Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

A/L-ICT-Revision

Kumudani Hewarathna
(B.Sc in IT(Sp,Hons),PGDE,MSc in ITE))
Computer generations
1st- vacuum tubes
2nd - transistor
3rd- Integrated circuits (IC)
4th- very large IC s
5th- Ultra large IC s
Data validation methods
► Data type check – Check whether correct data type (numeric/text/date/currency etc.) is input into the
system
► Presence check – Presence of data (i.e. data entry field is not blank) is checked. It is compulsory to input
important data
► Range check – Check whether the data is in allowed range (i.e. Marks have to be between 0 and 100)
commonly used when working with data which consists of numbers, currency or dates/times
► Format check-use to ensure that the data is in the right format,
Ex:-date in the format of dd/mm/yyyy
Booting process
The BIOS (sometimes called ROM BIOS) is always the first program that executes when a computer is
powered up.
► A computer's basic input/output system (BIOS) is a program that's stored in nonvolatile memory such as
read-only memory (ROM) or flash memory, making it firmware.
► Triggered by a series of clock ticks, the CPU execute the startup program’s instruction in the BIOS that
involves power on self-test(POST)
► BIOS program identifies, configures, tests and connects computer hardware to the OS immediately after
a computer is turned on. The combination of these steps is called the boot process.
► These tasks are each carried out by BIOS' four main functions:
I. Power-on self-test (POST). This tests the hardware of the computer before loading the OS.
II. Bootstrap loader. This locates the OS.( A boot loader, is a small program that places the operating
system (OS) of a computer into memory.
III. Software/drivers. This locates the software and drivers that interface with the OS once running.
IV. Complementary metal-oxide semiconductor (CMOS) setup. This is a configuration program that enable
users to alter hardware and system settings. CMOS is the name of BIOS' non-volatile memory.
(The CMOS is used by the motherboard chipset to save custom settings - changes to the BIOS firmware
defaults, such as date and time, boot order, on-board device management, etc.)
7 state process transition diagram

• New (Create): In this step, the process is about to be created but not yet created. It is
the program that is present in secondary memory that will be picked up by OS to create
the process.

• Ready: New -> Ready to run. After the creation of a process, the process enters the
ready state i.e. the process is loaded into the main memory. The process here is ready to
run and is waiting to get the CPU time for its execution. Processes that are ready for
execution by the CPU are maintained in a queue called ready queue for ready processes.

• Run: The process is chosen from the ready queue by the CPU for execution and the
instructions within the process are executed by any one of the available CPU cores.

• Blocked or Wait: Whenever the process requests access to I/O or needs input from the
user or needs access to a critical region(the lock for which is already acquired) it enters
the blocked or waits state. The process continues to wait in the main memory and does
not require CPU. Once the I/O operation is completed the process goes to the ready
state.

• Terminated or Completed: Process is killed as well as PCB is deleted. The resources


allocated to the process will be released or deallocated.

• Suspend Ready: Process that was initially in the ready state but was swapped out of
main memory(refer to Virtual Memory topic) and placed onto external storage by the
scheduler is said to be in suspend ready state. The process will transition back to a ready
state whenever the process is again brought onto the main memory.

• Suspend wait or suspend blocked: Similar to suspend ready but uses the process which
was performing I/O operation and lack of main memory caused them to move to
secondary memory. When work is finished it may go to suspend ready.
Network layers.

Parts of MAC address

ASUS d4:5d:64:6c:a7:bb
company

OUI is administered by the IEEE and identifies the vendor of the network adapter.

vendor-assigned portion is just that, the alphanumeric identifier assigned by the vendor
• MAC address is assigned to the NIC (Network Interface card) of each device that can be connected to
the internet.
• It stands for Media Access Control, and also known as Physical address, hardware address, or BIA
(Burned In Address).
Plagiarism
Plagiarism is the act of taking another individual's work and claiming it as your own
Piracy
the illegal use, copying, modification, distribution, sharing, or selling of copyrighted computer software
phishing
an online scam that uses fraudulent emails or text messages to trick people into giving away personal
information
malwares
software that interferes with a computer's normal functioning and can damage or destroy computers and
computer systems
virus
a malicious program that can infect a computer's hard drive, files, or system areas without the user's knowledge
or permission.
• protocols
SNTP-(Simple Network Time Protocol )Synchronize the clocks of computer of networks
SMTP- (Simple Mail Transfer Protocol)sending and receiving email messages
FTP-file transfer protocol
POP3-(Post Office Protocol version 3) internet standard protocol that allows email clients to retrieve email from
a mail server.
TCP-( Transmission Control Protocol) a connection oriented communications standard that allows devices to
exchange messages over a network
UDP-(User Datagram Protocol) a connection less communication protocol that allows users to send messages to
other hosts on an Internet Protocol (IP) network.
ARP-(Address Resolution Protocol ) translates IP addresses to MAC addresses and vice versa
BDP-(Border Gateway Protocol)-how packets pass through routers in an autonomous system
DNS –(Domain Name Systems)translates the domain name into IP addresses
DHCP-( Dynamic Host Configuration Protocol)dynamically assign IP addresses to devices of a network.

Functional requirements

• The software automatically validates customers against the ABC Contact Management System
• The Sales system should allow users to record customers sales
• The background color for all windows in the application will be blue and have a hexadecimal RGB color
value of 0x0000FF.
• Only Managerial level employees have the right to view revenue data.
• The software system should be integrated with banking API
• The software system should pass Section 508 accessibility requirement.

non-functional requirements

• Users must change the initially assigned login password immediately after the first successful login.
Moreover, the initial should never be reused.
• Employees never allowed to update their salary information. Such attempt should be reported to the
security administrator.
• Every unsuccessful attempt by a user to access an item of data shall be recorded on an audit trail.
• A website should be capable enough to handle 20 million users with affecting its performance
• The software should be portable. So moving from one OS to other OS does not create any problem.
• Privacy of information, the export of restricted technologies, intellectual property rights, etc. should be
audited.

You might also like