The document contains information about various computer science concepts including:
- Data types like strings, integers, reals, and booleans.
- Variables and how they store and change data. A variable must be assigned.
- Functions are reusable blocks of code that perform a single task. They contain parameters and are called using parentheses.
- Modules allow organization of code and functions. Comments are used to annotate and document code.
- Binary, hexadecimal, ASCII, and how computers use binary to represent data and perform calculations. Conversion between number systems is explained.
- Logic gates and how they are used in digital circuits. Common gates like AND, OR, NOT are defined.
- Memory
This document discusses creating an abstract processor called Aod. It begins by explaining what an abstract processor is and then outlines the specifications for Aod including registers (IP, SP, X, FLAG), stack size, and an explanation of each component. An instruction set is then defined for Aod including opcodes and descriptions. The document concludes by implementing Aod in Perl to demonstrate how it would execute code.
This document summarizes a tool called Sunzip that uses the Huffman algorithm for data compression. It discusses how Huffman encoding works by assigning shorter bit codes to more common symbols to reduce file size. The tool analyzes files to determine symbol frequencies and builds a Huffman tree to assign variable-length codes. It allows compressing different data types like text, images, audio and video. Adaptive Huffman coding is also described, which dynamically updates the code tree as more data is processed. Benefits of Huffman compression include being fast, simple to implement and achieving close to optimal compression. Sample screenshots of the Sunzip tool are also provided showing file details before and after compression.
A computer is a programmable machine that can execute a list of instructions. Modern computers are electronic and digital, described by their hardware and software components. Hardware refers to the physical parts of a computer like processors, storage drives, and ports. Software exists as programs and operating systems, making the hardware useful. Computers use binary language and digital data represented by bits and bytes. Key hardware includes the CPU for processing, hard disks for storage, and RAM for temporary memory. Important software is the operating system that runs other applications. Connectivity options like USB allow connection of external devices.
This document provides an introduction to Python data types including numbers, strings, tuples, and lists. It discusses integers, floating point numbers, complex numbers, Boolean values, and their representation in Python. Strings can be created using single, double, or triple quotes. Characters within a string can be accessed using indexes and slices. Tuples are immutable sequences while lists are mutable sequences. The document also covers precedence of operators in Python.
LESSON 2. CONDITIONAL LOGIC, IF ELSE STATEMENTS, SELECTION, DEBUGGING
Introduction to, with examples, conditional logic and the use of IF and ELSE statements. Look at SELECTION in game design. Learn about Debugging and Error Checking. Analyse the use of a flow chart and how to design before implementation. Discuss: Video gaming addiction! Create a password checker and a username and password (login) app. Learn about the use of ELIF. Learn about Boolean variables and their use. Learn about Multiple comparisons using and/or. Includes a suggested videos, ‘Big ideas’ discussion, and HW/research projects section. Discussion on Artificial Intelligence and Robotics.
The lesson covers lists in Python including an introduction to lists, list operations like enumeration and mutability, and challenges using lists like creating a contacts list program and times table application. Various list methods are demonstrated and discussed such as sorting, appending, searching by index, and removing elements from a list. The anatomy and uses of lists in computing and programming are explored.
There are many hardware and software components that work together in a computer. The hardware includes the physical parts like the central processing unit (CPU), memory, storage devices, input devices like the keyboard and mouse, and output devices like the monitor. The software includes operating systems like Windows and MS-DOS that provide interfaces to control the hardware and run programs.
Sample slide sharon the marketisation of education in singaporesharopn
1. In the 1980s, schools in Singapore gained increased autonomy from central control, allowing principals more educational leadership over staff deployment, salaries, finances, management, and curriculum.
2. By the 1990s and 2000s, the government established 28 school clusters headed by superintendents, provided education endowments for enrichment programs, and encouraged internal school performance assessments rather than inter-school competition focused on rankings.
3. However, tensions remain between decentralization and tight external controls over competition and reviews, and between developing critical thinking skills versus drilling for exam results.
This document discusses creating an abstract processor called Aod. It begins by explaining what an abstract processor is and then outlines the specifications for Aod including registers (IP, SP, X, FLAG), stack size, and an explanation of each component. An instruction set is then defined for Aod including opcodes and descriptions. The document concludes by implementing Aod in Perl to demonstrate how it would execute code.
This document summarizes a tool called Sunzip that uses the Huffman algorithm for data compression. It discusses how Huffman encoding works by assigning shorter bit codes to more common symbols to reduce file size. The tool analyzes files to determine symbol frequencies and builds a Huffman tree to assign variable-length codes. It allows compressing different data types like text, images, audio and video. Adaptive Huffman coding is also described, which dynamically updates the code tree as more data is processed. Benefits of Huffman compression include being fast, simple to implement and achieving close to optimal compression. Sample screenshots of the Sunzip tool are also provided showing file details before and after compression.
A computer is a programmable machine that can execute a list of instructions. Modern computers are electronic and digital, described by their hardware and software components. Hardware refers to the physical parts of a computer like processors, storage drives, and ports. Software exists as programs and operating systems, making the hardware useful. Computers use binary language and digital data represented by bits and bytes. Key hardware includes the CPU for processing, hard disks for storage, and RAM for temporary memory. Important software is the operating system that runs other applications. Connectivity options like USB allow connection of external devices.
This document provides an introduction to Python data types including numbers, strings, tuples, and lists. It discusses integers, floating point numbers, complex numbers, Boolean values, and their representation in Python. Strings can be created using single, double, or triple quotes. Characters within a string can be accessed using indexes and slices. Tuples are immutable sequences while lists are mutable sequences. The document also covers precedence of operators in Python.
LESSON 2. CONDITIONAL LOGIC, IF ELSE STATEMENTS, SELECTION, DEBUGGING
Introduction to, with examples, conditional logic and the use of IF and ELSE statements. Look at SELECTION in game design. Learn about Debugging and Error Checking. Analyse the use of a flow chart and how to design before implementation. Discuss: Video gaming addiction! Create a password checker and a username and password (login) app. Learn about the use of ELIF. Learn about Boolean variables and their use. Learn about Multiple comparisons using and/or. Includes a suggested videos, ‘Big ideas’ discussion, and HW/research projects section. Discussion on Artificial Intelligence and Robotics.
The lesson covers lists in Python including an introduction to lists, list operations like enumeration and mutability, and challenges using lists like creating a contacts list program and times table application. Various list methods are demonstrated and discussed such as sorting, appending, searching by index, and removing elements from a list. The anatomy and uses of lists in computing and programming are explored.
There are many hardware and software components that work together in a computer. The hardware includes the physical parts like the central processing unit (CPU), memory, storage devices, input devices like the keyboard and mouse, and output devices like the monitor. The software includes operating systems like Windows and MS-DOS that provide interfaces to control the hardware and run programs.
Sample slide sharon the marketisation of education in singaporesharopn
1. In the 1980s, schools in Singapore gained increased autonomy from central control, allowing principals more educational leadership over staff deployment, salaries, finances, management, and curriculum.
2. By the 1990s and 2000s, the government established 28 school clusters headed by superintendents, provided education endowments for enrichment programs, and encouraged internal school performance assessments rather than inter-school competition focused on rankings.
3. However, tensions remain between decentralization and tight external controls over competition and reviews, and between developing critical thinking skills versus drilling for exam results.
The document discusses several key topics related to computer systems:
1. Computers only understand binary (1s and 0s) called machine code. Humans write programs in high-level languages that are translated into machine code.
2. Operating systems control tasks like loading data, reading input/output, and saving files. They provide a human-computer interface (HCI).
3. Files are either program files or data files used by programs. Memory stores active data (RAM) and permanent files (backing storage like hard disks).
- Bits are the smallest units of data in computing, represented as 0s and 1s. 8 bits form a byte.
- The motherboard contains the CPU, RAM, ROM, and connections for expansion cards and peripherals. RAM is used for active programs and files while ROM contains startup instructions.
- An operating system manages hardware, allows software to interface with the CPU, and provides a user interface like graphical desktops. Common functions include file management, multitasking, and coordinating input/output.
This document provides an introduction to computer systems and programming. It describes the basic hardware components of a computer including input/output devices, memory, processor, and secondary storage. It explains how programs are run on a computer with the operating system allocating resources. High-level programming languages like C++ make programming easier for humans by using instructions resembling human languages rather than the simple instructions a processor can understand directly. The document gives an overview of key concepts to provide context before demonstrating a sample C++ program.
This document provides definitions and explanations of common computer terms like bits, bytes, binary, hexadecimal and decimal numbering systems. It also describes various components of a computer like memory, storage drives, the central processing unit, buses and ports that allow connection of peripheral devices using standards like USB, Firewire, Ethernet and more.
This document provides an introduction to basic computer concepts. It discusses what computers are and their main components, including hardware such as the system unit, motherboard, CPU, memory and storage devices. It also discusses software and different types of computer programs. The document explains how computers represent and store various types of data like text, images, and files in binary form. It highlights some key advantages of computers like speed, reliability, storage and communications capabilities.
This document provides homework instructions for computer science students over the Easter break. It includes tasks to practice programming in Python using Codecademy, revising data types and network topologies, and completing exercises on binary numbers, flowcharts, databases, and data structures. Students are asked to research advantages and disadvantages of different network topologies. It also provides contact information for teachers if students require assistance.
This document provides an introduction to basic computer terminology, components, and functions. It defines what a computer is and discusses binary numbers, file sizes like kilobytes and megabytes, and different types of storage media. The document outlines the major internal components of a computer including the CPU, RAM, hard drive, motherboard, and peripherals. It also discusses operating systems, common software applications, and basic keyboard and mouse functions. The summary concludes with safety tips and cautions for proper computer use and care.
This document provides an overview of the aims and content covered in several lessons for a National 5 Computer Science course. It introduces the course structure and rules, outlines the mandatory units, assessment methods, and folders to be created. It discusses various computer system topics including hardware, software, main memory, processors, buses, storage, and number representation. It also covers representing characters, bitmap images, vector graphics, color depth, and compression.
Here are the answers to the quiz questions:
Full Form of USB- Universal Serial Bus
Full Form of CD- Compact Disc, DVD- Digital Versatile Disc, ROM- Read Only Memory, RAM- Random Access Memory
Father of modern computers- Charles Babbage
I will collect information about two famous IT personalities who worked with storage and memory and discuss them in the virtual classroom with visual materials. Please let me know the best time to have that discussion. Gathering the right information and materials may take me some time.
hinditutorialspoint.com
<a href="https://hinditutorialspoint.com/">what is java in hindi</a>
<a href="https://hinditutorialspoint.com/">History of java in hindi</a>
<a href="https://hinditutorialspoint.com/">Java Features in Hindi</a>
<a href="https://hinditutorialspoint.com/">jvm in java in hindi, java virtual </a>
<a href="https://hinditutorialspoint.com/">machine in hindi,</a>
<a href="https://hinditutorialspoint.com/">JRE in Java in Hindi</a>
<a href="https://hinditutorialspoint.com/">Introduction to HTML in Hindi</a>
<a href="https://hinditutorialspoint.com/">What is HTML in Hindi</a>
<a href="https://hinditutorialspoint.com/">html attributes in hindi</a>
<a href="https://hinditutorialspoint.com/">Elements in html in hindi</a>
<a href="https://hinditutorialspoint.com/">Formatting in html in hindi</a>
This document provides an overview and introduction to the Computer Systems course being taught. It outlines the course content which includes memory organization, CPU organization and operation, and assembly programming. It provides contact information for the instructor and details on exams, textbooks, and the course website. It then discusses the characteristics of different types of computer memory including registers, main memory, disk memory, and different technologies for RAM such as SRAM, DRAM, SDRAM, and DDR SDRAM.
This document discusses how computers represent and process data. It explains that computers use binary numbers consisting of 1s and 0s to represent all data. It describes how bits are grouped into bytes to store individual characters. It outlines the main components of the CPU that process instructions, including the control unit and arithmetic logic unit. It differentiates between RAM, which is volatile memory used for active processing, and ROM, which is permanent memory that holds startup instructions. It also describes the role of cache memory in improving processing speed.
The document discusses computer memory and its types. It begins by defining computer memory as the storage space where data and instructions are stored to be processed. Memory is divided into small parts called cells, each with a unique address. There are two main types of memory: internal memory like cache and RAM, and external memory like hard disks. Memory hierarchy characteristics include increasing capacity, decreasing cost per bit, and increasing access time as one moves down the hierarchy. RAM is further divided into static RAM and dynamic RAM. The document also discusses different types of ROM and how programmable logic devices like PROM, PAL, PLA, and FPGA work.
The document discusses instruction sets and their characteristics. It covers topics like instruction formats, types of instructions, addressing modes, operand types, and byte ordering. Instruction sets have operation codes, operands, and addressing that reference locations in memory or registers. Design decisions for instruction sets include the operation repertoire, number of registers, and addressing modes.
This presentation is about Computer Systems and its Componentsabena
The document summarizes the main components of a computer system:
- The central processing unit (CPU) controls the system and includes an arithmetic logic unit, control unit, and memory unit. It processes input and outputs results as it coordinates operations.
- Computers operate at high speeds measured in hertz or megahertz. Modern computers can perform millions of operations per second.
- Computers use binary digits (bits) represented as 0s and 1s to store and process all information digitally. Memory comes in two main types: random access memory (RAM) stores temporary data while read only memory (ROM) permanently stores basic startup instructions.
Supplementary Reading 01 - Introduction to computers, programs and java.pdfAshirHussain6
This document provides an introduction to computers, programs, and the Java programming language. It discusses the basic components of a computer including the CPU, memory, storage devices, input/output devices, and communication devices. It defines what programming is and explains that programs contain instructions that tell computers what to do. The document introduces Java as the programming language that will be used, and outlines the chapter objectives which include writing, compiling, and running simple Java programs.
The document discusses using Pandas and Jupyter Notebook for data analysis in Python. It introduces Pandas as a data analysis library for working with tabular data like spreadsheets. The key points covered include:
- Using Anaconda distribution for a complete Python data analysis environment
- Opening Jupyter Notebook and creating cells to run Python code
- Loading data from files into Pandas DataFrames for analysis
- Filtering and exploring DataFrames using methods like df[] and Counter()
- Examples of projects like gathering SEMRush data and custom tracking charts
Presentation given at Outreach Digital in London, February 2017.
We look at some examples of using Python and Pandas to analyse SEO and web analytics data. Especially useful when your dataset is too large for working in Excel.
The document discusses the key components of a computer system unit, including the motherboard, processor, memory (RAM, ROM, cache), expansion slots, ports, buses, power supply, and storage devices. It describes the functions of the central processing unit, arithmetic logic unit, control unit, and how they work together. It also explains data representation in binary and different memory types like RAM, ROM, and cache.
There are two main types of translators: interpreters and compilers. Interpreters translate each line of code as the program runs, making debugging easier but resulting in slower performance. Compilers translate all the code at once into machine code, resulting in faster performance but making errors harder to find during development. Virtual reality systems aim to fully immerse users in simulated environments through specialized input and output devices.
Gen Z and the marketplaces - let's translate their needsLaura Szabó
The product workshop focused on exploring the requirements of Generation Z in relation to marketplace dynamics. We delved into their specific needs, examined the specifics in their shopping preferences, and analyzed their preferred methods for accessing information and making purchases within a marketplace. Through the study of real-life cases , we tried to gain valuable insights into enhancing the marketplace experience for Generation Z.
The workshop was held on the DMA Conference in Vienna June 2024.
Discover the benefits of outsourcing SEO to Indiadavidjhones387
"Discover the benefits of outsourcing SEO to India! From cost-effective services and expert professionals to round-the-clock work advantages, learn how your business can achieve digital success with Indian SEO solutions.
The document discusses several key topics related to computer systems:
1. Computers only understand binary (1s and 0s) called machine code. Humans write programs in high-level languages that are translated into machine code.
2. Operating systems control tasks like loading data, reading input/output, and saving files. They provide a human-computer interface (HCI).
3. Files are either program files or data files used by programs. Memory stores active data (RAM) and permanent files (backing storage like hard disks).
- Bits are the smallest units of data in computing, represented as 0s and 1s. 8 bits form a byte.
- The motherboard contains the CPU, RAM, ROM, and connections for expansion cards and peripherals. RAM is used for active programs and files while ROM contains startup instructions.
- An operating system manages hardware, allows software to interface with the CPU, and provides a user interface like graphical desktops. Common functions include file management, multitasking, and coordinating input/output.
This document provides an introduction to computer systems and programming. It describes the basic hardware components of a computer including input/output devices, memory, processor, and secondary storage. It explains how programs are run on a computer with the operating system allocating resources. High-level programming languages like C++ make programming easier for humans by using instructions resembling human languages rather than the simple instructions a processor can understand directly. The document gives an overview of key concepts to provide context before demonstrating a sample C++ program.
This document provides definitions and explanations of common computer terms like bits, bytes, binary, hexadecimal and decimal numbering systems. It also describes various components of a computer like memory, storage drives, the central processing unit, buses and ports that allow connection of peripheral devices using standards like USB, Firewire, Ethernet and more.
This document provides an introduction to basic computer concepts. It discusses what computers are and their main components, including hardware such as the system unit, motherboard, CPU, memory and storage devices. It also discusses software and different types of computer programs. The document explains how computers represent and store various types of data like text, images, and files in binary form. It highlights some key advantages of computers like speed, reliability, storage and communications capabilities.
This document provides homework instructions for computer science students over the Easter break. It includes tasks to practice programming in Python using Codecademy, revising data types and network topologies, and completing exercises on binary numbers, flowcharts, databases, and data structures. Students are asked to research advantages and disadvantages of different network topologies. It also provides contact information for teachers if students require assistance.
This document provides an introduction to basic computer terminology, components, and functions. It defines what a computer is and discusses binary numbers, file sizes like kilobytes and megabytes, and different types of storage media. The document outlines the major internal components of a computer including the CPU, RAM, hard drive, motherboard, and peripherals. It also discusses operating systems, common software applications, and basic keyboard and mouse functions. The summary concludes with safety tips and cautions for proper computer use and care.
This document provides an overview of the aims and content covered in several lessons for a National 5 Computer Science course. It introduces the course structure and rules, outlines the mandatory units, assessment methods, and folders to be created. It discusses various computer system topics including hardware, software, main memory, processors, buses, storage, and number representation. It also covers representing characters, bitmap images, vector graphics, color depth, and compression.
Here are the answers to the quiz questions:
Full Form of USB- Universal Serial Bus
Full Form of CD- Compact Disc, DVD- Digital Versatile Disc, ROM- Read Only Memory, RAM- Random Access Memory
Father of modern computers- Charles Babbage
I will collect information about two famous IT personalities who worked with storage and memory and discuss them in the virtual classroom with visual materials. Please let me know the best time to have that discussion. Gathering the right information and materials may take me some time.
hinditutorialspoint.com
<a href="https://hinditutorialspoint.com/">what is java in hindi</a>
<a href="https://hinditutorialspoint.com/">History of java in hindi</a>
<a href="https://hinditutorialspoint.com/">Java Features in Hindi</a>
<a href="https://hinditutorialspoint.com/">jvm in java in hindi, java virtual </a>
<a href="https://hinditutorialspoint.com/">machine in hindi,</a>
<a href="https://hinditutorialspoint.com/">JRE in Java in Hindi</a>
<a href="https://hinditutorialspoint.com/">Introduction to HTML in Hindi</a>
<a href="https://hinditutorialspoint.com/">What is HTML in Hindi</a>
<a href="https://hinditutorialspoint.com/">html attributes in hindi</a>
<a href="https://hinditutorialspoint.com/">Elements in html in hindi</a>
<a href="https://hinditutorialspoint.com/">Formatting in html in hindi</a>
This document provides an overview and introduction to the Computer Systems course being taught. It outlines the course content which includes memory organization, CPU organization and operation, and assembly programming. It provides contact information for the instructor and details on exams, textbooks, and the course website. It then discusses the characteristics of different types of computer memory including registers, main memory, disk memory, and different technologies for RAM such as SRAM, DRAM, SDRAM, and DDR SDRAM.
This document discusses how computers represent and process data. It explains that computers use binary numbers consisting of 1s and 0s to represent all data. It describes how bits are grouped into bytes to store individual characters. It outlines the main components of the CPU that process instructions, including the control unit and arithmetic logic unit. It differentiates between RAM, which is volatile memory used for active processing, and ROM, which is permanent memory that holds startup instructions. It also describes the role of cache memory in improving processing speed.
The document discusses computer memory and its types. It begins by defining computer memory as the storage space where data and instructions are stored to be processed. Memory is divided into small parts called cells, each with a unique address. There are two main types of memory: internal memory like cache and RAM, and external memory like hard disks. Memory hierarchy characteristics include increasing capacity, decreasing cost per bit, and increasing access time as one moves down the hierarchy. RAM is further divided into static RAM and dynamic RAM. The document also discusses different types of ROM and how programmable logic devices like PROM, PAL, PLA, and FPGA work.
The document discusses instruction sets and their characteristics. It covers topics like instruction formats, types of instructions, addressing modes, operand types, and byte ordering. Instruction sets have operation codes, operands, and addressing that reference locations in memory or registers. Design decisions for instruction sets include the operation repertoire, number of registers, and addressing modes.
This presentation is about Computer Systems and its Componentsabena
The document summarizes the main components of a computer system:
- The central processing unit (CPU) controls the system and includes an arithmetic logic unit, control unit, and memory unit. It processes input and outputs results as it coordinates operations.
- Computers operate at high speeds measured in hertz or megahertz. Modern computers can perform millions of operations per second.
- Computers use binary digits (bits) represented as 0s and 1s to store and process all information digitally. Memory comes in two main types: random access memory (RAM) stores temporary data while read only memory (ROM) permanently stores basic startup instructions.
Supplementary Reading 01 - Introduction to computers, programs and java.pdfAshirHussain6
This document provides an introduction to computers, programs, and the Java programming language. It discusses the basic components of a computer including the CPU, memory, storage devices, input/output devices, and communication devices. It defines what programming is and explains that programs contain instructions that tell computers what to do. The document introduces Java as the programming language that will be used, and outlines the chapter objectives which include writing, compiling, and running simple Java programs.
The document discusses using Pandas and Jupyter Notebook for data analysis in Python. It introduces Pandas as a data analysis library for working with tabular data like spreadsheets. The key points covered include:
- Using Anaconda distribution for a complete Python data analysis environment
- Opening Jupyter Notebook and creating cells to run Python code
- Loading data from files into Pandas DataFrames for analysis
- Filtering and exploring DataFrames using methods like df[] and Counter()
- Examples of projects like gathering SEMRush data and custom tracking charts
Presentation given at Outreach Digital in London, February 2017.
We look at some examples of using Python and Pandas to analyse SEO and web analytics data. Especially useful when your dataset is too large for working in Excel.
The document discusses the key components of a computer system unit, including the motherboard, processor, memory (RAM, ROM, cache), expansion slots, ports, buses, power supply, and storage devices. It describes the functions of the central processing unit, arithmetic logic unit, control unit, and how they work together. It also explains data representation in binary and different memory types like RAM, ROM, and cache.
There are two main types of translators: interpreters and compilers. Interpreters translate each line of code as the program runs, making debugging easier but resulting in slower performance. Compilers translate all the code at once into machine code, resulting in faster performance but making errors harder to find during development. Virtual reality systems aim to fully immerse users in simulated environments through specialized input and output devices.
Gen Z and the marketplaces - let's translate their needsLaura Szabó
The product workshop focused on exploring the requirements of Generation Z in relation to marketplace dynamics. We delved into their specific needs, examined the specifics in their shopping preferences, and analyzed their preferred methods for accessing information and making purchases within a marketplace. Through the study of real-life cases , we tried to gain valuable insights into enhancing the marketplace experience for Generation Z.
The workshop was held on the DMA Conference in Vienna June 2024.
Discover the benefits of outsourcing SEO to Indiadavidjhones387
"Discover the benefits of outsourcing SEO to India! From cost-effective services and expert professionals to round-the-clock work advantages, learn how your business can achieve digital success with Indian SEO solutions.
Instagram has become one of the most popular social media platforms, allowing people to share photos, videos, and stories with their followers. Sometimes, though, you might want to view someone's story without them knowing.
Ready to Unlock the Power of Blockchain!Toptal Tech
Imagine a world where data flows freely, yet remains secure. A world where trust is built into the fabric of every transaction. This is the promise of blockchain, a revolutionary technology poised to reshape our digital landscape.
Toptal Tech is at the forefront of this innovation, connecting you with the brightest minds in blockchain development. Together, we can unlock the potential of this transformative technology, building a future of transparency, security, and endless possibilities.
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfFlorence Consulting
Quattordicesimo Meetup di Milano, tenutosi a Milano il 23 Maggio 2024 dalle ore 17:00 alle ore 18:30 in presenza e da remoto.
Abbiamo parlato di come Axpo Italia S.p.A. ha ridotto il technical debt migrando le proprie APIs da Mule 3.9 a Mule 4.4 passando anche da on-premises a CloudHub 1.0.
2. String (stings contain characters (text, numbers, symbols)#
Integer (a whole number without decimals you use integers for calculations)
Real e.g. floating point ( a number with decimals) , 6.786, 5.7.6
Boolean-yes/no or true/false
DATATYPES
3. A variable is something that can change and can only hold one bit of data at
one time, a variable must be a sign. For example a box is a good example of
a variable as you can change that amount of 1 thing or what that thing is.
VARIABLE
6. A function is a block of organisation, reusable code that is used to perform a
single, related action.
They are used for when you need to run the same piece of code multiple
times.
The parentheses ( )
Function e.g. print
7. A python file generally contains definitions of variables, functions and
classes.
module
8. + - / * > <
If x>2
Print “x is higher than two!”
Else:
print “x is less that three.”
Operations
9. It is the correct computer science
term for joining two things
together
concatenate
10. Commenting is one thing that separate an average programmer from a good
programmer. If you type a hash (#) it will turn red and you type comments.
It will not be noticed by python and will be ignored.
commenting
23. Hexadecimal digits represent four binary digits (bits), and
the primary use of hexadecimal notation is a human-
friendly representation of binary-coded values in
computing and digital electronics.
One hexadecimal digit represents a nibble, which is half
of a byte (8 bits)
Hex, or hexadecimal, is a number system of base 16.This
number system is especially interesting because in our
casually used decimal system we have only 10 digits to
represent numbers.
As hex system has 16 digits, the extra needed 6 digits are
represented by the first 6 letters of English alphabet.
Hence, hex digits are:
0,1,2,3,4,5,6,7,8,9 and A, B, C, D, E, F.
HEXADECIMAL
24. So a single Hexadecimal digit can
show 16 different values instead of
the normal 10 like this:
25.
26.
27. Go into excel.
Type in an = sign
Type in a
Enter number e.g. 62
Close bracket
ENTER
CONVERTING DENARYTO
HEXADECIMAL
28. American Standard Code for Information Interchange.
is a code for representing English characters as numbers, with each letter
assigned a number from 0 to 127.
Most computers use ASCII codes to represent text, which makes it possible
to transfer data from one computer to another.
ASCII
30. The standard ASCII character set uses just 7 bits for each character.
There are several larger character sets that use 8 bits, which gives them 128
additional characters.
The type of text you can use is limited to the standard Latin alphabet
This means that you cannot represent text in languages other than those
based solely on the standard Latin alphabet. Mostly just English.
Limitations
31. A Digital Logic Gate is an electronic device that
can process multiple bits at once and can make
logical decisions based on the different
combinations of the digital signals it receives.
DIGITAL LOGIC GATE
32. Two men approach the stile, can they
get through to the next field?
A man and a dog approach the stile,
can they both get through?
Two dogs approach the stile, can they
get through to the other field?
CONSIDORTHIS STILE…
33. Most logic gates have two inputs and one output
The inputs it can read are either 1s (high) or 0s (low)
There are seven basic logic gates: AND, OR, XOR, NOT, NAND, NOR, and
XNOR.
Rather than men and dogs, consider
binary…
Input A
= 1
Input B
= 0
Output C
= 0
Logic
Gate
37. The AND gate is so named because, if 0 is called "false" and 1 is called "true,"
the gate acts in the same way as the logical "and" operator in Python.
The output is "true" when both inputs are "true." Otherwise, the output is
"false."
AND gate
1 1 1
1 0 0
0 1 0
0 0 0
38. AND gate
If one is off the gate is not
true and will not be
activated
41. The OR gate gets its name from the fact that it behaves like the Python
command "or."
The output is "true" if either or both of the inputs are "true." If both inputs
are "false," then the output is "false.“
OR gate
X=A or B
42. OR gate
only 1 has to be activated for
the gate to be true, whatever
doorbell you press it will still
sound the same bell
45. The NOT gate, to differentiate it from other types of electronic inverter
devices, has only one input. It reverses the logic state.
NOT gate
X=Not A
52. Memory is the way the computer stores data
Data is stored in bits (binary digits)
Memory comes in the form of RAM or ROM
What is memory?
53. Main memory of the computer
Short-term computer memory
Stores data before it is saved to a file
Standard amount is 2GB
RAM is volatile
Important to save work as your going along so
you do not loose anything
It does NOT automatically save
RAM – Random Access Memory
56. A form of long term memory (ROM)
Can be written to and read from (a bit like RAM)
Much slower than RAM
Non volatile
Hard disk drives
57. A computer’s processor searches for instructions that
are stored in the RAM memory of the computer. If
those instructions are not stored in the RAM
memory, they will have to be transferred from the
hard disk to the RAM memory - the well-known
process of "loading" a program.
So, a greater amount of RAM memory means that
more instructions fit into that memory and,
therefore, bigger programs can be loaded at once.
How RAM affects a computer’s performance
58. Explain the difference between RAM and
ROM
Research what DRAM is and explain it
Write a definition of volatile and non-
volatile memory
Research and explain the term latency
Task – Update revision guide
59. ROM is memory that cannot be changed by a program or user. ROM retains
its memory even after the computer is turned off. For example, ROM stores
the instructions for the computer to start up when it is turned on again.
RAM
RAM is a fast temporary type of memory in which
programs, applications and data are stored. Here are some examples of
what's stored in RAM:
the operating system
applications
the graphical user interface (GUI)
If a computer loses power, all data stored in its RAM is lost.
Difference between RAM and ROM
60. Dynamic random-access memory (DRAM) is a type of random-access
memory that stores each bit of data in a separate capacitor within an joined
circuit.
DRAM
61. Volatile memory contrary to non-volatile memory, is computer
memory that requires power to maintain the stored information; it retains
its contents while powered, but when power is interrupted stored data is
immediately lost.
VOLATILE
62. Non-volatile memory, non volatile memory, NVM or non-volatile
storage is computer memory that can get back stored information even
when not powered. Examples of non-volatile memory include read-only
memory, flash memory, ferroelectric RAM (F-RAM), most types of
magnetic computer storage devices (e.g. hard disks, floppy disks,
and magnetic tape), optical discs, and early computer storage methods such
as paper tape and punched cards.
NON-VOLATILE
63. Latency is the time it takes for a computers
memory to respond after a request has been
made
E.g. imagine you are in your room and your
parents call you for dinner. The length of time it
takes you to respond is Latency
RAM has less latency than a hard drive because it
is Solid State (has no moving parts)
Latency
64. Sometimes a part of the hard drive can be used
to store RAM. This is known as Virtual Memory
It causes more latency in the system but
increases the size of a computers memory
By adding Virtual Memory you can increase the
size of memory on a computer e.g. a computer
with 1GB of actual memory + 1GB of virtual
memory has 2GBs of memory it an use.
Virtual memory
65. The CPU cannot fetch the data it needs directly
from the Hard Drive because the hard drive is at
least 50 times slower. Fast memory is therefore
required, the fastest type of memory is called
Cache.
CACHE MEMORY
CPU Cache RAM
Disk
Storage
Virtual
Memory
66. RAM is faster than a hard drive but often has a bit
rate of 128 or 256
Most CPUs now run at over 2GHz so RAM is still
too slow for a processor
So the Cache’s ‘memory controllers’ have to
predict what piece of data the CPU will need next.
They then collect it from RAM and add it to their
high speed memory.
This speeds up the systems performance
Why do we need Cache when we have
RAM?
67. Explain the benefit of virtual memory
What is a computers Cache memory used
for?
Update your revision Guides with these
exam questions
68. Answer this question in approx. 500 words
Some suggestions to help:
phase-change memory (PCM)
magnetoresistive RAM (MRAM)
resistive RAM (RRAM)
How are changes in memory leading to
innovative computer design?
70. The processing is carried out by a range of
hardware such as a graphics card, a sound card,
the operating system and the processor on the
motherboard known as the CPU. The CPU is
seen as the brain of the computer, translates all
computer commands from binary to text we can
understand. Also tells all of the computer
components what to do.
What is a computers CPU?
CPU = Central Processing unit
71. Often referred to as ‘the computer’s brain’
It’s purpose is to process data
It does this by performing functions such as
searching or sorting data and calculating and
decision making using the data.
Whenever you carry out a task on a computer the
processor carries out all the data-processing
associated with that task.
- e.g. design a spreadsheet, write an email, play a game or search
the internet
What is a computers CPU?
72. Having two processors is like carrying out two
jobs at once.
This is quicker and more efficient
Technology has continued to advance with the
invention of quad-core and even hexa-core
processors
Dual-Core Processors
73. BIOS stands for Basic Input/Output
System. This is the first place the processor
goes to when a computer is switched on.
This is accessed even before the Operating
System is loaded. It is used to access initial
instructions for booting a computer.
BIOS
74. The CPU undertakes the instructions it receives from programs in what is
called a cycle
If we go back to the making tea and toast example: if you worked faster
you could produce the breakfast quicker, the addition of a faster kettle
would help even more.
Not only does the CPU have multiple cores but it also has a speed. This
speed is measured in how many cycles it can perform per second.
The name given to one cycle per second is a hertz.
How does a CPU work?
75. The CPU undertakes the instructions it receives from programs in what is
called a cycle
If we go back to the making tea and toast example: if you worked faster
you could produce the breakfast quicker, the addition of a faster kettle
would help even more.
Not only does the CPU have multiple cores but it also has a speed. This
speed is measured in how many cycles it can perform per second.
The name given to one cycle per second is a hertz.
How does a CPU work?
76. A CPU that processes one million cycles per
second is said to have a speed of one megahertz
(MHz) and one billion cycles per second would
be one gigahertz (GHz).
The faster the processor, the more processes it
can complete but that results in the processor
getting hotter and requiring more power.
How does a CPU work?
77. A computer accesses 3 different levels of cache:
Level 1- is always build into the CPU.
Level 2 - is built in separately on an external microchip stored on a motherboard.
However, modern CPUs have the L2 cache built in. The faster the CPU, the larger
the L2 cache needs to be. There is no fixed size for L2 cache but a standard
amount at the moment is 512KB, it can be as high as 2MB.
Level 3 – is the name given to the extra cache which is built into motherboards
between the processor and the main memory.
The size of Cache can affect
performance
78. Cache predicts what data will be needed next
The larger the cache the greater the amount of
potentially needed data, therefore, the faster the
computer
The size of Cache can affect
performance
79. The same concept of cache is used on the
internet.
When you visit a website the details of it are
‘cached’ on your computer.
The next time the web page is accessed, the
computer will load what has been cached on the
computer and then fetch any missing data from
the internet.
This makes loading a webpage much faster.
Other uses for cache
81. Pseudocode is a detailed yet readable description of what a computer
program or algorithm must do, expressed in a formally-styled natural
language rather than in a programming language.
Pseudocode is used when planning/designing code structures in a similar
way to flow charts
What is Pseudocode?
84. Pseudocode
The first thing we do when designing a program is to decide on a name for the
program.
Let’s say we want to write a program to calculate interest, a good name for the
program would be CalculateInterest.
Note the use of CamelCase.
85. Pseudocode
So we start the program as:
PROGRAM CalculateInterest:
And in general it’s:
PROGRAM <ProgramName>:
88. Pseudocode
When we write programs, we assume that the computer executes the program
starting at the beginning and working its way to the end.
This is a basic assumption of all algorithm design.
We call this SEQUENCE.
89. Pseudocode
In Pseudo code it looks like this:
Statement1;
Statement2;
Statement3;
Statement4;
Statement5;
Statement6;
Statement7;
Statement8;
90. Pseudocode
For example, for making a cup of tea:
Organise everything together;
Plug in kettle;
Put teabag in cup;
Put water into kettle;
Wait for kettle to boil;
Add water to cup;
Remove teabag with spoon/fork;
Add milk and/or sugar;
Serve;
91. Pseudocode
Or as a program:
PROGRAM MakeACupOfTea:
Organise everything together;
Plug in kettle;
Put teabag in cup;
Put water into kettle;
Wait for kettle to boil;
Add water to cup;
Remove teabag with spoon/fork;
Add milk and/or sugar;
Serve;
END.
92. Pseudocode
What if we want to make a choice, for example, do we want to add sugar or not to
the tea?
We call this SELECTION.
93. Pseudocode
So, we could state this as:
IF (sugar is required)
THEN add sugar;
ELSE don’t add sugar;
ENDIF;
94. Pseudocode
Or to check which number is biggest:
IF (A > B)
THEN Print A + “is bigger”;
ELSE Print B + “is bigger”;
ENDIF;
95. Pseudocode
Adding a selection statement in the program:
PROGRAM MakeACupOfTea:
Organise everything together;
Plug in kettle;
Put teabag in cup;
Put water into kettle;
Wait for kettle to boil;
Add water to cup;
Remove teabag with spoon/fork;
Add milk;
IF (sugar is required)
THEN add sugar;
ELSE do nothing;
ENDIF;
Serve;
END.
96.
97. Pseudocode
What if we need to tell the computer to keep doing something until some
condition occurs?
Let’s say we wish to indicate that the you need to keep filling the kettle with water
until it is full.
We need a loop, or ITERATION.
Loops are the same as iteration
98. Pseudocode
So, we could state this as:
WHILE (Kettle is not full)
DO keep filling kettle;
ENDWHILE;
99. Pseudocode
Or to print out the numbers 1 to 5:
A = 1;
WHILE(A > 5)
DO Print A;
A = A + 1;
ENDWHILE;
100. Pseudocode
PROGRAM MakeACupOfTea:
Organise everything together;
Plug in kettle;
Put teabag in cup;
WHILE (Kettle is not full)
DO keep filling kettle;
ENDWHILE;
Wait for kettle to boil;
Add water to cup;
Remove teabag with spoon/fork;
Add milk;
IF (sugar is required)
THEN add sugar;
ELSE do nothing;
ENDIF;
Serve;
END.
102. Re-cap –Theory
Computer programming is about creating a set of instructions
to complete a specific task.
These are the fundamental building blocks of any program and
any true programing language will contain all of these.
1. Sequence – the ORDER in which statements are executed.
2. Selection – the use of logic to select the statement to be
executed.
3. Iteration – the use of repetition (to prevent typing the
same code out many times a loop structure is used. For
example While or For).
103.
104. Flowchart
Turn A/C off
(process)
False
Turn on A/C
(process)
True
Temp > 25
(decision)
End
Start
Temp
(input)
The flow chart is
made up of an
input, decision and
the alternative
processes or
actions.
You cannot
have to yes’
or two no’s,
(true, false)
with a
diamond
105. start
Can you
see in the
dark?
no
yes
stop
Is the lamp
plugged in
yes
no
Plug in
lamp
Is the
bulb
Brocken
Fix bulb
107. • In general, an array is a number of items arranged in some
specified way - for example, in a list or in a three-dimensional
table.
• An array is a data structure that contains a group of elements.
Typically these elements are all of the same data type, such as an
integer or string.
• Arrays are commonly used in computer programs to organize
data so that a related set of values can be easily sorted or
searched.
• This is like a variable but you can store more than one item.
• Arrays in python are called lists
Definition of Arrays
108. Arrays in Python
• The name given to Arrays in Python is Lists or Tuples
• In other programming languages Lists and Arrays are separate things
• Tuples are the same as Lists but they are Immutable
• Lists can be changed tuples can never be changed.
109. Creating Lists in Python
• A list is assigned in the same way as a variable but the square brackets are used to
hold the values that need to be stored.
• Commas separate each item in the list
Name_of_list = [“item1”, “item2”, “item3”, “item4”]
• Brackets show where the list starts and finishes.
110. Printing a list using an index
Think of the index of a book – what is its purpose?
In programming the index of a list is the location of an item in a list which is denoted
using a number
Items in a list are given an index number starting from 0
countries = [“France”, “Italy”, “Spain”, “Belgium”]
111.
112. Adding to a list
A list can be added to by using the append method of the list object
countries.append(“Great Britain”)
Note: square brackets are used to assign the list but parenthesis are used to call a
method within the list object e.g. append
113. Removing from a list
An item in a list can be removed in the same way as append, however, the
method ‘remove’ is used:
countries.remove(“France”)
France will now be removed when you print the list
114. Lists must be declared at the beginning of a programme
Empty list =
115.
116. Operating Systems and Utility
Programs
Explain the need for the following functions of an operating
system:
• user interface - UI
• memory management
• peripheral management page 2 on PM
• multi-tasking
• security
Describe the purpose and use of common utility programs for:
• computer security
• system maintenance
117. USER INTERFACE
• a user interface (UI) brings structure to the
interaction between a user and the computer
• Most leading computer companies have invested
time and money in developing graphical user
interfaces (GUI)
• Windows 8 and Apple’sOSx are examples of
current operating systems which contain GUIs
• It's important to remember that the user interface
is a program or set of programs that sits as a layer
above the operating system itself
118. Memory Management
• Memory management is the
functionality of an operating system
which handles or manages primary
memory
• The memory management function
keeps track of the status of each
memory location, either allocated or
free
• It checks how much memory is to be
allocated to processes. It decides
which process will get memory at
what time.
• It tracks when memory is freed or
unallocated and updates the status.
119. Peripheral management
What are peripherals?
“able to be attached to and used with a
computer, though not an integral part of it.”
120. Peripheral management
Device management controls
peripheral devices by sending
them commands in their own
proprietary language.
The software routine that
knows how to deal with each
device is called a "driver," and
the OS requires drivers for the
peripherals attached to the
computer.
When a new peripheral is
added, that device's driver is
installed into the operating
system
122. Security
If a computer program is run by unauthorized user then he/she may
cause severe damage to computer or data stored in it. So a computer
system must be protected against unauthorized access, malicious
access to system memory, viruses, worms etc.
These are some of the areas a computers operating system can
handle:
Unauthorised user – username/password to login and confirm your
identity
ProgramThreats – Torjan horse, trap door, logic bomb, virus
SystemThreats - System threats refers to the misuse of system
services and network connections to put user in trouble.
123. Trojan Horse - Such programs steal user login credentials and stores them
to send to malicious user who can later on login to computer and can access
system resources.
Trap Door Trap doors, also referred to as backdoors, are bits of code
embedded in programs by the programmer(s) to quickly gain access at a
later time, often during the testing or debugging phase. If an unscrupulous
programmer purposely leaves this code in or simply forgets to remove it, a
potential security hole is introduced. Hackers often plant a backdoor on
previously compromised systems to gain later access.
Logic Bombs are small programs or sections of a program triggered by
some event such as a certain date or time, a certain percentage of disk
space filled, the removal of a file, and so on. For example, a programmer
could establish a logic bomb to delete critical sections of code if she is
terminated from the company
Virus - Virus as name suggest can replicate themselves on computer
system. They are highly dangerous and can modify/delete user files, crash
systems.
125. Computer security
Research to find the answer – What do these three
types of software do?
antivirus
firewall
Spyware protection
126. Disk Organisation
Formatting – Before a hard disk can be used, it needs
to be prepared so that files and applications can be
added to it.
Disk formatting is the initial part of the process in
preparing a hard disk drive for its first use. As part of
the disk formatting process ‘partitions’ are created.
These are know to us as ‘drives’ and are assigned
letters to represent them e.g. C: , D: , E:
File Transfer Windows Explorer is an example of a
graphical utility software that enables you to view
files, copy them and delete them.
127. Disk Organisation continued…
Defragmentation –You may notice after a
while that your computer begins to run more
slowly. There could be many reasons for this
but one of the key reasons is that many of
your files and folders become fragmented or
scattered over time.
It is therefore a good idea to ‘defrag’ your
hard disk.
All computers have a defragmenter utility
pre-installed which will reorganise the hard
drive by putting pieces of related data back
together so that files are stored next to each
other. This often frees up more space on the
hard disk.
128. System maintenance
System information – The operating stores information
about hardware such as make, clock speed, no. of
processors etc.
System clean-up tools – A good disk clean-up tool will
remove temporary files, old shortcuts and old installation
files.
Automatic Updating – the software that you used,
whether it be games or office applications, are constantly
being redeveloped by the authors of the software. Most
software is updated automatically using the operating
system which checks the internet for any changes to
software versions and automatically downloads and
installs the update if it exists.
129. Antivirus or anti-virus software (often abbreviated as AV), sometimes
known as anti-malware software, is computer software used to prevent,
detect and remove malicious software. Antivirus software was originally
developed to detect and remove computer viruses, hence the name.
A firewall is a program or device that acts as a barrier to keep destructive
elements out of a network or specific computer. Firewalls are configured (in
hardware, software, or both) with specific criteria to block or prevent
unauthorized access to a network.
Anti-spyware (AS) software are programs that attempt to remove or block
spyware – malicious programs that try and collect small pieces of
information without the computer owner’s knowledge and may change
settings, make your computer run slowly or affect other programs installed.
Antivirus, firewall, anti-spyware
130. values= [A, 2, 3, 4, 5, 6, 7, 8, 9, J, Q, K]
Suit= [“hearts”, “diamonds”, “spades”, “clubs”]
VALUES AND SUITS FOR C.A
Editor's Notes
Got to slide 53 out of 131, DON’T REMOVE INK ON SLIDES!!!