Você está na página 1de 88

Computer Studies

Form 5
Syllabus 2013
Form 5 Computer Studies Notes

TABLE OF CONTENTS

2.4 TRANSLATION OF HIGH-LEVEL LANGUAGES ............................... 6

2.4.1 Higher Level Languages, Translators, Source and Executable Code .........6

4.6 LANGUAGE TRANSLATORS.................................................................. 9

4.6.1 The difference between compilers, interpreters and assemblers the


relative advantages (and disadvantages) of each. ..........................................................9
Assembler .............................................................................................................................................9
Compiler ..............................................................................................................................................10
Interpreter .........................................................................................................................................11
Which to use Compiler or Interpreter? .........................................................................11

4.6.2 Source code and Executable Code ...............................................................................12

4.6.4 4GL ..................................................................................................................................................13

4.6.5. Software Portability ............................................................................................................15

2.3 THE CPU ................................................................................................... 16

2.3.14 Typical machine code instructions - load, store and process (e.g. Add,
sub etc.) instructions. ......................................................................................................................16
Moving of Data.................................................................................................................................17
Computing ..........................................................................................................................................18
Affecting the Program Flow .....................................................................................................19

2.3.15 Using mnemonics to represent machine instructions. ..................................19

2.3.16 Symbolic addressing. ........................................................................................................21

2.3.17 Conditional and unconditional branches ...............................................................23


Unconditional Jump ......................................................................................................................24
Conditional Branching .................................................................................................................24

2.5 THE OPERATING SYSTEM .................................................................. 27

2.5.1 System software; Resource management functions of OS ...........................27


Process Management ...................................................................................................................27
Memory Management ..................................................................................................................28
Disk Management (File Systems) .........................................................................................29
Networking ........................................................................................................................................29
Security ................................................................................................................................................30
GUI (Graphical User Interface) .............................................................................................31
Device Drivers ..................................................................................................................................33

Mr.A.Gatt Page 2 of 88
Form 5 Computer Studies Notes

3.5 TYPES OF OPERATING SYSTEMS .................................................... 34

3.5.1 Real time OS..............................................................................................................................34

3.5.2 Batch OS ......................................................................................................................................36

3.5.3 Time sharing OS ......................................................................................................................37

3.5.4 The necessity of different OS's to support different modes and


configurations. .....................................................................................................................................38
Real-Time Operating System ..................................................................................................39
Batch Operating System ............................................................................................................39
Time Sharing Operating System ...........................................................................................40

3.5.5 Common types of operating systems single-user, multiuser,


networked, single programming, multi programming. ................................................40

2.8 DEDICATED COMPUTER SYSTEMS.................................................. 42

2.8.1 Difference between a general-purpose and a dedicated computer. ........42

2.8.2 Embedded and process control systems. .................................................................42

2.8.3 Computerised appliances as an example of dedicated systems VCR,


auto pilot, mobile phones, GPS, etc. .......................................................................................43

2.8.4 Specialised I/O devices (sensors, buttons, LCD). ..............................................44

2.8.5 Software for dedicated computer systems .............................................................47

3.4 NETWORKS ............................................................................................. 48

3.4.1 Networking LAN and WAN ................................................................................................48

3.4.2 Advantages of a LAN ............................................................................................................49

3.4.3 Use of modems ........................................................................................................................50

3.4.4 Use of WANS for email, WWW, Video Conferencing .........................................52


E-Mail (Electronic Mail) ..............................................................................................................53
WWW (World Wide Web) ..........................................................................................................55
Video Conferencing .......................................................................................................................57

3.4.5 Server and client machines; the problem of bandwidth at a general


level. ...........................................................................................................................................................57
Network Topology .........................................................................................................................59
Bus Network .................................................................................................................................59
Ring Network ...............................................................................................................................60
Star Network ................................................................................................................................61

5.3 DATA SECURITY AND PRIVACY ...................................................... 62

Mr.A.Gatt Page 3 of 88
Form 5 Computer Studies Notes

5.3.1 Need of data security and integrity of data. ..........................................................62

5.3.2 Backups (the generations of files: grandfather, father, son files), .........62

5.3.3 Physical security and software safeguards. ..........................................................64


Physical Security ............................................................................................................................64
Software Security ..........................................................................................................................65
IDS (Intrusion Detection System) ..................................................................................65
User ID (User Identification) .............................................................................................65
Biometric ........................................................................................................................................66
Encryption .....................................................................................................................................66
Digital Signature ........................................................................................................................67
Digital Certificate ......................................................................................................................67

5.3.4 Software piracy and copyright. .....................................................................................68


Copyright ............................................................................................................................................69

5.3.5 Ethical and legal issues. .....................................................................................................70


Ethical Issues ...................................................................................................................................70
Legal Issues ......................................................................................................................................72

5.3.6 Hardware and software procedures which deter piracy - serial


numbers and activation keys, hardware keys (dongles). ..........................................73

5.3.7 Software registration. .........................................................................................................74

5.3.8 Access rights. Privacy on multi-user/network systems. ................................74

5.2 EFFECTS OF COMPUTER-BASED SYSTEMS ON INDIVIDUALS,


ORGANISATIONS AND SOCIETY ............................................................ 76

5.2.1 Positive and negative effects of computerisation ..............................................76


Computers and Work ...................................................................................................................76
Computers and the Workplace ...............................................................................................77
Computers and Society (involving the Internet) ........................................................77
Computers and the Individual ................................................................................................78

5.4 MULTIMEDIA .......................................................................................... 79

5.4.1 Brief overview of capabilities and trends................................................................79


Interactive Video ...........................................................................................................................79
Browse .................................................................................................................................................80
Video Clip ............................................................................................................................................80
Video Data Compression ............................................................................................................80

5.4.2 Future perspectives (home office, access to public and institutional


databases, libraries, high-quality sound and pictorial data representation). 81

5.4.3 Basic hardware and software requirements and costs. ..................................83

3.2 ROLES RELATED TO AN I.T. ENVIRONMENT .............................. 84

Mr.A.Gatt Page 4 of 88
Form 5 Computer Studies Notes

3.2.1 Information Systems Manager.......................................................................................84

3.2.2 Systems Analyst/Designer ...............................................................................................84

3.2.3 Systems Administrator .......................................................................................................85

3.2.4 Programmer ..............................................................................................................................86

3.2.5 I.T. Trainer .................................................................................................................................86

3.2.6 Operator ......................................................................................................................................87

3.2.7 Data Clerk ...................................................................................................................................87

3.2.8 Web Master ................................................................................................................................87

3.2.9 Lab technician ..........................................................................................................................88

3.2.10 Maintenance engineer ......................................................................................................88

Mr.A.Gatt Page 5 of 88
Form 5 Computer Studies Notes

2.4 Translation of High-Level Languages

2.4.1 Higher Level Languages, Translators, Source and Executable


Code

Machine code is the closest language to the computer system. When


coding in machine code, only binary can be used; therefore everything
has to be coded in 1s and 0s. So, a programming statement in
machine code could be something similar to this:

0 0 0 1 0 0 0 0 1 0 0 0

Op-code Operand or Address

In this case the first four bits of the statement are op-codes (which
determine the function that must be worked out), and the second part
the operand reflects the data which is passed on to the function; or
in certain cases an operand might be replaced by a memory location
(address).

The combination of bits in the op-code section refers to a special


function; for example: the combination 0001 represents ADD, 0002
represents MUL, etc In the above example, since there are four bits
assigned to the op-code section, there can be a total of 24=16 different
functions.

When assembly language is used, mnemonics are used instead of the


actual machine code. So instead of coding 0001|00001000 we can use

Mr.A.Gatt Page 6 of 88
Form 5 Computer Studies Notes

ADD 8. However, since this is not machine code, we have to convert it


using a special application called an assembler. An assembler
converts the mnemonics and the relative operands and/or addresses
to machine code. This is the case also for all other high-level
languages; when a program is not coded in machine code, the high-
level coding has to be converted into machine code. In the case of
high-level languages compilers and interpreters are used.

High-level languages were developed with the primary aim of ease of


use for the user. Whilst a machine code program is executed very fast
on a computer, its coding can be a very difficult process for the
programmer because everything has to be coded in binary. Also, a
simple task (such as adding two numbers) that might require various
lines in a low-level language (such as Assembly) can be worked out in
fewer lines using a high-level language (such as Pascal); this is shown
in the following example:

The task is to add two numbers (6 and 9) and display their total.

Assembly
Pascal
Language

MOV AX, #6
MOV BX, #9
ADD AX, BX
PUSH AX WRITE(6+9);
CALL WRITE

Figure 1 : Assembly vs. Pascal

Mr.A.Gatt Page 7 of 88
Form 5 Computer Studies Notes

4.6 Language Translators

4.6.1 The difference between compilers, interpreters and assemblers


the relative advantages (and disadvantages) of each.

Computers can only understand machine code (1GL), so in order to


convert all other generation of languages, a translator is required.
This translator is required to change the source code (code created by
the user) into executable code (code that the computer is able to
understand).

Source Translator
Code Executable

Figure 2: Source Code into Executable

However, there is the need for more than one type of translator:
Assembler: This is used to convert assembly language into
machine code.
Compiler & Interpreter: These are both used to convert higher
generation languages into machine code.

Assembler

The assembler is used to convert Assembly code into machine code.


Assemblers are usually very fast to convert the source code into
executable code because assembly is very close to the computer
language.

Mr.A.Gatt Page 9 of 88
Form 5 Computer Studies Notes

The main duties of the assembler are to:


Translate each source code instruction into machine code
Place program instructions into memory locations
Assign the required address
Hand over the execution of the program to the Control Unit

The above duties are a general outline of the duties of an assembler,


because these might vary between different assemblers and different
CPUs.

Compiler

A compiler is used to convert a high-level language program into an


executable file. A compiler is dedicated only to one programming
language; i.e. a compiler that works for Pascal will not work for C.
Also, compilers vary from architecture to another, i.e. a compiler of
C++ for a PC will not be the same as a compiler of C++ for Macintosh.

The compilers task is to translate the source code into executable


code. This is done by translating the existing code at one go. During
this translation process the compiler checks the syntax of the
program to make sure that the program is well-coded (no errors) and
that the program makes use of existing reserved words.

After the program is thoroughly checked, all libraries used (such as the
CRT library in Pascal) are linked, and the program is converted into
machine code, which in turn is passed on to the control unit so that
the program is executed.

Mr.A.Gatt Page 10 of 88
Form 5 Computer Studies Notes

Interpreter

Interpreter has the same functions of a compiler, but the difference is


that Interpreter checks each statement as it is being typed in. When
using a compiler like Pascals, first the whole program is coded, and
then the program is compiled all lines at one go, and in the case of any
errors, the programmer will be informed. When using Basic (which
uses an interpreter), as soon as a statement is coded, and the Enter
button is pressed, the interpreter will inform the programmer of any
errors found in that line. So, an interpreter changes the source code
into machine go, as it is being typed.

Which to use Compiler or Interpreter?


The choice between a compiler and interpreter depends on the
scenario. If a program is being developed and requires testing,
interpreter is ideal, because it highlights the mistakes as the
programmer goes along. However, once the program has been fully
coded and tested, it is more feasible to use a compiler because it is
faster than an interpreter.

Summary of Differences between Assembler, Compiler and Interpreter


Assembler Compiler Interpreter
Can only be used for 2GL Must be used for higher Must be used for higher
code. generation languages. generation languages.
Assemble the source code Compiles the source code Interprets the source code
all at once. all at once. one line at a time.
Errors are very difficult to Errors are more difficult to Errors are easy to find and
find. find. correct.
Very fast execution. Very fast execution. Slow execution.
Example: Assembly Example: Pascal Example: Basic

Figure 3: Language Translators Choice

Mr.A.Gatt Page 11 of 88
Form 5 Computer Studies Notes

4.6.2 Source code and Executable Code

Source code is the code as typed in by the programmer. The structure


and syntax of the source code depends on the programming language
used. The following code illustrates a function which adds up two
numbers. The first example is in PASCAL and the second in C++.

PASCAL
Function AddNums(n1 : integer, n2: integer):integer;
Begin
AddNums:=n1+n2;
End;

C++
int AddNums (int n1, int n2)
{
return n1+n2;
}

As you can see from the above code statements, in order to carry out
the same thing, different structures are used for different languages. A
computer does not understand any of these languages unless it uses a
translator (interpreter or compiler). So, all these English-like
statements must be converted into machine code (1s and 0s) so that it
can be understood by the computer. Once these have been compiled,
these applications can run without the need for these translators, so in
turn we have the executable file, which under the Windows operating
system has an EXE extension.

Mr.A.Gatt Page 12 of 88
Form 5 Computer Studies Notes

If one tries to open the EXE files using the same programming
languages editor, one will find that the program is not the same (and
it is unreadable). This happens because after the source code has been
compiled into an executable, the executable file is in the computers
language (machine code).

4.6.4 4GL

A Fourth generation language (4GL) is a computer language that is


more advanced than traditional high-level programming languages.
For example, in dBASE (a 4GL created for databases), the command
List displays all the records in a data file. In second- and third-
generation languages, in order to read all records in a data file a
number of steps must be carried out, such as:
Read a record
Test if it is the end of the file
If it is not the end of the file display the record on screen, and
go back to the start
If it is the end of the file, stop program.

First-generation languages are machine languages; second-generation


are machine-dependent assembly languages; third-generation
languages are high-level programming languages, such as FORTRAN,
COBOL, BASIC, Pascal, and C.

Although many languages are called fourth-generation languages, they


are actually a mix of third and fourth. For example, the List command
in dBASE is a fourth-generation command, but applications
programmed in dBASE are third-generation.

Mr.A.Gatt Page 13 of 88
Form 5 Computer Studies Notes

The following command examples show the difference between third


and fourth-generation syntax to open a customer file and display all
names and addresses on screen.

dBASE 3GL dBASE 4GL


use customer use customer
do while .not. eof() list name, address
? name, address
skip
enddo

Figure 4: 3GL vs 4GL

Query language (SQL) and report writers are also fourth-generation


languages. Any computer language with English-like commands that
does not require traditional input-process-output logic falls into this
category.

Many fourth-generation language functions are also built into graphical


interfaces and activated by clicking and dragging. The commands are
embedded into menus and buttons that are selected in an appropriate
sequence.1

1
Source: http://www.answers.com/topic/fourth-generation-programming-language

Mr.A.Gatt Page 14 of 88
Form 5 Computer Studies Notes

4.6.5. Software Portability

When using low-level languages, it is very difficult to make a program


that was created on a computer to work on another type of computer
that has a different CPU and/or hardware devices. So, clearly the
biggest benefit of high-level languages is that it can run on various
machines provided that there is the required translator.

When using assembly language, the coding required to perform a


particular task may vary from one computer to another. Hence, a
program coded on a Pentium 3 processor will probably not work on an
Athlon processor (and the other way round). But, by using a high-level
language the program can be translated to the computers language
and therefore can run on different machines. This is known as
Software Portability.

The best example of software portability is JAVA. After a program has


been coded in JAVA, it is not compiled immediately, but it is compiled
only when it is needed. This makes it possible that a JAVA program
runs on different platforms (different operating systems and/or CPUs)
without any problems, since the program is compiled accordingly.

Mr.A.Gatt Page 15 of 88
Form 5 Computer Studies Notes

2.3 The CPU

2.3.14 Typical machine code instructions - load, store and process


(e.g. Add, sub etc.) instructions.

The Assembly language is made up of op-codes (mnemonics) and


operands. These op-codes can be compared to reserved words in a
higher-level programming language - like the reserved words Readln,
Writeln, RepeatUntil in Pascal.

2
Instructions in assembly language are generally very simple, unlike in
a high-level language. Any instruction that references memory (either
for to store or retrieve data, or as a jump target) will also have an
addressing mode to determine how to calculate the required memory
address. More complex operations are then built on the concept of
these simple operations.

2
Source: http://en.wikipedia.org/wiki/Assembly_language#Machine_instructions

Mr.A.Gatt Page 16 of 88
Form 5 Computer Studies Notes

Some operations available in most instruction sets include:

Moving of Data

Set a register (a
temporary STO 10
This will store a result (found in
location in the CPU itself) to a
the accumulator) to a memory
fixed constant value.
location, which in this case is 10.
Move data from a
memory mov ah, 09
location to a register, or vice This will move the constant
versa. This is done to obtain the number 9 to the register ah.
data to perform a computation on
it later, or to store the result of a
computation.
Read and write data from INP ah, 145
Receives input from the input
hardware devices
device with the code 145 and
stores it into register ah.

Mr.A.Gatt Page 17 of 88
Form 5 Computer Studies Notes

Computing

Add, subtract, multiply, or divide ADD AX, BX


Add the contents found in the
the values of two registers,
register AX with the contents in
placing the result in a register
register BX and store the result in
register AX.
Perform bitwise operations, taking OR AX, BX
Executes an bit-wise OR between
the conjunction / disjunction
the two registers and stores the
(and/or) of corresponding bits in a
result in BX.
pair of registers, or the negation
(not) of each bit in a register

Compare two values in registers CMP AX, BX


Compares the values by
(for example, to see if one is less,
subtracting the BX from AX, the
or if they are equal)
result is not stored.

Mr.A.Gatt Page 18 of 88
Form 5 Computer Studies Notes

Affecting the Program Flow

Jump to another location in the JMP dest


This will force the flow of the
program and execute instructions
program to jump to the
there
destination specified as an
argument.
Jump to another location if a JNZ dest
This will jump to the destination if
certain condition holds
the accumulator is not Zero.

For more info:


http://en.wikibooks.org/wiki/X86_Assembly/X86_Instructions

2.3.15 Using mnemonics to represent machine instructions.

As already mentioned in previous sections, coding in binary is a very


difficult and time-consuming process, hence assembly was created.
So, instead of coding in binary numbers, mnemonics are used.

Mnemonics are short words (usually made up of 3 characters) which


when invoked, perform a function. These mnemonics are much easier
to remember by programmers, since their make-up usually refers to
what they will perform, for example:

Mr.A.Gatt Page 19 of 88
Form 5 Computer Studies Notes

Op.code
(binary) Mnemonic Function
LoaD Accumulator with contents of specified
0000 LDA address.
0001 STA STore Accumulator contents in specified address.
ADD contents of the specified address to the
0010 ADD accumulator.
SUBtract contents of specified address from the
0010 SUB accumulator.
0110 JPU JumP Unconditionally to the specified address
Jumps to the specified address if Accumulator is
0111 JAZ Zero.
1001 JAL Jumps to specified address if Accumulator < zero.
Jumps to the specified address if the Accumulator
1010 JAG > zero.
1111 HLT Stop the program

As you can see from the above mnemonics it is much easier to


remember their function rather than to remember a numeric (binary)
code.

For more information on the Assembly Language:


http://www.osdata.com/topic/language/asm/asmintro.htm

Mr.A.Gatt Page 20 of 88
Form 5 Computer Studies Notes

2.3.16 Symbolic addressing.

In Assembly language, there are two ways in which the computer can
find locations from memory; these are Absolute Addressing and
Relative Addressing.

Absolute Addressing: During the execution of an assembly program


various memory locations must be used to manage data. In certain
cases, the memory location to be used can be specified by giving the
actual memory location. For example, the assembly command LDA 10
is specifying that the accumulator should be filled with the contents
found in memory location (in the address) 10. Hence, in this case we
are referring to the exact location in memory.

9
10 11 12 13

LDA 10

Figure 5: Example of Absolute Addressing

Mr.A.Gatt Page 21 of 88
Form 5 Computer Studies Notes

Relative Addressing: This is indicated by specifying the distance from


another address which in this case is called the base address. So, in
this case the exact memory location is not given. For example, the
assembly command MOV CX, [BX+4] is specifying that the contents of
Register C must be moved in the location which is found 4 locations off
register B.

Bx
Bx+ Bx+ Bx+ Bx+
1 2 3 4

MOV CX,[BX+4] Note:


BX is the base address

Figure 6: Example of Relative Addressing

Symbolic Addressing: In assembly programming a label can be given


to a memory location. So, instead of referring to the memory location
by the location itself (i.e. the location number) a label is used. So, if
for example the memory location 106 can be assigned a label Num1,
and from then on, whenever location 106 is required, instead of calling
memory location 106, Num1 is called LDA Num1.

Mr.A.Gatt Page 22 of 88
Form 5 Computer Studies Notes

103 104 105 106 107

NUM1

LDA NUM1

Figure 7: Symbolic Addressing

2.3.17 Conditional and unconditional branches

The program counter (PC) found in the CPU always points to the next
instruction which must be fetched. By changing the program counter,
instructions can be executed in a different order rather than in a
sequential manner.

3
In order to jump instructions, labels must be used; labels are
essential for branching. Labels can be created by simply specifying a
label name and adding a colon at the end of the label. For example:

label1: mov ax,5


mov bx,3

3
Adapted from: http://www.geocities.com/SiliconValley/Park/3230/x86asm/asml1006.html

Mr.A.Gatt Page 23 of 88
Form 5 Computer Studies Notes

Unconditional Jump

This type of branching instructs the processor to jump to a label


without any conditions. The command for this type of jump is JMP. The
following illustrates an example of an unconditional jump.

mov ax, 5
When the JMP command is
encountered, the flow of the jmp lab1
program will resume from the
specified label; in this case lab1. add ax, 4
lda 10
lab1: sub ax, 3

In the above program, as soon as the command jmp lab1 is


encountered, the program will jump to and continue from the label.
Hence, the commands add ax,4 and lda 10 will be skipped, and sub
ax,3 will be worked next. As already mentioned, an unconditional
branch does not have any conditions, so when the jump command is
encountered it will simply skip to the label.

Conditional Branching

Conditional branching allows the program to skip to another location


(through the use of labels) but only if it satisfies a condition. In order
to use this type of branching however, a comparison must be done
first. So, first we carry out the comparison, and then we jump to a
label if the comparison satisfies the jumps criteria. The following
example illustrates a conditional jump, and the equivalent in Pascal is
listed as well.

Mr.A.Gatt Page 24 of 88
Form 5 Computer Studies Notes

Assembly PASCAL
cmp ax, bx if ax > bx then
jg isgreater begin
: ; block 1 (else part) {block 2}
jmp after end else
isgreater: begin
: ; block 2 (then part) {block 1}
after: end
: ; after if {after if}

So by looking at the above assembly program, the registers ax and bx


are compared with each other using the command CMP. Then the
command jg (jump if greater) is used to jump to the label isgreater
if ax is greater than bx, otherwise it will jump to label after. The
actual comparison is carried out using the CMP command, and then
different jump statements can be used. The following table illustrates
different types of jumps:

Instruction Meaning
jg Jump if greater
jge Jump if greater or equal
jl Jump if less
jle Jump if less or equal
je Jump if equal
jne Jump if not equal
jc Jump if carry flag is set

Figure 8: Different types of Jumps

Mr.A.Gatt Page 25 of 88
Form 5 Computer Studies Notes

The following flowcharts illustrate the three different types of


executions which are Sequential, Unconditional and Conditional
execution.

Sequential Unconditional Conditional

i=0 i=0 i=0

A A
Print i Print i Print i

i=i+1 i=i+1 i=i+1

y
Print Goto A
i<
Done 10

n
Print
Done
Print
Done

Figure 9: Different types of Executions

For more information:


http://homepages.ius.edu/jfdoyle/c335/Html/Chapter4.htm#Execution
%20Control

Mr.A.Gatt Page 26 of 88
Form 5 Computer Studies Notes

2.5 The Operating System

2.5.1 System software; Resource management functions of OS

The operating system (also known as system software) is essential for


any computer to work; every computer system must have an
operating system (OS) in order for other application software and/or
hardware to work. There are various tasks which are carried out by the
OS as depicted in the diagram below:

Process
Management

GUI
Memory
(Graphical
Management
User Interface)

Operating
System
Disk
Device Management
Drivers (File Systems)

Security Networking

Figure 10: Tasks of an O/S


Process Management

Mr.A.Gatt Page 27 of 88
Form 5 Computer Studies Notes

Every application that runs on the computer system is run inside a


process which is executed by the CPU. Due to the current architecture
of the CPU, only one process at a time can be executed. However,
many modern operating systems allow many processes to run at the
same time; this is achieved by switching from one process to another
very quickly this is called Multitasking.

Multitasking allows the CPU to run more than one process at the same
time by giving each process attention for a very brief period of time
(timeshare), before moving on to the next process. However, if there
are many concurrent processes problems may arise because since the
CPU has to cater for many processes, some processes might not get
the attention they require, and the application will not work correctly.
So, process management involves the computation and distribution of
"timeshares".

Memory Management

The computer has different type of memories which it can use, and
these are arranged in a hierarchical manner, starting from the fastest
being the memory registers, cache, RAM and ending in disk storage.

The purpose of the OS's memory management is to track which


memory is free, which memory is to be allocated and deallocated, and
how to swap between the main memory and secondary memory.
Swapping data between memories is called virtual memory
management this allows some dedicated hard-disk space to act as
RAM if the actual RAM is not sufficient. However, this virtual RAM is

Mr.A.Gatt Page 28 of 88
Form 5 Computer Studies Notes

not as fast as RAM and excessive use may result in computer


thrashing.

Disk Management (File Systems)

Operating systems have a variety of native file systems. Linux has a


greater range of native file systems, the most common being: ext2,
ext3, ReiserFS. Windows on the other hand has a file system support
which includes: FAT16, FAT32, and NTFS. The NTFS file system is the
most efficient and reliable of the three Windows systems. All the FAT
systems are older than NTFS and have limitations on the partition and
file size.

For most of the above file systems there are two ways it can be
allocated. Each system can be journaled or non-journaled. Journaled is
the safer alternative under the circumstances of a system recovery, if
a system comes to an abrupt stop (a system crash), the non-journaled
system will need to undergo an examination from the system check
utilities where as the journaled file systems recovery is automatic.
Microsoft's NTFS is journaled along with most Linux file systems,
except ext2, but including ext3, ReiserFS.

Every file system is made up of similar directories and subdirectories.


Along with the operating systems file system similarities there are the
subtle differences. Microsoft separates its directories with a back-slash
\ and its file names aren't case sensitive whereas Unix-derived
operating systems (including Linux) use the forward-slash / and their
file names generally are case sensitive.4

Networking

4
Adapted from http://en.wikipedia.org/wiki/Operating_system#Disk_and_file_systems

Mr.A.Gatt Page 29 of 88
Form 5 Computer Studies Notes

Most of the operating systems nowadays are capable of using the now
universal TCP/IP (Transmission Control Protocol/Internet Protocol)
protocol. This allows computers to communicate with each other and
be able to share resources such as files and hardware devices.5

Security

The basic type of security pertaining to an operating system is the


ability to authenticate users before using the operating system; this is
performed by the use of a username and password. Generally, only
permitted users are allowed to log in the system, but level access is
also implemented.

Level access limits the things a particular user can perform on the
operating system; these levels are usually implemented by the system
administrator and are called system policies.

Another type of security of an operating system is network related.


The task of protecting the computer from network breaches is carried
out using a firewall. Basically, when using the TCP/IP protocol, the
operating system assigns various ports to different services (such as
web-browsing, e-mailing, file sharing, etc). The firewall closes unused
or dangerous ports, and limits the traffic to and fro the computer.

5
Adapted from http://en.wikipedia.org/wiki/Operating_systems#Networking

Mr.A.Gatt Page 30 of 88
Form 5 Computer Studies Notes

GUI (Graphical User Interface)

Nowadays, most operating systems use a GUI, which is more user-


friendly since it uses graphical representations which the user can
simply manipulate using the mouse. Some of the GUI's components
include icons, menus, windows, toolbars and buttons amongst others.

Each operating system uses different GUIs, for example Windows uses
a different GUI than MacOS or Linux.

Figure 11: MacOSX

Mr.A.Gatt Page 31 of 88
Form 5 Computer Studies Notes

Figure 12: Linux OS

Figure 13: Windows XP OS

Mr.A.Gatt Page 32 of 88
Form 5 Computer Studies Notes

Device Drivers

A device driver is a specific type of computer software developed to


allow interaction with hardware devices. Typically a device driver
creates an interface for communicating with the device, through the
specific computer bus or communications subsystem that the hardware
is connected to, providing commands to and/or receiving data from
the device, and on the other end, the requisite interfaces to the
operating system and software applications.

Every model of hardware (even within the same class of device) is


different. Newer models also are released by manufacturers that
provide more reliable or better performance and these newer models
are often controlled differently. Computers and their operating systems
cannot be expected to know how to control every device, both now
and in the future. To solve this problem, OSes essentially dictate how
every type of device should be controlled. The function of the device
driver is to translate these OS created function calls into device
specific calls.

In theory a new device, which is controlled in a new manner, should


function correctly if a suitable driver is available. This new driver will
ensure that the device appears to operate as usual from the operating
systems' point of view.6

6
Adapted from http://en.wikipedia.org/wiki/Operating_systems#Device_drivers

Mr.A.Gatt Page 33 of 88
Form 5 Computer Studies Notes

3.5 Types of Operating Systems

Operating systems have been developed to cater for different


computing scenarios. The same type of operating system is not
capable of handling all the different requirements that will arise in
different cases.

3.5.1 Real time OS

A real-time operating system (RTOS) is designed to immediately


deliver the results for an activity or an event that is happening in real-
time. This means that once the inputs have been submitted, the
output must be immediate.

An example for the need of a


real-time operating system is
on a Fighter Jet. On modern
aircrafts computers play a vital
role in keeping the aircraft
flying. Due to the very delicate
and critical moments in flying such a high-velocity aircraft, every
command issued by the pilot must be acted upon immediately, and not
left waiting because that might lead to catastrophic results.

Mr.A.Gatt Page 34 of 88
Form 5 Computer Studies Notes

There are two main types of real-time operating system:


Hard Real-Time: In this case, if the operating system fails to
finish off a calculation by the time it was required, the whole
process will fail. This happens because then the next calculations
will not be able to be worked out since they were dependent on
the unfinished calculation.
Soft Real-Time: The main difference from Hard real-time is
that consecutive calculations will still be able to be worked out,
but usually at a less efficient pace since the previous calculations
were not finished off by their designated time.

An operating-system can be considered to be real-time if it is or has:


Multitasking: it can perform more than one task at a time.
Priority of Process: some processes can be deemed to be
more important than others and hence worked out before less
important processes.
Sufficient number of Interrupts: whenever a device or a
process requires attention, the real-time operating system must
be capable of noticing the need of the device or process.

Some real-time operating systems are considered to be embedded,


this means that they are packaged as part of a micro-devices.

Mr.A.Gatt Page 35 of 88
Form 5 Computer Studies Notes

3.5.2 Batch OS

Batch operating systems where very common in the early days of


operating systems; however one must not think that these are not
used anymore.

In a batch operating system, a number of tasks are assigned to the


computer, and these tasks are executed one after the other. So before
a task is executed its previous task must be first carried out. If there
are six different tasks which need to be
done, the sixth task is only done after the
first five have been carried out one after the
other. An important aspect is that these
tasks are carried out without human
intervention. So, once the tasks have been
assigned to the computer, no interaction
with the machine is needed for the tasks to be executed.

To this day, elements of a batch operating system


are still used. When printing on a computer system
batch processing is used especially when more
than a file is printed. If for example seven
requests to print are passed on to the printer,
these requests are not processed simultaneously,
but they are batch processed. This means, that
these seven requests are placed after each other, and only when a
task is finished (in this case the prinout is ready), the consecutive task
is carried out.

Mr.A.Gatt Page 36 of 88
Form 5 Computer Studies Notes

Another common example of batch processing is BAT files on Microsoft


Windows. By creating a file with a list of commands after each other,
the file can be submitted to the DOS shell, and each step is executed
after the previous step has been worked out.

The following code extract illustrates the contents of a batch file


(CFB.BAT) and it copies all the contents of Drive A to the current
directory.

@ECHO OFF
ECHO.
IF "%1" == "" XCOPY B:\*.*
IF NOT "%1" == "" XCOPY B:\%1
ECHO.
C:\BATCH\DR

3.5.3 Time sharing OS

In time-sharing operating system, multiple applications will seem to be


using the CPU at the same time. This happens because the CPU is able
to allot a time bracket (called time-slice) to each application. A time-
slice is a small period of time when the CPU is available to execute any
tasks required from it.

If a CPU is given only one application to execute, the application would


be executed immediately leaving the CPU with idle time (time when it
is doing nothing). This idle time can be used to run other applications
at the same time; hence more than one application can run at the
same time.

Mr.A.Gatt Page 37 of 88
Form 5 Computer Studies Notes

This concept is applied both to multi-user (when more than one user
uses the same computer) or single-user (when only one user uses the
computer).
Multi-user: In this case, since more than one user will be using
the same CPU, the CPU will allot a time-slice to each user.
Hence, it will go around all the users, one after each other
servicing their computing needs before going on to the next
user. Usually the time-slice is very small and it is measured in
milliseconds. If there are many users, each having a fair amount
of work being carried out, the CPU response time might be
degraded due to the high load of work.
Single-user: When a CPU is being used by a single user, the
idle time of the CPU is used to run multiple applications at the
same time. So, each application is assigned a time-slice, and the
CPU will go round the applications executing their requirements
in their alloted time-slice. Also, in this case if there are many
applications running, each with its requirements, the response
time for each application will degrade, resulting in overall
sluggishness.

3.5.4 The necessity of different OS's to support different modes and


configurations.

Depending on various scenarios, a different operating system can be


more suited than others. No operating system can be used to cater for
all scenarios. The following will illustrate different cases where a type
of operating system might be more suitable to use than others.

Mr.A.Gatt Page 38 of 88
Form 5 Computer Studies Notes

Real-Time Operating System

As already mentioned before, real-time systems are very critical


because their response must be immediate. Due to this very short
response time, batch processing and time-sharing are definetely out of
question because these can have a somewhat long response time.

In the case of very delicate situations such as jet-


fighting, space shuttles or time-dependent situations
such as a production line, a real-time operating system
is the prime choice.

Batch Operating System

Although a batch operating system might be considered to be the


oldest type of operating system, its nature can be used for very large
quantities of data that needs to be processed.

In the case of a financial bank, where millions of cheques


are processed each day, it would be a cumbersome process
to input the details of each cheque, so what is usually done
is that all the cheques are collected and handed to the
operating system at the end of the day.

Since, a batch operating system does not require human intervention,


all the cheques are processed automatically and by morning
(hopefully!) all cheque processing will be done.

Mr.A.Gatt Page 39 of 88
Form 5 Computer Studies Notes

Time Sharing Operating System

The main aim of a time-sharing operating


system is to utilise the idle time of a CPU. So,
in the case of having a large mainframe
system with a very powerful CPU, many other
terminals can be connected to it, so that
multiple users can use it, hence utilising the
idle time of the CPU.

3.5.5 Common types of operating systems single-user, multiuser,


networked, single programming, multi programming.

Single-User: This allows one user at a time to use the computer. This
means that the computer will be exclusively used by one user at a
given point in time; therefore no other user can use the computer at
that time. Once the first user is finished with the computer, another
user can then use it.

Multi-User: This setup allows more than one user to use a computer
at a time. Usually, a mainframe (or minicomputer) is used for this
setup, and various input (and output) devices are connected to the
mainframe so that more than one user can use the system. Each user
would then have his/her own terminal along with his/her directories.
Usually, a password is required to access ones account.

Mr.A.Gatt Page 40 of 88
Form 5 Computer Studies Notes

Networked: This type of operating system is specifically designed to


keep a network to run at its optimal performance. In a network there
are a number (more than 2) computers connected to each other, and
the main aims of a network operating system is to:
Control a network and its traffic,
Control access of users to different resources such as hardware
and/or files,
Provide administration features such as security.

Single-Programming: In this kind of operating system, a task must


be fully executed before a new task could be run. This operating
system is capable of running one task at a time, so no multitasking is
available.

Multi-Programming: In multi-programming operating systems, the


OS is capable of running more than one task at a time. This can be
carried out by using time-slicing, where each application is allocated a
small amount of time, where the CPU tends for the application. Since a
time-slice is usually very small (it can be around 1/60 second), the
user has the illusion that multiple applications are being run at the
same time.

Mr.A.Gatt Page 41 of 88
Form 5 Computer Studies Notes

2.8 Dedicated Computer Systems

2.8.1 Difference between a general-purpose and a dedicated


computer.

A general-purpose computer is created with the main aim of


performing a variety of tasks. When using a PC one can perform a
multitude of tasks such as spreadsheets, word-processing, browsing
the Internet, playing games, creating music, editing videos, etc So, a
general-purpose computer is not limited to a single task.

On the other hand, a dedicated computer is clearly


designed to do a single task. It does not have to be
a simple task, it can be somewhat complex, but a
dedicated computer can only do what it was
manufactured for. Common examples are Sony
Playstation, ATM (Automatic Teller Machines),
Mobile Phones, GPS (Global Positioning System).

2.8.2 Embedded and process control systems.

An embedded system is a special-purpose system totally


encapsulated in the device it controls. Since it is not a general-purpose
system, its functions (the functions that this system does) are known
beforehand, and so engineers can reduce its size, and simplify it as
much as possible in order to be more easily embedded and cheaper to
produce. Typical examples of an embedded system are VCR (Video
Cassette Recorders), Washing Machines, Microwave Ovens, Alarm
Systems

Mr.A.Gatt Page 42 of 88
Form 5 Computer Studies Notes

For more information visit:


http://en.wikipedia.org/wiki/Embedded_computer

A process control system is the automatic monitoring and control of


an industrial activity by a computer that is programmed to respond to
the feedback signals from sensors. The operation controlled may be as
small as a single machine packing boxes or as extensive as the control
of an automated bakery, where the mixing, cooking and packaging are
controlled within a single integrated manufacturing process.7

2.8.3 Computerised appliances as an example of dedicated systems


VCR, auto pilot, mobile phones, GPS, etc.

As previously mentioned, a special purpose (embedded) system is


capable of perfoming only a limited number of tasks. This can be
clearly seen in computerised appliances such as:
VCR: (Video Cassette Recorder) has a number of options which
are related to its task. For instance on a VCR one can find the
option to play, rewind, fast-forward a cassette. In modern VCR
one can also program the VCR to record whats on TV at a
specified time, and also one can program it to stop recording at
a specified time. Other computerised features might be
automatic tracking, where the picture is made sharper and nicer
through constant monitoring of the tape by the VCR and
adjusting accordingly.
Auto-Pilot: Modern aircrafts especially passenger jets are
equipped with auto-pilots. This special-purpose machine helps

7
Source: A Glossary of Computer Terms 10th Edition Pg59

Mr.A.Gatt Page 43 of 88
Form 5 Computer Studies Notes

the pilot to travel from one place to another with little


intervention. The auto-pilot automatically (or controlled by the
pilot) plots the route the aircraft needs to take and then the
speed and altitude and many other variables are controlled by
this dedicated machine.
Mobile Phones: The technology advancements in computing
made it possible to integrate very small dedicated machines into
mobile phones. These machines apart from handling normal
mobile phone functions such as making or receiving a call, can
also handle more features such as sound management,
messageing management, WAP connectivity, JAVA programs and
more!
GPS: (Global Positioning System) make travelling easier and
safer too. This dedicated machines, help the user to keep track
of their location hence making it more difficult to get lost
especially when used on ships which have to cross large
stretches of oceans.

2.8.4 Specialised I/O devices (sensors, buttons, LCD).

One must also keep in mind that there are various forms of Input and
Output devices, not just the general ones such as keyboards, mice,
monitors, printers, etc Some input/output devices are in the form
that suits the machine they were created for.

Mr.A.Gatt Page 44 of 88
Form 5 Computer Studies Notes

Sensors

A sensor is an electronic component which converts one


form of energy into another; for example: a thermistor
converts a temperature into electrical energy with varying
voltages. The sensor responds to some physical property
such as pressure, rate of flow, humidity amongst others.
Some examples:
Alarm Systems: When an alarm system is installed, every door
or window will have a sensor. This sensor detects whether the
door or window is open. If the door or window is closed, the
sensor will not do anything, but if the sensor detects that the
window has been opened the alarm system will go off.
Climate Control: Air-conditions have sensors to detect the
temperature in a room. So, when a temperature is set, the air-
conditioner will constantly monitor the temperature of the area
through the sensor and react accordingly.

Buttons

Another common form of input is the button.


Buttons are included in almost all computerised
appliances and these act as the main source of
input from the user to the machine.

Mr.A.Gatt Page 45 of 88
Form 5 Computer Studies Notes

LCD

Liquid Crystal Display allows the


computer to deliver back the
output. This is especially used for
example in GPS systems, where
the current location on the map is
displayed on the LCD screen. With
the advances in this technology
and reduction in prices, the LCD screen is more likely to be included in
more special-purpose machines.

LED

Light emitting diodes have been used for quite a


long time, and are still very common. LEDs are
very small diodes that can generate a small
amount of light (requiring very little electricity)
usually in the colour of green, red or blue. This type of output indicates
various states of the dedicated-machine. Almost all appliances when
turned on have a small LED which indicated that the machine has been
turned on.

Mr.A.Gatt Page 46 of 88
Form 5 Computer Studies Notes

2.8.5 Software for dedicated computer systems

Dedicated computer systems have specially made software which is


solely aimed to perform the required tasks and thus cannot handle
out-of-the-routine functions.

This software usually resides in the ROM of the dedicated computer


because it never needs to be changed. (Although in certain cases
where the software needs to be changed, the ROM is flashed and the
new software is put into it.) Dedicated computer systems usually have
a limited amount of RAM as well which will aid the computer system to
store temporary results.

Mr.A.Gatt Page 47 of 88
Form 5 Computer Studies Notes

3.4 Networks

3.4.1 Networking LAN and WAN

A network is a linked set of computer systems capable of sharing


computer power and resources such as printers, large disk-drives, CD-
ROM and other databases

There are two main types of networks being:


LAN (Local Area Network): This is a network in which the
computer systems are all situated relatively close to each other,
for example in the same building or cluster of buildings, such as
a school. Since the distances involved are small, direct physical
connection is possible. The network connections are normally
wire cables, such as coaxial cable, but fibre optic cable is being
increasingly used.
WAN (Wide Area Network): This is a network in which the
computers are geographically remote. Wide area networks make
use of a range of connection methods including communication
8
satellites.

8
Source: A Glossary of Computing Terms 10th Edition Pg67

Mr.A.Gatt Page 48 of 88
Form 5 Computer Studies Notes

3.4.2 Advantages of a LAN

Clearly the communication between various computers has its


benefits, these mainly being:
Easier Communication: The networked computers can
communicate with each other. This can be done through text
(instant messaging) or video (using a web-cam).
Device Sharing: Peripheral devices can be shared with the
networked computers. So, a single printer can be purchased,
and all computer connected to the network can print to that
printer. This clearly saves a lot of expenses, since less hardware
needs to be purchased. Since modems can also be shared,
Internet connection can be shared as well. A single Internet
connection can be subscribed to (usually Business connection)
and the all the networked computers would have access to
Internet.
File Sharing: File server allows the sharing of data resources.
So, users from different machines can update the same data
source, this will keep the data updated throughout the whole
network ensuring consistency of data.
Easier Administration: Network administrator can manage
hardware resources and update any software from the main
server.
Expandable: Network is easily expandable since only a network
card and a network point are required to connect a new terminal
to the networked system.

Mr.A.Gatt Page 49 of 88
Form 5 Computer Studies Notes

However, there are also some drawbacks of having a network:


Start-up Cost: The cost to start and implement (initial-cost) of
a network is quite expensive.
Break-downs: If the file server breaks down, the other
computers will not be able to access the files stored on the file
server.
Viruses: Viruses can spread very quickly, since the computers
are all connected together.
Security: Data security becomes very important, because since
many users use the network, there has to be the proper data
security to control hacking and unauthorised access.

3.4.3 Use of modems

The term modem derives


from two words Modulate and
Demodulate which basically
refer to what the task of a
modem is. The modem
allows the computer to be
connected to a telephone line
so that data can be
transmitted and received.

Mr.A.Gatt Page 50 of 88
Form 5 Computer Studies Notes

There are various different modems available:


External PSTN9 Modem: This modem is simply plugged into
the computer via the serial port, and it has its own power
supply. The telephone cable is plugged into the modem.
Internal PSTN Modem: This is the same as the external PSTN
modem, but it is directly connected to the motherboard (hence it
is found inside the tower) and it does not need external power.
ADSL10 Modem: The ADSL modem is generally external, and it
plugs to the PC using either USB or using the network interface.
It still uses the PSTN line but a special filter is used so that data
can be passed both ways and making the service much faster
than normal dial-up.
Cable Modem: The cable modem does not use a telephone line,
but instead it uses cable (the same cable used for TV) to connect
to the ISP.

The main task of the modem is to convert sound signals into electronic
signals. The telephone-lines used by modems, use analogue
technology which is not compatible with computers. The modem is
therefore used to convert those analogue signals into digital signals.
When information is being sent, the digital data sent by the computer
is delivered to the modem, which converts it to analogue data which in
turn is transferred to the telephone line. When information is being
received by the PC, information from the telephone line is converted
from analogue to digital by the modem, which in turn delivers it to the
computer.

9
PSTN: Public Switched Telephone Network the network used for normal telephony
10
ADSL: Asymmetric Digital Subscriber Line based on PSTN but uses different technologies which
allow two-way communication

Mr.A.Gatt Page 51 of 88
Form 5 Computer Studies Notes

Digital data is passed


to the modem. Modem receives
analogue data.

1010101 1010101
1110101 1110101
0000. 0000.

Data is converted
The modem converts it into back into digital
analogue, since the telephone format.
line is analogue.

Figure 14: Modulation / Demodulation

The baud rate of modem determines how fast information is sent or


received by the modem. Most dial-up modems have a speed of
56Kilobits (56kbps/sec), but most modern modems such as ADSL can
reach speeds of 4096Kbps/sec.

For more information visit:


http://en.wikipedia.org/wiki/Modem

3.4.4 Use of WANS for email, WWW, Video Conferencing

WANS allow computers which are located in different geographic


locations to communicate with each other. This communication allows
for a number of services which enhance this type of communication.

Mr.A.Gatt Page 52 of 88
Form 5 Computer Studies Notes

E-Mail (Electronic Mail)

E-Mail is one of Internets services. The main aim of the Internet is to


allow computers send instant messages from one computer to
another. According to Darwin Magazine, the first e-mail was sent in
1971, prior to this date, messages could only be sent to users on a
single machine. Ray Tomlinsons breakthrough was the ability to send
e-mails to anyone connected to the Internet by using the now common
e-mail address with the @ symbol.

An e-mail message is basically a short text file, although from its early
days it has evolved, and so users can attach files, and even include
HTML in their messages.

Each e-mail address is made up of the username (which is chosen by


the user) and the domain the part after the @ symbol which carries
the name of the host of the e-mail service, for example:

james@hotmail.com

There are two main types of e-Mail:


e-Mail services which are accessed by a standalone applications
such as Outlook, Thunderbird and
Free e-Mail services which are accessed through a web-site.
Such free services are Yahoo!, Google, and Hotmail.

Mr.A.Gatt Page 53 of 88
Form 5 Computer Studies Notes

An e-mail server is required to send e-mails from one computer to


another. This e-mail server needs to have two services:
SMTP (simple mail transfer protocol) which is used to send
e-mails.
POP3 (post office protocol 3) is used to receive e-mails.

If for example anne@yahoo.com sends an e-mail to john@hotmail.com


the e-mail message will follow this path.

Yahoo! Mail Hotmail Mail


Server Server
SMT SMT POP
P P 3

anne@yahoo.com john@hotmail.com

Figure 15: E-Mails

The main advantages of e-mails are:


Speed: Very fast, the moment an e-mail is sent in just a few
seconds it will be delivered to the recipient.
Asynchronous: E-Mail messaging is asynchronous which means
that communication does not occur at the same time. Therefore
after the sender sends the e-mail, the recipient can reply at
his/her convenience unlike real-time chatting.

Mr.A.Gatt Page 54 of 88
Form 5 Computer Studies Notes

Cheap: E-Mail is inexpensive, many companies such as Yahoo!,


GMail, Hotmail offer free e-mail services. Also, each e-mail send
is free unlike conventional post (or snail-mail) where an
envelope and a stamp have to be purchased. Also, the same
message can be sent to a large group of recipients.
Environmental Friendly: E-Mail is environment-friendly,
because no paper is used.

Disadvantages of e-mail are:


Not Everyone Has It: Not everyone has an e-mail address
whereas by using normal post, everyone can be reached.
Privacy: A threat to privacy and security. If the password is
known there will be total access to the e-mail service.
SPAM: SPAM mail is very common and very difficult to get rid
of. Many messages advertising products or scams are sent to e-
mail addresses without the users permission.
Only Virtual Messages: No tangible products can be sent.

For more information on how e-mail works visit:


http://computer.howstuffworks.com/email.htm

WWW (World Wide Web)

WWW is a collection of information held in multimedia form on the


Internet. This information is stored at locations called Web Sites in the
form of Web Pages. A web page is a single document. It may be too
large to be displayed as a screen without scrolling.

Mr.A.Gatt Page 55 of 88
Form 5 Computer Studies Notes

Web pages are permanently available to any user of the Internet. Each
organisation (and many individuals) providing information, organise
their information as a web-site, often consisting of many pages. Web
sites are an effective way of distributing information such as
advertisements, technical information, comments and ideas.

Any web page can be accessed directly if its full address is knows, but
to make locating information easier each web site has a home page
(welcome page) which provides a starting point for a user to search
the site. Any web site can provide links to other related web sites.

Since browsers and search engines can quickly find pages of interest,
users are provided with the tools to surf the Internet. Surfing means
to search for useful information, following whatever routes may seem
interesting.

Web pages are usually prepared using HTML (hyper-text mark-up


language)11, although nowadays PHP or ASP are used in order to
connect a website to a database and CSS is used for a much neater
design.

For more information visit:


http://en.wikipedia.org/wiki/Www

11
Source: A Glossary of Computing Terms 10th Edition Pg42

Mr.A.Gatt Page 56 of 88
Form 5 Computer Studies Notes

Video Conferencing

Video conferencing is used to allow two or more people situated in


different geographic locations to transmit both video data and audio
data simultaneously in order to be able to communicate with each
other.

A videoconference allows participants


to communicate and collaborate as if
they were in the same room. In order
to participate in video-conferencing,
the necessary software is required
(such as MSN Messenger, Skype or
iVisit), along with a microphone to
deliver sound, speakers to receive
sound and a digital video camera connected to the computer to
transmit the video feed.

A video conference can also be conducted on the Internet using a web


browser and a web server, and in which case it is called a web
conference.

3.4.5 Server and client machines; the problem of bandwidth at a


general level.

Client-server relationship is a method of network organization in which


stations make use of resources available at one or more servers. This
is the kind of organization seen in a star network (explained below); in
which one computer has the role of central resource manager for the

Mr.A.Gatt Page 57 of 88
Form 5 Computer Studies Notes

network. Other forms of network can also operate with a client-server


relationship.12

The server is a computer offering a service (files, printers, database,


CD-ROM) and handles the requests by a client which asks to make use
of these resources. Some types of servers are:
File Server: provides central disk storage for any users of the
network. The file server software identifies each users files
separately so that other users cannot use them. Users can
access their own files from any client station on the network.
Printer Server: allows all the clients stations to use a printer
controlled by it and usually provided and usually provides the
facilities of a print spooler.
CD-ROM Server: allows all the clients stations to obtain data
from a CD-ROM disk currently being used by the CD-ROM server
computer. Often a CD-ROM server will have access to many CD-
ROM disks, either from a collection of several CD-ROM players,
or from a CD-ROM jukebox.
Database Server: manages a large database. Client stations
can access data in the database and, if authorized, can maintain
the database. The database processing is usually carried out by
the server, with the query being sent by a client station of the
server and the results assembled by the server and returned to
the client station.13

One of the main problems with client-server technologies is bandwidth.


Bandwidth determines the amount of data that can travel through the
network at any given moment. So, if for example in a LAN setup the

12
Source: A Glossary of Computing Terms 10th Edition Pg72
13
Source: A Glossary of Computing Terms 10th Edition Pg73

Mr.A.Gatt Page 58 of 88
Form 5 Computer Studies Notes

bandwidths capacity is 100Mbits/sec, that means that at any second


the maximum amount of data that can pass through the network is
100Mbits. This may lead to some problems if the data that needs to be
passed through the number is greater than this limit. In that case the
communication between the computers will be degraded.

Network Topology

This refers to the layout of the network; i.e. how the computers are
connected to the network. This usually depends on the need of the
network and is heavily determined by the building that will host the
network. The following will illustrate the main types of setups.

Bus Network

A bus network, allows the computers to be connected to the network


line, one after each other, as can be seen from the diagrams.

COMPUTER COMPUTER COMPUTER COMPUTER

Each computer has the network cable going into its network interface and
another cable going out from the network interface to another computer.

COMPUTER COMPUTER COMPUTER

COMPUTER COMPUTER

Each computer is connected to the bus network cable via a spur.

Mr.A.Gatt Page 59 of 88
Form 5 Computer Studies Notes

Ring Network

A ring network has each of its computers connected to a network ring


along which signals are sent.

COMPUTER COMPUTER

COMPUTER COMPUTER

COMPUTER COMPUTER

Each computer has the network cable going into its network interface and
another cable going out from the network interface to another computer.

COMPUTER
COMPUTER

COMPUTER COMPUTER

COMPUTER
COMPUTER

Each computer is connected to the ring network cable via a spur.

In both bus and ring network setups, it is usually preferable to connect


the computers to the network using spurs. This is preferred because if
a computer malfunctions, the rest of the network will not be affected.
In the case of the network setups without the spurs, precautions must

Mr.A.Gatt Page 60 of 88
Form 5 Computer Studies Notes

be taken to prevent a malfunction of the whole network, if a computer


malfunctions.

Star Network

In a star network all devices are connected to one central computer


(such as a file server). The central node (called hub) is a computer
which has separate connections to each computer.

COMPUTER COMPUTER

COMPUTER

SERVER
COMPUTER
(HUB)
COMPUTER

COMPUTER

COMPUTER
COMPUTER

Each computer is connected to the central computer.

Mr.A.Gatt Page 61 of 88
Form 5 Computer Studies Notes

5.3 Data Security and Privacy

5.3.1 Need of data security and integrity of data.

Data is one of the most important and essential asset of businesses.


Data must be safeguarded all the time, and every effort is required to
keep data reliable and updated.

Data integrity describes the correctness of data both during and after
processing. Data may be changed by the processing but will still have
integrity. Safeguards are needed to make sure that the data has
integrity by detecting any accidental or malicious change to the data.

Data security involves the user of various methods to make sure that
data is correct, is kept confidential and is safe. Data security includes
ensuring the integrity and the privacy of data, as well as preventing
the loss or destruction of data.14

5.3.2 Backups (the generations of files: grandfather, father, son files),

A master file is used to store the data found on the database. Usually
it stores data which is mostly static and does not change frequently.
However, data can be changed or added as necessary through
updating during processing.

The transaction file is used to keep track of all the changes made to
the database throughout the day. These changes are not immediately
entered into the master file; instead they are stored in the transaction

14
Source: A Glossary of Computing Terms 10th Edition Pg111

Mr.A.Gatt Page 62 of 88
Form 5 Computer Studies Notes

file. At the end of the day, all the contents stored in the transaction file
are transferred (merged) to the master file to obtain a new and
updated master file.

The following is a simple example of a master/transaction file process.

Master File Transaction File Grandfather

Update

Master File Transaction File Father

Update

Master File Son

Figure 16: GFS Backup System

As you can see from the above diagram, in the Grandfather section we
started with a master file and a transaction file which when combined
together created a new Master File (Father). This in turn was combined
with another Transaction File to obtain the last Master File (Son).

This Grandfather, Father, Son hierarchy is used for safety. Suppose


the last Master File (Son) got corrupted by accidental deletion or
corruption of data, the same Master File can be re-created by

Mr.A.Gatt Page 63 of 88
Form 5 Computer Studies Notes

combining the father Master File with the respective Transaction File to
obtain the son file once again.

5.3.3 Physical security and software safeguards.

Physical Security

The most obvious choice of protecting data is to place it in a safe


secure place. Data can be stored in a limited-access room; such a
room would prevent unauthorised access. This room can be protected
either by a normal lock-and-key approach, or by more sophisticated
methods such as ID card scanning and biometrics (using human
features for security such as retina-scan, fingerprint-scanning).
Another physical approach would be to store data in a safe where only
very few persons know the combination to it.

Another basic physical


security system is the
write-protect option found
on certain devices. Some
devices, such as the floppy
or tape have read-only
mechanisms that prevent
the user from accidentally overwriting data. These can be simply
activated by positioning the read-only lock in the desired position.

Mr.A.Gatt Page 64 of 88
Form 5 Computer Studies Notes

Software Security

There are many software measures which can protect data. The
following highlights some of the most common approaches.

IDS (Intrusion Detection System)

IDS monitors the operation of the network to detect and warn when
illegal operations are being carried out. The system may be server-
based, detecting attacks on the operation of the file-server, or they
may be a network based, watching the pattern of traffic across the
network.

User ID (User Identification)

A user ID is a unique name or code used to identify a user to a


computer system when gaining access (logging in). The systems
manager or systems management software allocates user IDs to new
users.

Checks must be made to verify that the person logging on is the


correct owner of the user ID. Methods of checking include:
Passwords: are words or codes known only to the user. A
password is linked to a specific user ID. Although a user ID may
be generally known to others, access can only be gained with the
correct combination of user ID and password.
Personal Identification Devices: is usually a plastic card
which identifies the user and acts as an electronic key. Most
cards have a magnetic stripe which stores information. This

Mr.A.Gatt Page 65 of 88
Form 5 Computer Studies Notes

information can be read by a computer and used as a user ID.


Unauthorised access is made difficult because an unauthorised
user must have the personal identification device. Additional
protection can be provided by the use of a personal identification
number. Key-card is another name for this device.
Personal Identification Numbers (PIN): is a number used as
a password, particularly with bank cards and credit cards.

Biometric

This is a unique physical characteristic of an


individual which can be checked automatically by
a computer. The individuals biometric is measured
by a special scanner and used with the user ID in
a similar way to a password. Finding physical
characteristics which cannot be copied has been
difficult but viable systems include fingerprints and
retina scans (the pattern of veins at the back of
the eye). Face recognition and voice samples have proved to be
unreliable for use as a biometric.

Encryption

Encryption makes data in a computer system unintelligible. The


encrypted data appears to be meaningless and is sometimes described
as scrambled data. Encryption provides security for the data (by
preventing it being understood), both when stored electronically and
when transmitted between computer systems. Decryption is
converting the unreadable data back into understandable form.

Mr.A.Gatt Page 66 of 88
Form 5 Computer Studies Notes

An encryption key is a word or code selected by the user to govern the


encryption process. A decryption key is needed before the data can be
understood.

In conventional systems both encryption and decryption keys are the


same and therefore all users must have a copy of the key. If the
number of users is mall and the concern is for the security of stored
data, a single encryption key is usually sufficient. If transmission,
rather than storage, requires extra protections then different
encryption and decryption keys may be used.

Digital Signature

This is the special encryption of data, used to indicate that the data is
genuine. If the recipient of the data can correctly decipher the digital
signature then the data should be correct (and forged data is unlikely
to have been substituted).

Digital Certificate

This is an encrypted message provided by a certification authority


which confirms that the individual is who they claim to be in an on-line
communication. It includes a digital signature, which can be confirmed
by sending a secure message to the certification authority.

The certification authority, also known as a trusted service provider or


a trusted third party, is a business that provides online certification
facilities. These organisations are trusted to check the identity of the

Mr.A.Gatt Page 67 of 88
Form 5 Computer Studies Notes

online users and provide them with encrypted messages (the


certificates) which can be confirmed by checking the certificate with
the certification authority.15

5.3.4 Software piracy and copyright.

Software Piracy is the unauthorized duplication,


distribution or use of computer software; for
example, making more copies of software than
the license allows, or installing software
licensed for one computer onto multiple
computers or a server.

Copying software is an act of copyright infringement, and is subject to


civil and criminal penalties. It's illegal whether you use pirated
software yourself, give it away, or sell it. And aiding piracy by
providing unauthorized access to software or to serial numbers used to
register software can also be illegal.

These are four of the most common types of software piracy:

Soft-lifting: This happens when a persons buys software with a


single license and installs it on more than one PC or installs it on
other peoples machines. The exception is that one can make a
single copy of the software but only as a backup purpose.
Hard Disk Loading: Many computer vendors install software on
a new PC without selling the software itself. This is done, to sell
a fully loaded machine at very low prices because the user is not
charged for the software.

15
Source: A Glossary of Computing Terms 10th Edition Pg113-117

Mr.A.Gatt Page 68 of 88
Form 5 Computer Studies Notes

Downloading: With many advances in communications


(broadband connectivity) downloading software from the
Internet is much quicker and easier. Many P2P (peer-to-peer)
applications exist (such as Torrents) which facilitate the
download of illegal software.
Software Counterfeiting: Software is copied illegally and re-
sold. Some counterfeited software can be very obvious because
only the CD (or storage media) is sold, but in more
sophisticated counterfeited software; everything will be
reproduced including the box, the manuals, etc

Copyright

Copyright is a protection that


covers published and unpublished
literary, scientific and artistic
works, whatever the form of
expression, provided such works
are fixed in a tangible or material
form. This means that if you can
see it, hear it and/or touch it - it
may be protected. If it is an essay, if it is a play, if it is a song, if it is a
funky original dance move, if it is a photograph, HTML coding or a
computer graphic that can be set on paper, recorded on tape or saved
to a hard drive, it may be protected.

Mr.A.Gatt Page 69 of 88
Form 5 Computer Studies Notes

Copyright laws grant the creator the exclusive right to reproduce,


prepare derivative works, distribute, perform and display the work
publicly. Exclusive means only the creator of such work, not anybody
who has access to it and decides to grab it.16

When software is purchased there will be a software licence (also


known as the licence agreement) which sets conditions for the use of
the software. These conditions vary considerably between products.
Any use of the software not allowed by its licence is illegal. In practice,
this means that copying software bought by someone else is likely to
be an offence. Special licenses are needed for some cases, for example
multiple use on a network.17

5.3.5 Ethical and legal issues.

Ethical Issues

Software development involves a team effort that blends the creative


ideas and talents of programmers, writers and graphic artists. And like
most creative works, such as books, music and films, computer
software is protected by U.S. copyright laws.

When you purchase software, you do not become the owner of the
copyright. Rather, you are purchasing the right to use the software
under certain restrictions imposed by the copyright owner, typically
the software publisher. The precise rules are described in the
documentation accompanying the software -- the license. Most often,
they state that you have the right to load the software onto a single
16
Source: http://www.whatiscopyright.org/
17
Source: A Glossary of Computing Terms 10th Edition Pg120

Mr.A.Gatt Page 70 of 88
Form 5 Computer Studies Notes

computer and make one backup copy. If you copy, distribute or install
the software in ways that the license prohibits, whether you are
swapping disks with friends and co-workers or participating in
widespread duplication, you are violating federal copyright law.

Using copied or counterfeit software also means:


Greater exposure to software viruses, corrupt disks, or otherwise
defective software
Inadequate or no documentation
No warranties
Lack of technical product support available to properly licensed
users
Ineligibility for software upgrades offered to properly licensed
users.

Software piracy is not a victimless crime. Piracy denies the software


developer its rightful revenue and harms consumers and the industry
as a whole. All software developers, both big and small, spend years
creating software. A portion of every dollar spent in purchasing original
software is funnelled back into research and development, so that
newer, more advanced software can be produced. When you purchase
illegal or counterfeit copies, your money goes straight into the pockets
of software pirates.18

18
Source: www.bsa.org

Mr.A.Gatt Page 71 of 88
Form 5 Computer Studies Notes

Legal Issues

Apart from a degraded software experience, and any ethical issues


that may arise from software piracy, there are also some serious legal
issues.

In the USA, software theft is a serious matter. If you or your company


would be caught copying software, you may be held liable under both
civil and criminal law.

If the copyright owner brings a civil action against you, the owner can
seek to stop you from using its software immediately and can also
request monetary damages. The copyright owner may then choose
between actual damages, which include the amount it has lost because
of your infringement as well as any profits attributable to the
infringement, and statutory damages, which can be as much as
$150,000 for each program copied.

In addition, the government can criminally prosecute you for copyright


infringement. If convicted, you can be fined up to $250,000, or
sentenced to jail for up to five years, or both.19

19
Source: www.bsa.org

Mr.A.Gatt Page 72 of 88
Form 5 Computer Studies Notes

5.3.6 Hardware and software procedures which deter piracy - serial


numbers and activation keys, hardware keys (dongles).

Software developers try to protect their software by implementing


various methods to deter piracy. These are:
Serial Numbers: Certain software will ask the user to input a
serial number when installing the software. If the number is not
inputted or entered incorrectly, the software will not install,
making the pirated copy useless. If the serial number is entered
correctly, the software will install and be fully functional. In
some cases the serial number is checked with the company
using an Internet connection to make sure that it has not been
previously used by another user, making it more difficult to
duplicate serial numbers.
Activation Keys: After the software is installed, the user is
required to enter some text (the activation key) so that the
application will work. This activation key is usually obtained from
the vendor of the application the user will send an e-mail with
the product ID of the application, and after the vendor will
confirm that the software is indeed original; it will send the
activation key which will unlock the software.
CD (or DVD) Copy Protection: Most companies will create a
special program when burning their application to the storage
medium which will prevent users from copying the software by
normal means.
Hardware Keys: In this case a hardware device (such as a USB
pen) is given with the software and for the software to be
functional the dongle must be connected to the machine.

Mr.A.Gatt Page 73 of 88
Form 5 Computer Studies Notes

5.3.7 Software registration.

Most software can be registered with the company that supplies the
software. The user fills in some personal details such as name, address
and e-mail. This will allow the company to serve better its customers:
Updates: The software company can inform its registered
members with news about the product. This may include news
about new program releases, new updates or new patches to the
program. Sometimes, when a surface address is supplied,
updates and patches are sent by post on a CD.
Bonus Features: Certain companies create bonus features to
the program (also called extensions, add-ons or expansion
packs) which might be free to registered users.
Discounts: Registered members usually benefit from discounts
on applications released by the same company.
Technical Support: Some companies offer technical support
(such as forums or live chatting) about their program only to
registered members.

5.3.8 Access rights. Privacy on multi-user/network systems.

Access rights control whether or not a particular user can use or edit a
program or a data file. Each user is assigned rights which determine
the files that can be accessed. A user may be allowed complete access
to a file (including altering the data), may be restricted only to read
the data (or part of the data) or have no access at all. Technical
personnel may have more substantial rights. Access rights can also
restrict the use of a file to a particular workstation or user.

Mr.A.Gatt Page 74 of 88
Form 5 Computer Studies Notes

With the simpler operating systems used on stand-alone computers


the actual user is normally not identified. The access rights can easily
be changed but provide a way of preventing some mistakes (for
example deleting important files).

The more complex network operating system provides a way of


identifying individuals (for example by a user ID and password). Each
individual can only access resources the user is given privileges for by
the network manager. The user may have ownership of some files and
can then set the access rights to restrict who else can use the files.

Some files have additional access restrictions provided by password


protection. When a user attempts to gain access to one of these files
an additional password will be requested before access is allowed. This
provides extra security since knowing a users system password is not
enough to gain access to the data. The password is often used as the
encryption key to encrypt the data, making the data meaningless even
if unauthorized access to the system is achieved.20

20
Source: A Glossary of Computing Terms 10th Edition Pg116

Mr.A.Gatt Page 75 of 88
Form 5 Computer Studies Notes

5.2 Effects of Computer-Based systems on Individuals, Organisations


and Society

5.2.1 Positive and negative effects of computerisation

In these last years, computer use amongst people has increased


greatly. This computerization can have both positive and negative
effects on the individual, an organization or the society. The following
will highlight some of the positive and negative aspects in several
different areas.

Computers and Work

Negative
Jobs are decreased, since computers are replacing humans in
such cases as ATM (automatic teller machine), telephone
operators, meter readers, film processors.

Positive
New jobs are created in the computing industry such as the
hardware industry, software industry and web-design industry.
Computers increase productivity and overall quality leading to
cheaper and better products.

Mr.A.Gatt Page 76 of 88
Form 5 Computer Studies Notes

Computers and the Workplace

Negative
Possible less face-to-face communication.
Very fast technology advances might lead to job disruption in
order to adopt (or adapt) to new technologies.
Employees might feel that constant monitoring can affect their
privacy and dignity.
Constant use of computers can lead to RSI (repetitive strain
injury) if the proper precautions are not adopted.

Positive
Employee has more information available which allows the
employee more decision-making freedom.
Various tools available on the computer can enhance the work
experience and reduce the overall work-load.

Computers and Society (involving the Internet)

Negative
Reduced human contact, since people prefer chatting rather than
socialising.
Community groups attendance decreases, once again due to
lack of involvement.
Erodes family life and community values.

Positive
Facilitated communication with relatives, friends and other close
persons.

Mr.A.Gatt Page 77 of 88
Form 5 Computer Studies Notes

Routine tasks can be done quickly, hence leaving more free time
to spend with close relatives.

Computers and the Individual

Negative
Addiction to the Internet.
Addiction to games; especially in youngsters which deter a
healthy lifestyle since they do not participate in outdoor games
Less socializing.
Being lazier; since Internet can be used as a source for ready-
made material.

Positive
More work can be done in less time with the adequate tools on
the PC.
Facilitates access to services by using websites for buying
products or paying bills.
More information at the users fingertips with interactive
encyclopaedias and the constantly updated Internet.

Mr.A.Gatt Page 78 of 88
Form 5 Computer Studies Notes

5.4 Multimedia

5.4.1 Brief overview of capabilities and trends.

Multimedia is the presentation of information by a computer system


using graphics, animation, sound and text. The data may be stored in
a variety of ways using conventional computer storage devices,
together with a picture database on CD-ROM (or DVD-ROM). Output
might be through VDUs, sound-generators and laser projectors.

Integrating a tutor program could allow the system to be used as a


training resource. The performance of the user could then be
monitored by recording the choices made in response to questions and
evaluating this response using an expert system. This performance
output might then be sent to a remote trainer who would assess the
trainees progress.

Interactive Video

This involves the user of a computer linked to a large capacity data


store such as DVD to provide random access retrieval of images
(including stills and continuous video) and sound. Data, once recorded,
is not easily changed or added to and access times can sometimes
appear long. However, any disadvantage arising is generally
outweighed by the amount, variety and quality of data which can be
retrieved from one active device.

Mr.A.Gatt Page 79 of 88
Form 5 Computer Studies Notes

Browse

This is a feature of hypertext systems which allow users to build their


own route through an application rather than following a pre-
determined one. The route so chosen may be remembered by the
system so that it can be re-traced back to the starting point of that
route. This kind of browsing is particularly useful in such applications
as computerised manuals; computer aided learning packages and
large databases.

Video Clip

A video clip is a short section of film or video stored in digital form


(both sound and pictures). It is easily incorporated in computer
displays. The video clip would normally be stored in compressed form;
otherwise the storage cost would be prohibitive.

Video Data Compression

This is the use of electronic methods to reduce the amount of data that
has to be included when video data, either for still or moving pictures,
is stored or transmitted. For moving pictures (video), the principles
involve identifying those parts of the picture which change from one
scan to the next, and sending data only about changes, which is
known as delta compression. This alone will save a significant amount
of transmission and storage capacity. The Joint Photographic Expert
Group (JPEG) had defined standards for still picture compression, and
this format for storage or transmission is called JPEG. These standards

Mr.A.Gatt Page 80 of 88
Form 5 Computer Studies Notes

have been extended by the Motion Picture Expert Group (MPEG) to


cover moving images. These proposals are currently being used for
video compression on CD-ROM and DVD. Sound is also compressed
using MP3 encoding and decoding mechanisms.21

5.4.2 Future perspectives (home office, access to public and


institutional databases, libraries, high-quality sound and pictorial data
representation).

With advances in technology (faster CPUs, cheaper storage, very fast


Internet connectivity), multimedia possibilities are endless.

Public databases can be made accessible on the Internet, allowing a


large number of users to access its contents. Nowadays, various
websites offer free books (which do not have a copyright) to be read
from home by accessing their database. Universities can also publish
their work and research on Internet, which makes communication and
research with other universities much easier; this is also further helped
by video-conferencing which can encourage distant team-work.

By using video and sound compression, virtual tours can be created.


By using a standard interface a user can go on a virtual tour of a
historic or public landmark. This can be done by taking pictures (or a
video) of the place, edit it, and finally compile it, so that the user can
choose where to go by simply clicking the mouse. This can also be
enhanced by offering further details on visible items. So, if for
example, an art gallery is made virtual, various paintings can be

21
Source: A Glossary of Computing Terms 10th Edition Pg85,86

Mr.A.Gatt Page 81 of 88
Form 5 Computer Studies Notes

clicked and a high-resolution photo will be displayed along with


information about the painting and painter.

By using many elements of multimedia, virtual reality can also be


achieved. Virtual reality is a computer generated environment which
provides the user with the illusion of being present in that situation.
Virtual reality is produced by providing feedback to our various senses:
vision, hearing, movement, and sometimes smell. As the user moves
or acts, the image seen will change along with appropriate sound and
movement. It usually requires high-powered computers. There are two
main types of virtual reality:
Immersive VR: these systems provide feedback to as many
senses as possible by using specialised equipment. They attempt
to provide the user with a very realistic situation and are used
for training in critical and stressful situations. Examples include
the training of aircraft crew and training maintenance engineers
to work in nuclear reactors.
Non-immersive VR: The systems use limited feedback to
provide the user with the perception of a particular situation
without attempting to convince the user that it is real. This can
be done relatively cheaply using common equipment. The
environment is displayed on a standard monitor using 3D
graphics and can be controlled using a simple pointing device
such as a special scalpel that a sculptor may use to carve a
sculpture. Other examples include vehicle driver training and the
ergonomic evaluation of a shop layout.22

22
Source: A Glossary of Computing Terms 10th Edition Pg86

Mr.A.Gatt Page 82 of 88
Form 5 Computer Studies Notes

5.4.3 Basic hardware and software requirements and costs.

The basic requirement for multimedia is a PC which has a:


Video Card which is able to process images (and or moving
images) fast enough, especially if 3D image generation is
required.
Monitor (CRT or LCD) in order to be able to display most of the
multimedia components, such as pictures or videos.
Sound Card which is required to process sounds and generate
the required sounds through the speakers.
Speakers which are able to playback sounds.
CD or DVD drives which is generally required to store large
amounts of multimedia data.
Colour printer used to print images or text on paper.
Scanner which is used to transfer paper images to the computer
in order to manipulate them.
Input devices that are used to interact such as mouse, hand
glove (in case of VR), and any other kind of special device.

The above items illustrate the basic requirements which must be used
for a multimedia experience. However, the better the quality and
intensity of multimedia such as immersive virtual reality, the better
the machine must be. For instance in VR, a video-card must be very
powerful in its 3D image processing since almost everything is shown
in 3D. In case of sound, if sound is to be delivered using Dolby
SurroundTM sound, a Dolby-capable sound card and speakers are
required. The type of multimedia dictates the hardware requirements,
and the better the hardware the steeper the costs will be.

Mr.A.Gatt Page 83 of 88
Form 5 Computer Studies Notes

3.2 Roles related to an I.T. Environment23

The EDP (electronic data processing) department is in charge of


various aspects related to I.T.; these can range from project
management to the quality control, when the product is finally
finished. The EDP has various roles, and each role can be assigned to a
number of employees, depending on the complexity and size of the
project. The EDP department needs to work together as a team, each
role with specific duties.

3.2.1 Information Systems Manager

The I.S. manager has the overall responsibility of the I.T. department
and sees that everything goes well and to plan. The I.S. manager
needs to monitor and encourage communication between different
roles to ensure project consistency. Some of the roles are:
Engage or disengage employees
Ensure that the department is satisfying the customers needs
Create new opportunities for the company which can result in
company profits; such as taking on new projects.

3.2.2 Systems Analyst/Designer

The system analyst plays a vital role in the system analysis lifecycle.
The main task of a system analyst is to determine the input and
output requirements of a new project, and conduct feasibility studies,
to determine whether a project should be done or not.

23
Adapted from: A Complete Computer Course by Ivan Buttigieg Pg344-348

Mr.A.Gatt Page 84 of 88
Form 5 Computer Studies Notes

In the case that the feasibility studies show that the project is not
feasible, the system analyst must propose whether to abandon it, or to
modify some of its aspects to make it feasible. If the project is
feasible, the main roles of the system analyst are:
Write down project details, including documentation manuals,
etc
Prepare test data in collaboration with the database
administrator
Provide instructions manuals (user and technical)
Supervising and maintaining the new system.

3.2.3 Systems Administrator

The role of the systems administrator is to ensure that all the software
required by the EDP is available and fully functional. This role is very
powerful because the systems administrator has got the rights to view
and/or modify all the files in the organisation. The main roles are:
Setting up the design of the database used by the organisation
Continuously maintaining the design of the database to reflect
changes and suit needs
Have extensive knowledge of the business rules
Testing database data integrity
Maintaining access rights of employees
Making sure to perform regular backups
Catalogue and index save files for future needs.

Mr.A.Gatt Page 85 of 88
Form 5 Computer Studies Notes

3.2.4 Programmer

Once the project has been given to go-ahead by the systems analyst,
the work is passed on to the programmers. But before handing the
programming task to the programmers, the system analyst splits the
project into various modules. The programmers will then start the
planning, writing and testing of these modules so that they meet the
systems designers requirements.
Programmers can be classified under two groups:
Senior programmers. There roles are to:
o Develop detailed plans (such as flowcharts) to be followed
by programming staff
o Schedule and co-ordinate junior programmers work
o Set up the technical and the user help.
Junior programmers. There roles are to:
o Write the program
o Test the program by using supplied test data
o Correct any mistakes
o Prepare inline documentation (comments).

3.2.5 I.T. Trainer

The main role of the I.T. trainer is to guide computer users in the use
of organisations software products. The trainer:
Lectures new employees on how to use the current EDP system
(logging, downloading or uploading, accessing files)
Teaches non-I.T. oriented people how to operate the hardware
and software applications
Co-ordinates training courses.

Mr.A.Gatt Page 86 of 88
Form 5 Computer Studies Notes

3.2.6 Operator

The computer operator needs to make sure that the departments


system is working effectively. The operator has to:
Ensure that input and output media are ready for use
Power up machines to be used
Record computer errors into logbook
Monitor systems directory for suspicious or unwanted files
Keep computers clean
Regulate computers environment.

3.2.7 Data Clerk

Data clerks enter information into the computer system. These


employees also check if the input and output information makes sense.
Examples include verifying all the data is present in a file, as well as
validating the source of the documents and eventually correcting any
errors found.

3.2.8 Web Master

The web master creates and maintains a web page and all the web site
links for the organisation. Usually the website will contain the products
/ improvements of the company, company vision and mission, support
information.

Mr.A.Gatt Page 87 of 88
Form 5 Computer Studies Notes

3.2.9 Lab technician

The role of the lab technician is to ensure that all computers (the
hardware) are in correct working order. This person needs to:
Replace or repair faulty equipment
Install new hardware
Maintain older hardware in working condition.

3.2.10 Maintenance engineer

The maintenance engineer knows the hardware of the EDP


departments computer system thoroughly, and is present when the
company purchases new hardware. This person is required to:
Initially set up the system
Solve hardware problems which the technician might now have
enough knowledge about
Upgrade the computer system to make sure that everything will
work after the upgrade.

The End
Good Luck!

Mr.A.Gatt Page 88 of 88

Você também pode gostar