this chapter you will learn about:
• the pseudocode for assignment, using ←
• the pseudocode for conditional statements
IF … THEN … ELSE … ENDIF
CASE … OF … OTHERWISE … ENDCASE

• the pseudocode for loop structures
FOR … TO … NEXT
REPEAT … UNTIL
WHILE … DO … ENDWHILE

• the pseudocode for input and output statements
INPUT and OUTPUT
(e.g. READ and PRINT)

• the pseudocode for standard actions totalling (e.g. Sum ← Sum + Number) counting (e.g. Count ← Count + 1)

• the standard flowchart symbols for the above statements, commands and structures. 10.1 Introduction
Using pseudocode is a clear and concise way to represent an algorithm. Data items to be processed by the algorithm are given meaningful names in the same way that variables and constants are in a high-level programming language. Pseudocode is not bound by the strict syntax rules of a programming language. It does what its name says; it pretends to be programming code!
To ensure that pseudocode is easily understandable by others it is useful to be consistent in the way that it is written. The pseudocode in this book is written in the following way to help you understand the algorithms more easily:
• Courier New font is used throughout
• all keywords (words used to describe a specific action (e.g. INPUT) are written in capital letters
• all names given to data items and sub-routines start with a capital letter
• where conditional and loop statements are used, repeated or selected statements are indented by two spaces.

10.2 Assignment
Values are assigned to an item/variable using the ← operator. The variable on the left of the ← is assigned the value of the expression on the right. The expression on
202

the right can be a single value or several values combined with mathematical operators. Table 10.1 Mathematical operators
Operator

Action

+

add



subtract

*

multiply

/

divide

^

raise to the power

()

group

Examples of pseudocode assignments:
Cost ← 10
Price ← Cost * 2
Tax ← Price * 0.12
SellingPrice ← Price + Tax
Gender ←"M"
Chosen ← False

Cost has the value 10
Price has the value 20
Tax has the value 2.4
SellingPrice has the value 22.4
Gender has the value M
Chosen has the value False

Activity 10.1
What values will the following variables have after the assignments have been completed?
Amount ← 100
TotalPrice ← Amount * 3.5
Discount ← 0.2
FinalPrice ← TotalPrice – TotalPrice * Discount
Name ←"Nikki"
Message ←"Hello" + Name

10.3 Conditional statements
When different actions are performed by an algorithm according to the values of the variables, conditional statements can be used to decide which action should be taken.
There are two types of conditional statement as shown below with an example of
203

each.
• A condition that can be true or false: IF

… THEN … ELSE … ENDIF,

for example

IF Age < 18
THEN PRINT "Child"
ELSE PRINT "Adult"
ENDIF

• A choice between several different values: CASE
ENDCASE, for example

… OF … OTHERWISE …

CASE Grade OF
"A" : PRINT "Excellent"
"B" : PRINT "Good"
"C" : PRINT "Average"
OTHERWISE PRINT "Improvement is needed"
ENDCASE

10.3.1 IF … THEN … ELSE … ENDIF
For an IF condition the THEN path is followed if the condition is true and the ELSE path is followed if the condition is false. There may or may not be an ELSE path. The end of the statement is shown by ENDIF.
A condition can be set up in different ways:
• Using a Boolean variable that can have the value TRUE or FALSE (see Section
11.4 for details of Boolean variables). For example
IF Found
THEN PRINT "Your search was successful"
ELSE PRINT "Your search was unsuccessful"
ENDIF

• Using comparison operators, as shown in Table 10.2. Comparisons are made from left to right, for example A > B means is A greater than B. Comparisons can be simple or more complicated. For example
IF ((Height > 1) OR (Weight > 20) OR (Age > 5)) AND (Age < 70)
THEN PRINT "You can ride"
ELSE PRINT "Too small, too young or too old"
ENDIF
204

Table 10.2 Comparison operators
Operator

Comparison

>

greater than

<

less than

=

equal

>=

greater than or equal

10
Counter ← 0
WHILE Counter < 10 DO
PRINT "*"
Counter ← Counter + 1
ENDWHILE

The FOR

… TO … NEXT

loop is the most efficient for this type of task.

10.4.1 FOR … TO … NEXT
A variable is set up with a start value and an end value and then incremented in steps of one until the end value is reached and the iteration finishes. The variable can be used within the loop so long as its value is not changed. This type of loop is very useful for reading values into lists.

Figure 10.2

10.4.2 REPEAT … UNTIL
This loop structure is used when the number of repetitions/iterations is not known and the actions are repeated UNTIL a given condition becomes true. The actions in this loop are always completed at least once.

207

Figure 10.3

10.4.3 WHILE … DO … ENDWHILE
This loop structure is used when the number of repetitions/iterations is not known and the actions are only repeated WHILE a given condition is true. If the WHILE condition is untrue when the loop is first entered then the actions in the loop are never performed.

Figure 10.4

Activity 10.4 a Write pseudocode to input 10 positive numbers and find the total and the average. b Write pseudocode to input positive numbers, –1 to finish, and find the
208

total and the average. c Explain why you chose the loop structures for each task.

10.5 Input and output statements and OUTPUT are used for the entry of data and display of information.
Sometimes READ can be used instead of INPUT; this is usually used for reading from files, which is not covered in this textbook. Frequently PRINT is used instead of
OUTPUT.
INPUT is used for data entry. It is usually followed by a variable where the data input is stored, for example:
INPUT

INPUT Name
INPUT StudentMark

is used to display information either on a screen or printed on paper. It is usually followed by a single value that is a string or a variable or a list of values separated by commas, for example:
OUPUT/PRINT

PRINT Name
PRINT "Your name is", Name
OUTPUT Name1, Name2, Name3

10.6 Standard actions
The ability to repeat actions is very important in the design of algorithms. When an algorithm is turned into a program the same set of actions may be repeated many thousands of times, for example, keeping a running total of the value of goods sold in a supermarket.
RunningTotal ← RunningTotal + Value

Keeping a count of the number of times an action is performed is another standard action, for example:
Count ← Count + 1

Counting is also used to count down until a certain value is reached, for example the number of items in stock in a supermarket:
NumberInStock ← NumberInStock - 1

10.7 Examples of algorithms in pseudocode
209

Example 1
Tickets are sold for a concert at $20 each. If 10 tickets are bought then the discount is
10%; if 20 tickets are bought the discount is 20%. No more than 25 tickets can be bought in a single transaction. a Use pseudocode to write an algorithm to calculate the cost of buying a given number of tickets. b Explain how you would test your algorithm. a REPEAT
PRINT "How many tickets would you like to buy?"
INPUT NumberOfTickets
UNTIL NumberOfTickets > 0 AND NumberOfTickets < 26
IF NumberOfTickets < 10
THEN Discount ← 0
ELSE
IF NumberOfTickets < 20
THEN Discount ← 0.1
ELSE Discount ← 0.2
ENDIF
ENDIF
Cost ← NumberOfTickets * 20 * (1 – Discount)
PRINT "Your tickets cost", Cost

b Would use test data with values of
0, 26
1, 25
9, 10
19, 20

Expected result rejected
Expected results 20, 400
Expected results 180, 180
Expected results 342, 320

Activity 10.5
For the test data given in Example 1, identify the type of test data used and suggest some more test data.

Example 2
A school with 600 students wants to produce some information from the results of the four standard tests in Maths, Science, English and IT. Each test is out of 100 marks.
210

The information output should be the highest, lowest and average mark for each test and the highest, lowest and average mark overall. All the marks need to be input. a Use pseudocode to write an algorithm to complete this task. b Explain how you would test your algorithm. a OverallHighest ← 0
OverallLowest ← 100
OverallTotal ← 0
FOR Test ← 1 TO 4
SubjectHighest ← 0
SubjectLowest ← 100
SubjectTotal ← 0
CASE Test OF
1 : SubjectName ←"Maths"
2 : SubjectName ←"Science"
3 : SubjectName ←"English"
4 : SubjectName ←"IT"
OTHERWISE
ENDCASE
FOR StudentNumber ← 1 TO 600
REPEAT
PRINT "Enter Student", StudentNumber,""s mark for",
SubjectName
INPUT Mark
UNTIL Mark < 101 AND Mark > -1
IF Mark < OverallLowest THEN OverallLowest ← Mark
IF Mark < SubjectLowest THEN SubjectLowest ← Mark
IF Mark > OverallHighest THEN OverallHighest ← Mark
IF Mark > SubjectHighest THEN SubjectHighest ← Mark
OverallTotal ← OverallTotal + Mark
SubjectTotal ← SubjectTotal + Mark
NEXT
SubjectAverage ← SubjectTotal/600
PRINT SubjectName
PRINT "Average is", SubjectAverage
211

PRINT "Highest Mark is", SubjectHighest
PRINT "Lowest Mark is", SubjectLowest
NEXT
OverallAverage ← OverallTotal/2400
PRINT "Overall Average is", OverallAverage
PRINT "Overall Highest Mark is", OverallHighest
PRINT "Overall Lowest Mark is", OverallLowest

b For the algorithm to be tested by dry running, it would be a good idea to reduce the number of students to 5 and the number of subjects to 2.

Activity 10.6 a Identify the changes you would need to make to the algorithm for
Example 2 to reduce the number of students to 5 and the number of subjects to 2. b Identify the test data needed to test Example 2 with the reduced number of students and subjects. c With the set of data you have chosen, set up and complete a trace table so that you can compare your expected results with the actual results when you dry run the algorithm.

10.8 Standard flowchart symbols
Flowcharts are drawn using standard symbols.

10.8.1 Begin/End
Terminator symbols are used at the beginning and end of each flowchart.

Figure 10.5 Terminator symbols

10.8.2 Process
Process symbols are used to show when values are assigned to an item/variable like
212

an assignment in pseudocode.

Figure 10.6 Process symbol

10.8.3 Input/Output
Input/Output symbols are used show input of data and output of information.

Figure 10.7 Input/Output symbol

10.8.4 Decision
Decision symbols are used to decide which action is to be taken next. These can be used for selection and repetition/iteration.

Figure 10.8 Decision symbol

10.8.5 Flow lines
Flow lines are used to show the direction of flow which is usually, but not always, top to bottom and left to right.

Figure 10.9 Flow line

Example 1 (continued)
213

Tickets are sold for a concert at $20 each, if 10 tickets are bought then the discount is
10%, if 20 tickets are bought the discount is 20%. No more than 25 tickets can be bought in a single transaction. c Draw a flowchart for the algorithm to calculate the cost of buying a given number of tickets.

Figure 10.10 Flowchart for Example 1

214

Activity 10.7
Draw a flowchart for the algorithm given in Example 2.
Choose the method you think is the clearest way to show this algorithm and explain why it is the clearest.

215

End-of-chapter questions
1 Show two ways of selecting different actions using pseudocode.
2 You have been asked to write the pseudocode to choose the correct routine from the menu shown below. a Decide which type of conditional statement you are going to use. b Explain your choice. c Write the pseudocode. d Select your test data and explain why you chose each value.

Figure 10.11
3 Show three ways a loop to add up five numbers and print out the total can be set up using pseudocode. Explain which loop is the most efficient to use.
4 A sweet shop sells 500 different sorts of sweets. Each sort of sweet is identified by a unique four-digit code. All sweets that start with a one (1) are chocolates, all sweets that start with a two (2) are toffees, all sweets that start with a three (3) are jellies and all other sweets are miscellaneous and can start with any other digit except zero. a Write an algorithm, using a flowchart, which inputs the four-digit code for all
500 items and outputs the number of chocolates, toffees and jellies. b Explain how you would test your flowchart. c Decide the test data to use and complete a trace table showing a dry run of your flowchart. 5 The temperature in an apartment must be kept between 18°C and 20°C. If the temperature reaches 22°C then the fan is switched on; if the temperature reaches
16°C then the heater is switched on, otherwise the fan and the heaters are switched off. The following library routines are available:
• GetTemperature
216

• FanOn
• FanOff
• HeaterOn
• HeaterOff
Write an algorithm, using pseudocode or a flowchart, to keep the temperature at the right level.
6 Daniel lives in Italy and travels to Mexico, India and New Zealand. The time differences are:
Table 10.4
Country
Mexico
India
New Zealand

Hours
–7
+4
+11

Minutes
0
+30
0

Thus, if it is 10:15 in Italy it will be 14:45 in India. a Write an algorithm, using pseudocode or otherwise, which:
• inputs the name of the country
• inputs the time in Italy in hours (H) and minutes (M)
• calculates the time in the country input using the data from the table
• outputs the country and the time in hours and minutes.
[4]
b Describe, with examples, two sets of test data you would use to test your algorithm. [2]
Cambridge IGCSE Computer Studies 7010/0420 Paper 11 Q17 June 2011
7 A school is doing a check on the heights and weights of all its students. The school has 1000 students.
Write an algorithm, using pseudocode or a flowchart, which
• inputs the height and weight of all 1000 students
• outputs the average (mean) height and weight
• includes any necessary error traps for the input of height and weight.
[5]
Cambridge IGCSE Computer Studies 7010/0420 Paper 11 Q17 November 2010
8 A small café sells five types of item:
• bun
• coffee
• cake

0.50 dollars
1.20 dollars
1.50 dollars
217

• sandwich
• dessert

2.10 dollars
4.00 dollars

Write an algorithm, using pseudocode or a program flowchart only, which
• inputs every item sold during the day
• uses an item called ‘end’ to finish the day’s input
• adds up the daily amount taken for each type of item
• outputs the total takings (for all items added together) at the end of the day
• outputs the type of item that had the highest takings at the end of the day.
[6]
Cambridge IGCSE Computer Studies 7010/0420 Paper 13 Q16 November 2012
9 5000 numbers are being input which should have either one digit (e.g. 5), two digits (e.g. 36), three digits (e.g. 149) or four digits (e.g. 8567).
Write an algorithm, using pseudocode or a flowchart only, which
• inputs 5000 numbers
• outputs how many numbers had one digit, two digits, three digits and four digits
• outputs the percentage of numbers which were outside the range.
[6]
Cambridge IGCSE Computer Studies 7010/0420 Paper 13 Q15 November 2013

218

11 Programming concepts
In this chapter you will learn about:
• programming
• declaration and use of:
• variables
• constants
• basic data types:
• integer
• real
• char
• string
• Boolean
• how to use:
• sequence
• selection
• repetition
• totalling
• counting
• use of predefined procedures/functions.

11.1 Introduction
Chapters 9 and 10 have enabled you to develop your computational thinking by writing algorithms to perform various tasks. This chapter will show you how to put your computational thinking to the ultimate test by writing computer programs to perform tasks.
So far you have tested your algorithms by dry running. Once you have written a program for your algorithm, and when there are no syntax errors (see Section 7.4.1), you should then use a computer to run the program to complete the task you have specified. The computer will perform the task exactly as you have written it; you may need to make some changes before it works exactly as you intend it to.

11.2 Programming
In Chapter 7 you learnt that programs could be written in high- or low-level languages then translated and run. This chapter will introduce you to the programming concepts required for practical use of a high-level language.
There are many high-level programming languages to choose from. For Cambridge
IGCSE Computer Science any high-level programming language may be used,
219

however if you plan to continue your studies with A Level Computer Science then one of Visual Basic, Pascal/Delphi or Python is recommended.
Many programming languages are free to download and use. This chapter shows the use of programming and should be used in conjunction with learning the syntax of an appropriate programming language.
Programs developed in this chapter will be illustrated using the following freely available languages:
• Scratch: a good basic introduction to programming for beginners that is freely available from MIT. Scratch makes programming easy and fun to learn as it uses visual building blocks. It is useful as an introduction.
• JavaScript: a scripting language that works in any browser, no download needed.
JavaScript works with the HTML (see Section 1.6.2).
• Python: a general purpose, open source programming language that promotes rapid program development and readable code.
The traditional introduction to programming in any language is to display the words
‘Hello World’ on a computer screen. The programs look very different:

Figure 11.1 Programs to display

Activity 11.1
Have a look at all three programs and decide which program is the easiest to understand.
Scratch and Python work in their own Integrated Development Environments (IDEs).

220

Figure 11.2 Python IDE

Figure 11.3 Scratch program running

221

Figure 11.4 Scratch IDE
JavaScript works in a browser.

Figure 11.5 JavaScript working in a browser

Activity 11.2
222

In the high-level programming language that your school has chosen to use, write and run your own program that displays the words ‘Hello Computer
Scientists’.

11.3 Declaration and use of variables and constants A VARIABLE in a computer program is a named data store that contains a value that may change during the execution of the program. In order to make programs understandable to others, variables should be given meaningful names.
A CONSTANT in a computer program is a named data store that contains a value that does not change during the execution of the program. In order to make programs understandable to others, constants should be given meaningful names.
Not all programming languages explicitly differentiate between constants and variables but programmers should be clear which data stores can be changed and which cannot be changed. There are several ways of doing this, for example:
• use of capital letters:

PI = 3.142

• meaningful names that begin with Const:

ConstPi = 3.142

It is considered good practice to declare at the start of a program the constants and variables to be used in that program. Declarations are expected in programs written for the tasks specified in the IGCSE Computer Science pre-release material (see
Section 1.2.3).

223

Figure 11.6 Variable and constant declarations in Scratch

Figure 11.7 Variable and constant declarations in JavaScript

Figure 11.8 How to declare variables and constants in Python

Activity 11.3
In the high-level programming language that your school has chosen to use, declare the variables and constants you would use in an algorithm to find the volume of a cylinder.

11.4 Basic data types
In order for a computer system to process and store data effectively, different kinds of data are formally given different types. This enables:
• data to be stored in an appropriate way, for example, as numbers or characters
• data to be manipulated effectively, for example numbers with mathematical operators and characters with concatenation
• automatic validation in some cases.

224

Integer
An INTEGER is a positive or negative whole number that can be used with mathematical operators.

Real
A REAL NUMBER is a positive or negative number with a fractional part. Real numbers can be used with mathematical operators.
Not all programming languages distinguish between real numbers and integers.
JavaScript makes no distinction; Python does with the use of built-in functions. sets up an integer variable with the value of 25 in
Python
sets up a real variable with the value of 25.0 in Python

FirstInteger = int(25) FirstReal = float(25)

Char
A variable or constant of type CHAR is a single character. var Gender = 'F'
Gender = 'F'

or Gender

= "F"

JavaScript
Python

String
A variable or constant of type STRING is several characters in length. Strings vary in length and may even have no characters: an empty string. The characters can be letters and/or digits and/or any other printable symbol. For example:
Var TelephoneNumber = '44121654331'
Var FirstName = 'Emma'
Var UnRepeatable = '@!&&@@##!'
TelephoneNumber = '44121654331'
FirstName = 'Emma'
UnRepeatable = '@!&&@@##!'

JavaScript
JavaScript
JavaScript
Python
Python
Python

Activity 11.4
In the high-level programming language that your school has chosen to use, write and run your own program that displays the words ‘Hello
’. Use a string variable to store YourName.

Boolean
A BOOLEAN variable can have only two values: TRUE or FALSE.
225

Var AgeOver21 = true
AgeOver21 = true

JavaScript
Python

Activity 11.5
At the start of a program to store some personal information you need to set up variables to store the following data:
• name
• address
• gender
• over/under 18 years of age
• colour of hair
• shoe size
• weight in kilograms.
You also need to set up constants for male and female. a Select meaningful variable names and types for your constants and variables. b In the high-level programming language that your school has chosen to use, write and run your own program that displays the values you have used to initialise your variables and constants. c Make sure that you can input new values and select suitable test data for your program.

11.5 How to make your program work
Programs work by automatically following one instruction after another in sequence.
Look at the following examples.

Figure 11.9 Python program

226

Figure 11.10 Python program running

Figure 11.11 JavaScript program

227

Figure 11.12 JavaScript program running
Sometimes the next instruction to be obeyed will depend upon what has already happened before and a selection has to take place. Look at the following examples.

Figure 11.13 Python program showing selection

228

Figure 11.14 Python selection program running

Figure 11.15 JavaScript selection program

229

Figure 11.16 JavaScript selection program running
Sometimes instructions need to be repeated several times so a final result can be obtained, this often involves the use of totalling and counting. Look at the following examples. 230

Figure 11.17 Python repetition program

Figure 11.18 Python repetition program running

231

Figure 11.19 JavaScript repetition program

232

233

Figure 11.20 JavaScript repetition program running

11.5.1 Sequence
Statements are followed in sequence so the order of the statements in a program is important. Assignment statements rely on the variables used in the expression on the right-hand side of the statement all having been given values. Input statements often provide values for assignment statements. Output statements often use the results from assignment statements.
FirstNumber = int(input( 'Enter First Whole Number: '))
SecondNumber = int (input( 'Enter Second Whole Number: '))
Sum = FirstNumber + SecondNumber print ('The sum equals ', Sum)

11.5.2 Selection
Selection is a very useful technique, allowing data items to be picked out according to given criteria, for example selecting the largest value or the smallest value, selecting items over a certain price, selecting everyone who is male. This is done with the use of if and case statements.

Figure 11.21 Selection

Activity 11.6
234

Using the high-level programming language that your school has chosen to use, find out about the structure of if…then…else and case statements. Not all programming languages include the use of a case statement.

11.5.3 Repetition
Most programming languages support three types of loop:
• a fixed number of repetitions
• an unknown number of repetitions with at least one repetition, as the condition is tested at the end of the loop
• an unknown number of repetitions which may not be completed at all, as the condition is tested at the beginning of the loop.

Figure 11.22 Fixed number of repetitions

Figure 11.23 Unknown number of repetitions, at least one completed

235

Figure 11.24 Unknown number of repetitions, statements in loop may never be used

11.5.4 Totalling
Totalling is used with repetition with the total updated every time the loop is repeated. Keeping a running total is one of the most frequently used programming techniques in many computer systems, for example, the total on a receipt at a supermarket checkout.
ReceiptTotal = ReceiptTotal + CostOfItem

11.5.5 Counting
Counting is used with repetition with the counter increased by 1 every time the loop is repeated. Counting items or events is another of the most frequently used programming techniques, for example, counting the number of items sold in a single transaction at a supermarket.
NumberOfItems = NumberOfItems + 1

As well as counting upwards, a counter can be used to count down with the counter being decreased by 1 every time the loop is repeated, for example, removing an item from stock every time one is sold.

236

NumberInStock = NumberInStock - 1

11.5.6 Writing programs
Example 1
Tickets are sold for a concert at $20 each, if 10 tickets are bought then the discount is
10%, if 20 tickets are bought the discount is 20%. No more than 25 tickets can be bought in a single transaction. a Write a program to calculate the cost of buying a given number of tickets. b Show how you would test your program.

Figure 11.25 Example 1 in Python

237

Figure 11.26 JavaScript program for Example 1

238

Figure 11.27 Program testing Example 1 in Python

Figure 11.28 Program testing Example 1 in JavaScript

Activity 11.7
239

Using the high-level programming language that your school has chosen to use, write a program for Example 1. Look at the test data used with the
Python and JavaScript solutions; explain how you would improve this test data to ensure that your program was fully tested.

240

End-of-chapter questions
1 Explain the difference between a variable and a constant in a program.
2 State four different basic data types. Illustrate your answer by declaring a variable for each one and assigning it a value.
3 A school with 600 students wants to produce some information from the results of the four standard tests in Maths, Science, English and IT. Each test is out of 100 marks. The information output should be the highest, lowest and average mark for each test and the highest, lowest and average mark overall. All the marks need to be input. a Write a program to complete this task. b Explain how you would test your program.
4 Write three programs showing the different ways that can be used to add up five numbers and print out the total. Explain which loop is the most efficient to use.
5 A sweet shop sells 500 different sorts of sweets. Each sort of sweet is identified by a unique four-digit code. All sweets that start with a one (1) are chocolates, all sweets that start with a two (2) are toffees, all sweets that start with a three (3) are jellies and all other sweets are miscellaneous and can start with any other digit except zero. a Write a program, which inputs the four-digit code for all 500 items and outputs the number of chocolates, toffees and jellies. b Explain how you would test your program.

241

12 Data structures: arrays and using pre-release material
In this chapter you will learn about:
• declaration of one-dimensional arrays
• the use of one-dimensional arrays
• the use of a variable as an index in an array
• reading and writing values in an array using a FOR
• using pre-release material.

… TO … NEXT

loop

12.1 Introduction
One of the advantages of using computer systems is their ability to accurately repeat the same tasks many times, for example, producing electricity bills or calculating exam scores. In order to do this, programs are written with loops for repetitions to work with lists of similar items.
These lists are identified by the use of a single name and each item in the list can be found by an index number showing the place in the list. This type of list is called a one-dimensional array. The items in the list are the elements of the array.

Figure 12.1 List or one-dimensional array

242

12.2 Arrays
12.2.1 One-dimensional arrays
In order to use a one-dimensional array in a computer program, you need to consider:
• what the array is going to be used for, so it can be given a meaningful name
• how many items are going to be stored, so the size of the array can be determined
• what sort of data is to be stored, so that the array can be the appropriate data type.
For example, if a one-dimensional array for all the students’ test marks in a class was to be set up:
• array name StudentMarkTest
• number of items = number of students in the class, this could be a constant
NoStudents

• whole numbers need to be stored, data type Integer.
Arrays usually start at element 0 or element 1. Often if an array starts at element 0, the size of the array is given as one more than required and element 0 is not used.

Figure 12.2 Array declaration in JavaScript

Figure 12.3 Declaration of lists and arrays in Python
243

Activity 12.1
Using the high-level programming language that your school has chosen, find out about arrays. a Is the first element 1 or 0? b How do you declare the size of an array? c Can you declare the type of the array? d Declare an array to store the test marks for a class of 30 students.

12.2.2 Using a variable as an index in an array
In order to repeat the same task many times for all the items in a list, each item needs to be referred to in the same way using the index number for each element of the onedimensional array. If a variable is used for this index number, then the same code can be re-used for each item.

Figure 12.4 Using a variable as an index in an array
This allows several arrays to be used together with the same index number to show related information, for example, each student could sit more than one test and the name and gender of the student could also be recorded.

244

Figure 12.5 Use of multiple arrays with the same index

12.2.3 Read or write values in an array using a
FOR … TO … NEXT loop
A FOR … TO … NEXT loop uses a fixed number of repeats so it is ideal to use with an array, when the number of elements is known, as the loop counter can be used as the array index. For example a FOR … TO … NEXT loop could be used to read values into two arrays to store two sets of test marks for a class of 30 students.

245

Figure 12.6 Reading values into an array
Another FOR … TO … NEXT loop could be used to show values in the arrays that store two sets of test marks for a class of 30 students.

Figure 12.7 Outputting values already stored in an array

246

Activity 12.2
Using the high-level programming language that your school has chosen, declare arrays to store:
• the names of a class of 30 students
• the gender of each student as M or F
• the marks for two tests for a class of 30 students.
When storing values that are input in any variable or array, validation checks should be used (see Section 9.4.1). For example when inputting the gender for the activity above only M or F should be allowed.

Activity 12.3
The examples below test for M.

Figure 12.8 Checking for gender ‘M’
Extend your program to test for:
• both M and F in your student gender array
• marks between 0 and 50 for the first test
• marks between 0 and 100 for the second test.
The two previous activities have enabled you to store validated data in four arrays; once this data is stored you can use it to extract useful information. For example you may want to find the students with the highest and lowest mark for each test, the average mark for each test, the average mark overall and the number of male and female students in each class.
You can find a student with the highest mark for test 1 like this:
247

Figure 12.9 Finding the student with the highest mark for test 1

Activity 12.4
Now extend your program as follows: a Find the students with the highest marks for tests 1 and 2. b Find the students with the lowest marks for tests 1 and 2. Hint: set your lowest mark variables to 50 and 100. c Find the average mark for each test. Hint: use a running total and divide by the number of students at the end. d Find the number of male and female students. Hint: count either males or females and calculate the other by taking away from 30.

12.3 Using pre-release material
In order to answer practical questions based on pre-release material, you will need to practise the skills you have learnt so far. The pre-release material will arrive a
248

few months before your examination; you can discuss it with your teacher and your fellow students.
You need to practise applying your skills to the tasks mentioned in the scenario, which is different for each examination series.
Here is a checklist of useful things to do.
1 Read through the pre-release material several times. Check with your teacher if there is anything at all that you do not understand.
2 For each task, write an algorithm using both pseudocode and a flowchart to show what is required.
3 Choose sets of test data that you will need to use, and work out the expected results. Remember to use normal, boundary and erroneous data. Be able to give reasons for your choice of test data.
4 Complete trace tables to test your pseudocode and flowcharts. This will enable you to ensure that both the pseudocode and the flowcharts work properly. It is a good idea to get another student to trace your algorithms as well.
5 Decide which works best for each task, pseudocode or a flowchart, and why.
6 Before starting to write your program for each task:
• decide the variables, including any arrays, and constants you will need
• decide the data types required for these
• decide the meaningful names you will use
• be able to explain your decisions.
7 If you are asked to repeat the same thing many times, for example adding up totals, complete the task for one and check it works before repeating it many times.
8 Write and test each task. You can use the same test data as you used for your pseudocode and flowcharts.

Activity 12.5
Work through the checklist with the pre-release material for your examination. 249

13 Databases
In this chapter you will learn about:
• what databases are used for
• database structure
• practical uses of a database.

13.1 Introduction
A DATABASE is a structured collection of data that allows people to extract information in a way that meets their needs. The data can include text, numbers, pictures: anything that can be stored in a computer.
Databases are very useful in preventing data problems occurring because:
• data is only stored once – no data duplication
• if any changes or additions are made it only has to be done once – the data is consistent • the same data is used by everyone.

13.2 What are databases used for?
To store information about people, for example:
• patients in a hospital
• students at a school.
To store information about things, for example:
• cars to be sold
• books in a library.
To store information about events, for example:
• hotel bookings
• results of races.

Activity 13.1
Find five more uses for databases, and for each one decide what sort of information is being stored.

13.3 The structure of a database
Inside a database, data is stored in TABLES, which consists of many RECORDS and each record consists of several FIELDS.
250

Figure 13.1 Structure of a database table
Tables contain data about one type of item, person or event, for example:
• a table of patients
• a table of books
• a table of doctor’s appointments.
Each record within a table contains data about a single item, person or event, for example: • Winnie Sing (a hospital patient)
• IGCSE Computer Science (a book)
• the 15:45 appointment on 27 January 2014.
Each field contains one specific piece of information about a single item, person or event, for example:
• For a hospital patient the fields could include:
• first name
• family name
• date of admission
• consultant
• ward number
• bed number.
• For a book the fields could include:
• title
• author
• ISBN.

Activity 13.2
What fields would you expect to find in each record for a doctor’s appointments? In order to be sure that each record can be found easily and to prevent more than one copy of the same record being kept, each record includes a PRIMARY KEY field. Each
251

primary key field in the table is unique.

Figure 13.2 Structure of a database table including a primary key
The primary key can be a field that is already used, provided it is unique, for example the ISBN in the book table, or a new field added to each record, for example, a unique hospital number could be added to each hospital patient’s record.
Sometimes, a primary key can be formed by using two or more existing fields, for example, the doctor’s appointments could have a primary key made from the date and the time of each appointment.

13.4 Practical use of a database
As a Cambridge IGCSE Computer Science student you need to be able to do the following: • define a single-table database from given data storage requirements
• choose a suitable primary key for a database table
• perform a query-by-example from given search criteria.
In order to do this you will need to use a relational database management system. The following case study shows how to set up a database with Microsoft Access and complete the tasks described above.

Case study
Boys and girls between the ages of seven and eleven can join a cub scout group. (http://en.wikipedia.org/wiki/Cub_Scout)
Each cub scout group needs to keep records about its members. Most groups will keep the following information about each cub in their group:
Personal Details Form
To ensure our records are up to date, please fill out all of the information below. Without a completed form, your child will not be able to participate in meetings/activities. 252

Personal Details
Name:
Date of Birth::
Address:
Gender:
School:
Telephone Number:
Date Joined:
Figure 13.3 Data collection form

13.4.1 Defining a database
This section shows you how to define a single-table database from given data storage requirements and choose a suitable primary key.
To create the cub scout database, open Access, select the Blank database template Figure 13.4 Blank database and type the filename CubScout and click the Create button.

253

Figure 13.5 Creating the cub scout database
Select the table design view

Figure 13.6 Design View

254

and name the table Cub.

Figure 13.7 Naming the table
Set up the fields to match the data collection form and include the primary key. Each field will require a meaningful name and a data type must be selected. The basic data types were introduced in Section 11.4. They are available in Access but the names are different.
Computer program
Integer
Real
Char
String
Boolean

Access
Number/Integer
Number
Text/field length 1
Text
yes/no

Table 13.1
Access also has other data types that will be useful: Date/Time and
Currency.

255

Figure 13.8 Cub table fields
Access allows validation checks to be built in for each field, for example the gender field:

Figure 13.9 Gender field validation

Activity 13.3
Decide which other fields should be validated.

13.4.2 Getting information from a database
This section shows you how to perform a query-by-example (QBE) from given search criteria.
The cub scout leader wants to be reminded before the first meeting in the month of any cub scouts who will have a birthday that month.
To set up a query-by-example to perform this task, open the database
CubScout, select the Create tab followed by Query Design.

256

Figure 13.10
Then add table Cub.

Figure 13.11
The cub scout leader wants to see the Name of any cub with a Date of
Birth this month.
Select the fields Name and Date of Birth, check the box to display the
Name and check that the month of the Date of Birth is the same as the current month.

257

Figure 13.12

Figure 13.13
Then run the query to test it.

Activity 13.4
Set up a cub scout database with 10 records in it. Include appropriate validation. Using query-by-example, write a query to pick out any cubs born this month.
The cub scout leader wants to put each cub into a group called a ‘six’. Each
‘six’ can have up to six cubs in it and is given a name, for example red,
258

yellow, blue or green. Add a new text field called Six, put each cub into a six. Using query-by-example, write a query to pick out any cubs in the red six. 259

End-of-chapter questions
1 A database of students is to be set up with the following fields:
• Family name
• Other names
• Student ID
• Date of birth
• Date of entry to school
• Current class
• Current school year/grade
• Email address. a Select a data type for each field. b Which fields should be validated and which fields should be verified? c Decide the validation rules for those fields which should be validated. d Which field would you choose for the primary key? e Choose a suitable format for the student ID. f Build a database with at least 10 records. Include all your validation checks.
Ensure there are at least three different classes and two different years/grades. g Set up and test QBEs to: i Print Other names, Family name and Email address in alphabetical order of family name ii Select all the students from a given class iii Select all the students for a year/grade and print Other names, Family name and
Data of birth, grouping the students by class.
2 A motor car manufacturer offers various combinations of
• seat colours
• seat materials
• car paint colours.
A database was set up to help customers choose which seat and paint combinations were possible.

260

Figure 13.14 a How many records are shown in the database? b The following search condition was entered using a query-by-example grid:

Figure 13.15
What will be displayed? c A customer wants to know the possible combinations for a car with leather seats and either silver or grey paint.
What search condition needs to be input? Copy and complete the table.

261

Figure 13.16
3 A database was set up to compare oil companies. A section of the database is shown below:

Figure 13.17 a How many fields are there in each record?
[1]
b The following search condition was entered:
(No of countries < 30) AND (Head office = “Americas”)
Using Code only, which records would be output?
[2]
c What search condition is needed to find out which oil companies have a share price less than $50 or whose profits were greater than 8 billion dollars?
[2]
Cambridge IGCSE Computer Studies 7010/0420 Paper 13 Q12 June 2013
4 A database was set up to keep track of goods in a shop. A section of the database is shown below:
262

Figure 13.18 a How many records are shown in this section of database?
[1]
b i Using Item code only, what would be output if the following search was carried out?
(Number in stock < Re-order level) AND (Items ordered = “No”)
[2]
ii What useful information does this search produce?
[1]
c Write a search condition to locate items costing more than $2.00 or which have a stock value exceeding $300.00.
[2]
Cambridge IGCSE Computer Studies 7010/0420 Paper 13 Q9 November 2013

263

Index
A
Abiword (word processor), free software 112 acknowledgement 21
ACM (Association for Computer Machinery), code of ethics 110–111 acoustic/sound sensor 62 actuators 51, 62, 71
ADC (analogue to digital converter) 62 additive manufacturing 69 address bus 45 addresses, in computer memory 45, 47
Adobe Reader (freeware) 112 airports, use of scanners 53 alarm app, for a smart phone 116 algorithms finding the purpose 118, 125 flowcharts 117, 118 identifying and correcting errors 127–129 producing 129–131 pseudocode 118, 139–141 standard actions 139
ALU arithmetic and logic unit 47, 48
AND gate 26, 27 made up of of NAND gates 39
Android 42 anonymous user profile 101 anti-lock braking systems 65–66
ARQ (automatic repeat request) 21 arrays name, size and data type 163–164 one-dimensional 163–164 reading or writing values 165–167
ASCII code 12, 53, 58, 88 assemblers 93–94 assembly code, hexadecimal 13 assembly languages 91–92 assignment in pseudocode 134 statements 156 asymmetric encryption 105–107 asynchronous data transmission 15–16
264

audio compression 77 authentication 107
B
back-lighting 72 back-ups, regular 101 barcode check digit 122 readers/scanners 51, 54–56 binary numbers converting to denary 2–3 converting to hexadecimal 6–7 binder 3D printing 69 biometrics 108
BIOS (basic input–output system) 43, 82 birefringence 86 bit (binary digit) 4
Blu-ray discs 85–86
BMP, raw bitmap image 78
Boolean algebra 26–29
Boolean variable 136, 151 boundary data 119, 169 browser features 24 security 99, 103–104 use of cookies 25, 100 use of HTML 24 use of JavaScript 146, 148 buffers 43–44, 82 burglar alarm, monitoring system 64 buses, function 45 byte, smallest unit of computer memory 4
C
CAD (computer aided design) 52, 69, 70
CASE … OF … OTHERWISE … ENDCASE 137 case statements 156 cathode-ray monitors 72
CCD (charge couple device) 52
CCFL (cold cathode fluorescent lamp) 72
CD/DVD storage media 71–72, 85, 87
CHAR, data type 150
265

character checks 121 check digits 121, 122 checksum 17, 21–22, 124
CIR current instruction register 47, 48, 49 clothing, ‘smart’ 73
CNC machining 69 comparison operators 136 compilers 93 computer architecture 45–48 computer ethics 110–111 computer memory, size and units 4 computer operation, incorrect 101 computer programssee programs computer systems components 114 top-down design 114, 115–116 computers, effect on society 110 conditional statements 135–138 constants 149, 150 control, use of sensors 63, 65–66 control bits 15–16 control bus 45 control unit 48 cookies 25, 100–101 counting 139, 154–155, 158 cracking 98
CSS (cascading style sheet) file 23–24
CT (computed tomography) scanners 53–54 customer loyalty cards 56 cutters, 2D and 3D 51, 71 cypher text 107
D
DAC (digital to analogue converter) 62, 71 data analogue in nature 61 location in computer memory 47 loss or corruption 101 safety and security 97 storing 149, 165–167 types 150–151, 169, 172 data bits 15–16 data bus 45
266

data collection form 171 data entry, validation and verification 120 data transmission asynchronous 15–16 internet technologies 22–25 parallel 15 rate 4 serial 14–15 simplex, half-duplex and full-duplex 14 synchronous 16 via USB 15, 16, 57, 58, 59, 88 databases creating 171–173 defining 169, 171 searching 173–174 structure 169–170 uses 169 decision symbols 142 declaration, of variables and constants 149 denary (base 10) numbers 2 conversion to hexadecimal 8–9 converting to binary 3 denial of service attacks 108 digital cameras 51, 57–58
XD or SD (Secure Digital) cards 87 digital light projectors (DLP) 74 digital signatures 107 dongle 87
DOS 42 double entry 124
DRAM (dynamic RAM) 82 dry run 125, 127, 141, 146
DVD-RAM 85
E
echo check 22
EEPROM (electronically erasable programmable read-only memory) 84 electronic circuits 26 encryption 104–108 algorithm 105, 106 secure 86 erroneous/abnormal data 119, 169 errors 267

checking 17–22 identifying and correcting 127–129 types 94 extreme data 120
F
F-spot (photograph manager), free software 112 face recognition 53, 108 fetch–execute cycle 49–50 fields, in a database 169–170, 172 file compression algorithms 77, 80 lossless and lossy 77, 78, 80–81 file formats 76–80 file size, estimating 88–89 fingerprint scans 108 firewalls 102 flash memory 87
NAND technology 84 floppy disks 87 flow lines 142 flowcharts 114, 117, 142–143, 169
FOR … TO … NEXT loop 137–138, 165–167 format checks 121 freeware 112 full-duplex data transmission 14
G
games, on DVD and Blu-ray 86 gas sensor 62 gateway 102 gibibyte (GiB) 4 gigabyte (GB) 4
H
hacking 98 half-duplex data transmission 14 hand-held devices, LCD/LED screens 74 hardware fault, causing data loss or corruption 101 hashing algorithms 106, 107
HDD (hard disk drives) 83 removable 88
268

size 4 headphones 71 hexadecimal numbers conversion to binary 6–7 conversion to denary 8–9 hexadecimal system notation 5–6 uses 9–13 high-level programming languages 91, 93, 146–148 hospital patients database records 170 monitoring system 63, 64
HTML (hypertext mark-up language) hexadecimal codes 10–11 and JavaScript 146 structure and presentation 23–24 use for web pages 23–25 http (hypertext transfer protocol) 24 https (http over secure) 24, 103 padlock symbol 24, 99, 103
I
IDE (integrated/interactive development environment) 95, 147, 148
IEC (International Electrotechnical Commission) convention 4
IEEE (Institute of Electrical and Electronics Engineers), code of ethics 110–111
IF … THEN … ELSE … ENDIF 135–136 if statements 156 index number 163, 165 infra-red sensor 62 inkjet printers 67, 68 input devices 48, 51 input statements 139, 156 input/output devices, supermarket checkouts 55–56 input/output statements 139 input/output symbols 142 integers 150, 151, 152 intellectual property rights 110 interactive whiteboards 51, 66–67 internet technologies, data transmission 22–25 interpreters 93 interrupt handler 43 interrupts 43–44
IP (internet protocol) address 22–23, 25
269

ISBN (International Standard Book Numbers), check digits 122–123
ISP (internet service provider) 22 denial of service attacks 108 iteration 137
J
JavaScript arrays 164, 165, 166, 167 data types 150–151 declaration of variables and constants 149 display 147, 152 example program 159, 160 loops 158 repetition program 155, 156, 158 selection program 153, 154, 156 works in a browser 146, 148 jpeg (Joint Photographic Experts Group) files 52, 53, 78–79
K
key distribution problem 104 key-logging software 100, 110 keyboard ASCII characters 12, 58, 88 as input device 48, 58
MIDI files 76–77 virtual 58 kibibyte (KiB) 4 kilobyte (KB) 4
L
LAA (locally administered MAC address) 11 laser printers 68 latency 83, 84
LCD (liquid crystal display) technology 72, 74, 75
LCD/LED monitors 51, 72–74
LED (light emitting diode) technology 72 length checks 121 libraries, barcode system 56 library routines 114, 117–118 light projectors (LCD and DLP) 66, 74, 75 light sensor 62
Linux 42
270

lists, importance in programming 163 logic circuits designing 33–35, 38 inputs and outputs 26–29 off-the-shelf components 29, 39–40 in the real world 38–42 safety function 35–38 simplifying 39, 40–41 truth tables 29–38 logic error 94 logic gates 26, 27–29 loop structures 137 types 157 loudspeakers 51, 71 low-level languages 91–92
M
MAC (media access control) addresses 11–12, 23 machine code 13, 92 magnetic field sensor 62, 65 magnetic storage systems 83, 84 manufacturing, subtractive 69
MAR memory address register 47–48 mathematical functions, standard solutions 119
MD4 hashing algorithm 106, 107
MDR memory data register 47–48 mebibyte (MiB) 4 megabyte (MB) 4 memory devices and media 81–88 primary 81–83 refreshing 82 memory cache 82 memory cards 87 memory dumps 9–10 memory unit 47–48 microphones 51, 59 microprocessors, embedded 43
Microsoft Access 171
MIDI (Musical Instrument Digital Interface) files 76–77 mobile devices cameras 58
271

flexible 73 security risks 113 touchscreen technologies 61 moisture/humidity sensor 62 monitoring, use of sensors 63–64 motion sensor 62 mouse 51, 58 movies on DVD and Blu-ray 86 streaming 86
MPEG-3 (MP3) and MPEG-4 (MP4) files 77–78
MRI (magnetic resonance imaging) 54 multimedia files, MPEG-4 (MP4) format 77 music devices and storage systems 86
MP3 file format 77 streaming 86
N
NAND technology 26, 28 as ‘building block’ 39–40 in solid-state devices 84, 87 nested IF 136
NIC (network interface card) 11
NOR chips 84
NOR gate 26, 28 normal data 119, 169
NOT gate 26, 27 made up of NAND gates 39 number formats 80
O
off-line storage 84–88
OLED (organic light emitting diode) 72–73 online banking, security 109–110 optical character recognition (OCR) 52, 53 optical storage systems 85–86
OR gate 26, 28 made up of NAND gates 39
OS (operating system) 42–43 output, statements 139, 156 output devices 48, 51, 67–75
272

P padlock symbol (https) 24, 99, 103 parallel data transmission 15 parity, even and odd 17–18 parity bit 17 parity blocks 19 parity byte 19 parity check 17–21, 124 partitions, address and contents 47
Pascal/Delphi 146 passwords for an alarm system 64 authentication 107 control 102 for ISP account 22 length check 121 for personal banking 109–110 strong 98 theft 98, 100 and user id 101
PC program counter 47, 48, 49 pen drives 87 perceptual music shaping 77 petabyte (PB) 4 pH sensor 62 pharming 99 phishing 99 photographic files compression 78 wireless transfer 57
PIN, four-digit 109 piracy and copyright infringement, preventing 86, 87 pitch byte, in MIDI files 76 pixels 78, 88–89 plagiarism 110 plain text, unencrypted 107 pointing devices 51, 58–59
POS (point of sale) terminal 56 pre-release material, writing and testing algorithms 169 presence checks 121 pressure sensor 62 primary key field 170, 171
273

PRINT, output statement 139 printers 51, 67, 68
3D 69–70 privacy issues 110 see also security process symbols 142 processor 48 product codes, check digits 122 programming languages 90–92, 146 programs definition and uses 90–91 examples 90, 159 testing 160–161 projectors see light projectors protocols 18 proxy servers 102–103 pseudocode 114, 117, 126, 139–141, 169 assignment 134–135 consistent presentation 134 operators 134 public key encryption 105–107
Python programming language 91, 146–147 declaration of variables and constants 149–151 display 147 example program 159, 160
IDE 95, 147 lists and arrays 164, 165, 166, 167 loops 158 program testing 160–161 repetition 154–155, 157, 158 selection 153
Q
QBE (query-by-example) 173
QR (quick response) code 57 code reader 51
R
RAM (random access memory) 81–82, 83 range checks 121 raw bitmap image, TIFF or BMP 78
274

READ operation 47 real numbers 150 records, in a database 169–170 registers 4–5, 45, 47 relational database management system 171
REPEAT … UNTIL loop structure 137, 138 repetition 157–158 program 154–156 repetitive strain injury (RSI) 58 resolution 78 retina scans 108
ROM (read only memory) 82, 83 running total 139, 159
S
safety system, logic circuit 35–38 sampling rate 71 scanners 51
2D 51–52, 53
3D 52
Scratch programming language 146–147 declaration of variables 90, 149
IDE 90, 148 screen/visual check 124
Scribus (DTP), free software 111 searching, library routines 118 security and data integrity 97–98 denial of service attacks 108 protocols 103–104 risks 98–100 use of personal questions 110 selection 153, 157 sensors 51, 61–63 sequence, importance 157 sequencer software 77 serial data transmission 14–15 session caching 104 shareware 112–113 simplex data transmission 14
Skype (freeware) 112 software on CDs and DVDs 86
275

development 9–10, 13 fault 101 free 111–112 solenoid 62 solid-state storage offline 84 requires careful handling 87 solution, effectiveness 131 sorting, library routines 118 source code editing 98 in freeware and shareware 112
SPECT (single photon emission computed tomography) 54 speech recognition system 59–60 spreadsheet file, lossless compression 80 spyware 100, 110
SRAM (static RAM) 82
SSD (solid-state drives) 84
SSL (secure sockets layer) 103 standard actions, in algorithm design 139 statements, order 157 status byte, in MIDI files 76 stepwise refinement 116 stock control, automatic 56 storage media 81–88 secondary 83–84 storage media, obsolescence 86–87 street lighting, control 65
STRING type variable or constant 150 structure diagrams 114, 116 sub-routines 114, 117, 118 sub-systems 114, 115, 116, 119 supermarkets, computer applications 55–56, 139, 159 symmetric encryption 104–105 synchronous data transmission 16 syntax errors 94, 146
T
tables, in a database 169–170 tags, in HTML 10, 23 tebibyte (TiB) 4 temperature sensor 62
276

terabyte (TB) 4 terminator symbols 142 test data 119–120, 140, 169 text, ASCII format 80 text files file compression 80 formats 52, 80 size 88
TIFF, raw bitmap image 78 timeout 21 tomography 53–54 top-down design 114, 115–116 totalling 154–155, 159 touch pad, on laptop computers 58 touchscreen technology 51, 58, 61 trace tables 125–127 trackerball 58–59 translator programs 92–94 transport layer security (TLS) 103–104 truth tables 26–29 for logic circuits 29–38
TVs, ‘smart’ 86 type checks 121
U
UAA (universally administered MAC address) 11 uniform resource locator see URL universal serial bus see USB
UNIX 42
URL (uniform resource locator) hexadecimal 13
IP address 23 parts 25 stored in QR code 57
USB (universal serial bus) data transmission method 15, 16, 57, 58, 59, 88 flash memories 81, 84, 87 user id/name 22, 98, 101, 107
V
validation of input 166
277

methods 120–124 in Microsoft Access 173 types of checks 121 variable as an index in an array 165 in a computer program 149 velocity byte, in MIDI files 76 verification 124
VIN (vehicle identification number), check digit 122 viruses 98
Visual Basic 146 voice recognition 59–60, 108 von Neumann architecture 45–46
W
wardriving 100 web address see URL web browser see browser
WEP (wired equivalent privacy) encryption 100
WHILE … DO … ENDWHILE loop structure 137, 138
Windows 42–43 wireless, password protection 100
WRITE operation 47
X
XOR gate 26, 29

278

Similar Documents

Premium Essay

Nt1310 Unit 1 Data Performance Analysis

...ANALYSIS OF PROPOSED WORK 4.1 Text Samples The samples of text are taken from a database consisting of about 5500 messages comprising of the messages which are sent from individual-to-individual and those that are sent as spam to a large number of recipients. As stated previously, unsolicited bulk messages are called SPAM, whereas those which are normally send from one-to-one in routine are known as HAM. Table 4.1 enlists a few of such samples. The complete database is provided in the CD ROM enclosed. TABLE 4.1 NORMAL (HAM) AND SPAM TEXT MESSAGES NORAMAL (HAM) SPAM Go until jurong point, crazy.. Available only in bugis n great world la e buffet... Cine there got amore wat... Free entry in 2 a wkly comp to win FA Cup final tkts 21st May 2005. Text FA to 87121 to receive entry question(std txt rate)T&C's apply 08452810075over18's...

Words: 668 - Pages: 3

Free Essay

Programming Assignment 1

...ASSIGNMENT 1 COMP-202, Fall 2014, All Sections Due: September 19th , 2014 (23:59) Please read the entire pdf before starting. You must do this assignment individually and, unless otherwise specified, you must follow all the general instructions and regulations for assignments. Graders have the discretion to deduct up to 10% of the value of this assignment for deviations from the general instructions and regulations. These regulations are posted on the course website. Be sure to read them before starting. Question 1: Question 2: Question 3: 60 points 20 points 20 points 100 points total It is very important that you follow the directions as closely as possible. The directions, while perhaps tedious, are designed to make it as easy as possible for the TAs to mark the assignments by letting them run your assignment through automated tests. While these tests will not determine your entire grade, it will speed up the process significantly, which will allow the TAs to provide better feedback and not waste time on administrative details. Plus, if the TA is in a good mood while he or she is grading, then that increases the chance of them giving out partial marks. Marks can be removed if comments are missing, if the code is not well structured, or if your solution does not follow the assignment specifications. Assignment Question 1: Scratch Project (60 points) You are to head to http://scratch.mit.edu/ and create an account. Start by exploring some projects, and click on the see...

Words: 1417 - Pages: 6

Free Essay

Information Technology

...and arithmetic/logical unit together known as CPU (central processing unit). –Arithmetic/Logic Unit: carries out mathematical operations and logical comparisons, consist of very large scale integrated circuits, can perform billion operations per second, numbers taking from memories as input and results stored in memory as output. -Control Unit: controls the other five compo of the comp system, enables the comp to take advantage of speed and capacity of its other compo, list of operations called a program, these operations read from memory, interpreted and carried out one at a time (stored program concept). –Cache memory: high speed, high cost storage, used as intermediary between control unit and main memory, compensates for speed mismatches built into the comp system. –Multiple processor configurations: a comp system usually contains more than one processor, dual processor contain two physical separate processors as two separate chips, dual core contain two complete processors manufactured as a single chip, dual processor are better and faster. –Input: devices allow users to enter data into the comp for processing, common devices: keyboard, disk drive, magnetic ink character, etc) –Terminal: Simpler than PC, design for input and output, connected to computer with telecommunication line. –Output: devices produce results in usable format, common output methods: printer, output to paper using various types of printers, video display unit, displays output on a screen. –Data: Streams...

Words: 3433 - Pages: 14

Free Essay

Interopérabilité

...Standard du gouvernement du Québec sur les ressources informationnelles Cadre commun d’interopérabilité Volet 0 – Mise en œuvre Version 1.3 31 mars 2005 © Gouvernement du Québec Avertissement Ce document ne constitue pas pour l’instant un standard officiel du gouvernement du Québec. Il a franchi l’étape de l’enquête élargie qui précède son approbation par le Conseil du trésor. Son contenu est encore sujet à modification sans préavis. Toute référence à ce document doit donc obligatoirement inclure la mention « ébauche de standard en cours d’officialisation », en plus du numéro et du nom du standard, ainsi que du numéro et de la date de la version. Pour obtenir des renseignements supplémentaires à propos de ce document, veuillez vous adresser au Sous-ministériat à l’encadrement des ressources informationnelles (SMERI) du Ministère des Services gouvernementaux au (418) 528-6148. . © Gouvernement du Québec Table des matières SIGLES ET ACRONYMES .........................................................................................................................4 1 INTRODUCTION................................................................................................................................6 2 LE CADRE COMMUN D’INTEROPÉRABILITÉ DANS LE PAYSAGE GOUVERNEMENTAL .....................................................................................................................10 3 LA PORTÉE DU CADRE COMMUN D’INTEROPÉRABILITÉ...

Words: 10999 - Pages: 44

Free Essay

Code

...This  is  CS50.   Harvard  College  Fall  2010   Problem  Set  3:  The  Game  of  Fifteen     due  by  7:00pm  on  Fri  10/1     Per  the  directions  at  this  document’s  end,  submitting  this  problem  set  involves  submitting  source  code   on  cloud.cs50.net  as  well  as  filling  out  a  Web-­‐based  form  (the  latter  of  which  will  be  available  after   lecture  on  Wed  9/29),  which  may  take  a  few  minutes,  so  best  not  to  wait  until  the  very  last  minute,     lest  you  spend  a  late  day  unnecessarily.     Be  sure  that  your  code  is  thoroughly  commented   to  such  an  extent  that  lines’  functionality  is  apparent  from  comments  alone.       Goals.     •   Introduce  you  to  larger  programs  and  programs  with  multiple  source  files.   •   Empower  you  with  Makefiles.   •   Implement  a  party  favor.       Recommended  Reading.     •   Section  17  of  http://www.howstuffworks.com/c.htm.   •   Chapters  20  and  23  of  Absolute  Beginner’s  Guide...

Words: 4248 - Pages: 17

Free Essay

An Examination of Discrimination Against Transgender Americans in the Workplace Hearing

...U.S. HOUSE OF REPRESENTATIVES ONE HUNDRED TENTH CONGRESS SECOND SESSION HEARING HELD IN WASHINGTON, DC, JUNE 26, 2008 Serial No. 110–99 Printed for the use of the Committee on Education and Labor ( Available on the Internet: http://www.gpoaccess.gov/congress/house/education/index.html U.S. GOVERNMENT PRINTING OFFICE 43–027 PDF WASHINGTON : 2008 For sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512–1800; DC area (202) 512–1800 Fax: (202) 512–2104 Mail: Stop IDCC, Washington, DC 20402–0001 VerDate 0ct 09 2002 10:55 Dec 17, 2008 Jkt 000000 PO 00000 Frm 00001 Fmt 5011 Sfmt 5011 G:\DOCS\110TH\HELP\110-99\43027.TXT HBUD PsN: DICK COMMITTEE ON EDUCATION AND LABOR GEORGE MILLER, California, Chairman Dale E. Kildee, Michigan, Vice Chairman Donald M. Payne, New Jersey Robert E. Andrews, New Jersey Robert C. ‘‘Bobby’’ Scott, Virginia Lynn C. Woolsey, California ´ Ruben Hinojosa, Texas Carolyn McCarthy, New York John F. Tierney, Massachusetts Dennis J. Kucinich, Ohio David Wu, Oregon Rush D. Holt, New Jersey Susan A. Davis, California Danny K. Davis, Illinois ´ Raul M. Grijalva, Arizona Timothy H. Bishop, New York ´ Linda T. Sanchez, California John P. Sarbanes, Maryland Joe Sestak, Pennsylvania David Loebsack, Iowa Mazie Hirono, Hawaii Jason Altmire, Pennsylvania John A. Yarmuth, Kentucky Phil Hare, Illinois Yvette D. Clarke, New York Joe Courtney...

Words: 49958 - Pages: 200

Premium Essay

None

...Network Security Audit Final Practical Project Steffen L. Norgren A00683006 COMP 8006 - Network Administration & Security II • BCIT • April 18, 2010 TABLE OF CONTENTS Summary 3 Introduction 3 Network #1 4 Detection Overview 4 IP Address Locations 6 Malicious Traffic – TCP 7 Malicious Traffic – UDP 10 Reconnaissance Traffic 11 High Risk Addresses 12 Network #2 16 Detection Overview 16 IP Address Locations 17 Network #3 18 Detection Overview 18 Detection Overview 18 Traffic Overview 19 Conclusions 20 Page 2 of 20 SUMMARY An overview of the data for all three networks shows that each network was compromised in one manner or another. For instance, network #1 had intrusive access via a Microsoft ISS web server to cmd.exe, which allowed complete access to the system. This was achieved through a buffer overflow attack against IIS. As such, the administrator of this network should ensure that all systems are fully patched in order to avoid known exploits. For network #2, an exploit via phpBB enabled access to the system. Network #3, “EXPLOI~1.RTF”, which a user must have downloaded, was executed, opening up a backdoor into the system. Unfortunately, as outlined in my conclusion, an in-depth analysis of this data was aborted partly due to time mismanagement and a very large course load for the term. INTRODUCTION This assignment consisted of the analysis of three...

Words: 3055 - Pages: 13

Free Essay

Software

...HACKING SECRETS REVEALED Information and Instructional Guide HACKING SECRETS REVEALED Production of  S&C Enterprises T able of Contents Disclaimer Introduction i Trojans Joiners ICQ CHAPTER 1 1 Chapter 6 Access Granted CHAPTER 2 1 15 18 18 19 19 19 19 CHAPTER 7 42 43 44 45 49 55 59 Bank Account Information Email Pictures Resume Survellance Via Internet Connection 36 37 39 39 39 40 29 34 34 System Intrusion in 15 Seconds The Trojan Horse The Hack NewsGroups Grapevine Email Un-Safe Websites IRC ChatSites CHAPTER 3 20 20 Acceptable Files Readme & Text Files How To protect Yourself Firewalls Antivirus Software Tips & Tricks Protecting Shared Resources Disabling File and Printer Sharing Oh No My system's Infected Chapter 4 Who are Hackers Anarchist Hackers Hackers Crackers 24 24 25 26 Chapter 8 Every Systems Greatest Flaw Chapter 9 How to Report Hackers 65 60 Chapter 5 Tools of the Trade Portscanners 27 28 Chapter 10 Final Words 74 DISCLAIMER The authors of this manual will like to express our concerns about the misuse of the information contained in this manual. By purchasing this manual you agree to the following stipulations. Any actions and or activities related to the material contained within this manual is solely your responsibility. The misuse of the information in this manual can result in criminal charges brought against the persons in question. The authors will not be held responsible in the event any criminal charges be brought against any individuals...

Words: 11585 - Pages: 47

Free Essay

Pythone

...‫‪Pages de variables‬‬ ‫تعلم البرمجة مع بيثون 3‬ ‫ُ‬ ‫تأليف : جرار سوين‬ ‫ِ‬ ‫ترجمة : هشام رزق الله وآخرون‬ ‫مراجعة و إخراج : مجتمع لينكس العربي‬ ‫النسخة اللكترونية من هذه ص يمكنك الحصول عليهها )باللغة الفرنسية( مجانا وبحرية من:‬ ‫ً‬ ‫النصو‬ ‫ّ‬ ‫‪http://inforef.be/swi/python.htm‬‬ ‫‪) How to think like a computer scientist‬كيف تفكر كعالم حاسوب(‬ ‫بعض فقرات هذا الكتاب قد تم تكييفها وفقا لكتاب:‬ ‫بواسطة: ‪ Allen B. Downey، Jeffrey Elkner‬و ‪Chris Meyers‬‬ ‫أو: ‪http://www.openbookproject.net/thinkCSpy‬‬ ‫متاح على: ‪http://thinkpython.com‬‬ ‫جميع حقوق الطبعة العربّية محفوظة لتجتمع لينكس العربي )2102 – 3102(‬ ‫جميع حقوق الكتاب اللصلي محفوظة للمؤلف جيالد سوينو )0002 – 2102(‬ ‫يتم توزيع هذا الكتاب بموجب ‪" Creative Commons‬رخصة البداع العامة غي التجارية الشاركة باللثل 0٫2".‬ ‫وهذا يعن أنك تستطيع نسخ وتعديل وإعادة توزيع هذه الصفحات بحرية تامة، ش ط أن تتبع عددا من قواعد هذا التخيص.‬ ‫ً‬ ‫وفي الساس، اعلم أنك ل يمكنك الحصول على ملكية هذا النص وإعادة تتتوزيعه )معتتدل أو غيتت معتتدل( محتتدِّدا لنفستتك حقتتوق‬ ‫تأليف ونش أخرى. الستند الذي قمت بإعادة توزيعه، معدل أو غي معدل، يجب أن يتضمن النص الكامتتل للرخصتتة أعله وهتتذا‬ ‫العشعار والتمهيد الذي يأتي بعده. الوصول إلى هذه اللحظات يجب أن يبقى ح را للجميع. يمكنك طلب مساهمة ماليتتة لتوزيتتع‬ ‫ً‬ ‫هذه اللحظات، لكن البلغ الطلتتوب يجتتب أن يرتبتتط بتكلفتتة النستتخ. ل يمكنتتك إعتتادة توزيتتع هتتذه اللحظتتات وجعلهتتا بحقتتوق‬ ‫تأليفك ونش،ك، ول يمكنك أن تحد من حقوق الستنساخ للنسخ الت قمت بتوزيعها.‬ ‫.‬ ‫الترخيص :‬ ‫هذا العمل...

Words: 58244 - Pages: 233

Free Essay

Uefi Shell Specification

...UEFI Shell Specification September 25, 2008 Revision 2.0 The material contained herein is not a license, either expressly or impliedly, to any intellectual property owned or controlled by any of the authors or developers of this material or to any contribution thereto. The material contained herein is provided on an "AS IS" basis and, to the maximum extent permitted by applicable law, this information is provided AS IS AND WITH ALL FAULTS, and the authors and developers of this material hereby disclaim all other warranties and conditions, either express, implied or statutory, including, but not limited to, any (if any) implied warranties, duties or conditions of merchantability, of fitness for a particular purpose, of accuracy or completeness of responses, of results, of workmanlike effort, of lack of viruses and of lack of negligence, all with regard to this material and any contribution thereto. Designers must not rely on the absence or characteristics of any features or instructions marked "reserved" or "undefined." The Unified EFI Forum, Inc. reserves any features or instructions so marked for future definition and shall have no responsibility whatsoever for conflicts or incompatibilities arising from future changes to them. ALSO, THERE IS NO WARRANTY OR CONDITION OF TITLE, QUIET ENJOYMENT, QUIET POSSESSION, CORRESPONDENCE TO DESCRIPTION OR NON-INFRINGEMENT WITH REGARD TO THE SPECIFICATION AND ANY CONTRIBUTION THERETO. IN NO EVENT WILL ANY AUTHOR OR DEVELOPER OF THIS...

Words: 35960 - Pages: 144

Premium Essay

Prueba

...IND131 IND131xx IND331 IND331xx Terminals User’s Guide www.mt.com 64067481 (11/2012).06 © METTLER TOLEDO 2012 No part of this manual may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording, for any purpose without the express written permission of METTLER TOLEDO. U.S. Government Restricted Rights: This documentation is furnished with Restricted Rights. Copyright 2012 METTLER TOLEDO. This documentation contains proprietary information of METTLER TOLEDO. It may not be copied in whole or in part without the express written consent of METTLER TOLEDO. METTLER TOLEDO reserves the right to make refinements or changes to the product or manual without notice. COPYRIGHT METTLER TOLEDO® is a registered trademark of Mettler-Toledo, LLC. All other brand or product names are trademarks or registered trademarks of their respective companies. METTLER TOLEDO RESERVES THE RIGHT TO MAKE REFINEMENTS OR CHANGES WITHOUT NOTICE. FCC Notice This device complies with Part 15 of the FCC Rules and the Radio Interference Requirements of the Canadian Department of Communications. Operation is subject to the following conditions: (1) this device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant...

Words: 37056 - Pages: 149

Free Essay

Vulnerability Assess

...Nessus Report Nessus Scan Report 24/Jan/2014:09:12:12 Nessus Home: Commercial use of the report is prohibited Any time Nessus is used in a commercial environment you MUST maintain an active subscription to the Nessus Feed in order to be compliant with our license agreement: http://www.tenable.com/products/nessus Table Of Contents Hosts Summary (Executive).................................................................................................4 •kupangkota.go.id..........................................................................................................................................................5 Vulnerabilities By Host......................................................................................................... 7 •kupangkota.go.id..........................................................................................................................................................8 Vulnerabilities By Plugin.....................................................................................................64 •51192 (6) - SSL Certificate Cannot Be Trusted....................................................................................................... 65 •57582 (6) - SSL Self-Signed Certificate................................................................................................................... 67 •54582 (2) - SMTP Service Cleartext Login Permitted...........................................................

Words: 29406 - Pages: 118

Premium Essay

Velocity

...TE AM FL Y Mastering Apache Velocity Joseph D. Gradecki Jim Cole Wiley Publishing, Inc. Mastering Apache Velocity Joseph D. Gradecki Jim Cole Wiley Publishing, Inc. Publisher: Joe Wikert Copyeditor: Elizabeth Welch Executive Editor: Robert Elliott Compositors: Gina Rexrode and Amy Hassos Editorial Manager: Kathryn Malm Managing Editor: Vincent Kunkemueller Book Producer: Ryan Publishing Group, Inc. Copyright © 2003 by Joseph D. Gradecki and Jim Cole. All rights reserved. Published by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8700. Requests to the Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4447, E-mail: permcoordinator@wiley.com. Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best efforts in preparing this book, they make no representations...

Words: 70755 - Pages: 284

Free Essay

Abcd

...2010-04-13[11:16:39]: Logging started mode 01570 ---- LOG ROW INFO [0000010] ---- ---- LOG TABLE INFO [0000020] ---- ---- LOG DB INFO [0000040] ---- ---- LOG DBMS INFO [0000100] ---- ---- LOG SQL INFO [0000400] ---- ---- LOG DEBUG INFO [0001000] ---- Portingset mode 6.1c >>msql_attach_server -------------------------------------------------------------------------------- EFFECTIVE MSQL DRIVER SETTINGS -------------------------------------------------------------------------------- Common ~~~~~~ Level : 1 msql_dsn : msql_serverhost : (local) msql_init : 003000 000001:MSQL_ARRAY_FETCH : 0 000002:MSQL_ARRAY_INSERT : 0 000004:MSQL_EXPLAIN : 0 001000:not MSQL_USE_VARCHAR : 1 002000:MSQL_LEVEL1 : 1 004000:MSQL_PRINT_ERROR : 0 010000:not MSQL_LEVEL1 : 0 msql_use_cc : OFF msql_use_sp : ON msql_max_open_handles : 190 msql_max_ret_rows : 0 msql_max_arrsz : 1 msql_array_fetch : 0 msql_array_insert : 0 msql_log_warnings : 0 msql_lock_timeout : 10 (timeout after N seconds) msql_max_sql_buffer : 8000 msql_use_ffo : 1 msql_65_schema : 0 msql_odbc_prof_all : 0 msql_odbc_perf_stat : 0 msql_odbc_long_queries : 0 msql_odbc_query_timeout : 3000 -------------------------------------------------------------------------------- msql_alloc_henv id 8393960 Done. allocate_sql_buffer_area size 8000. msql_attach_server done... tbase_refresh D -1 ...

Words: 92865 - Pages: 372

Free Essay

Global Expansion

...[pic] Assignment for Course: BUS 625 Multi-National Corporations and International Trade Submitted to: Dr. Lee Pickler Submitted by: Zachery Engels, Frank Mayse, and Gina Glorioso Rendall Date of Submission: April 11, 2015 Title of Assignment: Global Expansion Project - Ancestry CERTIFICATION OF AUTHORSHIP: I certify that I am the author of this paper and that any assistance I received in its preparation is fully acknowledged and disclosed in the paper. I have also cited any sources from which I used data, ideas of words, whether quoted directly or paraphrased. I also certify that this paper was prepared by me specifically for this course. Student Signature: __Gina Glorioso Rendall__________ ******************************************* Instructor’s Grade on Assignment: Instructor’s Comments: AN EXECUTIVE BRIEFING ON [pic] Researched by Downtown Dominators Zachery Engels, Franklin Mayse, and Gina Glorioso Rendall Spring 2015 TABLE OF CONTENTS INTRODUCTION TO THE STUDY 5 DOMINANT MARKET ENVIRONMENT ASSESSMENT 5 INTRODUCTION 5 POLITICAL / REGULATORY 5 ECONOMIC: MACRO 5 TECHNOLOGY 6 SOCIETAL 6 INDUSTRY ANALYSIS AND COMPANY PERFORMANCE 6 SUMMARY 8 INTRODUCTION 9 FINANCIAL RESOURCE ASSESSMENT 9 CASH 9 MARKETABLE SECURITIES 9 LEVERAGE (ABILITY TO BORROW) 9 CREDIT RATING 10 STANDARD AND POOR RATING 10 ...

Words: 11356 - Pages: 46