Download Course Arrangements: Higher Computing 6

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts
Transcript
-1-
Higher Computing Checklist
Computer Systems
Notes
Topic
Page
No
Class
Home
Covered Covered
Data Representation
Representation of positive numbers in binary
Conversion from binary to decimal and vice versa
representation of negative numbers using two’s
complement using examples of
up to 8 bit numbers
mantissa / exponent
range and precision of floating point numbers
Conversion to and from bit, byte, kilobyte,
Megabyte, Gigabyte, Terabyte. (
Unicode
ASCII
bit map graphics
bit depth
vector graphics
relationship between bit depth and file size
data compression, need for
Computer Structure
ALU
Control Unit
Registers, purposes of
data bus
address bus
control lines, read, write and timing functions of
control lines reset, interrupt lines
fetch-execute cycle
registers
cache
main memory,
backing storage
Addressability
measures of performance: clock speed,
MIPS,FLOPS, and application based tests
system performance and data bus width, use of cache
memory, rate of data transfer to and from peripherals
current trends in computer hardware
Peripherals
buffers and spooling
selection of hardware, including peripherals, to
support typical tasks
Justification of the hardware selected in terms of
appropriate characteristics including resolution,
capacity, speed, cost and compatibility
solid state storage devices including flashcards
development trends in backing storage devices



-2functions of an interface
Parallel and serial interfaces
increasing interface speeds and
wireless communication between peripherals and
CPU,
Networking
LANs
WANs
Intranet
Internetwork
mainframe with terminals
peer-to-peer networks
client server networks
file, print and web servers
node
channel
bus topology
star topology
ring topology
mesh topology
hub
switch
router.
Network interface card (NIC).
Bandwidth
wireless communications
advances in computer hardware, including
processors, main memory capacity, backing
storage, data transfer rates
improved network related software, including
browsers and network operating systems breaching
copyright,
hacking
viruses
Computer Misuse Act
Copyright Designs and Patents Act
Data Protection Act
Computer Software
bootstrap loader
single user operating system:
interpreting users commands
file management
memory management
input/output management,
resource allocation
managing processes
utility
virus checker
disk editor
defragmenter)
standard file formats for graphics files: jpeg, gif,
TIFF
Classification of viruses
-3file virus
boot sector virus
macro virus
replication
camouflage
watching
delivery
virus
worm
trojan horse
anti-virus software detection techniques
use of checksum
virus
signature
heuristic detection
memory resident monitoring