Vous êtes sur la page 1sur 8

Raul Mansukhani Yr.

10 GSCE NOTES

RESEARCH
Google- Fu (finding info.): using depth and keywords.
Notes: - Snippets (bits and bobs) of info: Using many different browsers, using your
own words!
Researching Topic: How credit cards became more secure by using a pin number?
Whats a credit card?
A credit card allows you to borrow money from your bank to make different
purchases.
Why use pins in credit cards?
A pin or account number provide protection now that you will not need to swipe your
credit card; instead you will insert your card into a slot, and the machine will read the
microchip instead of a magnetic stripe.
The chip provides superior security and protection to help guard against robbery or
hacking, so there are hardly any chances that someone else knows your PIN
number except for the owner!
Chip-and-PIN is the most secure type of credit card technology. Instead of a
signature being used for identity verification, it requires you to enter a four-digit
Personal Identification Number (PIN) that must correspond to information contained
in a computer chip set in the card.

Binary
Binary numbers and arithmetic let you represent any amount you want using just two
digits: 0 and 1. This was created by Gottfried Leibniz.
How is text stored as binary?
ASCII Code

Abacus, used for calculating binary!


Representing data how can binary store text?
All data inside a computer is transmitted as a series of electrical signals that are
either on or off. Therefore, in order for a computer to be able to process any kind of
data, including text, images and sound, they must be converted into binary form. If
the data is not converted into binary a series of 1s and 0s the

Raul Mansukhani Yr. 10 GSCE NOTES

Computer will simply not understand it or be able to


process it.

ASCII code sheet

ASCII codes hold all characters (A-Z) and the binary equivalent. When a key is
pressed on a keyboard the code is sent to the computer. E.g. ASCII CODE: - 0163
the computer looks up the code on the ASCII chart and displays the character but
stores the binary equivalent in RAM/ HARD DISK.
Finding ASCII codes
= ALT + 0163
@ = ALT + 64
= ALT + 8364

= ALT + 165
= ALT + 184
= ALT + 169

To find the ASCII codes, you need to find on the table the symbol or key which you
want, and then type the code in but at the same time you need to hold the ALT button

Raul Mansukhani Yr. 10 GSCE NOTES

of the left hand side of the keyboard and the numbers on the right hand side of the
keyboard. (ALT + CODE)
My name in BINARY = 01001101
M

01001111
O

01001000

01001001

Test on Binary!
1. 00101111
1
2. 01001010
1
3. 00010101
1
4. 00011011
1
5. 01110100
1
6. 11111001
1
7. 00010001 1
8. 01011000
1
9. 11111110
1
10. 00000001
1

11. 15
1
12. 170
13. 240
14. 85
15. 128+64+ 8 +2 = 202
16. 38
17. 214
18.
19.
20.

1
1
1
1
1
0
0
0
0

16 / 20

01010100
T

Raul Mansukhani Yr. 10 GSCE NOTES

Hexadecimal
Base 16 Number System

0
0

1
1

2
2

3
3

4
4

5
5

6
6

7
7

8
8

9
9

A
1
0

B
1
1

C
1
2

D
1
3

E
1
4

F
1
5

Hex cheat sheet


Hex is used by computers to store numerical values
Used in: - Html code, memory addresses (to help locate resources (data)
in ram)

How to convert denary into Hex


Example Hexadecimal String: - AA47

Raul Mansukhani Yr. 10 GSCE NOTES

Working Example
75 to HEX

INTEGERS (WHOLE NUMBERS) ARE DIVIDED /


16
FRACTIONS ARE MULTIPLIED * 16
READ BOTTOM UPWARDS

75 / 16 = 4.6875
4 / 16 = 0.25
.6875 x 16 = 11
.25 x 16 = 4

75 = 4B
96 / 16 = 6
6 / 16 = 0.375
.375 x 16 = 6

96 = 60
111 / 16 = 6.9375
6 / 16 = 0.375
.9375 x 16 = 15
0.375 x 16 = 6

111 = 6F
7FFA = 32,762
7 x 16 x 16 x 16
15*16*16
15*16
10

Raul Mansukhani Yr. 10 GSCE NOTES

Data Storage

Input

Process

Output

Store

Computers need to store input data. All data input is first held in Ram
(Memory)
Ram only stores data when connected to the power. RAM is volatile
storage (power cut = data loss)

How does RAM store data?


1s and 0s are stored using tiny switches (transistors)
Open = 0
Closed = 1

e.g.

Open

SWITCHES

Closed

What is data?
Data is binary, all data comprises of 1s and 0s (millions of them)
1 GB of Ram has approx 8billion (quite a lot) switches/transistors
There is a very close relationship between binary + RAM
15 = 00001111 (8 bits)
Volatile storage is reset = all switches open (0) when power is removed
All data (+errors) are cleared from RAM when computer is reset

Raul Mansukhani Yr. 10 GSCE NOTES

Difference between Primary storage and secondary storage


Primary memory is the main memory (Hard disk, RAM) where the
operating system resides.
Secondary memory can be external devices like CD; floppy magnetic discs
etc. secondary storage cannot be directly accessed by the CPU and is also
external memory storage.
- Primary memory storages are temporary; whereas the secondary
storage is permanent.
- Primary memory is expensive and smaller, where as secondary memory
is cheaper and larger
- Primary memory storages are faster, where as secondary storages are
slower.
- Primary memory storages are connected through data buses to CPU,
where as the secondary storages are connect through data cables to CPU
A computer's internal hard drive is often considered a primary storage
device, while external hard drives and other external media are
considered secondary storage devices.
How long does data last on;
Hard disks: 4 - 8 years, this depends on brand, quality and use
Optical Disk: CD-R, 2 5 years, 5 25 years
SSD/USB: 50 years
The newest technology can hold more data, faster and for longer periods
of time

Raul Mansukhani Yr. 10 GSCE NOTES

Client Server Network Model


Clients
1

S
E
R

Switch

V
E
R

3
99

100

In a client server network model. The clients access resources provided by


the server. Server is designed to provide specific services to the clients.
E.g.
File server= to store/hold users data
Print server = provides printing services for clients
On a server
No key/mouse/screen no user works @ server critical system must run
24/7 for clients run a command line operating system
On a client
Software tools graphical user interface (NO IMPORTANT/CRITICAL DATA)
windows Mac osx, Linux, IOS
Clients/users can log on anywhere!

Vous aimerez peut-être aussi