J277 (9-1) Computer Systems Revision

An interactive worksheet with revision notes and quiz questions. One attempt per question!

Lesson 1: Data Representation

Binary, Denary & Hexadecimal

  • Why Binary? Computers use binary because they are made of switches that can only be on or off (representing 1 or 0).
  • Conversions: You need to be able to convert between all three number systems: Denary (base 10), Binary (base 2), and Hexadecimal (base 16).
  • Binary Shifts: A left shift multiplies a number by 2 for each place moved. A right shift divides a number by 2 for each place moved.

File Sizes & Character Sets

  • File Units: Be able to compare file sizes (e.g., 0.1 GB is 100 MB). Remember the order: Byte, Kilobyte (KB), Megabyte (MB), Gigabyte (GB), Terabyte (TB).
  • Character Sets: A character set like ASCII stores a list of all available characters. Each character is given a unique binary code. Upper-case and lower-case letters have different codes.

Topic 1 Quiz: Data Representation (6 Q's)

1. Which statement about binary is true?
2. Convert the denary number 49 to 8-bit binary.
3. Convert the 8-bit binary number 01100110 to denary.
4. Convert the 2-digit hexadecimal number F4 to 8-bit binary.
5. Which of these file sizes is the largest?
6. In a character set, each character is given a...?

Lesson 2: Networks & Protocols

LANs (Wired vs. Wireless)

  • LAN (Local Area Network): Covers a small geographical area (e.g., one building). A key characteristic is that the organisation owns all the network hardware.
  • Wired Benefits: More secure from eavesdropping, faster and more reliable connection (less interference).
  • Wireless Benefits: Allows devices to be portable, easier to connect new devices, no need to run physical cables.

Network Protocols

Protocols are rules for communication. They are split into layers to make them manageable (each layer handles one job and passes data to the next).

  • HTTP: Used for viewing standard webpages.
  • HTTPS: A secure version of HTTP, used for sensitive data (like banking).
  • FTP (File Transfer Protocol): Used for downloading/uploading files.
  • IMAP (Internet Message Access Protocol): Used for checking and receiving emails.

Topic 2 Quiz: Networks & Protocols (6 Q's)

7. Which protocol is used for securely accessing a bank account?
8. Which protocol is used for downloading a file from a web server?
9. Which protocol is used for checking for new emails in an inbox?
10. What is a reason for using layers in protocols?
11. What is a characteristic of a Local Area Network (LAN)?
12. What is a drawback of a wireless connection compared to wired?

Lesson 3: Images, Storage & VM

Image Representation

  • Metadata: Data *about* the data. For an image, this includes its width, height, and colour depth.
  • Pixel Data: The image itself is stored as a sequence of binary values, one for each pixel, read from left-to-right, top-to-bottom.
  • Colour Depth: The number of bits per pixel. A 4-bit colour depth can store $2^4$ = 16 different colours. Increasing it to 2 bytes (16 bits) would allow $2^{16}$ = 65,536 colours, but would also massively increase the file size.

Primary vs. Secondary Storage

  • Primary Storage (RAM/ROM): Volatile (RAM) or Read-Only (ROM), holds data the CPU is *currently* using.
  • Secondary Storage (HDD/SSD): Non-volatile, long-term storage. A computer needs both: secondary storage to hold the OS and files permanently, and primary storage (RAM) to load them into when they are in use.
  • Virtual Memory (VM): A section of the secondary storage (e.g., HDD/SSD) used as temporary RAM when the RAM is full. Data is moved from RAM to VM, and then back to RAM when needed.

Topic 3 Quiz: Images, Storage & VM (6 Q's)

13. What is meant by metadata in an image file?
14. What is the maximum number of different colours that can be represented with a 4-bit colour depth?
15. What are two effects of increasing an image's colour depth from 4 bits to 2 bytes (16 bits)?
16. Why does a computer need both primary and secondary storage?
17. Virtual Memory (VM) is needed when...
18. Virtual Memory (VM) is a section of...

Lesson 4: Security & Software Models

Network Security

  • Spyware: Software that secretly records user actions. Prevented by Anti-malware.
  • Brute-force attack: Tries every possible password. Can be slowed by Firewalls (blocking repeated attempts).
  • Data Interception: Eavesdropping on data sent over a network. Prevented by Encryption.
  • SQL Injection: Malicious code entered into a website form to steal data. Prevented by Penetration Testing (to find the vulnerability).

Software Models

  • Client-Server: A model where a Client (e.g., your computer) requests services from a Server (e.g., a website's computer) which stores, processes, and provides the data.
  • Proprietary Software: Source code is kept secret, and users buy a licence to use it. Benefit: The artist/programmer earns money and has full control.
  • Open Source Software: Source code is publicly available. Benefit: Users can modify the code to fix bugs or add features.

Topic 4 Quiz: Security & Software Models (6 Q's)

19. Which threat is prevented by Encryption?
20. Which threat is software that secretly records what you type?
21. Which threat involves trying every possible password to gain access?
22. An artist uploads an image to a website. The artist's computer is the...
23. The website's computer, which stores the images, is the...
24. What is a benefit to a user of open source software?

Lesson 5: Embedded Systems & Legal/Ethical

Embedded Systems

  • Definition: An embedded system is a computer built into a larger device to perform a specific, dedicated task (e.g., parking sensors, a microwave controller, engine management).
  • It is *not* a general-purpose computer like a laptop.

Legal, Ethical & Privacy Issues

  • Legal Issues: Involve breaking the law. For example, using facial recognition to store personal data (a face scan) without consent could breach the Data Protection Act (DPA).
  • Ethical Issues: Morally questionable actions. For example, is it right to track people's movements in a shopping centre without telling them?
  • Privacy Issues: Relate to an individual's right to be "left alone". Storing and tracking individuals' faces and locations is a major invasion of privacy.

Topic 5 Quiz: Embedded & Legal/Ethical (6 Q's)

25. Which of these is the best example of an embedded system?
26. Why is a car's parking sensor an embedded system?
27. Storing a person's face scan without their permission is most likely a breach of which legal act?
28. Tracking shoppers' movements without telling them is best described as an...
29. A text document needs to be compressed to save space, but no data can be lost. Which compression should be used?
30. An image file needs to be compressed as small as possible, and a slight drop in quality is acceptable. Which compression is best?

Revision Complete!

Well done, Student!

You've completed the J277 interactive revision.

Your final score:
0 / 0

Your Personal Feedback: