CS As General Notes 4 Paper 1
CS As General Notes 4 Paper 1
https://theenglishschool-my.sharepoint.com/:w:/g/personal/s161006_englishschool_ac_cy/EcaJDsHsFmxMve-
hkbPYEFcBLKQEc4TD_DH26fcmu_Bm3Q?e=3K5Ks2
Compression in sound:
-Reducing amplitude to the human hearing range, this means there is a limited amplitude therefore fewer bits
per second and thus less file size
-Run Length Encoding (RLE), consecutive sounds are the same, so they are recorded in binary value and the
number of time it repeats. This way, RLE allows the changes in the binary values to be recorded instead of the
actual sound which takes up less storage space.
Sample size:
-Higher sample rate will mean smaller time gaps between samples, and this will make the digital sound wave
more accurate.
-Therefore more bits are stored as more samples are taken, which increases file size.
Networks:
LAN:
-Small geographical area
WAN:
1 MAR←[PC]
2 PC←[PC] + 1
3 MDR ← [[MAR]]
4 CIR ← [MDR]
-Address from the Program Counter is sent to the Memory Address Register
-The Program Counter now is incremented by one so it points to the next program to be executed
-Contents of Memory Address Register is copied onto the Memory Data Register
-Address from the Memory Data Register is copied to the Current Instruction Register
Keys:
Primary key:
Foreign key:
Access rights:
-Uses accounts/logins/passwords
ROM technologies:
PROM can be set only once, since writing is done by blowing fuses
EPROM has to be removed from the device for it to be erased (unlike EEPROM)
Electronic circuits control the movement of the arm (and hence the
heads)
One track in one sector is the basic unit of storage called a block
When reading from disk, a variation in magnetic field produces a variation in current through the head
2NF: All attributes must be fully dependant on the (composite) primary key // No partial dependencies
3NF: All attributes must be fully dependent on the primary key and no other attributes // no non-key
dependencies // no transitive dependencies
Existence check: checks whether data matches an entry in a list of data table of valid options
Limit check: Range check but only checks upper or lower bound of data
Data Verification:
Double entry: entering data twice, which then lets the computer compare the two to see if they match
Visual check: Manually compare and correct whether the data entered is the same as the data that needs
to be sent
IDE Features:
Dynamic syntax check: Underlines or highlights statements that do not meet the rules of the language
-Usually used in representation of digits on a digital clock display such as that on a calculator screen
Embedded Systems:
-Embedded systems involve installing microprocessors into devices to allow for operations with said device
to be controlled in a more efficient way by using a web activated device for example
-Mark schemes usually just ask for you to say that it does one specific thing.
SUKILI !!!!!:
# Part of a query that only selects data that fits a certain condition. Logical operators can also be used.
# Inner join combines rows from 2 tables so they can be selected in 1 query
# Above, all data that contains data from the specified fields in table 1 and 2 will be selected
# Line 2 joins the tables together using a common field that they both have
# t1foreignkey is the same field as t2primarykey
GROUP BY {field_name};
# Arranges data into groups that are inside the certain field given
# can delete the table,fields or specific entities depending how its written
AGGREGATE FUNCTIONS:
SQL COMMANDS:
# creates a database
SQL DATATYPES:
BOOLEAN # boolean
INTEGER # integer
Binary shifts:
Directions:
(all examples below will use the process of 2 right shifts for convenience)
Logical shift: bits shifted out of the register are replaced with zeros.
Arithmetic shift: doubles if left, halves if right. Never shift 1st bit, shift bits like logical but if its a right shift,
replace new bits with MSB
im lazy
Embedded System:
An embedded system is a microcontroller or microprocessor based system which is designed to perform a
specific task. They are built into the device/system hence the name
Hacker:
Logical schema:
a data model for a specific database that is independent of the DBMS used to build the database. (Put this
when u need to write some theory about E-R diagrams)
Operation of a compiler:
Operation of an Interpreter:
writing
reading
Hardware component that allows a device to connect to a wireless network // Provides a MAC address to
the device to identify it on the wireless network
Hardware component that provides radio communication from the central device to nodes on the network
(and vice versa)
Router:
Receives and sends data between two networks operating on the same protocol
Repeater:
Fibre optic has higher bandwidth than copper cable // Fibre optic has
higher transmission rates than copper cable
Fibre optic has smaller risk of (noise) interference than copper cable
Fibre optic can be used over longer distances than copper cable before
repeaters are needed
Fibre optic is much more difficult to hack into than copper cable
CSMA/CD:
…data is only sent when the channel is free // ... if channel is free data
is sent
... two workstations can start to transmit at the same time, causing a
collision
Character set:
ASCII
Extended ASCII
UNICODE
No of bits:
The (text) file would be corrupted // the (text) file cannot be opened
When ISR finished, check for further interrupts (of higher priority) /
return to step 1
Otherwise load data from stack and continue with next F-E cycle (of
process)
FE register shit:
-Program Counter: to store the address / location / memory location of the next instruction to be fetched
-Index Register: to store a value that is added to an address to give another address
-Status Register: to store flags which are set by events // from the results of arithmetic and logic operations and
interrupt flags
Arithmetic operations
- Perform addition and subtraction
Compare instructions
- Compare the result to another value
Memory management
Creates files/folders
Renames file/folders
Security management
Creates accounts/passwords
Hardware management
Process management
supports multitasking
Back-up software:
Defragmentation software:
Compression software
Virus checker
Encryption
Access rights
Verification checks if the data matches the data given it does not check
if the original data is accurate
Cloud server:
Public:
- Computing services offered by 3rd party provider over the public
Internet
Private
- Computing services offered either over the Internet or a private internal
network
A tuple is an entity, ig