The document discusses the key components of a computer system including hardware, software, input devices, storage devices, and output devices. It defines these terms and provides examples of common devices. It also summarizes the different types of software including systems software (operating systems, utilities, programming tools, libraries) and applications software (small-scale like word processors versus large-scale like payroll systems). Finally, it outlines the stages of the systems development life cycle from problem identification to maintenance. Defining the problem accurately is important so the delivered system matches user expectations.
This document provides an introduction to software engineering. It defines software as including not just programs or code, but also the related data and documentation. Software plays a vital role in many fields like business, science, games, and embedded systems. Software engineering is defined as utilizing computer science knowledge to effectively produce software systems. A key difference between software and other systems like cars or TVs is that software does not experience wear and tear over time - any defects or bugs exist from the beginning. The inherent complexity of software arises from its constant evolution, with frequent changes made across many dimensions, unlike other engineered systems. This rapid change leads to increased bugs that software engineers must address.
Mca i-fundamental of computer-u-2- application and system softwareRai University
This document provides information on different types of software and software development models. It begins by defining system software and application software. System software includes operating systems, compilers, loaders, linkers, and interpreters and helps manage computer hardware. Application software includes programs like word processors, spreadsheets, databases, and presentations that perform tasks for users. The document then discusses software development models including the waterfall model, V-shaped model, and evolutionary prototyping model. It provides details on the phases and characteristics of each model.
In February, 2000, Hewlett-Packard (HP) acquired Bluestone, a maker of middleware software, for $467.6 million. In June, 2002, Hewlett-Packard announced its plans to exit the middleware business — instead relying on software partners (such as Microsoft, Oracle, and BEA) to provide the middleware stack that would run on their servers.
This document provides an overview of operating systems. It defines an operating system as a program that acts as an interface between the user and computer hardware to control execution of programs. The document then describes key functions of operating systems like memory management, processor management, device management, file management, and security. It also outlines different types of operating systems including batch, time-sharing, distributed, network, and real-time operating systems.
Embedded Systems Q and A M.Sc.(IT) PART II SEM IIINi
The document discusses various topics related to embedded systems including:
1. The differences between embedded systems and general computing systems are summarized.
2. Key operational and non-operational quality attributes of embedded systems are outlined.
3. The analysis and support phases of the embedded system development life cycle are described.
System software is a type of software that operates basic computer functions and provides a platform for running other application software. There are different types of system software including operating systems, device drivers, and programming software. The most important system software is the operating system, which acts as an interface between users and hardware and manages other programs. Major operating systems include Windows, Macintosh, and Linux. Windows 7 was developed by Microsoft as an improved version of earlier Windows operating systems with enhanced features, speed, and resource usage. As technology has evolved, operating systems and devices have shifted from desktop computers to mobile devices like smartphones and tablets.
Software Development Software development processimtiazalijoono
This document discusses software development and a software development process. It begins by defining software as a collection of computer programs and data that provide instructions for what a computer should do. It then describes different types of software like systems software and application software. The document outlines the typical stages of a software development process including specification, design, coding, testing, and evolution. It provides examples of system failures caused by software bugs. The remainder of the document discusses the contents of a textbook on C programming, outlining chapters that will cover topics like the programming environment, basic building blocks, loops, decisions, functions, arrays, strings, pointers, files and larger programs. It concludes with information on tests, labs, and the paper format for the course
This document provides an introduction to software engineering. It defines software as including not just programs or code, but also the related data and documentation. Software plays a vital role in many fields like business, science, games, and embedded systems. Software engineering is defined as utilizing computer science knowledge to effectively produce software systems. A key difference between software and other systems like cars or TVs is that software does not experience wear and tear over time - any defects or bugs exist from the beginning. The inherent complexity of software arises from its constant evolution, with frequent changes made across many dimensions, unlike other engineered systems. This rapid change leads to increased bugs that software engineers must address.
Mca i-fundamental of computer-u-2- application and system softwareRai University
This document provides information on different types of software and software development models. It begins by defining system software and application software. System software includes operating systems, compilers, loaders, linkers, and interpreters and helps manage computer hardware. Application software includes programs like word processors, spreadsheets, databases, and presentations that perform tasks for users. The document then discusses software development models including the waterfall model, V-shaped model, and evolutionary prototyping model. It provides details on the phases and characteristics of each model.
In February, 2000, Hewlett-Packard (HP) acquired Bluestone, a maker of middleware software, for $467.6 million. In June, 2002, Hewlett-Packard announced its plans to exit the middleware business — instead relying on software partners (such as Microsoft, Oracle, and BEA) to provide the middleware stack that would run on their servers.
This document provides an overview of operating systems. It defines an operating system as a program that acts as an interface between the user and computer hardware to control execution of programs. The document then describes key functions of operating systems like memory management, processor management, device management, file management, and security. It also outlines different types of operating systems including batch, time-sharing, distributed, network, and real-time operating systems.
Embedded Systems Q and A M.Sc.(IT) PART II SEM IIINi
The document discusses various topics related to embedded systems including:
1. The differences between embedded systems and general computing systems are summarized.
2. Key operational and non-operational quality attributes of embedded systems are outlined.
3. The analysis and support phases of the embedded system development life cycle are described.
System software is a type of software that operates basic computer functions and provides a platform for running other application software. There are different types of system software including operating systems, device drivers, and programming software. The most important system software is the operating system, which acts as an interface between users and hardware and manages other programs. Major operating systems include Windows, Macintosh, and Linux. Windows 7 was developed by Microsoft as an improved version of earlier Windows operating systems with enhanced features, speed, and resource usage. As technology has evolved, operating systems and devices have shifted from desktop computers to mobile devices like smartphones and tablets.
Software Development Software development processimtiazalijoono
This document discusses software development and a software development process. It begins by defining software as a collection of computer programs and data that provide instructions for what a computer should do. It then describes different types of software like systems software and application software. The document outlines the typical stages of a software development process including specification, design, coding, testing, and evolution. It provides examples of system failures caused by software bugs. The remainder of the document discusses the contents of a textbook on C programming, outlining chapters that will cover topics like the programming environment, basic building blocks, loops, decisions, functions, arrays, strings, pointers, files and larger programs. It concludes with information on tests, labs, and the paper format for the course
System software includes operating systems and utilities that enable computer functions. Application software performs real work for users, like word processors and spreadsheets. There are several software development models including:
- Waterfall model which progresses in linear stages from requirements to implementation.
- V-shaped model emphasizes testing at each stage to validate the product.
- Prototyping model involves building prototypes, getting user feedback, and refining iteratively until the user is satisfied.
Computer Science / ICT - Software
Software is key in computer systems and i have put together a presentation to explain the different types such as system software (utility and library programs) and application software (bespoke, special purpose and general purpose). - operating systems are mentioned but there is another presentation based on that.
Software:
Systems and Application Software
Identify and briefly describe the functions of the two basic kinds of software
Outline the role of the operating system and identify the features of several popular operating systems
Discuss how application software can support personal, workgroup, and enterprise business objectives
Identify three basic approaches to developing application software and discuss the pros and cons of each
Outline the overall evolution and importance of programming languages and clearly differentiate among the generations of programming languages
Identify several key software issues and trends that have an impact on organizations and individuals
This document provides an outline and overview of key topics about computer software that will be covered in a chapter. It discusses the major types of software including system software like operating systems and application software. It describes important functions of operating systems and lists different operating system types. It also outlines various application software categories including personal, enterprise, and specialized software. Finally, it discusses software issues organizations may face and trends in programming languages.
This document discusses computer software, summarizing:
- There are three main categories of software: operating systems, programming languages, and applications.
- Operating systems provide user interfaces, manage computer resources like memory and processors, and execute application programs.
- Programming languages include low-level languages like machine code and assembly, and high-level languages with syntax less dependent on specific hardware.
- Application software performs specific tasks, including media-specific apps for editing content and authoring apps for integrating media and interfaces.
This chapter discusses software and programming languages. It describes the evolution of programming languages from machine languages to higher-level languages like visual programming languages. It distinguishes between application software, which performs specific tasks, and system software, which manages computer resources. Important considerations for purchasing application software include cost, quality, and support.
The document provides an introduction to C programming, including:
- C is a general-purpose programming language used widely for operating systems and software. It allows for maximum control and efficiency.
- The document outlines the basic elements of C like data types, variables, decision making, loops, functions, and file input/output.
- It also discusses compilers, text editors, and the benefits of understanding C programming at a low level. Understanding C provides insight into how computers work at their basic level.
Software has evolved from being solely a product designed and built by engineers, to serving a dual role as both a product and vehicle for delivering other products. Originally developed by computer software and services companies in the 1950s-60s, software expanded to computer hardware companies in the 1970s-80s. Today from the 1990s to present, software has transformed how people work, play and communicate on a daily basis by supporting and controlling other programs and communications.
The document provides an overview of object-oriented programming basics and the C++ language. It discusses the basic components of a computer system including input, processing, and output. It also defines different types of software such as system software, operating systems, application software, utilities, and translators. The document then discusses the evolution and timeline of C++ and the three step process of translating a C++ program which includes writing source code, compiling to an object file, and linking to create an executable file.
In this slide you can find the definition of the computer software, types of computer software like the system software and applications software and its examples.
System software coordinates hardware components and translates inputs into machine language. Examples include operating systems like DOS, BIOS, and linkers. Popular operating systems are Microsoft Windows, developed by Microsoft for IBM PC compatible systems.
Application software allows direct interaction with computers and includes programs like Microsoft Office, web browsers, email clients, media players, and antivirus software. Application software is divided into systems software that supports applications, and actual applications end-users directly interact with.
you can be friend with me on orkut
"mangalforyou@gmail.com" : i belive in sharing the knowledge so please send project reports ,seminar and ppt. to me .
Nature and Qualities of Software, Types of SoftwareRaja Adapa
Software refers to programmed instructions that allow computers to perform meaningful tasks. It is distinct from hardware in that it is logical rather than physical. There are two main types of software: system software, which controls computer operations and allows other programs to run, and application software, which is designed for specific tasks. Software has qualities like correctness, reliability, robustness, and evolvability that are important to its design and function. It is engineered rather than manufactured, does not wear out over time, and can be customized to specific users.
Bsc cs 1 fit u-2 application and system softwareRai University
System software includes operating systems and utilities that enable computer functions. Application software includes programs for specific tasks. The document describes various types of system software like compilers, loaders, and interpreters. It also discusses application software for word processing, spreadsheets, presentations, and databases. Several software development models are covered, including waterfall, V-shaped, prototyping, spiral, and evolutionary models. Each has strengths and weaknesses for different project needs.
Computer Software and Operating SystemRupan Sharma
In this presentation we have described basic concept ofcomputer Software and operating system featurs, how they related to each other. Also we have described various types of computer software and operating system with examples and also their use. Some other aspects of computer software such as open source, copyright, licence and agreements are also described inthis slides.
Anil, a 17-year-old student from Ghaziabad, India, introduces himself and gives a presentation about software. He defines software as a set of computer programs and documents related to operating a computer system. There are two main types of software: application software, which performs tasks for users like word processors; and system software, which manages hardware and runs applications, like operating systems. Anil discusses different types of each, including open source software that allows public access to modify code. He concludes by thanking his teacher for the opportunity and asking if anyone has any questions.
Introduction
Difference between System software and Application software
Difference between System and Application programming
Elements of programming environment
Assembler
Loader and Linker
Macro preprocessor
Compiler
Editor
Debugger
Device Drivers
Operating System
Unit 1 importance ofsoftengg_b.tech iii yearPreeti Mishra
Here are some key points from Unit 1:
- Software is computer programs, data structures, and documentation. Software engineering is the systematic development and maintenance of software.
- A software process provides a framework for development activities like communication, planning, modeling, construction and deployment. It establishes quality practices.
- Legacy software supports core functions but is outdated, poorly designed and documented. It is costly to replace but also to maintain.
- Common software myths include thinking requirements can change freely, documentation is unnecessary, or that quality is only important after coding. These undermine good practices.
- A process framework provides structure while methods and tools support specific technical tasks. Processes must balance control and flexibility for different projects.
Unit 1 introduction tosoftengg_mba tech ii yearPreeti Mishra
This document provides an introduction to software engineering. It defines software and discusses different categories of software products. It explains that software engineering is concerned with developing software using systematic and disciplined approaches. The document outlines important attributes of good software such as maintainability, dependability, efficiency and acceptability. It also discusses challenges with legacy software systems and reasons for evolving legacy systems. Finally, it covers key tasks for software project planning such as establishing scope, feasibility analysis, risk analysis, resource estimation, and developing a project schedule.
System software includes operating systems and utilities that enable computer functions. Application software performs real work for users, like word processors and spreadsheets. There are several software development models including:
- Waterfall model which progresses in linear stages from requirements to implementation.
- V-shaped model emphasizes testing at each stage to validate the product.
- Prototyping model involves building prototypes, getting user feedback, and refining iteratively until the user is satisfied.
Computer Science / ICT - Software
Software is key in computer systems and i have put together a presentation to explain the different types such as system software (utility and library programs) and application software (bespoke, special purpose and general purpose). - operating systems are mentioned but there is another presentation based on that.
Software:
Systems and Application Software
Identify and briefly describe the functions of the two basic kinds of software
Outline the role of the operating system and identify the features of several popular operating systems
Discuss how application software can support personal, workgroup, and enterprise business objectives
Identify three basic approaches to developing application software and discuss the pros and cons of each
Outline the overall evolution and importance of programming languages and clearly differentiate among the generations of programming languages
Identify several key software issues and trends that have an impact on organizations and individuals
This document provides an outline and overview of key topics about computer software that will be covered in a chapter. It discusses the major types of software including system software like operating systems and application software. It describes important functions of operating systems and lists different operating system types. It also outlines various application software categories including personal, enterprise, and specialized software. Finally, it discusses software issues organizations may face and trends in programming languages.
This document discusses computer software, summarizing:
- There are three main categories of software: operating systems, programming languages, and applications.
- Operating systems provide user interfaces, manage computer resources like memory and processors, and execute application programs.
- Programming languages include low-level languages like machine code and assembly, and high-level languages with syntax less dependent on specific hardware.
- Application software performs specific tasks, including media-specific apps for editing content and authoring apps for integrating media and interfaces.
This chapter discusses software and programming languages. It describes the evolution of programming languages from machine languages to higher-level languages like visual programming languages. It distinguishes between application software, which performs specific tasks, and system software, which manages computer resources. Important considerations for purchasing application software include cost, quality, and support.
The document provides an introduction to C programming, including:
- C is a general-purpose programming language used widely for operating systems and software. It allows for maximum control and efficiency.
- The document outlines the basic elements of C like data types, variables, decision making, loops, functions, and file input/output.
- It also discusses compilers, text editors, and the benefits of understanding C programming at a low level. Understanding C provides insight into how computers work at their basic level.
Software has evolved from being solely a product designed and built by engineers, to serving a dual role as both a product and vehicle for delivering other products. Originally developed by computer software and services companies in the 1950s-60s, software expanded to computer hardware companies in the 1970s-80s. Today from the 1990s to present, software has transformed how people work, play and communicate on a daily basis by supporting and controlling other programs and communications.
The document provides an overview of object-oriented programming basics and the C++ language. It discusses the basic components of a computer system including input, processing, and output. It also defines different types of software such as system software, operating systems, application software, utilities, and translators. The document then discusses the evolution and timeline of C++ and the three step process of translating a C++ program which includes writing source code, compiling to an object file, and linking to create an executable file.
In this slide you can find the definition of the computer software, types of computer software like the system software and applications software and its examples.
System software coordinates hardware components and translates inputs into machine language. Examples include operating systems like DOS, BIOS, and linkers. Popular operating systems are Microsoft Windows, developed by Microsoft for IBM PC compatible systems.
Application software allows direct interaction with computers and includes programs like Microsoft Office, web browsers, email clients, media players, and antivirus software. Application software is divided into systems software that supports applications, and actual applications end-users directly interact with.
you can be friend with me on orkut
"mangalforyou@gmail.com" : i belive in sharing the knowledge so please send project reports ,seminar and ppt. to me .
Nature and Qualities of Software, Types of SoftwareRaja Adapa
Software refers to programmed instructions that allow computers to perform meaningful tasks. It is distinct from hardware in that it is logical rather than physical. There are two main types of software: system software, which controls computer operations and allows other programs to run, and application software, which is designed for specific tasks. Software has qualities like correctness, reliability, robustness, and evolvability that are important to its design and function. It is engineered rather than manufactured, does not wear out over time, and can be customized to specific users.
Bsc cs 1 fit u-2 application and system softwareRai University
System software includes operating systems and utilities that enable computer functions. Application software includes programs for specific tasks. The document describes various types of system software like compilers, loaders, and interpreters. It also discusses application software for word processing, spreadsheets, presentations, and databases. Several software development models are covered, including waterfall, V-shaped, prototyping, spiral, and evolutionary models. Each has strengths and weaknesses for different project needs.
Computer Software and Operating SystemRupan Sharma
In this presentation we have described basic concept ofcomputer Software and operating system featurs, how they related to each other. Also we have described various types of computer software and operating system with examples and also their use. Some other aspects of computer software such as open source, copyright, licence and agreements are also described inthis slides.
Anil, a 17-year-old student from Ghaziabad, India, introduces himself and gives a presentation about software. He defines software as a set of computer programs and documents related to operating a computer system. There are two main types of software: application software, which performs tasks for users like word processors; and system software, which manages hardware and runs applications, like operating systems. Anil discusses different types of each, including open source software that allows public access to modify code. He concludes by thanking his teacher for the opportunity and asking if anyone has any questions.
Introduction
Difference between System software and Application software
Difference between System and Application programming
Elements of programming environment
Assembler
Loader and Linker
Macro preprocessor
Compiler
Editor
Debugger
Device Drivers
Operating System
Unit 1 importance ofsoftengg_b.tech iii yearPreeti Mishra
Here are some key points from Unit 1:
- Software is computer programs, data structures, and documentation. Software engineering is the systematic development and maintenance of software.
- A software process provides a framework for development activities like communication, planning, modeling, construction and deployment. It establishes quality practices.
- Legacy software supports core functions but is outdated, poorly designed and documented. It is costly to replace but also to maintain.
- Common software myths include thinking requirements can change freely, documentation is unnecessary, or that quality is only important after coding. These undermine good practices.
- A process framework provides structure while methods and tools support specific technical tasks. Processes must balance control and flexibility for different projects.
Unit 1 introduction tosoftengg_mba tech ii yearPreeti Mishra
This document provides an introduction to software engineering. It defines software and discusses different categories of software products. It explains that software engineering is concerned with developing software using systematic and disciplined approaches. The document outlines important attributes of good software such as maintainability, dependability, efficiency and acceptability. It also discusses challenges with legacy software systems and reasons for evolving legacy systems. Finally, it covers key tasks for software project planning such as establishing scope, feasibility analysis, risk analysis, resource estimation, and developing a project schedule.
The document discusses software development life cycle (SDLC) and the various steps involved including requirements analysis, design, coding, testing, and maintenance. It also discusses different types of errors that can occur during software development such as unexpected input values and changes that affect software operations. It then discusses the input-process-output (IPO) cycle and how it relates to batch processing systems and online processing systems. For batch systems, the input data is collected in batches and processed as batches, with no user interaction during processing. For online systems, the user can interact with the system as transactions are processed immediately.
The document provides an overview of software engineering concepts including definitions of software, characteristics of good software, and the software engineering process. It discusses that software engineering aims to apply systematic and disciplined approaches to software development and maintenance to economically produce reliable and efficient software. The document also outlines key activities in a generic software process framework including communication, planning, modeling, construction, and deployment.
The document provides an overview of software engineering concepts. It defines software and its key characteristics, such as being developed rather than manufactured. It discusses different types of software applications and attributes of good software like maintainability and dependability. The document also outlines the activities in a generic software process, including communication, planning, modeling, construction, and deployment. It emphasizes that the process should be adapted to each project's specific needs.
SE_Lec 01_ Introduction to Software EnginerringAmr E. Mohamed
The document discusses two examples of software systems:
1) An insulin pump which collects blood sugar data, calculates insulin doses, and injects insulin to maintain safe blood sugar levels. This is a safety-critical embedded system.
2) A mental health patient management system which maintains patient records, allows clinicians to track care, and generates administrative reports. It aims to support treatment and monitor at-risk patients while maintaining privacy.
The document discusses different types of software and operating systems. It begins by defining software and describing different categories such as application software, system software, programming software, and firmware. It then provides examples of different types of application software and system software. Finally, it asks the recipient about their expectations for an operating systems application course.
The document provides an overview of software engineering concepts including definitions of software and software engineering. It discusses the importance of software and characteristics that make it different than other engineered products. The document also outlines some common software applications and categories. It defines the key activities in a generic software process including communication, planning, modeling, construction, and deployment. Finally, it provides examples of two case studies - an embedded system in an insulin pump and a patient information system for mental health care.
- Software includes application software that directs computer use for specific tasks and system software that controls computer operations.
- Application software is divided into general-purpose programs for common tasks and specialized programs for business functions.
- System software includes programs that manage computer resources and programs that help develop other programs.
- An operating system integrates programs to manage the CPU, input/output, storage, and provide support services.
The document provides an introduction to C programming, including algorithms and flowcharts, computer systems and software, and creating and running programs in C. It discusses algorithm development using pseudocode and flowcharts, the components of computer hardware and software, and the process of compiling, linking, and executing C programs. Example algorithms and programs are provided to illustrate various concepts like decision making and iteration. An overview of computing environments like personal, time-sharing, client-server and distributed computing is also presented.
The document discusses software engineering and provides definitions and explanations of key concepts. It defines software engineering as applying engineering principles and methods to the development of software. It notes that the goal of software engineering is to produce efficient and reliable software products. It also discusses what constitutes software, different types of software products, the importance of software, and characteristics of good software.
This document provides an overview of computer software. It begins by defining software as computer instructions or data that can be stored electronically, in contrast to hardware which refers to physical devices. It then discusses the relationship between hardware and software, noting that both are necessary for a computer to function and that software refers to programs written in a language understood by computers. The document goes on to describe the two major types of software - system software, which acts as an interface between hardware and applications, and application software, which is designed to perform specific tasks. It provides examples and details of both types of software and outlines the typical software development life cycle.
Computer software or simply software is a program that enables a computer to perform a specific task as oppose to the physical components of the system (i.e. hardware).
This document discusses software engineering and requirements engineering. It defines software engineering as using techniques, methodologies and tools to produce high quality software within budget and deadline constraints. It describes requirements engineering as identifying functional, non-functional and pseudo requirements to develop software. Key activities in requirements engineering include domain analysis, defining the problem scope, and determining what constitutes a requirement.
Introduction to software engineering
Software products
Why Software is Important?
Software costs
Features of Software?
Software Applications
Software—New Categories
Software Engineering
Importance of Software Engineering
Essential attributes / Characteristics of good software
Software Components
Software Process
Five Activities of a Generic Process framework
Relative Costs of Fixing Software Faults
Software Qualities
Software crisis
Software Development Stages/SDLC
What is Software Verification
Advantages of Software Verification
Advantages of Validation
Lec 01_Linux System Administration (1).pptxShabanaShafi3
This course provides students with the necessary skills to administer Linux systems. The course objectives include understanding Linux architecture, configuring Linux, writing scripts, managing user accounts and authentication, performing backups and restores, and more. Students will be assessed through quizzes, assignments, exams, and lab work. The course covers topics such as installing Linux, user account management, the command line, configuration management, system services, virtual environments, security policies, and networking.
This document provides an overview of key concepts in the field of software engineering. It defines software engineering as the application of systematic and disciplined approaches to software development, operation, and maintenance. The document discusses the importance of software engineering in producing reliable and economical software. It also summarizes essential attributes of good software such as maintainability, dependability, efficiency, and acceptability. Additionally, the document outlines a generic software engineering process framework involving activities like communication, planning, modeling, construction, and deployment. It notes that the process should be adapted to the specific project.
The document provides an introduction to software engineering and discusses key concepts. It defines software, engineering, and software engineering. Software engineering aims to develop reliable software products using scientific principles and methods. The document outlines different types of software products and applications. It discusses the importance of software and costs associated with software. Finally, it introduces the concept of software evolution and laws of software evolution.
Computers in accounting class 11th by NithinNithin Patel
This document discusses computers in accounting and accounting information systems. It defines a computer and its basic elements including hardware, software, and humanware. It describes the components of a computer system including the central processing unit, memory, storage, input/output devices, and networking. It then discusses accounting information systems as a type of management information system and the role of accounting data in decision making. Finally, it covers automation of accounting processes using accounting software.
Similar to A level-computing-9691-paper-1-notes (20)
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Infrastructure Challenges in Scaling RAG with Custom AI modelsZilliz
Building Retrieval-Augmented Generation (RAG) systems with open-source and custom AI models is a complex task. This talk explores the challenges in productionizing RAG systems, including retrieval performance, response synthesis, and evaluation. We’ll discuss how to leverage open-source models like text embeddings, language models, and custom fine-tuned models to enhance RAG performance. Additionally, we’ll cover how BentoML can help orchestrate and scale these AI components efficiently, ensuring seamless deployment and management of RAG systems in the cloud.
Infrastructure Challenges in Scaling RAG with Custom AI models
A level-computing-9691-paper-1-notes
1. A Level. Computing (9691/1)
www.revision-notes.co.cc
www.revision-notes.co.cc
2. CPT1: Computing Fundamentals
1.1 COMPONENTS OF A COMPUTER SYSTEM
Candidates should be able to:
1. Define the terms hardware, software, input device, storage
device and output device.
2. Describe the purpose of input devices, storage devices and
output devices.
Hardware
Hardware are the physical components of a computer – eg the input devices, output devices,
primary storage (memory) and secondary storage (backing store), Central Processing Unit etc.
Note that input and output devices are collectively known as peripherals.
Software
Software are the sets of instructions/programs that are loaded into the memory of the computer in
order to perform a task or to control the operation of the computer.
Peripheral
A peripheral is a device that is external to the computer’s ‘box’ and connected to it via one of the
Input/Output (I/O) ports.
Common peripherals include:
• mouse;
• keyboard;
• VDU;
• printer;
• scanner.
Input device
An input device is hardware that allows data to be entered into a computer.
Common input devices include:
• keyboard;
• mouse;
• scanner;
• digital camera
ADDITIONAL NOTES:
11
www.revision-notes.co.cc
3. CPT1: Computing Fundamentals
Storage device
A storage device is hardware that allows data to be saved, long-term, after it has been inputted into
the computer.
Common storage devices include:
• Hard disk drive;
• CD-ROM (or CD-R, CD-RW)
• USB Flash ‘pen’
Output device
An output device is hardware that allows a computer to present data to a user.
Common output devices include:
• Visual display unit (VDU/monitor);
• Printer;
• LCD projector.
ADDITIONAL NOTES:
12
www.revision-notes.co.cc
4. CPT1: Computing Fundamentals
Categories of Software
Candidates should be able to:
3. Describe the different roles and functions of systems software
and applications packages.
Systems software
The set of programs needed to control and monitor the operation of the hardware (and applications
software) of a computer.
Systems software consists of the following:
• Operating System software
• Utility programs
• Programming tools
• Library programs
Operating System software
The Operating System is the software that controls the operation of the hardware and hides its
complexities from the user.
The operating system is loaded into main memory during start-up.
Examples of Operating Systems are DOS, Windows, Unix, Linux, Mac OS. Note that the operating
system is not just one large program – it consists of a set of many programs all of which are
necessary to get the computer to work.
Utility programs
Utility programs are non-essentials small programs that are designed to perform common tasks that
thousands of computer users benefit from at one time or another.
Some utility programs help maintain the functioning of the system and others make life easier for
the computer users.
Utility programs include:
• file backup;
• file compression;
• disk formatters;
• disk defragmentation;
• file recovery;
• virus detection and cleaning etc..
Performance monitoring programs can also be classified as utility software – this is software that is
used to monitor disk, memory and processor use.
ADDITIONAL NOTES:
13
www.revision-notes.co.cc
5. CPT1: Computing Fundamentals
Programming tools
Programming tools include language translators such as compilers and assemblers that are
necessary to ‘build’ programs. They also include interpreters which are necessary to run programs
written in languages such as Visual Basic.
Note that the MS DOS versions of DEBUG and QBASIC were clearly systems software although
some people argue that Visual Basic is closer to applications software.
Library programs
Library programs are files that contain program code, which is available to all applications to share.
They allow different applications to communicate and share resources. MS Windows™ uses many
library files known as dynamic link libraries (*.dlls – pronounced dee-el-el’s).
Applications packages
Application packages (software) are the programs that are consciously used by the user to solve
problems or perform work related tasks – writing a letter, keeping accounts, printing invoices, etc.
Small-scale applications
Even though they are complex in their programming and can contain millions of lines of code,
some applications are designed to be installed on a single computer for one user to use. These
applications include:
• word processing;
• spreadsheets;
• desktop publishing (DTP);
• presentation software;
• drawing packages.
Large-scale applications
Some of the large scale applications can be used by hundreds of people at the same time and store
millions upon millions of records. Such applications are often central to large organisations such as
banks, supermarkets and other types of large business organisations. These applications include:
• stock control;
• payroll;
• order processing and tracking;
• utility billing.
ADDITIONAL NOTES:
14
www.revision-notes.co.cc
6. CPT1: Computing Fundamentals
1.2 THE SYSTEMS DEVELOPMENT LIFE CYCLE
Candidates should be able to:
4. Describe the stages of the systems life cycle.
The stages in the systems life-cycle
Most IT projects use the System’s Life-cycle approach to developing a new system. This approach
consists of several distinct stages, which follow one after the other.
During the development life-cycle, a team is not permitted to go back to a previous stage – this
could cause the project to over-run in terms of both cost and time.
The stages in the System’s Life-Cycle are as follows:
• Problem identification
• Feasibility Study (Initial investigation)
• Analysis (detailed investigation)
• Design
• Coding (software development)
• Testing
• Conversion
• Review (Evaluation)
• Maintenance
Note that each stage of the System’s Life-cycle has a distinct end-point, which can be shown to the
customer and ‘signed off’. This helps to ensure that the final product is what the customer actually
wanted!
Problem identification
The problem identification is a statement of the existing problems and description of user
requirements as outlined by the customer.
Feasibility Study
A feasibility study is an initial investigation of a problem in order to ascertain whether the proposed
system is viable, before spending too much time or money on its development.
ADDITIONAL NOTES:
15
www.revision-notes.co.cc
7. CPT1: Computing Fundamentals
Analysis
The analysis is a detailed, fact-finding, investigation of the existing system in order to ascertain its
strengths and weaknesses and to produce the list of requirements for the new system.
Design
Design is the production of diagrams, tables and algorithms, which show how the new system is to
look and work.
The design will show:
• how the interfaces and reports should look;
• the structure of and relationships between the data;
• the processing to be used to manipulate/transform the data;
• the methods to be used for ensuring the security and validity of the data.
Coding
Coding is the creation and editing of the interfaces, code and reports so they look and work as
indicated in the design stage.
Note that user and technical documentation will also be produced during the coding stage.
Testing
Testing is the process to ensure that the system meets the requirements that were stated in the
analysis and also to discover (and eliminate) any errors that might be present.
Conversion
Conversion is the process of installing the new system into the customer’s organisation and training
the employees to use it.
Review
Post-implementation review (also known as evaluation) is a critical examination of a system after it
has been in operation for a period of time.
Maintenance
Maintenance is the process of making improvements to a system that is in use.
The reasons for maintenance could be to fix bugs, to add new features or to make the system run
quicker.
ADDITIONAL NOTES:
16
www.revision-notes.co.cc
8. CPT1: Computing Fundamentals
Defining the problem
Candidates should be able to:
5. Explain the importance of defining a problem accurately.
An accurate problem definition is needed so that the developers know exactly what is expected
from the system. This means that the system that is delivered is going to be what the customer
expected. Without an accurately defined problem, it is likely that the software that is developed will
not fully satisfy the needs of the end users.
Note that there has to be a two-way dialogue between the analyst and the users because:
• The users do not know a lot about computers and their capabilities;
• Programmers will not know very much about the way the business works, for which they
are developing the software
ADDITIONAL NOTES:
17
www.revision-notes.co.cc
9. CPT1: Computing Fundamentals
Feasibility Study
Candidates should be able to:
6. Describe the function and purpose of a feasibility study.
After the problem/task has been defined and before a complete detailed study of exactly what is
needed within a new system, a feasibility study is undertaken to verify that the system that is
required is, in fact, viable and that it is worth proceeding.
There are five factors that are considered in a feasibility study:
• Technical feasibility – this investigates whether the hardware and
software exists to create the system that is wanted.
• Economic feasibility – this investigates the cost of developing a
new system (including the purchase of new hardware) and then determines whether the
benefits of a new system would outweigh the costs.
• Legal feasibility – investigates if there is a conflict between what is wanted and the law.
For example, would the new system satisfy the requirements of the Data Protection Act?
• Operational feasibility – investigates whether the current working practises within the
organisation are adequate to support the new computer system. It is possible that the new
system would require employees to perform duties in a different way –this may not be
acceptable!
• Schedule feasibility – this investigates the amount of time that the new system is likely to
take to develop and determines whether it can be developed within the timescale that is
available.
Estimating cost effectiveness
Costs Benefits
New Hardware Reduced Staffing
The New software Better service to customers
Training (time and money) Improved management information
Faster processing that speeds up payments from
Conversion (Time)
customers
Maintenance (Money)
ADDITIONAL NOTES:
18
www.revision-notes.co.cc
10. CPT1: Computing Fundamentals
Fact finding during analysis
Candidates should be able to:
7. Explain the importance of determining the information
requirements of a system and describe different methods of
fact finding, including questionnaires, observation, and
structured interviews, highlighting the advantages and
disadvantages of each method.
When attempting to create a new IT system, it is vital that sufficient information is gained about the
way the present system operates. The usual methods of obtaining this information include:
• Interviewing staff
• Observation of current procedures
• Examination of paperwork
• Surveying (with questionnaires)
Interviewing staff
All levels of staff from end-user to senior management need to be involved during the analysis
stage. A systems analyst should try to interview as many of them as possible so that all their needs
can be ascertained. Interviews are time-consuming, but very effective.
It should be remembered that many of the staff may not be sure exactly what they require and so the
system analyst may have to ‘tease’ out some of their requirements with carefully thought out
questions.
Benefits Drawbacks
User can express their opinions in a detailed Time consuming for the analyst
way
Extension questions can be asked as a result Users may feel intimidated and not tell the truth
of the user’s answers to the original questions about what they feel is lacking in the existing
system
Users may feel valued and involved with the
new system
Observation of current procedures
Time and motion studies could be undertaken to see how data and documents move around the
existing system and to detect where bottlenecks occur and determine where procedures could be
made more efficient. This could be done by using a test document that has its movement tracked
through all its stages as it moves around the system.
ADDITIONAL NOTES:
19
www.revision-notes.co.cc
11. CPT1: Computing Fundamentals
Observing the staff at work can often prove more advantageous than just interviewing them,
because it may uncover processes that they do sub-consciously and do not remember to tell the
analyst about during interview.
Benefits Drawbacks
Allows the analyst to see the current system at Users may work differently if they know that
first hand and what processes that are often they are being watched.
done sub-consciously
Analyst can get a feel for user-competence
Analyst can measure the time taken to do
tasks
Examination of paperwork
This will help to show the inputs and outputs of the current system and so help determine the inputs
and outputs required by the new one. The paperwork will include documents that are received from
an organisation’s customers – such as membership application forms or orders. They will also
include documents that are produced by the current system – such as the invoices sent to customers
and the current reports that are produced for the management team.
Benefits Drawbacks
Analyst can get an idea of the volume of data Can be time consuming if there is a large
being stored and processed volume of files to go through
Analyst can see what output is required
Analyst can see how data is currently validated
Surveying (with questionnaires)
If there are many users of the system then surveying staff by asking them to complete a
questionnaire would be a more efficient method of gathering information than conducting personal
interviews. The analyst could then choose to follow up some of the responses with an interview.
Benefits Drawbacks
Efficient in terms of time Responses to questions are less flexible than
in an interview
Answers can be anonymous There is often a low return rate
It can be difficult to design a good
questionnaire
ADDITIONAL NOTES:
20
www.revision-notes.co.cc
12. CPT1: Computing Fundamentals
Requirements analysis
Candidates should be able to:
8. Describe what is involved when analysing the requirements of
a system, explaining the nature of the requirements
specification and its content, including current data structures,
inputs, outputs and processing represented in diagrammatic
form (data flow diagrams, system flowcharts), identify
inefficiencies/problems in the current system.
The deliverable at the end of analysis is documentation that shows an investigation into the current
system and a list of system requirements for the new one. These requirements need stated in a clear,
specific and measurable way.
In order to ascertain these requirements, the systems’ analyst needs to examine the current data
structures and relationships between them. They must also trace the flow of data through the
existing system – this will begin by determining the source of the various data, identifying the ways
in which the data is processed; and finish by identifying the destinations of the final outputs.
The analysis documentation will contain the following:
• Identification of existing and prospective users;
• Identification of current data and its structure;
• Identification of inputs, outputs and processes within the current system;
• Identification of data flows including the sources and destinations of the data;
• Identification of the strengths and the weakness of the current system;
• Listing of objectives.
Current data and its structures
This is the description of the current data within the system – its data type, validation techniques
used, relationships with other data within the system. The analysis data dictionary is usually
presented in tabular form, with each different category of data being described in its own table.
ADDITIONAL NOTES:
21
www.revision-notes.co.cc
13. CPT1: Computing Fundamentals
Data flow diagrams
A data flow diagram is a drawing that depicts the transformation of data within an existing system
by using three different graphical symbols connected by labelled, directed lines.
A data flow diagram is an analysis tool that represents what a system does, not how it does it. They
are:
• graphical – eliminating thousands of words;
• logical representations – not physical models;
• hierarchical – showing systems at any level of detail; and
• jargonless – allowing user understanding and reviewing.
An example of a data flow diagram depicting the sale of turkeys on a farm:
ADDITIONAL NOTES:
22
www.revision-notes.co.cc
14. CPT1: Computing Fundamentals
System flowcharts
A system flowchart shows an outline of how a system operates.
The following shows the system flowchart for a school’s registration system that stores student
attendance data on a magnetic disk in a database called Register.
KEY:
Input/output
On-line storage
Process
ADDITIONAL NOTES:
23
www.revision-notes.co.cc
15. CPT1: Computing Fundamentals
Design
Candidates should be able to:
9. Describe a design specification including input design,
diagrammatic depiction of the overall system, processing, data
structure design and output design.
The deliverable at the end of the design stage is documentation that could be used, unaided, by a
third-party programmer to create the system as the designer intends.
This means that each section of the design must be detailed and clear. Explanations of what must be
done and why this method is chosen need to be included.
The design documentation will contain the following:
• user interface designs (input forms and menus);
• specification of data structures (including the relationships between different types of data);
• validation procedures;
• output/report designs;
• algorithms;
• security methods.
User interfaces
Humans will need an interface that allows them to:
• give instructions – Print, Save, Open, Delete, Copy, Paste etc.
• enter data – file names, number of pages to print;
• make choices – Yes, No, Cancel etc.
Computers need ways to:
• inform of errors – illegal operation, invalid data input, printer out of paper, wrong password:
• tell on progress – copying, deleting, installing, downloading:
• display the results of processing
• ask for options – e.g. number of pages to be printed, which file to open.
• provide help with performing tasks – this help could be in the form of Status bar text, yellow
Tip boxes, an Office Assistant or even a full-blown help file accessed via the Help menu.
The user interface designs will need clearly annotated drawings to tell the programmer exactly what
is to be done.
ADDITIONAL NOTES:
24
www.revision-notes.co.cc
16. CPT1: Computing Fundamentals
Example of an interface for data entry:
Processing (algorithm) design
These algorithms outline the programming methods that need to be used to process the data.
Algorithms are usually written in pseudo-code, which are instructions that are half-way between
English and a programming language. The advantage of pseudo-code is that it can be used to
describe an algorithm in a way that is not specific to any particular programming language.
ADDITIONAL NOTES:
25
www.revision-notes.co.cc
17. CPT1: Computing Fundamentals
Data structures and validation
Data can be of many types and can have many properties. Typically, a table is constructed for each
category of data. The properties of the data and the necessary validation techniques are stated as
shown:
Field Name Data Type Validation Comments
MemberID AutoNumber Uniqueness Automatically generated
(Integer) check Primary Key
FirstName Text (size 25) Presence check Enter members first name –
maximum 25 characters)
LastName Text (size 25) Presence check …
DateOfBirth Date (Short) Data-type + …
Presence check
Gender Text (size 1) Existence check Default – M; choice of M/F
(on ‘M’ or ‘F’) select from radio-button.
---
---
ADDITIONAL NOTES:
26
www.revision-notes.co.cc
18. CPT1: Computing Fundamentals
Output design
This needs to be detailed in the same way as the input designs. Example of a mail-merge letter
output:
ADDITIONAL NOTES:
27
www.revision-notes.co.cc
19. CPT1: Computing Fundamentals
Testing
Candidates should be able to:
12. Explain the importance of system testing and installation
planning.
Testing is undertaken to ensure that a system satisfies the user’s requirements and to discover any
errors that might be present.
Testing needs to be undertaken by both the programming team and by the end-users. Note that
testing a program can never adequately prove or demonstrate the correctness of the system – it can
only reveal the existence of errors.
Testing by the programming team
Testing by the programming team is ongoing as the system is developed, but it is still very
important to undertake tests at the end, after the programming team believe that the system is
finished. This formal testing at the end of development is known as alpha-testing.
Alpha-testing
This is the formal testing at the end of development. It:
• is undertaken by the programming team;
• uses data that the programmers perceive to be realistic;
• is designed to ensure that the requirements/objectives have been met.
ADDITIONAL NOTES:
28
www.revision-notes.co.cc
20. CPT1: Computing Fundamentals
Testing by the end-users
Testing by the end-users is either beta-testing or acceptance testing.
Beta-testing
Beta testing is when the software is tested under real conditions, using real data, by a selection of
real end-users.
This phase of testing is necessary because software developers will probably not anticipate all the
combinations of conditions that will occur when the software is in use in its ‘real’ environment.
This is the stage of testing where problems with different hardware combinations are usually
discovered, as are problems with ‘clashing’ software.
During beta testing, users generally agree to report problems and bugs to the developers. These will
then be corrected and the software may then undergo a second round of beta testing before the
package is eventually released.
These end-users who test the system during beta-testing:
• use the system with realistic volumes of real data;
• use the system with a variety of different hardware and configurations;
• report faults/errors back to analyst;
• check that there is a reasonable response time;
• ensure that the user interface is clear;
• ensure that the output as expected.
Acceptance testing
Acceptance testing is where the customer specifies tests to check that the supplied system meets
his/her requirements as specified at the analysis stage and that the system works in their own
environment.
Note that the tests and data are specified by the customer, but the testing itself may be carried out
by the customer or by the developer under the scrutiny of the customer
ADDITIONAL NOTES:
29
www.revision-notes.co.cc
21. CPT1: Computing Fundamentals
Conversion
Conversion is the process of changing from an existing system to a new system.
Note that conversion may take place within a day, or it might be that it is several months before all
parts of the new system have replaced the old.
Problems arising when converting/changing over
Converting from an existing system to a new one is not always smooth. The following problems
could arise:
• Data may have to be converted because the format in the new system may be different
to the format of the old system.
• Users will have to be trained so that they will be able to use the new system – the
organisation may even need to employ additional staff.
• Data may be lost during conversion – must make sure there is a full backup made
before changing to the new system;
• Hardware may need to be replaced/upgraded – if it does not satisfy the demands of
the new system;
• System software may need to be replaced/upgraded – i.e. new system may be created
to take advantage of the features within Windows XP and so will not run correctly on an
earlier operating system.
• Old data may need to be archived;
ADDITIONAL NOTES:
30
www.revision-notes.co.cc
22. CPT1: Computing Fundamentals
Methods of conversion/changeover
The change from the use of an existing system to the use of a new system cannot always be
instantaneous. There are several different methods of converting to a new system, the four most
common are:
• Parallel;
• Direct;
• Pilot;
• Phased.
Parallel
Parallel conversion is when the old system and the new system operate along side each other for a
period of time, until all issues with using the new system have been resolved.
Parallel conversion allows an organisation to revert to the old system if the new system fails.
Direct
Direct changeover is when the old system is stopped being used one day and is replaced, in full, by
the new system the next day.
There is no going back when direct changeover is used.
Pilot
Pilot conversion is one department within an organisation changes to the new system before the
others.
This department will discover any problems with the use of the systems and these problems can be
ironed out before the rest of the organisation converts to the new system.
Phased
Phased conversion is when the old system is gradually replaced, in stages, by the new system.
This type of changeover is convenient when the system comprises of several different modules.
This will allow the organisation to convert to one of the new modules first, but maintain the use of
the other existing ones. This type of conversion means that training can be concentrated on one new
module at a time.
Note that if phased conversion is used, it is vital that the new system and the old system can share
data.
ADDITIONAL NOTES:
31
www.revision-notes.co.cc
23. CPT1: Computing Fundamentals
Evaluation (review)
Candidates should be able to:
10. Explain the importance of evaluating the system, and how to
identify the criteria used for evaluation.
Evaluation (also known as post-implementation review) is a critical examination of a system after it
has been in operation for a period of time.
Purpose
The purpose of an evaluation is to assess the success of a system. Specifically, it will assess the
suitability, effectiveness, usability and maintainability of the system.
The evaluation will ask many questions including:
• can it carry out the all the requirements that were set?
• is it an improvement on the existing system?
• is it cost effective?
• is it easy to use?
• is the new system compatible with the existing systems?
• is the system easy to maintain?
The evaluation will also consider:
• what limitations there are in the system;
• what enhancements could be made to the system in the future.
Note that feedback from the end-users should also be included.
Timing
The evaluation will occur after a new system has been in operation for some time – usually a period
of between three and six months.
The waiting period allows users and technical staff to learn how to use the system, get used to new
ways of working and understand new procedures required. It allows management a chance to
evaluate the usefulness of the reports and on-line queries that they can make and go through several
month-end periods when various routine reports will have been produced. Shortcomings of the
system, if they exist, will be becoming apparent at all levels of the organisation.
ADDITIONAL NOTES:
32
www.revision-notes.co.cc
24. CPT1: Computing Fundamentals
System documentation
Candidates should be able to:
11. Explain the content and importance of different types of
documentation at different stages in the system life cycle,
including the technical and user manuals.
There are two types of documentation that are necessary:
• Technical documentation – aimed at a future system developer
• User documentation/Manual – aimed at the end user.
Technical documentation:
Note that technical/system documentation is very valuable for the maintenance process. This is
because it will show how each part of a system has been constructed and the reasons why certain
choices have been made. The technical documentation should include:
• Annotated program listing – if the system is coded.
• Data flow diagram
• System flow diagram
• Structure charts/pseudo code/algorithm designs
• Test plan
• Data dictionary – i.e. the field definitions (including data-type, field length, validation)
• Entity relationship diagrams
User Documentation
As well as a contents page and index, the user documentation should include:
• Overview of the system
• Instructions on how to install
• Instructions on how to backup the data
• Instructions on how to operate the program
• Details on possible errors and how to deal with them
• Glossary of terms used within the documentation
ADDITIONAL NOTES:
33
www.revision-notes.co.cc
25. CPT1: Computing Fundamentals
Maintenance
Candidates should be able to:
13. Explain the purpose of maintaining the system, and explain the
need for system review and reassessment, understanding that
software has a limited life span.
Maintenance is the process of making improvements to (or modifying) a system that is in use.
The need for maintenance
Maintenance is needed because:
• Bugs are discovered in the software code – these bugs will have been identified only after
the system is in full use. They will be fixed and a ‘patch’ will be issued that changes the
appropriate lines of code within the end-users’ programs.
• The user requirements may change – this often happens after a system has been in
operation for some time and the users see further uses of the data that the system produces.
In some cases, the additional requirements may have been identified during the original
development, but they were not implemented because the system’s life-cycle approach to
projects does not allow a change in requirements once they have been agreed (such a change
would extend development time and cause a project to miss its deadline).
• Some in-built parameters change – e.g. VAT rate;
• Hardware is changed – the system will be updated to take advantage of new hardware
developments. This could be a new input device, output device or even communications
device.
• The performance needs tuning – often some of the original code, although working
without error, uses some quite cumbersome routines that are slow to execute. System
performance can often be improved by finding more efficient algorithms for such routines.
• Operating system is upgraded – the system will be modified to take advantage of the
additional capabilities of the operating system.
ADDITIONAL NOTES:
34
www.revision-notes.co.cc
26. CPT1: Computing Fundamentals
Types of maintenance
There are three types of maintenance:
• corrective maintenance;
• adaptive maintenance;
• perfective maintenance.
Corrective maintenance
Corrective maintenance is the removal of some of the known bugs in a program.
Software that has been released to the public will still contain bugs. Some of these bugs will be
previously unknown to the developers while others will be known to exist, but solutions will not yet
have been discovered. The software will be released with these ‘known bugs’ because of the
necessity to meet pre-set target dates and the need to gain some income from the software to
continue to pay the developers.
Eventually some of the bugs will be fixed and the solutions will need to be incorporated into the
public’s version of the programs. This type of maintenance is often done by releasing a ‘patch’
which is a very small program that actually changes lines of code within the main program. These
patches are available from Internet sites or from the CD-ROMs that are provided with computer
magazines.
Adaptive maintenance
Adaptive maintenance is the addition of new features to a program because of a change in users’
requirements.
The new version of the program may contain an added (or modified) feature or it may contain a
change in the interface. Adaptive maintenance could be needed because of:
• a change in the organisations/users requirements;
• a change in the law;
• a change in processes such as the method of tax calculation;
• to take account of new technologies.
Perfective maintenance
Perfective maintenance is when internal routines are changed to make them more efficient, so that
the application operates faster.
In the initial release of the software some of the processes, although error-free, may have used long
and slow routines. Perfective maintenance will make improvements in the way that the software
performs by ‘tidying up’ some of the internal routines. Changes to the interface may also be made.
ADDITIONAL NOTES:
35
www.revision-notes.co.cc
27. CPT1: Computing Fundamentals
Prototyping
Candidates should be able to:
14. Describe prototyping to demonstrate how a solution will
appear.
15. Describe the spiral and waterfall models of the systems life
cycle.
A prototype is a simplified working model of a proposed system used as a rough indicator of how
the new system will work.
The prototype will consist of a set of screens and processes that show the user (and developer) what
might be possible. It will help a customer to gain a clearer idea of a proposed system so that they
can give feedback before the development has gone too far.
In the prototyping approach, the analysis establishes an outline specification. A model is then built
in order to evaluate it or have it approved before building the production model.
Prototyping can involve the repeated re-development of a system with new features being added as
the initially vague requirements are refined.
ADDITIONAL NOTES:
36
www.revision-notes.co.cc
28. CPT1: Computing Fundamentals
1.4 SYSTEMS SOFTWARE
Operating system
Candidates should be able to:
20. Describe the purpose of operating systems.
The operating system is an integrated set of programs that is used to control and manage the
resources and overall operations of a computer.
Its role is to provide a ‘virtual machine’ by hiding the complexities of the hardware from the user. It
does this by providing a ‘buffer’ between the user and the hardware allowing the user to deal with a
simplified system, but without loosing any of its computational powers.
In addition to providing the HCI, the Operating System manages the hardware resources in order to
provide for an orderly and controlled allocation of the memory, storage media, processor time, and
I/O devices among the various processes competing for them.
The function of an operating system
The operating system (OS) for a standalone computer will be much simpler than that of a
supercomputer which is controlling hundreds of networked terminals and executing many different
kinds of job simultaneously. Nevertheless, all operating systems perform the same basic functions.
These include:
• memory management;
• file management (sometimes known as backing-store management);
• allocation of processor time;
• input and output management.
An operating system also manages:
• interrupts;
• errors;
• the human/computer interface.
ADDITIONAL NOTES:
55
www.revision-notes.co.cc
29. CPT1: Computing Fundamentals
Memory management
The operating system has to allocate memory to each running application and to itself. Each
application is loaded into its own memory space – this means that if one program freezes, the others
can, in theory, keep working normally. It also means that you can terminate a ‘frozen’ program by
pressing [Ctrl]+[Alt]+[Delete]. Doing this will not effect any other programs.
To manage memory effectively, the operating system must:
• assign programs their own area of memory;
• prevent two programs from using the same area of memory;
• reallocate memory when a program is quit.
File management
The OS controls the transfer of data from disk to memory and back again. It also has to maintain a
directory of the disk so that files and free space can be quickly located. The directory is called the
File Allocation Table (FAT for short). To manage files effectively, when files are written to a disk
the OS ensures that:
• existing files are not over-written;
• when files are deleted from the disk the storage blocks are made available for new files.
Allocation of processor time
When several processes are executing on a computer at the same time (eg downloading a file,
printing and listening to an .mp3), then they will all need to receive time from the processor. Some
processes, such as printing, require very little processor time, while other processes require the
processor continuously. In such situations the Operating System would place a high priority on
printing requests to get them cleared and then allow it to concentrate on the more demanding
processes.
Input output device management
When two programs want to print to the same printer, the operating system has to ensure that the
two ‘jobs’ do not interfere with each other. It would normally do this by putting the jobs into a
queue and then pass them to the printer when the printer is ready.
ADDITIONAL NOTES:
56
www.revision-notes.co.cc
30. CPT1: Computing Fundamentals
Interrupt handling
The OS detects and responds to many different kinds of interrupt such as:
• a user pressing a key on the keyboard;
• a printer sending a message that it is out of paper;
• a hardware or software malfunction.
In the case of a keyboard interrupt the operating system may simply display the appropriate
character on the VDU, but in the case of the printer sending an ‘out of paper’ interrupt, the
operating system will display a message to inform the end-user.
Error handling
Application software should normally include routines to deal with their own errors. When this is
not done, it is necessary for the operating system to deal with them or else the whole computer
could crash.
The operating system should be able to ‘freeze’ the program that causes an error and display a
message to the end user. A message such as ‘General Protection Fault’ might be displayed when a
badly-written application tries to use an area of memory that has been assigned to the operating
system itself.
The human/computer interface
The HCI allows a user to communicate with the computer. In early operating systems, users gave
instructions to the computer by typing command words. Most modern operating systems provide a
Graphical User Interface (GUI), which allows a user to choose commands by moving a pointer and
‘clicking’ on menus.
ADDITIONAL NOTES:
57
www.revision-notes.co.cc
31. CPT1: Computing Fundamentals
Types of operating system
Candidates should be able to:
21. Describe the characteristics of different types of operating
systems and their uses: batch, real-time, single-user, multi-
user, multi-tasking and distributed systems.
22. Describe a range of applications requiring batch processing,
and applications in which a rapid response is required.
Batch operating system
A batch operating system is one which allows input of data as batches and processes the data only
when all input has been collected so that the processing is carried out from beginning to end
without user interaction.
In a batch system the data is collected and input into the computer over a period of time. It is stored
as a ‘job’ to be processed later. Several batch jobs are usually executed at the same time so that the
processor and other resources are kept as busy as possible by switching between the different jobs.
Batch processing is typically used for:
• processing OMR forms such as those that contain answers to a multiple-choice exam;
• payroll;
• utility billing
In the case of processing multiple-choice OMR forms, the batch operating system can process the
forms incredibly fast, but it needs to reject forms that it cannot read – marks may be too faint, two
marks may exist on the same line etc. It does this by rejecting unreadable forms into a ‘hopper’ and
the data from these forms then need to be handled manually.
In the case of payroll
ADDITIONAL NOTES:
58
www.revision-notes.co.cc
32. CPT1: Computing Fundamentals
Interactive operating system
An interactive operating system is one that allows the user and the computer to be in direct two-way
communication.
The user enters commands and data as the application is executed and the results of processing are
displayed immediately.
Categories of interactive system are single-user, multi-user, multi-tasking and real-time.
Single-user
A single-user operating system is one that can only be used by one person at a time.
Multi-user
A multi-user operating system is one that allows two or more users to communicate with the
computer at any one time, with each user interacting with the computer via separate terminals.
Multi-tasking
Multitasking is the apparent concurrent execution of two or more programs, on the same computer,
in such a way that communication and data sharing is possible.
Real-time
A real-time operating system is one in which requests are executed immediately and can therefore
produce a response within a specified, short, interval of time.
Some definitions sate that:
‘A real-time operating system (RTOS) is an operating system that guarantees a certain
capability within a specified time constraint’.
Almost any general purpose operating system such as Microsoft Window or MacOS can be
considered real-time to some extent – even if an operating system doesn’t fully qualify as real-time,
it may have characteristics that enable it to be considered as a solution to a particular real-time
problem.
ADDITIONAL NOTES:
59
www.revision-notes.co.cc
33. CPT1: Computing Fundamentals
Real-time operating systems are characterised by their ability to:
• deal with events which happen at unpredictable moments in time;
• deal with multiple events that occur simultaneously;
• support application programs which are non-sequential in nature – i.e. programs which do
not have a START:PROCESS:END structure;
• carry out processing and produce a response within a specified interval of time.
Note that the results of processing may be returned in milliseconds – as in the guidance systems of a
cruise missile – or if the processing is complex, it might take a couple of seconds – as in a
temperature control system in a large greenhouse.
Examples of real-time operating systems:
• Airline flight reservation;
• Missile guidance;
• Temperature/pressure control;
• Process control.
Flight reservation
The booking needs to be processed quickly and confirmation given to the customer straight away.
When a seat has been booked on a flight, the system needs to be updated before the next transaction
occurs in order to avoid the possibility of double-booking.
Missile guidance
Various sensors that detect the altitude, latitude, speed etc. constantly provide up-to-date
information to the guidance system. If the missile is slightly off course then adjustments must be
made immediately – a one second delay could result in the missile hitting the wrong target.
Temperature/pressure control
Sensors in a nuclear power station will be providing data on the current temperature of the reactor.
If the reactor starts to overheat, then initiating cooling will have to happen instantly to avoid a
potentially dangerous situation or meltdown.
Sensors in a greenhouse will be providing data on the current temperature and humidity. If either
goes outside the preset range then an action such as opening/closing the greenhouse windows will
need to occur straight away.
Process control
In manufacturing processes 1000s of signals per second can arrive from sensors attached to the
system being controlled. Because such systems are extremely fast moving, the response time may
have to be less than one thousandth of a second.
ADDITIONAL NOTES:
60
www.revision-notes.co.cc
34. CPT1: Computing Fundamentals
Distributed system
A distributed system is one in which file storage (or processing) is shared between different
computers at different locations.
Users of a distributed system will be unaware of the exact physical location of the data that they are
accessing – it is likely that one set of records is retrieved from one remote system and the next set
of records is retrieved from another!
An example is a banking system where the data for each customer is held on the server at their local
branch, but is accessible from any branch.
Network operating system
A network operating system (NOS) is one that is able to share its resources (such as hard disk or
printer) and use the resources of others.
Note that in sharing its resources the network operating system is able to control what other users
are permitted access to and whether that access should be read & write or read-only.
A NOS often consists of exactly the same files as a standard operating system, but has an extra
layer of software. This software (known as the redirector) intercepts commands for file storage and
printing and, in a manner completely transparent to the user, redirects the requests to the appropriate
server. In this way files, printers and application programs resident on the server can be used by the
client exactly as if they were resident on the user’s own system.
Using a network printer
When a computer is set up to share its printer (known as a ‘print server’), the NOS will:
• allow the computer directly attached to the printer to make its printer visible to the other
computers;
• allow the other computers to be aware of the existence of the shared printer;
• allow the print requests from the other computers to be redirected to the print server’s
printer;
• allow this printer server to control the printing requests of the other computers by putting all
the requests into a print queue;
Note that it is usually possible for the print server to use access rights to control which users are
allowed to use the printer and to assign users priority in the queue.
ADDITIONAL NOTES:
61
www.revision-notes.co.cc
35. CPT1: Computing Fundamentals
Human-computer interface (user interface)
Candidates should be able to:
23. Identify and describe the purpose of different types of user
interface: forms, menus, GUI, natural language and command
line, suggesting the characteristics of user interfaces that
make them appropriate for different types of user.
The user interface is the hardware and software that provides the means for communication
between the user and the computer.
Different interfaces have been developed for different needs. Common types of HCI are:
• Forms
• Menus;
• Graphical (GUI);
• Natural Language;
• Command Line.
ADDITIONAL NOTES:
62
www.revision-notes.co.cc
36. CPT1: Computing Fundamentals
Forms
This kind of interface presents the user with an on-screen form into which they enter or view data.
The form will often be arranged into different sections and will consist of text-boxes, checkboxes,
radio buttons, drop down lists and other input ‘controls’ to help the user enter data quickly and to
help with validation.
Travel agents and other booking systems would typically use a form interface.
ADDITIONAL NOTES:
63
www.revision-notes.co.cc
37. CPT1: Computing Fundamentals
Menu interface
A menu interface is one that provides a list of choices from which the user can choose by pointing
to/clicking on. Each choice that the user selects will display a screen with other choices and
ultimately the desired choice.
ATMs and mobile phones often use menu driven interfaces and so do the ticket machines on the
London underground and many tourist information systems.
The benefits of a menu interface is:
• less human error – the user can only choose from the options available;
• user is restricted from accessing other parts of the system.
The drawbacks include:
• there may be no shortcuts for accessing common choices.
Tourist information systems would typically use a menu interface with a touch-screen to act as
both an input and output device. This:
• avoids the need for additional peripherals such as a mouse;
• allows ease of use by indicating possible choices with icons (not just text);
• provides an enclosed system with protection against vandals and the weather (can be used
outside).
ADDITIONAL NOTES:
64
www.revision-notes.co.cc
38. CPT1: Computing Fundamentals
Graphical User Interface (GUI)
A graphical user interface (GUI) is one that provides a means of interaction using windows, icons,
menus and a pointer to control the programs and operating system.
This kind of interface is sometimes called a WIMP and consists of the following:
• Windows;
• Icons;
• Menus;
• Pointer.
ADDITIONAL NOTES:
65
www.revision-notes.co.cc
39. CPT1: Computing Fundamentals
Windows
A window is a bounded area of the screen within which a specific task is executing – e.g. word
processing, web browsing, file management etc.
Icons
An icon is a small image that represents a program, folder, a device or a file.
Menus
A menu is a listing of options from which a user may choose – menus in a GUI are usually ‘pop-up’
or ‘drop-down’.
Pointer
A pointer is an on-screen ‘arrow’, usually controlled by mouse, used for navigation and to select
appropriate options by clicking a button.
Note that it is possible to set the pointer to be an image other than an arrow, but doing this often
makes the system harder to use.
Benefits and drawbacks of a GUI
Benefits Drawbacks
Easy for a novice because a GUI is usually Powerful hardware is required – fast
intuitive – the screen is arranged as a processor, high quality graphics card and VDU,
metaphor of a desktop with icons used to RAM and HDD with large capacity.
represent familiar objects.
User does not have to remember the precise Can be frustrating for an experienced user to
format of the instructions – instructions are perform certain tasks because a greater
initiated by selecting icons or menu number of operations may be required.
commands.
There is likely to be comprehensive, easy to Not all instructions are available through the
navigate, on-line help available. GUI – the command line will still need to be
used for many technical tasks.
Modern GUIs allow very easy execution of
some commands by ‘drag and drop’.
ADDITIONAL NOTES:
66
www.revision-notes.co.cc
40. CPT1: Computing Fundamentals
Natural Language
A natural language interface is one which allows a user to communicate with the computer by
speaking or typing in their normal way.
Ask Jeeves was a natural language search engine – it will allow you to type a question in the normal
way and it will interpret the question and provide the answer if it can. Below is an example:
The image part with relationship ID rId47 was not found in the file.
Type the question in your
usual language – ‘what is the
capital of France?’
The image part with relationship ID rId48 was not found in the file.
Jeeves will tell you the
answer if he knows it!
ADDITIONAL NOTES:
67
www.revision-notes.co.cc
41. CPT1: Computing Fundamentals
Command Line interface
A command-line interface is one in which the operating system provides a ‘prompt’ and the user
types a command to start program execution or to perform a housekeeping task.
For example:
The computer might prompt as follows:
C:>
The command prompt is the > character and the C: is the pathname for the current directory.
The user typing the following command:
C:>Del *.doc
will cause all files in the current directory with the extension .doc to be deleted.
Another command with MS DOS is:
C:>copy MyFile.doc C:BackupsMyFile.bak
This command copies the file called MyFile.doc into the directory called Backups and renames the
file MyFile.bak.
Sometimes ‘switches’ can be used with commands:
C:>xcopy C:Backups A:Backups /s /e
This command copies the directory named Backups from disk C: onto disk A: the /s means that
subdirectories are copied too, and the /e means that empty directories are also copied.
A command line interface is not for novice users, but is often used by an IT technician who needs to
perform tasks that are difficult when using a GUI.
When using a command line, the user must only type valid commands and they must be typed in
the correct format – omitting a space or a ‘’ will usually cause the command to fail.
ADDITIONAL NOTES:
68
www.revision-notes.co.cc
42. CPT1: Computing Fundamentals
Benefits and drawbacks of a command line interface
Benefits Drawbacks
Only low specification hardware is required – Difficult for a novice because they have to
monotone VDU, basic processor, small RAM remember a large number of commands and
and HDD. their exact format.
Experts can perform complex tasks using a The syntax of the command is vital and so the
single (although lengthy) command. instruction will not execute if the command is
typed incorrectly
An instruction can be executed from any part Easy to make mistakes.
of the system (do not have to have a certain
window open).
ADDITIONAL NOTES:
69
www.revision-notes.co.cc
43. CPT1: Computing Fundamentals
1.5 DATA REPRESENTATION
Number representation
Candidates should be able to:
26. Express numbers in binary, binary-coded decimal (BCD), octal
and hexadecimal.
Computers can only process binary data – i.e. 1’s and 0’s. If numeric data is to be processed then it
cannot be processed in its usual base10 form, it must be converted into its base2 form – known as
binary.
There are two ways that can be used to represent numbers in binary:
• ‘pure’ binary;
• binary-coded decimal (BCD).
There are also two ‘half-way’ stages that are sometimes used by programmers because they are
easier to understand than a string of 1s and 0s:
• octal;
• hexadecimal.
‘Pure’ binary
Pure binary represents numbers using just two digits (‘0’ and ‘1’) and columns, which increase by a
factor of two.
This is in contrast to our normal number system (denary), which uses ten digits (0-9) and columns,
which increase by a factor of ten.
In denary the number one hundred and ninety seven is represented as:
100 10 1
1 9 7
In binary, it is represented as:
128 64 32 16 8 4 2 1
1 1 0 0 0 1 0 1
ADDITIONAL NOTES:
77
www.revision-notes.co.cc
44. CPT1: Computing Fundamentals
Counting in binary
In binary, the first 15 numbers are as follows:
128 64 32 16 8 4 2 1
0 0 0 0 0 0 0 0 0
1 0 0 0 0 0 0 0 1
2 0 0 0 0 0 0 1 0
3 0 0 0 0 0 0 1 1
4 0 0 0 0 0 1 0 0
5 0 0 0 0 0 1 0 1
6 0 0 0 0 0 1 1 0
7 0 0 0 0 0 1 1 1
8 0 0 0 0 1 0 0 0
9 0 0 0 0 1 0 0 1
10 0 0 0 0 1 0 1 0
11 0 0 0 0 1 0 1 1
12 0 0 0 0 1 1 0 0
13 0 0 0 0 1 1 0 1
14 0 0 0 0 1 1 1 0
15 0 0 0 0 1 1 1 1
Can you see the pattern?
Converting from binary to denary
A binary number, such as 1001 0101, can be converted into its denary equivalent as follows:
1. Write the binary number with the appropriate column headings:
128 64 32 16 8 4 2 1
1 0 0 1 0 1 0 1
2. Add the column headings under which there is a binary ‘1’:
= 128 + 16 + 4 + 1
= 149
ADDITIONAL NOTES:
78
www.revision-notes.co.cc
45. CPT1: Computing Fundamentals
Converting from denary to binary
A denary number, such as 107, can be converted into binary as follows:
1. Write down the binary column headings:
128 64 32 16 8 4 2 1
2. Then, starting from the left, ‘take out’ the values in the column headings, if possible:
128 cannot be taken out of 107 so that column contains a ‘0’:
128 64 32 16 8 4 2 1
0
64 can be taken out of 107 so that column contains a ‘1’; this leaves 107 – 64 = 43:
128 64 32 16 8 4 2 1
0 1
32 can be taken out of 43 so that column contains a ‘1’; this leaves 43 – 32 = 11:
128 64 32 16 8 4 2 1
0 1 1
3. keep repeating the above process until the whole number has been converted to pure binary:
128 64 32 16 8 4 2 1
0 1 1 0 1 0 1 1
ADDITIONAL NOTES:
79
www.revision-notes.co.cc
46. CPT1: Computing Fundamentals
Binary Coded Decimal (BCD)
Binary Coded Decimal is one of the early memory encodings. Rather than converting the entire
denary value into its pure binary form, it converts each digit, separately, into its 4-bit binary
equivalent. The table below shows the 4-bit BCD equivalents of the ten denary digits:
8 4 2 1
0 0 0 0 0
1 0 0 0 1
2 0 0 1 0
3 0 0 1 1
4 0 1 0 0
5 0 1 0 1
6 0 1 1 0
7 0 1 1 1
8 1 0 0 0
9 1 0 0 1
Note that the higher codes are not used in BCD because they do not represent a denary digit. These
are:
1 0 1 0
1 0 1 1
1 1 0 0 Not used in BCD because their
denary equivalents are higher
1 1 0 1
than ‘9’.
1 1 1 0
1 1 1 1
ADDITIONAL NOTES:
80
www.revision-notes.co.cc
47. CPT1: Computing Fundamentals
Converting from denary to BCD
Each digit is converted to its 4-bit BCD equivalent. Thus, the number 319 would be represented in
12-bits as follows:
8 4 2 1 8 4 2 1 8 4 2 1
0 0 1 1 0 0 0 1 1 0 0 1
(3) (1) (9)
Converting from BCD to denary
Each group of 4-bits are converted into the equivalent denary digit. Thus, the 12-bit binary coded
decimal number 0110 1000 0011 is denary 683 as shown:
8 4 2 1 8 4 2 1 8 4 2 1
0 01 1 0 1 0 0 0 0 0 1 1
6 8 3
Octal
The octal number system uses eight digits (0 to 7) to represent numbers, and columns which
increase by a factor of eight.
… … … 4096 512 64 8 1
Converting from octal to denary
The octal number 652 would be converted to denary as shown:
… … … 4096 512 64 8 1
6 5 2
(6 × 64) + (5 × 8) + (2 × 1) = 426
ADDITIONAL NOTES:
81
www.revision-notes.co.cc
48. CPT1: Computing Fundamentals
Converting between octal and binary
The octal number 652 (426 in denary) is represented in binary as:
256 128 64 32 16 8 4 2 1
1 1 0 1 0 1 0 1 0
If we combine the bits in groups of three and label with the appropriate column headings…
4 2 1 4 2 1 4 2 1
1 1 0 1 0 1 0 1 0
6 5 2
… we can see that converting from octal to binary converts each digit into its 3-bit binary
equivalent (very similar as converting between denary and BCD).
Thus the octal equivalent of binary number 10011101 will be:
4 2 1 4 2 1 4 2 1
0 1 0 0 1 1 1 0 1
2 3 5
Note the extra ‘0’ added at the
front because the original
binary was only 8-bits.
ADDITIONAL NOTES:
82
www.revision-notes.co.cc
49. CPT1: Computing Fundamentals
Hexadecimal
The hexadecimal number system uses 16 digits to represent numbers. The denary digits 0 – 9 are
used together with the first six letters of the alphabet (A – F).
With hexadecimal, instead of column headings doubling, as they do in binary, or increasing by a
factor of 10 as they do in denary, each column heading in hexadecimal increases by a factor of 16.
The column headings are:
… … … 65,536 4096 256 16 1
Examples of hexadecimal numbers include: 3FC2, CFF8, 92B0, EE4D, ACDC.
Note that the number 9375 could either be ordinary denary or hexadecimal – to make it clear the
symbols ‘h’, ‘#’ or ‘&’ are often used. Thus, if the number was in hexadecimal, it would be written
as 9375h, #9375 or &9375.
Converting from hexadecimal to denary
The hexadecimal number 2C5A can be converted into its denary equivalent as follows:
1. Write the hexadecimal number with the appropriate column headings:
… … 4096 256 16 1
2 C 5 A
2. Noting that A ≡ 10 and C ≡ 12, convert in the same way as conversion from binary to denary:
= (4096 x 2) + (256 x 12) + (16 x 5) + (1 x 10)
= 11 354
ADDITIONAL NOTES:
83
www.revision-notes.co.cc
50. CPT1: Computing Fundamentals
Converting from hexadecimal to binary
This uses the same method as octal to binary, except each hexadecimal digit is represented by 4-
bits. Thus, the hexadecimal number B7C can be converted into a 12-bit binary as follows:
8 4 2 1 8 4 2 1 8 4 2 1
1 0 1 1 0 1 1 1 1 1 0 0
(B) (7) (C)
Converting from denary to hexadecimal
Convert to binary first and then to hexadecimal. For example, 462 can be converted as follows:
Convert to binary:
2048 1024 512 256 128 64 32 16 8 4 2 1
0 0 0 1 1 1 0 0 1 1 1 0
Convert each group of four into their hexadecimal equivalent:
8 4 2 1 8 4 2 1 8 4 2 1
0 0 0 1 1 1 0 0 1 1 1 0
1 12 (C) 14 (E)
= 1CE
Uses of hexadecimal
Hexadecimal is often used by Assembly language programmers to reference memory. It is also used
within HTML property values – specifically background and font colours.
There are three advantages of using hexadecimal:
• hexadecimal is quicker for a programmer to enter into a computer than binary;
• hexadecimal is easier for a programmer to understand and remember – 8F8B is easier to
remember than 1000111110001011.
• it is very easy to convert between binary to hexadecimal.
ADDITIONAL NOTES:
84
www.revision-notes.co.cc
52. CPT1: Computing Fundamentals
Negative binary numbers
Candidates should be able to:
27. Describe and use two’s complement and sign and magnitude
to represent negative integers.
Two’s compliment
Two’s compliment is a method of representing negative numbers in binary, whereby the most
significant bit maintains its magnitude, but is made negative.
If, for example, one byte is used to represent a ‘signed’ integer using the two’s compliment method,
the column headings would become:
– 128 64 32 16 8 4 2 1
Thus, the denary integer 18 would be represented as:
– 128 64 32 16 8 4 2 1
0 0 0 1 0 0 1 0
And the negative integer – 18 would be represented as:
– 128 64 32 16 8 4 2 1
1 1 1 0 1 1 1 0
Notes:
• negative numbers will always start with a ‘1’ and positives will start will a ‘0’;
• the range of integers that can be represented using one byte is from – 128 up to + 127.
– 128 64 32 16 8 4 2 1
1 0 0 0 0 0 0 0 = – 128
0 1 1 1 1 1 1 1 = + 127
ADDITIONAL NOTES:
86
www.revision-notes.co.cc
53. CPT1: Computing Fundamentals
Converting a negative denary integer into two’s complement
Due to the way that binary numbers work, there is an easy ‘trick’ that allows very fast conversion.
Taking the denary integer – 52 as an example, you can use the three stages shown below:
Stage one
Convert the positive form of the number into unsigned binary:
– 128 64 32 16 8 4 2 1
0 0 1 1 0 1 0 0 = + 52
Stage two
Starting at the right hand side, copy each bit, up to and including the first ‘1’:
– 128 64 32 16 8 4 2 1
0 0 1 1 0 1 0 0
1 0 0
Stage three
Reverse all the other bits:
– 128 64 32 16 8 4 2 1
0 0 1 1 0 1 0 0
1 1 0 0 1 1 0 0 = – 52
This will always work – even if you do not understand why!
ADDITIONAL NOTES:
87
www.revision-notes.co.cc
54. CPT1: Computing Fundamentals
Converting a two’s complement number into denary
This is the same as converting any binary number into denary, as long as you remember that the
most significant bit is negative. For example the ‘signed’ binary number 1 1 0 1 0 1 0 1 is converted
as follows:
– 128 64 32 16 8 4 2 1
1 1 0 1 0 1 0 1
= – 128 + 64 + 16 + 4 + 1
= – 43
Sign and magnitude
The alternative to using two’s complement to represent negative numbers is to use the ‘sign and
magnitude’ method – here, the most significant bit is used as a sign bit without a numerical value.
– 64 32 16 8 4 2 1
1 1 0 0 1 1 0 0
= – (64 + 8 + 4)
= – 76
Notes:
• the range of integers that can be represented using one byte is from – 127 up to + 127.
• although the sign and magnitude method is easier for humans it is much harder to use for
computers performing arithmetic.
SPOT CHECK
1. Assuming a single byte is used, convert the following numbers into two’s compliment binary:
(a) – 5 (b) – 10 (c) – 20
2. What is the denary value of 1010 1011 if the binary codes represent:
(a) a two’s compliment number (b) a sign and magnitude number
ADDITIONAL NOTES:
88
www.revision-notes.co.cc
55. CPT1: Computing Fundamentals
Binary arithmetic
Candidates should be able to:
28. Perform integer binary arithmetic, that is addition and
subtraction.
Addition
Computers will only ever add two numbers at a time – if three numbers need to be added, a
computer will add the first two and then add the third number will be added to the result.
Since only two numbers are added at a time, there are limited outcomes:
0+0=0
0+1=1
1+0=1
1 + 1 = 2 (‘10’ in binary – this is 0 ‘down’ and ‘carry’ 1)
Note that when you add a ‘carry’ to the next column, it is possible for:
1 + 1 + 1 (the carry) = 3 (‘11’ in binary – this is 1 ‘down’ and ‘carry’ 1)
This is better shown if we add 1010 1110 1100 and 0011 1010 1010:
1 0 1 0 1 1 1 0 1 1 0 0
0 0 1 1 1 0 1 0 1 0 1 0
Carried bits 1 1 1 1 1 1
1 1 1 0 1 0 0 1 0 1 1 0
ADDITIONAL NOTES:
89
www.revision-notes.co.cc
56. CPT1: Computing Fundamentals
Subtraction
To perform subtraction, the number to be subtracted is converted into its two’s compliment
negative and then added.
For example to subtract 12 from 25:
1. Convert the 12 into two’s compliment –12
– 128 64 32 16 8 4 2 1
12 0 0 0 0 1 1 0 0
– 12 1 1 1 1 0 1 0 0
2. Now add this to the 25:
– 12 1 1 1 1 0 1 0 0
25 0 0 0 1 1 0 0 1
Carried bits 1 1 1 1
0 0 0 0 1 1 0 1
Note that there is still a ‘carry’ bit, but this is ignored.
SPOT CHECK
1. Work out the following using binary addition and subtraction:
(a) 34 + 73 (b) 67 – 96
ADDITIONAL NOTES:
90
www.revision-notes.co.cc
57. CPT1: Computing Fundamentals
Text (character) representation
Candidates should be able to:
29. Explain the use of code to represent a character set (ASCII,
EBCDIC and UNICODE).
Character Set
A character set are the characters that can be recognised by a computer.
Character encoding
A computer is able to represent four types of characters:
• alphanumeric characters – letters A – Z and a – z and the digits 0 – 9.
• punctuation characters and other ‘special’ symbols such as , . ; : “ ‘ ! @ £ $ % & * ( ) + <
• graphical characters such as ♣, ♦, ♥, ♠, Ψ, , , ✘, ☛, ✻ (and many more…);
• control characters – [Return], [Esc], [Space], [Alt], etc.
Within a computer, each character is represented using a unique binary code. Although there are
many different methods of encoding the characters, three of the most common are ASCII, EBCDIC
and Unicode.
ASCII
American Standard Code for Information Interchange (ASCII) is used for character encoding by
most Windows™ PCs. ASCII can be used to translate alphanumeric characters into a 7-bit binary
code that represents all the characters available from the keyboard including punctuation and some
special symbols such as ‘@’, # and $:
A development of ASCII, known as Extended ASCII, uses an 8-bit code that also defines codes for
additional characters, including some graphical ones. Note that using an 8-bit code means the
maximum number of characters that can be represented is 256.
ADDITIONAL NOTES:
91
www.revision-notes.co.cc
58. CPT1: Computing Fundamentals
How character encoding works
The diagram below shows how the message “Hello World” is stored in the memory of a computer
using the ASCII codes:
The message is typed at the keyboard. Electronics in the keyboard convert the typed characters into
ASCII binary codes that are sent from the keyboard along a cable to the computer. The computer
stores these codes in its internal memory. The computer also provides a visual display of the
characters as they are typed. To be able to do this, electronics inside the computer convert the
stored binary codes back into their character equivalents.
EBCDIC
Extended Binary Coded Decimal Interchange Code (EBCDIC) was developed by IBM for use in
their mainframe systems. It has the same limitation as ASCII in that its 8-bit code can only define
256 different characters.
ADDITIONAL NOTES:
92
www.revision-notes.co.cc
59. CPT1: Computing Fundamentals
Notice how the EBCDIC codes are completely different to ASCII – if a message was sent that had
been encoded using ASCII, but received by a system that used EBCDIC, then the resulting message
would not make sense.
Unicode.
Unicode is an international system of representing characters using 16 bits. Using 16 bits means
that 216 = 65 536 different characters can be represented (thus overcoming the limitation of ASCII
and EBCDIC).
Unicode allows every character from most alphabets to have a code of its own – Chinese, Russian,
Greek, Urdu etc, including Egyptian Hieroglyphics. Note that there are plenty of spare codes that
are used for mathematical symbols, common graphics and even the Braille symbols
Some of the Mongolian characters: Some of the Hebrew characters
ADDITIONAL NOTES:
93
www.revision-notes.co.cc
61. CPT1: Computing Fundamentals
1.6 DATA CAPTURE
Standard input devices
Candidates should be able to:
30. Describe manual and automatic methods of gathering and
inputting data into a system, including form design, keyboard
entry, voice recognition, barcodes, optical mark recognition
(OMR), optical character recognition (OCR), magnetic ink
character recognition (MICR), touch screens; image capture,
chip and pin, sensors and remote data logging.
An input device is the hardware that is used to enter commands or data into a computer.
In many cases this requires the data to be converted into machine-readable form. Some input
devices – such as a keyboard, mouse and flat-bed scanner – require a human-user to be present to
control the input. Other devices – such as sensors and optical mark readers – can obtain data
automatically without the need for a human to be present. These latter devices are often referred to
as data capture devices.
Keyboard
The keyboard remains the most common input device although in terms of speed, it is one of the
most limited. It is, however, suitable for entering a wide range of data and it is a device that is
familiar to every office worker. Every key on a keyboard has a switch underneath it – when a key is
pressed the switch is closed and a signal is sent to the computer. Keyboards are wired so that the
signal which is sent is determined by the row and the column in which the key is. Most keyboards
have the keys arranged in the same way as the once popular typewriter – this arrangement is known
as QWERTY because it is the order of the first characters. This QWERTY layout was designed to
reduce the risk of jamming on early mechanical typewriters by spreading the most commonly used
letters around the keyboard – this effectively slowed down the typist. Improved layouts have been
designed such as the Dvorak layout which rearranges the keys in an attempt to distribute typing
more evenly among the fingers of both hands. Using these improved layouts increases the speed at
which data can be entered. Such layouts have never become popular, however, because there has
been no general agreement on a standard layout and also because of the time that it takes to get used
to a new arrangement.
Modern keyboards have in excess of 105 keys that
include 12 or more function keys, some of which
can be programmed by the user. Other keys have
specialist functions that can be used for navigation
within a document, to copy an image of the screen,
to put the computer into energy saving mode or to
ADDITIONAL NOTES:
95
www.revision-notes.co.cc
62. CPT1: Computing Fundamentals
display the Start Menu if using Microsoft Windows™. Note that standard text entry using a
keyboard is usually between 20 and 60 words per minute (wpm), but a trained operator can reach
speeds in excess of 100 wpm.
Graphics Tablet
A graphics tablet is a specialist input device that is used to trace (or create original) drawings,
pictures and designs into a computer. It consists of a flat tablet and a pen-like stylus. Software
detects the movement of the stylus on the tablet’s surface and the changes to the image are
immediately displayed upon the screen of the VDU. This provides an input device that is used in a
similar way to paper and pencil.
Light Pen
This is used in a similar way to a graphics tablet except the light pen is moved over the VDU screen
itself. The pen is triggered by the raster scan of the VDU – it detects when the electron beam
building up the screen image has just passed the point where the pen is positioned. Knowing the
instant at which the beam passed the pen, the software can calculate whereabouts on the screen it
has been placed.
Touch Sensitive Screen
Touch sensitive screens are now often used as an alternative to a mouse. The user places their finger
(or a stylus device) on the screen and the position is detected – the command/option that relates to
the screen display is then processed. One method of detecting the position of the figure is to have a
series of horizontal and vertical infrared beams directed across the screen. Position is calculated by
detecting which beams have been interrupted.
Touch sensitive screens are generally used for navigation in data display applications. Here the user
can select one of a limited number of menu/navigation choices by pointing at the screen.
These screens have started to become popular in restaurants, ATMs, London Underground ticket
booths and some British Telecom payphones. The Science Museum in London is now full of touch
screen terminals that are used to help visitors find the location of exhibits and also to provide them
with related information. They are particularly suited to this type of environment since they are
easily enclosed within a damage resistant casing.
Touch sensitive screens offer flexibility in that it is easy to redesign the screens when
improvements or modifications are made – for example an extra button can be added by modifying
the computer program that controls the interface. Systems can be made user-friendlier because the
buttons can contain relevant graphics as well as words.
ADDITIONAL NOTES:
96
www.revision-notes.co.cc
63. CPT1: Computing Fundamentals
Scanner – flatbed or hand-held
Scanners work by shinning a light
onto (or through) the material to be Choosing the resolution
scanned. The scanner then detects the Many people use the very high
image by measuring the reflected (or default manufacturer.set by the
scanner
resolutions
This results
transmitted) light – the most common in slow processing and a very large
sensor used to detect the reflected light is the charge coupled disk image (over 20+Mbytes in
device (CCD) which is also used in digital cameras. When some cases). The resolution
using a flatbed scanner the image to be scanned is placed chosen for the scan should reflect
upon a glass plate and a bright light source moves underneath the final print of the image. If you
intend to
use
the final image at the
the glass. This is in essence the same as a photocopier. Some same size then the scanning
flatbed scanners can be fitted with a transparency adapter so resolution should be set at the
that they can scan photographic negatives or slides. same as the resolution of the
printer; if the final printout will be
Scanning technology has increased tremendously over the half the size then the scanning
last few years. A typical flatbed scanner can produce images resolution should be halved.
with a resolution of more than 1200 dpi. If a page of text is If the image is to be viewed on
scanned into the computer, then Optical Character screen – within a web page for
Recognition (OCR) software can be used to convert the example – then the scanning
scanned image into an editable file. A decent flatbed scanner resolution should be set at 70/72
dpi.
can be bought for about £100 (Apr 2002).
If text is being scanned for
Hand-held scanners are smaller than flatbed scanners and conversion using OCR, then the
cannot scan a whole page of A4 in one go. The scanner is resolution must be 200 or 300 dpi.
moved across the image by hand and so is liable to jogging –
the image quality is therefore not as good as the flatbed.
Some hand-held scanners have the appearance of a pen and are designed to scan just one line of text
at a time.
Digital document scanners are high-speed flatbed devices that are capable of scanning books and
double-sided documents at 50 pages per minute.
Digital camera
These capture ‘still’ images. There are some available that will capture short movie sequences onto
a flash memory card. The resolutions of these devices has improved significantly in the last few
years and now images can be captured that are barely
distinguishable from a traditional photograph caught on film. Digitisers
Digitiser is the name given to any
Sound card with microphone device that changes analogue data
into digital data that can be
A sound card is the only method of getting analogue sound processed by a computer. A video
into a computer. A microphone or another sound device digitiser can convert the signal from
needs to be plugged into the sound card. Sound is an a television or videotape; a digital
analogue signal that needs to be converted into a digital form camera converts light and a sound
card converts sound.
before it can be processed by a computer. A sound card has
an analogue to digital converter that does this.
ADDITIONAL NOTES:
97
www.revision-notes.co.cc