Computer Revision Sohaila
Computer Revision Sohaila
Computer Revision Sohaila
Converting:
1-Converting from binary to denary:
126 64 32 16 8 4 2 1
0 0 1 1 0 0 1 1
32 + 16 + 2 + 1 = 51
2-converting from denary to binary:
Convert 107 into binary:
Move from left to right
See which numbers you add to make 107
126 64 32 16 8 4 2 1
0 1 1 0 1 0 1 1
The number is = 01101011
3-Converting from binary to hexadecimal:
Split the binary number into 4 groups
Add them
Convert the numbers you added to hexadecimal
1011 / 1110 / 0001
8421 8421 8421
11 14 1 = BE1
4-Converting from hexadecimal to binary:
Convert the hexadecimal values into binary
6 in binary is = 110
C in denary is 12 then into binary = 1100
6 C = 1101100
5-Converting from hexadecimal to denary:
16 x 6 = 96
1 x 11 (b in hexadecimal) = 11
16 1
6 B
96 + 11 = 107
6-Converting from denary to hexadecimal:
Divide by of 16
Read the remainders 2004
16
From bottom to top=
7 D 4 16 125 remainder 4
Table: 16 7 remainder 13 = D in hexadecimal
0 remainder 7
0
Binary value Hexadecimal value Denary value
0000 0 0
0001 1 1
0010 2 2
0011 3 3
0100 4 4
0101 5 5
0110 6 6
0111 7 7
1000 8 8
1001 9 9
1010 A 10
1011 B 11
1100 C 12
1101 D 13
1110 E 14
1111 F 15
Powers of 16
1 to the power of 0
16 to the power of 1
256 to the power of 2
4096 to the power of 3
If the register contains 1 0 1 0 1 0 1 0 this means ‘motor B is ON and motor C is ON and both motors are
turning to produce FORWARDS motion’. Effectively, the vacuum cleaner is moving forwards.
4-Web addresses
Each character used on a keyboard has what is known as an ASCII CODE (AMERICAN STANDARD
CODE FOR INFORMATION INTERCHANGE)
These codes are represented using hexadecimal or decimal values.
It takes longer to type in the URL using the hexadecimal codes, but it has the advantage that you
are unlikely to fall into the trap of copying and pasting a ‘fake’ website address.
Example:
A good example of the use of ASCII codes is the representation of a web address (or URL,
which stands for uniform resource locator)
www.hodder.co.uk which becomes (using hexadecimal values):
5-Assembly code and machine code
Computer memory can be referred to directly using machine code or assembly code.
Using true machine code (which uses binary) is very cumbersome and it takes a long time to
key in the values.
It is also very easy to mistype the digits in a sea of 1s and 0s.
They are examples of low level languages and are used by software developers when
producing.
2-Parallel data transmission: several bits at the same time over several wires or channels.
Example: sending data to a printer from a computer using a ribbon connector.
Advantages: very fast.
Disadvantages: expensive and sends data with some errors.
Benefits Drawbacks
Devises plugged into the computer The maximum length is about 5
are automatically detected; device meters
driver is automatically uploaded. The present transmission rate is
The connectors can only fit in one limited to less than 500 megabits per
way second
The older USB standards may not be
Several different data transmission supported near the future
rates are supported -
Newer USB standards are
compatible with older USB
standards
1-Parity checking:
It is a method of error detection in data transmission from a device to another.
Systems that use EVEN PARITY have an even number of 1- bits.
Systems that use ODD PARITY have an odd number of 1-bits.
Example 1:
It’s using even parity so in this case it will be a 0 as we already have and even number of 1 bit.
How it works?
Before data is transmitted the sender and receiver of the data agrees on which type of parity to
use.
If a byte was sent from the sender to the receiver (even/odd parity) an error would be flagged if
the byte has an odd/even number of 1 bit.
This error is detected by the receiver checking the parity agreed on and the number of 1 bit in
the byte sent.
Example 2:
3-Checksum
Another way to check if data has been changed or corrupted following data transmission.
How it works:
Sender computes a checksum by adding all the data and sending that checksum with the data.
Receiver computes the checksum on the data received.
It the sender’s checksum and the receiver’s checksum are equal the data is assumed to be
correct.
Calculating the check digit:
The modelu of the digit is calculated.
It is added to the data.
It is then recalculated when data is added.
The digits are compared checking for errors.
Internet technologies
What is meant by internet?
A global computer network providing a variety of information and communication facilities.
Web browser
A program that allows a user to view webpades
Translates HTML codes from websites and show the result
Most web browsers share the following features:
Have a home page.
Have the ability to store the users favorite websides.
Keep a history of the websites visited .
Give the ability to go backward and forward to the websides opened.
Introduction:
Logic gates take binary inputs and produce a binary output.
Several logic gates combined together form a LOGIC CIRCUIT and these circuits are designed to
carry out a specific function.
The checking of the output from a logic gate or circuit is done using a truth table.
Logic gates:
We have six different logic gates:
Truth tables:
Truth tables are used to trace the output from a logic gate
The NOT gate is the only logic gate with one input.
When constructing truth tables, all possible combinations of 1s and 0s which can be input are
considered. We can use 2 to the power of n.
For example, if the logic circuit has 3 inputs it will give us 8 binary combinations (2 to the power
of 3)
2-AND gate:
Two inputs and one output
Just like multiplying
Boolean algebra = X = A . B
Boolean logic = X = A AND B
3-OR gate:
Two inputs and one output
Just like addition
Boolean algebra = X = A + B
Boolean logic = X = A OR B
4-NAND gate:
Inverse of the AND gate
Two inputs and one output
Multiply then inverse
Boolean algebra = X =
Boolean logic: X = A NAND B
5-NOR gate:
Inverse of the OR gate
Two inputs and one output
Add then inverse
Boolean algebra = X =
Boolean logic = X = A NOR B
6-XOR gate
It the inputs are the same the output
Will be 0
Two inputs and one output
Boolean algebra = X=
Boolean logic = X = A XOR B
Logic circuits
When logic gates are combined they carry out a particular function to form a logic circuit
The output from the logic circuit is checked using a truth table
First you will split the circuits into groups
Draw a truth table in this circuit we have 3 inputs so 2 to the power of 3 would give us 8
combinations.
Example 1:
Input values Intermediate values Output
A B C P Q R X
0 0 0 0 1 1 1
0 0 1 0 0 0 1
0 1 0 0 0 0 0
0 1 1 0 0 0 1
1 0 0 0 1 1 1
1 0 1 0 0 0 1
1 1 0 1 0 1 1
1 1 1 1 0 1 0
Example 2:
We produce a logic circuit and truth tables to show the conditions which cause the output
to be X =1
The first thing to do is to write down the logic statement representing the scenario.
X = 1 if (A = 1 AND B = NOT 1) OR (B = 1 AND C = NOT 1)
WE WITE THE STATEMENT IN BOOLEAN ALGEBRA FORM:
(A . B) + (B . C)
We draw the circuit:
Example 3:
A wind turbine has a safety system which uses three inputs to a logic circuit.
The following table shows which parameters are being monitored and form the three inputs to
the logic circuit.
The output X will have a value of 1 if any of the following combination of the condition occur
Either turbine speed <=1000 rpm AND bearing temp >80°C
or turbine speed > 1000 rpm and wind velocity > 120 kph
or bearing temperature <= 80°C and wind velocity > 120 kph
Its then written in Boolean algebra form:
(S . T) + (S . W) + (T . W)
Then we draw a logic circuit:
F
Input values Intermediate
D values Output
S T W A B C D E F X
We 0 0 0 1 B 1 0 0 0 0 0 draw a truth
table:
0 0 1 1 1 0 1 0 0 1
0 1 0 1 0 0 0C 1 1 1
0 1 1 1 0 0 0 1 1 1
1 0 0 0 1 0 0 0 0 0
1 0 1 0 1 1 1 0 1 1
1 1 0 0 0 0 0 0 0 0
1 1 1 0 0 1 0 0 1 1
Logic circuits in the real world
Two possible ways electronic companies can review logic circuits design:
1. Using off the shelf logic circuits and build up the logic circuit as a number of building blocks.
2. Another method involves simplifying the logic circuit as far as possible.
The OR gate:
Example 4:
Show that this circuit can be turned into a NAND gate:
Use the gates above to convert them into
NAND gates
D F H
c
E
G
Then we draw a truth table:
Input values Intermediate values Output
A B C D E F G H X
0 0 0 1 1 0 0 1 1
0 0 1 1 0 0 1 1 0
0 1 0 1 1 0 0 1 1
0 1 1 1 0 0 1 1 0
1 0 0 1 1 0 0 1 1
1 0 1 1 0 0 1 1 0
1 1 0 0 1 1 0 0 1
1 1 1 0 0 1 1 0 1
As you can see the truth table matches the NOR gate so it can be simplified into that gate.
Example 5:
We can also write a logic statement from a logic circuit:
It could be written as both logic and algebraic:
X = (A + B) . (B + C)
X = 1 if (A = 1 OR B = 1) AND (B = 1 OR C = NOT 1)
Example 6:
We can also show that by drawing a truth table we can identify the NAND gate can be simplified into
one gate only.
E
X
Input values Intermediate values Output
A B C D E X
0 0 1 1 0 1
0 1 1 0 1 0
1 0 0 1 1 0
1 1 0 0 1 0
As you can see the outputs of the NAND gate matches the outputs of the NOR gate.
Operating system
What is an operating system?
The OPERATING SYSTEM (OS) is essentially software running in the background of a computer system.
What is the purpose of an operating system?
Operating system is used to facilitate communication between software and hardware.
Without an operating system a computer would be useless as it wouldn’t be able to load any sofwate
and we would not be able to interact with it
Examples of operating systems:
Windows
Andriod
Linux
UNIX
DOS
Windows:
It’s an example of a single user multitasking operating system – this means only one user can use the
computer at a time but can have many applications open simultaneously.
Simple devices:
They have embedded microprocessor but don’t always have an operating system.
Examples: cookers, microwave, washing machine, toasters
What is a buffer?
It’s a temporary memory area.
How buffers and interrupts are used when a document is sent to a printer:
Computer architecture
Very early computers could not store programs.
There had to be a person feeding the computer data while the machine was actually running.
In 1945 von Neumann developed the idea of a stored program computer.
This was then called the von Neumann architecture concept.
Von Neumann
3 components registers
Busses
Input/output MAR
Address Memory unit
Processor + control MDR
unit Data
ALU Processor
Memory unit Control
PC
Control unit
CIR
IAS
ACC
The idea of how a processor and memory unit are linked together by connections known as busses:
Function of each of the three buses:
Buses essentially move data around the computer and also send out control signals to make sure
everything is properly synchronized.
Busses connect the components of the model to one another.
Registers:
Internal memory location within the CPU.
They temporarily hold data and instructions during processing.
Registers are used to move data and instructions into and around the different components of
the CPU.
Describe the stored program concept when applied to the von Neumann model:
The program is stored on a secondary storage device.
Data and instructions are stored in the same memory/ RAM.
Data and instructions are moved to registers to be executed.
Instructions are fetched one at a time.
Accumulator (ACC)
Register that is used for arithmetic and logic calculations.
Values need to be placed in the accumulator for calculations to be carried out.
Processor:
The PROCESSOR contains the ARITHMETIC AND LOGIC UNIT (ALU).
The ALU allows arithmetic (e.g. add, subtract, etc.) and logic (e.g. AND, OR, NOT, etc.) operations
to be carried out
Memory unit
The computer memory unit is made up of a number of partitions. Each partition consists of an
ADDRESS and its CONTENTS.
The address will uniquely identify every LOCATION in the memory and the contents will be the
binary.
Example:
Address = MAR
Contents = MDR
READ the contents of location 0000 0101
MAR – it will be the same:
0000 0101
MDR – you will go find the read number then write the
Number from the contents column:
0111 1001
Fetch
In the fetch–execute cycle, the next instruction is fetched from the memory address currently
stored in the Program Counter (PC) and is then stored in the Current Instruction Register (CIR).
The PC is then incremented (increased by 1) so that the next instruction can be processed.
This is then decoded so that each instruction can be interpreted in the next part of the cycle.
Execute
The processor passes the decoded instruction as a set of control signals to the appropriate
components within the computer system.
This allows each instruction to be carried out in its logical sequence.
Human Computer Interface Provides a user friendly platform for the user to communicate with the computer.
(HCI)
Loading software Loading applications from hard drive to RAM for the user to use.
Managing & securing Managing user accounts and securing their login details like usernames and passwords.
accounts
File Management Save, sort, copy, edit, delete files
Processor Management Decides which programs should be executed for how long
Memory Management Handles RAM and manages the movement of processes between the RAM and Hard disk.
Interrupt handling Receives interrupts from the devices and responds accordingly
Real-time Processing Processes continuous inputs to generate output in a short period of time
Input/output control Receives input and output requests from the CPU and delivers it to the Input & Output
devices.
Types of OS
Interrupt handler
What is an interrupt handler?
An interrupt handler in a computer system is a piece of code related to a specific interrupt condition. It
is also called ISR or interrupt service routine.
1-Inputs:
An input device is responsible for putting data or actions from the real world into a format the
computing device can understand.
Some examples are scanner, barcode reader, digital camera, keyboard, mouse, microphone, touch
screen, sensors, interactive whiteboard.
2-Processing:
The central processing unit of the computer processes the data according to the instructions given to it
by programs. Programs are written to produce a certain reaction based on the inputs that are received.
3-Output:
An output device is responsible for relaying information from the computer back to the real world.
Some examples are: printers, speakers, monitor, projector.
Input devices
Barcode reader:
Barcode readers are most commonly found at the checkout or POS(Point Of Sale)in
supermarkets.
These are input devices that reads the barcode from an item to get the details of an item at the
time of purchase like price, quantity purchased etc.
A barcode is a series of dark and light parallel lines of varying thickness
2D Scanner
These types of scanner are the most common form and are generally used to input hard-copy (paper)
documents. The image is converted into an electronic form which can be stored in a computer.
Computers equipped with OPTICAL CHARACTER RECOGNITION (OCR) software allow the
scanned text from the document to be converted into a TEXT FILE FORMAT.
This means the scanned image can now be edited and manipulated by importing it into a word
processor.
If the original document was a photograph or image, then the scanned image forms an image
file such as JPEG.
How does a 2D operate?
Application of 2D Scanners
At the Airports:
2D scanners are used at airports to read passports
They make use of OCR technology to produce digital images of the passport pages and can be used in
many ways for e.g. passenger’s name, DOB, passport expiry can be copy pasted into a form field that
accepts text instead of typing manually.
The passenger’s photograph is scanned from the passport as an image at the passport control counter. A
picture of the passenger is also taken using the digital camera. The two images are then compared using
a face recognition/ detection software.
The key feature that are compared and recognized by the software to confirm if the passenger is the
same as in passport image are as follows:
Distance between the eyes.
Width of the nose.
Shape of the cheek bone.
Length of the Jaw line.
Shape of the eyebrows.
3D Scanner
3Dscanner is an input device that collects data like shape, color, distance between edges, length, width
etc. from a real-world object and translates these into a virtual 3D object.
Technologies used in 3D scanning:
Laser
Magnetic Resonance.
White Light.
3-D scanners are used for creating life-like images and animation in movies and video games.
Computer Aided Design (CAD) uses scanned images to create 3D working model.
Application of 3D Scanners
CT Scanners (Computed Tomographic):
Used to scan 3D solid objects.
Builds up an image of the solid object through a series of very thin ‘slices’. Together these 2D
‘slices’ make up a representation of the 3D solid object.
Each slice is made using X-rays, radio frequencies or gamma radiations.
Each ‘slice’ is then stored as a digital image in the computer memory. The whole of the solid
object is represented digitally in the computer memory
Disadvantages
QR code
Quick Response (QR) code is another type of barcode made up of a matrix of filled-in dark squares on a
light background.
QR code Barcode
The quality of the photograph also depends on many other factors, such as:
the type of lens used
the lighting
Mode of Operation:
• Keyboard is a circuit and each key on the keyboard works as a on a the keys of the keyboard has
an ASCII value. switch.
• Each character
• When keys are pressed, the switches joins the circuit and allows small amount of current to pass
through it creating electronic signals.
• These signals are then converted into a digital signal, which the computer interprets.
Advantages Disadvantages
Ergonomic keyboards can help to overcome the RSI Frequent use of these devices can lead to injuries,
problem. such as REPETITIVE STRAIN INJURY (RSI) in the
hands and wrists.
Potentially a fast way to enter data. A slow way to enter lots of data if not a trained typist.
Simple and easy to use. Mistakes/ errors can be made if not careful.
Ergonomic keyboards help solve these problems
Reduces the training required as they are easy to use Not suitable for large amount of options/choices
Ideal when options/choices are few Not suitable for all tasks
May speed up data entry
Braille Keyboard
Braille is a writing system for blind and visually impaired people. It is made up of raised dots that can be
'read' by touch.
simply tapping the surface this acts as a quick Sensitive to touch. May not be able to identify
method of selection on many touch pads. touch and perform accordingly.
doing a ‘voice over’ in a presentation E.g. Tablets and laptops, e.g. for video conferencing
or VoIP
part of a speech recognition system E.g. Mobile phones, e.g. for traditional phone calls
or VoIP
part of a voice recognition system E.g. Voice recognition systems, e.g. to input data
and commands using spoken words
enabling a disabled person to communicate with E.g. Handicapped people with limited or no
a computer. movement.
Used in cars to allow the driver to say commands like Task digital assistants in offices to search
make warmer’, ‘switch on GPS’ or ‘open window’ by reports, create graphs using data, voice
using keywords as voice patterns will be compared recording meeting minutes, start video
with the dictionary of words already stored. conferencing, print documents on request.
Used for solving crimes in investigation In banks to make payments, request
information regarding your balance,
transactions, receive information about your
transaction history.
Buying products and services online with your voice In marketing for recognizing customers with
while searching web. different dialects and accents by their names,
age etc.
Checking flight status for arrival and departures. In Health care while finding patients records,
reminding medical staff to follow instructions,
less paperwork and time to input data.
Types of Technologies:
There are three main types of touch screen technology:
Capacitive
Infra-Red
Resistive
When the computer is used to control devices, such as a motor or a valve, it is necessary to use a
DIGITAL TO ANALOGUE CONVERTER (DAC) since these devices need analogue data to operate in many
cases.
An ACTUATOR is used in these control applications (An actuator is an electromechanical device such as a
relay, solenoid or motor.)
Note that a solenoid is an example of a digital actuator; part of the device is connected to a computer
which opens and closes a circuit as required.
Other actuators, such as motors and valves, may require a DAC so that they receive an electric current
rather than a simple digital signal direct from the computer.
Examples of sensors
Sensors are used in both monitoring and control applications. There is a subtle difference between how
these two methods work:
Monitoring applications
Burglar alarm system
A burglar alarm monitoring system will carry out the following actions:
• The system is activated by keying in a password on a keypad.
• The infra-red sensor picks up the movement of an intruder in the building.
• The acoustic sensor picks up sounds such as footsteps or breaking glass.
• The pressure sensor picks up the weight of an intruder coming through a door or through a window.
• The sensor data is passed through an ADC if it is in an analogue form to produce digital data.
• The computer/microprocessor will sample the digital data coming from these sensors at a given
frequency (e.g. every five seconds); the data is compared with the stored values by the
computer/microprocessor.
• If any of the incoming data values are outside the acceptable range, then the computer sends a signal
to:
• a siren to sound the alarm, or
• a light to start flashing.
• A DAC is used if the devices need analogue values to operate them.
• The alarm continues to sound/lights continue to flash until the system is reset with a password.
Patient in a hospital
• A number of sensors are attached to the patient; these measure vital signs such as: temperature, heart
rate, breathing rate, etc.
• These sensors are all attached to a computer system.
• The sensors constantly send data back to the computer system.
• The computer samples the data at frequent intervals.
• The range of acceptable values for each parameter is keyed in to the computer.
• The computer compares the values from the sensors with those values keyed in. 102
• If anything is out of the acceptable range, a signal is sent by the computer to sound an alarm.
• If data from the sensors is within range, the values are shown in either graphical form on a screen
and/or a digital read out.
• Monitoring continues until the sensors are disconnected from the patient.
Control applications
Street lighting
This next sequence shows how a microprocessor is used to control the operation of a street lamp. The
lamp is fitted with a light sensor which constantly sends data to the microprocessor. The data value from
the sensor changes according to whether it is sunny, cloudy, raining or it is night time etc.
• The light sensor sends data to the ADC interface.
• This digitises the data and sends it to the microprocessor.
• The microprocessor samples the data every minute (or at some other frequency 103 rate).
• If the data from the sensor < value stored in memory:
• a signal is sent from the microprocessor to the street lamp
• and the lamp is switched on.
• The lamp stays switched on for 30 minutes before the sensor readings are sampled again (this
prevents the lamp flickering off and on during brief heavy cloud cover, for example).
• If the data from the sensor >= value stored in memory:
• a signal is sent from the microprocessor to the street lamp
• and the lamp is switched off.
• The lamp stays switched off for 30 minutes before sensor readings are sampled again (this prevents
the lamp flickering off and on during heavy cloud cover, for example).
Output devices
Inkjet printers
INKJET PRINTERS are essentially made up of:
• a print head which consists of nozzles which spray droplets of ink on to the paper to form characters
• an ink cartridge or cartridges; either a group of cartridges for each colour (blue, yellow and magenta)
and a black cartridge or one single cartridge containing all three colours + black (Note: some systems use
six colours.)
• a stepper motor and belt which moves the print head assembly across the page from side to side
• a paper feed which automatically feeds the printer with pages as they are required.
The ink droplets are produced currently using two different technologies.
Thermal bubble:
Tiny resistors create localized heat which makes the ink vaporise.
This causes the ink to form a tiny bubble; as the bubble expands, some of the ink is ejected from
the print head onto the paper.
When the bubble collapses, a small vacuum is created which allows fresh ink to be drawn into
the print head. This continues until the printing cycle is completed.
Piezoelectric:
A crystal is located at the back of the ink reservoir for each nozzle.
The crystal is given a tiny electric charge which makes it vibrate.
This vibration forces ink to be ejected onto the paper; at the same time more ink is drawn in for
further printing.
Laser printers
LASER PRINTERS differ greatly from inkjet printers in the way they print pages. They use dry
powder ink rather than liquid ink and make use of the properties of static electricity to produce
the text and images.
Unlike inkjet printers, laser printers print the whole page in one go (inkjet printers print the
page line by line).
Their advantage is the speed at which they can carry out large print jobs and the fact that they
don’t run out of ink halfway through.
3D printers
3D printers are primarily used in COMPUTER-AIDED DESIGN (CAD) applications.
Types of manufacturing
One type of manufacturing use addictive manufacturing. The 3D object being printed is built up
layer by layer using powdered resin, powdered metal, ceramic powder of paper.
Another type of manufacturing use subtractive manufacturing. The 3D object being printed is
carved from a block t stone until the object in formed.
3D printer’s technology
Direct 3D printing uses inkjet technology; a print head can move left to right as in a normal
printer. However, the print head can also move up and down to build up the layers of an object.
Binder 3D printing is similar to direct 3D printing. However, this method uses two passes for
each of the layers; the first pass sprays dry powder and then on the second pass a binder (a type
of glue) is sprayed to form a solid layer.
Newer technologies are using lasers and UV light to harden liquid polymers; this further
increases the diversity of products which can be made.
How a solid object is formed
Uses of 3D printers
prosthetic limbs made to exactly fit the recipient
items to allow precision reconstructive surgery scanning of the skull
in aerospace, manufacturers are looking at making wings and other parts using 3D technology;
the bonus will be lightweight precision parts
in fashion and art
2D and 3D cutters
A three-dimensional (3D) laser cutter works in a similar way to a two-dimensional (2D) cutter. The main
difference is that the 3D cutter can recognize an object in the xy-z direction rather than just x-y.
3D laser cutters can cut the following materials:
glass
crystal
metal
polymer
wood.
Very complex designs can be cut since the cutters are controlled by computers and very sophisticated
software.
Actuators
ACTUATORS are used in many control applications involving sensors and devices such as ADC and DAC.
The rate at which the DAC can translate the digital output into analogue voltages is known as the
SAMPLING RATE. If the DAC is a 16-bit device, then it can accept numbers between +32 767 (216 – 1)
and –32 768 (216); the digital value containing all zeros is ignored. The speed at which these values can
be converted is the sampling rate.
Example
Suppose a CD is being produced to contain a number of music tracks.
Each piece of music is sampled 44 100 times a second. Each sample is 16 bits.
Since the music is in stereo this also needs to be taken into consideration.
The above information means that 44 100 × 2 × 16 = 1 411 200 bits per second sampling (the
number ‘2’ is used in the calculation to account for the sound being in stereo).
Since 1 byte = 8 bits, this equates to 1 411 200/8 bytes per second.
This works out at 176 400 bytes per second.
LEDs have become increasingly more popular because of a number of advantages over older CCFL
technology:
LEDs reach their maximum brightness almost immediately
LEDs give a whiter light which sharpens the image and make the colours appear more vivid; CCFL
had a slightly yellowish tint
LEDs produce a brighter light which improves the colour definition
monitors using LED technology are much thinner than monitors using CCFL technology
LEDs last almost indefinitely; this makes the technology more reliable and means a more
consistent product
LEDs consume very little power which means they produce less heat as well as using less energy.
OLED
Future LED technology is making use of ORGANIC LIGHT EMITTING DIODES (OLEDS).
These use organic materials (made up of carbon compounds) to create semi-conductors which
are very flexible.
Organic films are sandwiched between two charged electrodes (one is a metallic CATHODE and
the other a glass ANODE).
When an electric field is applied to the electrodes, they give off light. This means that no form of
backlighting is required. This allows for very thin screens.
Advantages of using OLED compared with existing LEDs and LCDs include:
the plastic, organic layers of an OLED are thinner, lighter and more flexible than the crystal
structures used in LEDs or LCDs
the light-emitting layers of an OLED are lighter; OLED layers can be made from plastic rather
than the glass used in LED and LCD screens
OLEDs give a brighter light than LEDs
OLEDs do not require backlighting like LCD screens – OLEDs generate their own light
since OLEDs require no backlighting, they use much less power than LCD screens
since OLEDs are essentially plastics, they can be made into large, thin sheets
OLEDs have a very large field of view, about 170 degrees, which makes them ideal for use in
television sets and for advertising screens.
Light projectors
Projectors are used to project computer output onto larger screens or even onto interactive
whiteboards.
There are two common types of light projector:
• digital light projectors (DLP)
• LCD projectors.
LCD projectors
• A powerful beam of white light is generated from a bulb or LED inside the projector body.
• This beam of light is then sent to a group of chromatic-coated mirrors; these reflect the light
back at different wavelengths.
• When the white light hits these mirrors, the reflected light has wavelengths corresponding to
red, green and blue light components.
• These three different coloured light components pass through three LCD screens; these screens
show the image to be projected as millions of pixels in a grey scale.
• When the coloured light passes through the LCD screens, a red, green and blue version of the
grey image emerges.
• These images are then combined using a special prism to produce a full colour image – this final
image consists of millions of colours (each shade of grey in the original image produces a
different shade in each of the colour images).
• Finally the image passes through the projector lens onto a screen.
MP3
Moving Pictures Experts Group-3 (MPEG-3 or MP3) uses audio compression technology to
convert sound into an MP3 format. This reduces the size of a normal sound file by around 90%
(so a factor of 10).
For example, an 80-megabyte sound file could be reduced to an 8-megabyte MP3 file. k
This is done by removing sounds which humans can't hear. This process is called perceptual
music shaping.
MP3 files use what is known as a LOSSY FORMAT since part of the original file is lost following
the compression algorithm. This means that the original file can’t be put back together again.
However, even the quality of MP3 files can be different since it depends on the BIT RATE – this is
the number of bits per second used when creating the file. Bit rates are roughly between 80 and
320 kilobits per second; usually 200 or higher gives a sound quality close to a normal CD
Example question
Q.1 Music is to be stored on a CD. Each minute of music is worth 12 megabytes.
Calculate how much space the CD would need in order to store 3 tracks which are 3, 6 and 7 minutes
long.
3 + 6 + 7 = 16 minutes
16 x 12 = 192 megabytes
Q.2 The files are compressed using an MP3 compression algorithm. Calculate how much space the CD
would now need (you may assume the file size is reduced by 90%).
192 / 10 = 19.2 megabytes
Q.3 The CD has 800 megabytes of space. Calculate how many minutes can be stored on the CD.
Remember: 1 min = 12 megabytes
800 / 12 = 66.67 minutes = 66 minutes and 40 seconds
MP4
This format allows the storage of multimedia files rather than just sound. Music, videos, photos
and animation can all be stored in the MP4 format.
Videos, for example, could be streamed over the internet using the MP4 format without losing
any real discernable quality.
1. Primary memory
Random Access Memory (RAM)
This memory is volatile/temporary in nature. It is used to store data, programs or parts of the operating
system currently in use.The memory can be written to or read from.
The features of RANDOM ACCESS MEMORY (RAM) are:
it is volatile/temporary memory (the contents of the memory are lost when the
power to the RAM is turned off)
it is used to store:
data,
files, or
part of the operating system that are currently in use
it can be written to or read from and the contents of the memory can be changed
How RAM works
The larger the RAM, the faster the computer will run.
RAM never runs out, but it gets slower through time.
As RAM becomes full, the processor has to access the Hard-Disk Drive (HDD) to replace old data
on the RAM with new data.
But by increasing the RAM size, the number of times this access operation is done is reduced,
making the computer run faster.