Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
-1- Higher Computing Checklist Computer Systems Notes Topic Page No Class Home Covered Covered Data Representation Representation of positive numbers in binary Conversion from binary to decimal and vice versa representation of negative numbers using two’s complement using examples of up to 8 bit numbers mantissa / exponent range and precision of floating point numbers Conversion to and from bit, byte, kilobyte, Megabyte, Gigabyte, Terabyte. ( Unicode ASCII bit map graphics bit depth vector graphics relationship between bit depth and file size data compression, need for Computer Structure ALU Control Unit Registers, purposes of data bus address bus control lines, read, write and timing functions of control lines reset, interrupt lines fetch-execute cycle registers cache main memory, backing storage Addressability measures of performance: clock speed, MIPS,FLOPS, and application based tests system performance and data bus width, use of cache memory, rate of data transfer to and from peripherals current trends in computer hardware Peripherals buffers and spooling selection of hardware, including peripherals, to support typical tasks Justification of the hardware selected in terms of appropriate characteristics including resolution, capacity, speed, cost and compatibility solid state storage devices including flashcards development trends in backing storage devices -2functions of an interface Parallel and serial interfaces increasing interface speeds and wireless communication between peripherals and CPU, Networking LANs WANs Intranet Internetwork mainframe with terminals peer-to-peer networks client server networks file, print and web servers node channel bus topology star topology ring topology mesh topology hub switch router. Network interface card (NIC). Bandwidth wireless communications advances in computer hardware, including processors, main memory capacity, backing storage, data transfer rates improved network related software, including browsers and network operating systems breaching copyright, hacking viruses Computer Misuse Act Copyright Designs and Patents Act Data Protection Act Computer Software bootstrap loader single user operating system: interpreting users commands file management memory management input/output management, resource allocation managing processes utility virus checker disk editor defragmenter) standard file formats for graphics files: jpeg, gif, TIFF Classification of viruses -3file virus boot sector virus macro virus replication camouflage watching delivery virus worm trojan horse anti-virus software detection techniques use of checksum virus signature heuristic detection memory resident monitoring