{"id":6,"date":"2022-05-16T18:13:54","date_gmt":"2022-05-16T17:13:54","guid":{"rendered":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/phshighercomputingscience\/?page_id=6"},"modified":"2022-06-02T19:20:02","modified_gmt":"2022-06-02T18:20:02","slug":"computer-systems","status":"publish","type":"page","link":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/phshighercomputingscience\/computer-systems\/","title":{"rendered":"Computer Systems"},"content":{"rendered":"<p><strong>Data Representation<\/strong><\/p>\n<ul>\n<li>Describe and exemplify the use of binary to represent positive and negative integers using two\u2019s complement, including the range of numbers that can be represented using a fixed number of bits.<\/li>\n<li>Conversion of two\u2019s complement numbers from binary to denary and vice versa.<\/li>\n<li>Describe and exemplify floating-point representation of positive and negative real numbers, using the terms mantissa and exponent.<\/li>\n<li>Describe the relationship between the number of bits assigned to the mantissa\/exponent, and the range and precision of floating-point numbers.<\/li>\n<li>Describe Unicode used to represent characters and its advantage over extended ASCII code (8-bit) in terms of numbers of characters.<\/li>\n<li>Describe the relative advantages and disadvantages of bit-mapped graphics versus vector graphics.<\/li>\n<\/ul>\n<p><strong>Computer structure<\/strong><\/p>\n<ul>\n<li>Describe the concept of the fetch-execute cycle.<\/li>\n<li>Describe the factors affecting computer system performance:\n<ul>\n<li>number of processors (cores)<\/li>\n<li>width of data bus<\/li>\n<li>cache memory<\/li>\n<li>\u00a0clock speed<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><strong>Environmental Impact<\/strong><\/p>\n<ul>\n<li>Describe the environmental impact of intelligent systems:\n<ul>\n<li>heating systems<\/li>\n<li>\u00a0traffic control<\/li>\n<li>car management systems<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><strong>Security Risks and Precautions<\/strong><\/p>\n<ul>\n<li>Describe and identify the implications for individuals and businesses of<br \/>\nthe Computer Misuse Act 1990:<\/p>\n<ul>\n<li>unauthorised access to computer material<\/li>\n<li>\u00a0unauthorised access with intent to commit a further offence<\/li>\n<li>\u00a0unauthorised modification of programs or data on a computer<\/li>\n<\/ul>\n<\/li>\n<li>Describe and identify the security risks of:\n<ul>\n<li>tracking cookies<\/li>\n<li>DOS (Denial of Service) attacks:\n<ul>\n<li>\u00a0symptoms\n<ul>\n<li>slow performance, inability to access-<\/li>\n<\/ul>\n<\/li>\n<li>effects\n<ul>\n<li>disruption to users and businesses<\/li>\n<\/ul>\n<\/li>\n<li>costs\n<ul>\n<li>\u00a0lost revenue, labour in rectifying fault<\/li>\n<\/ul>\n<\/li>\n<li>type of fault\n<ul>\n<li>bandwidth consumption, resource starvation, Domain<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li>Name Service (DNS)\n<ul>\n<li>reasons\n<ul>\n<li>financial, political, personal<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li>Describe how encryption is used to secure transmission of data:\n<ul>\n<li>use of public and private keys<\/li>\n<li>digital certificates<\/li>\n<li>digital signatures<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Data Representation Describe and exemplify the use of binary to represent positive and negative integers using two\u2019s complement, including the range of numbers that can be represented using a fixed number of bits. Conversion of two\u2019s complement numbers from binary to denary and vice versa. Describe and exemplify floating-point representation of positive and negative real [&hellip;]<\/p>\n","protected":false},"author":79984,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-6","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/phshighercomputingscience\/wp-json\/wp\/v2\/pages\/6","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/phshighercomputingscience\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/phshighercomputingscience\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/phshighercomputingscience\/wp-json\/wp\/v2\/users\/79984"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/phshighercomputingscience\/wp-json\/wp\/v2\/comments?post=6"}],"version-history":[{"count":3,"href":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/phshighercomputingscience\/wp-json\/wp\/v2\/pages\/6\/revisions"}],"predecessor-version":[{"id":335,"href":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/phshighercomputingscience\/wp-json\/wp\/v2\/pages\/6\/revisions\/335"}],"wp:attachment":[{"href":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/phshighercomputingscience\/wp-json\/wp\/v2\/media?parent=6"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}