https://www.trccompsci.online/mediawiki/api.php?action=feedcontributions&user=H.Quartermaine&feedformat=atomTRCCompSci - AQA Computer Science - User contributions [en-gb]2024-03-29T15:04:19ZUser contributionsMediaWiki 1.31.6https://www.trccompsci.online/mediawiki/index.php?title=Alert_the_User_if_aqawords.txt_File_is_Missing&diff=4593Alert the User if aqawords.txt File is Missing2018-02-19T09:40:09Z<p>H.Quartermaine: </p>
<hr />
<div>A Simple solution to this issue:<br />
<br />
<syntaxhighlight lang="C#"><br />
static void Main(string[] args)<br />
{<br />
if (!File.Exists("aqawords.txt"))<br />
{<br />
Console.ForegroundColor = ConsoleColor.Red;<br />
Console.WriteLine("Dictionary doesn't exsist, please replace file");<br />
}<br />
<br />
}<br />
</syntaxhighlight><br />
<br />
<br />
This simply checks to see if the file exists, if it doesn't it prints a red error message to the user.<br />
<br />
<br />
<br />
<br />
This is actually not as difficult as it may first appear. Firstly, let's take a glimpse at the LoadAllowedWords method which actually loads the contents of the AQAwords.txt file.<br />
<br />
<syntaxhighlight lang="C#"><br />
private static void LoadAllowedWords(ref List<string> AllowedWords) {<br />
try {<br />
StreamReader FileReader = new StreamReader("aqawords.txt");<br />
<br />
while (!FileReader.EndOfStream) {<br />
AllowedWords.Add(FileReader.ReadLine().Trim().ToUpper());<br />
}<br />
<br />
FileReader.Close();<br />
} catch (Exception) {<br />
AllowedWords.Clear();<br />
}<br />
}<br />
</syntaxhighlight><br />
<br />
The entire method is wrapped in a try/catch statement, meaning if we create a new handler for a FileNotFoundException (which is thrown if a file isn't found) then we can easily alert the player.<br />
<br />
<syntaxhighlight lang="C#"><br />
private static void LoadAllowedWords(ref List<string> AllowedWords) {<br />
try {<br />
StreamReader FileReader = new StreamReader("aqawords.txt");<br />
<br />
while (!FileReader.EndOfStream) {<br />
AllowedWords.Add(FileReader.ReadLine().Trim().ToUpper());<br />
}<br />
<br />
FileReader.Close();<br />
<br />
} catch (FileNotFoundException) {<br />
Console.WriteLine($"File 'aqawords.txt' not found");<br />
AllowedWords.Clear(); // Also needs to be done<br />
} catch (Exception) { <br />
AllowedWords.Clear();<br />
}<br />
}<br />
</syntaxhighlight><br />
<br />
Done, that's all u need to do to alert the player. Now seeing as the game is unplayable we should by all rights end it here, but seeing as that's out of the perview of the task I'll leave it as is. I feel I should also note, exception handlers are executed in order of inheritance from the highest parent down. Thus if the new catch statement we've placed was put after the "catch (Exception)" block then it would be unreachable and never run. '''REMEMBER''' all exceptions inherit from the root parent class 'Exception', hence the "catch (Exception)" will be executed for '''ALL''' exceptions thrown regardless if the next checked exception down the line is a closer match to the actual thrown exception.</div>H.Quartermainehttps://www.trccompsci.online/mediawiki/index.php?title=Show&diff=3914Show2017-11-14T13:43:35Z<p>H.Quartermaine: </p>
<hr />
<div><syntaxhighlight lang=csharp><br />
public void Show()<br />
{<br />
if (Rear != -1)<br />
{<br />
Console.WriteLine();<br />
Console.Write("The contents of the queue are: ");<br />
foreach (var item in Contents)<br />
{<br />
Console.Write(item);<br />
}<br />
Console.WriteLine();<br />
}<br />
}<br />
</syntaxhighlight><br />
<br />
This method first checks that the Rear value is not -1 as an index of -1 would mean the queue is empty, and data cant is take from a queue that is empty. <br />
<br />
<syntaxhighlight lang=csharp><br />
if (Rear != -1)<br />
</syntaxhighlight><br />
<br />
The next couple of lines simply print a constant string to the console.<br />
<br />
<syntaxhighlight lang=csharp><br />
foreach (var item in Contents)<br />
{<br />
Console.Write(item);<br />
}<br />
</syntaxhighlight><br />
<br />
The above section uses a newly declared variable called item to retrieve a letter from the queue one at a time and print it to the console.</div>H.Quartermainehttps://www.trccompsci.online/mediawiki/index.php?title=Abstraction_-_Automation&diff=2475Abstraction - Automation2017-03-31T11:31:04Z<p>H.Quartermaine: </p>
<hr />
<div>==Information Hiding==<br />
Information Hiding is the process of hiding the complexity of a system behind the interface for that system. For example a car has an accelerator to control the speed of the car, however your car is deciding how much fuel to inject, the fuel to air ratio, and the spark timings etc.<br />
<br />
== Abstraction ==<br />
Removing details that are not essential for a problem to be solved. This can be interpreted as removing indirectly relevant data repeatedly until a complex problem (function) becomes a series of simpler problems (functions) which can easily accomplish the same larger problem (function) in a more efficient & simpler way. <br />
<br />
===Data Abstraction===<br />
The exact detail of how the data is stored is hidden, for example you pass the data values and program will decide the suitable data type to use.<br />
<br />
===Functional Abstraction===<br />
Breaking problems down to a reusable set of functions. Each function runs with the input given to create the output, the calculation process is hidden from the user.<br />
<br />
===Procedural Abstraction===<br />
Procedural abstraction is used to keep the actual values used in a computation separate from the overall design. Then any changes in one shouldn't affect the other. Procedural abstraction in simple terms, involves writing procedures and passing parameters.<br />
<br />
===Problem Abstraction===<br />
Removing details from a problem until it is represented in a way that is possible to solve.<br />
<br />
==Decomposition==<br />
Solving a problem by breaking the problem down into small mini problems. <br />
<br />
For example, making a cup of tea can be broken down into tasks such as fill kettle, boil kettle, wash cup, add tea bag, remove tea bag, add milk, stir etc.<br />
<br />
==Composition==<br />
Solving a problem by taking several small problems and grouping them together to specify a bigger problem (Opposite of decomposition).<br />
<br />
== Automation ==<br />
<br />
Automation is the process of building models of real world objects to solve a problem. Models can be made by including only details that are relevant to the problem and discarding those that are irrelevant or have only minor effects. Using the model, an algorithm can then be designed to solve and automate the problem.</div>H.Quartermainehttps://www.trccompsci.online/mediawiki/index.php?title=Abstraction_-_Automation&diff=2474Abstraction - Automation2017-03-31T11:30:23Z<p>H.Quartermaine: </p>
<hr />
<div>==Information Hiding==<br />
Information Hiding is the process of hiding the complexity of a system behind the interface for that system. For example a car has an accelerator to control the speed of the car, however your car is deciding how much fuel to inject, what the ratio of fuel to air, when to time the sparks etc.<br />
<br />
== Abstraction ==<br />
Removing details that are not essential for a problem to be solved. This can be interpreted as removing indirectly relevant data repeatedly until a complex problem (function) becomes a series of simpler problems (functions) which can easily accomplish the same larger problem (function) in a more efficient & simpler way. <br />
<br />
===Data Abstraction===<br />
The exact detail of how the data is stored is hidden, for example you pass the data values and program will decide the suitable data type to use.<br />
<br />
===Functional Abstraction===<br />
Breaking problems down to a reusable set of functions. Each function runs with the input given to create the output, the calculation process is hidden from the user.<br />
<br />
===Procedural Abstraction===<br />
Procedural abstraction is used to keep the actual values used in a computation separate from the overall design. Then any changes in one shouldn't affect the other. Procedural abstraction in simple terms, involves writing procedures and passing parameters.<br />
<br />
===Problem Abstraction===<br />
Removing details from a problem until it is represented in a way that is possible to solve.<br />
<br />
==Decomposition==<br />
Solving a problem by breaking the problem down into small mini problems. <br />
<br />
For example, making a cup of tea can be broken down into tasks such as fill kettle, boil kettle, wash cup, add tea bag, remove tea bag, add milk, stir etc.<br />
<br />
==Composition==<br />
Solving a problem by taking several small problems and grouping them together to specify a bigger problem (Opposite of decomposition).<br />
<br />
== Automation ==<br />
<br />
Automation is the process of building models of real world objects to solve a problem. Models can be made by including only details that are relevant to the problem and discarding those that are irrelevant or have only minor effects. Using the model, an algorithm can then be designed to solve and automate the problem.</div>H.Quartermainehttps://www.trccompsci.online/mediawiki/index.php?title=Flip_Flops&diff=2158Flip Flops2017-03-16T09:46:03Z<p>H.Quartermaine: </p>
<hr />
<div>==What is a flip flop==<br />
A flip-flop is used to store binary data, and is a simple latching circuit.<br />
<br />
==Basic (SR) Flip Flops==<br />
[[File:Bool-rs.gif|200px|thumb|right|SR-FF]]<br />
Basic flip flops are created using two NAND gates cross couples as seen in the image.<br />
<br />
==Problems with basic (SR) flip flops==<br />
<br />
==Edge triggered D Type Flip Flop==<br />
[[File:D-Type-ff.gif|200px|thumb|right|D-FF]]</div>H.Quartermainehttps://www.trccompsci.online/mediawiki/index.php?title=Flip_Flops&diff=2157Flip Flops2017-03-16T09:45:22Z<p>H.Quartermaine: /* Basic (SR) Flip Flops */</p>
<hr />
<div>==What is a flip flop==<br />
A flip-flop is used to store binary data, and is a simple latching circuit.<br />
<br />
==Basic (SR) Flip Flops==<br />
[[File:Bool-rs.gif|200px|thumb|right|alt text]]<br />
Basic flip flops are created using two NAND gates cross couples as seen in the image.<br />
<br />
==Problems with basic (SR) flip flops==<br />
<br />
==Edge triggered D Type Flip Flop==<br />
[[File:D-Type-ff.gif|200px|thumb|right|alt text]]</div>H.Quartermainehttps://www.trccompsci.online/mediawiki/index.php?title=Flip_Flops&diff=2156Flip Flops2017-03-16T09:45:00Z<p>H.Quartermaine: /* Edge triggered D Type Flip Flop */</p>
<hr />
<div>==What is a flip flop==<br />
A flip-flop is used to store binary data, and is a simple latching circuit.<br />
<br />
==Basic (SR) Flip Flops==<br />
[[File:Bool-rs.gif]]<br />
Basic flip flops are created using two NAND gates cross couples as seen in the image.<br />
==Problems with basic (SR) flip flops==<br />
<br />
==Edge triggered D Type Flip Flop==<br />
[[File:D-Type-ff.gif|200px|thumb|right|alt text]]</div>H.Quartermainehttps://www.trccompsci.online/mediawiki/index.php?title=Flip_Flops&diff=2155Flip Flops2017-03-16T09:44:13Z<p>H.Quartermaine: </p>
<hr />
<div>==What is a flip flop==<br />
A flip-flop is used to store binary data, and is a simple latching circuit.<br />
<br />
==Basic (SR) Flip Flops==<br />
[[File:Bool-rs.gif]]<br />
Basic flip flops are created using two NAND gates cross couples as seen in the image.<br />
==Problems with basic (SR) flip flops==<br />
<br />
==Edge triggered D Type Flip Flop==<br />
[[File:D-Type-ff.gif|200px|thumb|left|alt text]]</div>H.Quartermainehttps://www.trccompsci.online/mediawiki/index.php?title=File:D-Type-ff.gif&diff=2154File:D-Type-ff.gif2017-03-16T09:43:48Z<p>H.Quartermaine: </p>
<hr />
<div></div>H.Quartermainehttps://www.trccompsci.online/mediawiki/index.php?title=File:Bool-rs.gif&diff=2141File:Bool-rs.gif2017-03-16T09:31:35Z<p>H.Quartermaine: </p>
<hr />
<div></div>H.Quartermainehttps://www.trccompsci.online/mediawiki/index.php?title=User:Aiden_Roche&diff=2035User:Aiden Roche2017-03-10T12:48:09Z<p>H.Quartermaine: </p>
<hr />
<div>I Hate Jacob Clarke. He eats bum for a living nomm nommm</div>H.Quartermainehttps://www.trccompsci.online/mediawiki/index.php?title=User:Aiden_Roche&diff=2026User:Aiden Roche2017-03-10T12:42:57Z<p>H.Quartermaine: </p>
<hr />
<div>My names Rash... Aiden Rash</div>H.Quartermainehttps://www.trccompsci.online/mediawiki/index.php?title=User:Aiden_Roche&diff=2024User:Aiden Roche2017-03-10T12:42:15Z<p>H.Quartermaine: </p>
<hr />
<div>My names Roche... Aiden Roche</div>H.Quartermainehttps://www.trccompsci.online/mediawiki/index.php?title=User:Meep&diff=1998User:Meep2017-03-10T12:27:57Z<p>H.Quartermaine: </p>
<hr />
<div><br />
Nope.</div>H.Quartermainehttps://www.trccompsci.online/mediawiki/index.php?title=User:Meep&diff=1995User:Meep2017-03-10T12:27:40Z<p>H.Quartermaine: </p>
<hr />
<div>Meep<br />
Nope.</div>H.Quartermainehttps://www.trccompsci.online/mediawiki/index.php?title=Hardware&diff=1976Hardware2017-03-10T12:03:43Z<p>H.Quartermaine: /* Laser Printer */</p>
<hr />
<div>==Hardware Definition==<br />
Hardware is a collective term for the physical parts of a computer system; this also includes peripheral devices, not just the internal components. Hardware is the platform on which software is run, and is more invariable than software. However, the configuration of the hardware in the system can be changed by adding new adapters or cards to improve the system's capabilities.<br />
Examples of hardware include motherboards, keyboards, video cards and mice.<br />
<br />
Hardware can be simply defined as components of a computer system that can be touched and altered physically.<br />
<br />
==Devices==<br />
You will need to cover the principles of operation for the following devices:<br />
<br />
===RFID===<br />
RFID or Radio Frequency Identification is where a small device emits a small radio wave with a specific ID on it so that it can be detected. These are most commonly used in shops in an effort to stop theft. RFID tags are attached to items that need tracking. An RFID reader is called an interrogator, and it uses two antennas to create an electromagnetic field. When the tag enters the electromagnetic field it is powered up and immediately transmits its data to the reader.<br />
<br />
===Barcode Reader===<br />
A barcode reader reads a barcode and translates it into text that a computer can understand and decode. These are most commonly used in industry and shops to identify products quickly and easily.<br />
<br />
Barcodes represent numbers 0 to 9 by giving each a unique combination of black and white bars contained within the same amount of horizontal space per digit. Barcode scanners read this information using a scanning head that shines an LED or laser light onto the barcode. The white areas of the barcode reflect the most light back to scanner, while black areas absorb the most and reflect the least. The reflected light is detected by a photoelectric cell in the scanner. As the scanner moves over the barcode, the cell generates a series of on-off pulses that represent the black and white stripes, which are then converted to zeroes or ones by an electronic circuit. The scanner is attached to a computer which uses the resulting binary value to identify the product from a database of barcodes and product numbers.<br />
<br />
===Laser Printer===<br />
Data is inputted into the printer and an electronic circuit figures out how to print this data. This activates the corona wire which produces a static charge to anything it touches. The corona wire positively charges the photoreceptor drum. The laser bounces off a mirror to produce the image; wherever it touches becomes negatively charged. Where the page should be white is positively charged and areas that are black are negatively charged. The toner is then painted across the image, the toner is positively charged so attracts to negatively charged areas of the page. A positively charged blank page is moved near the drum so the toner transfers from the drum to the page. The fuser unit then heats the page so the toner fuses permanently.<br />
<br />
===Digital Camera===<br />
A digital camera is a camera which encodes digital images and stores them for later reproduction. The aperture at the front of the camera opens to let light through the lens. A light detector captures the incoming light rays and converts them into electrical signals. An image sensor - a CMOS image sensor or a Charge-Coupled Device (CCD) - chip breaks up the image into pixels, measuring the colour and brightness of each one. The image itself is a large string of numbers describing each pixel.<br />
<br />
==Secondary Storage Devices==<br />
===Optical Disk===<br />
An optical disk is a flat circular disk which encodes binary data in the form of pits (0's) and lands (1's) on a reflective surface. The data is stored on the disk with a laser or stamping machine and can be accessed using a laser on the underside of the disk (the reflective side) to reflect the light to form the 1's and 0's created by the lands and pits, as lands will reflect this light back to the photocell, which is registered as a 1 and pits will reflect this light elsewhere, and are counted as 0s. <br />
<br />
Some disks have a dye recording layer between the reflective layer and a protective layer. The pits and lands are burned into dye rather than the disk itself to make the disk rewritable.<br />
<br />
===Hard Disk===<br />
A hard disk is made of a circular disk coated in a magnetic material called a platter, which spins at up to 10000 rpm. Each area of the platter can be independently magnetized or demagnetized by a read/write head to store a 1 or a 0. The read/write head is a tiny magnet that moves across the platter as it spins. One platter has two read/write heads - one to read the top of the disk, and one to read the bottom side.<br />
Data is written to the disk in concentric, circular paths called tracks. Each track is broken into sectors, and part of the hard drive stores a map of which sectors contain data and which are free.<br />
===Solid State Drive===<br />
A solid state drive has no moving parts - instead, data is saved to a pool of flash memory with floating gate transistors. Unlike the transistors used in RAM, these can retain their charge state even when the computer is turned off, making flash memory non-volatile. Since SSDs have no moving parts, they can read and write at far faster speeds than magnetic hard drives or optical disks.</div>H.Quartermainehttps://www.trccompsci.online/mediawiki/index.php?title=Data_Protection_Act&diff=1914Data Protection Act2017-03-09T10:24:41Z<p>H.Quartermaine: </p>
<hr />
<div>== The Data Protection Act ==<br />
[[File:Data.jpg|right|frame|x200px]]<br />
The data protection act is in place to protect peoples data which is stored on servers and on companies computers.<br />
<br />
The Data Protection Act states that:<br />
* If you collect data, you must not use it for a different reason.<br />
* You must not share data with external sources.<br />
* People have the right to see data about themselves.<br />
* You must not keep data for longer than you need to and it must be up-to-date.<br />
* You must not send data outside the European Economic Area (EEA) to an area with lower protection.<br />
* People who store data must be registered with the Information Commissioner’s Office (ICO).<br />
* If you store data, the data must be protected and safe.<br />
* If companies have information about you that is wrong, it is your right to as them to change it.<br />
<br />
==Your right to view/request==<br />
<br />
*You can ask the organisation you think is holding, using or sharing the personal information you want, to supply you with copies of both paper and computer records and related information.<br />
<br />
*Data requests are fulfilled by an appointed data controller at an organisation.<br />
<br />
*Organisations may charge a fee of up to £10 (£2 if it is a request to a credit reference agency for information about your financial standing only).<br />
<br />
*There are special rules that apply to fees for paper based health records (the maximum fee is currently £50) and education records (a sliding scale from £1 to £50 depending on the number of pages provided).<br />
<br />
*However, it is important to remember that not all personal information is covered and there are ‘exemptions’ within the Act which may allow an organisation to refuse to comply with your subject access request in certain circumstances.</div>H.Quartermainehttps://www.trccompsci.online/mediawiki/index.php?title=File:Data.jpg&diff=1913File:Data.jpg2017-03-09T10:24:34Z<p>H.Quartermaine: </p>
<hr />
<div></div>H.Quartermainehttps://www.trccompsci.online/mediawiki/index.php?title=Data_Protection_Act&diff=1911Data Protection Act2017-03-09T10:16:49Z<p>H.Quartermaine: </p>
<hr />
<div>== The Data Protection Act ==<br />
[[File:Lock.jpg|right|frame|x200px]]<br />
The data protection act is in place to protect peoples data which is stored on servers and on companies computers.<br />
<br />
The Data Protection Act states that:<br />
* If you collect data, you must not use it for a different reason.<br />
* You must not share data with external sources.<br />
* People have the right to see data about themselves.<br />
* You must not keep data for longer than you need to and it must be up-to-date.<br />
* You must not send data outside the European Economic Area (EEA) to an area with lower protection.<br />
* People who store data must be registered with the Information Commissioner’s Office (ICO).<br />
* If you store data, the data must be protected and safe.<br />
* If companies have information about you that is wrong, it is your right to as them to change it.<br />
<br />
==Your right to view/request==<br />
<br />
*You can ask the organisation you think is holding, using or sharing the personal information you want, to supply you with copies of both paper and computer records and related information.<br />
<br />
*Data requests are fulfilled by an appointed data controller at an organisation.<br />
<br />
*Organisations may charge a fee of up to £10 (£2 if it is a request to a credit reference agency for information about your financial standing only).<br />
<br />
*There are special rules that apply to fees for paper based health records (the maximum fee is currently £50) and education records (a sliding scale from £1 to £50 depending on the number of pages provided).<br />
<br />
*However, it is important to remember that not all personal information is covered and there are ‘exemptions’ within the Act which may allow an organisation to refuse to comply with your subject access request in certain circumstances.</div>H.Quartermainehttps://www.trccompsci.online/mediawiki/index.php?title=Data_Protection_Act&diff=1909Data Protection Act2017-03-09T10:13:59Z<p>H.Quartermaine: </p>
<hr />
<div>== The Data Protection Act ==<br />
[[File:Lock.jpg|right|frame|x200px]]<br />
The data protection act is in place to protect peoples data which is stored on servers and on companies computers.<br />
<br />
The Data Protection Act states that:<br />
* If you collect data, you must not use it for a different reason.<br />
* You must not share data with external sources.<br />
* People have the right to see data about themselves.<br />
* You must not keep data for longer than you need to and it must be up-to-date.<br />
* You must not send data outside the European Economic Area (EEA) to an area with lower protection.<br />
* People who store data must be registered with the Information Commissioner’s Office (ICO).<br />
* If you store data, the data must be protected and safe.<br />
* If companies have information about you that is wrong, it is your right to as them to change it.<br />
<br />
==Your right to view/request==<br />
<br />
If a company is holding data on you then you have a right to know what data is being kept. By following certain steps you can request this data.<br />
<br />
*</div>H.Quartermainehttps://www.trccompsci.online/mediawiki/index.php?title=Data_Protection_Act&diff=1899Data Protection Act2017-03-09T09:54:45Z<p>H.Quartermaine: </p>
<hr />
<div>== The Data Protection Act ==<br />
[[File:Lock.jpg|right|frame|x200px]]<br />
The data protection act is in place to protect peoples data which is stored on servers and on companies computers.<br />
<br />
The Data Protection Act states that:<br />
* If you collect data, you must not use it for a different reason.<br />
* You must not share data with external sources.<br />
* People have the right to see data about themselves.<br />
* You must not keep data for longer than you need to and it must be up-to-date.<br />
* You must not send data outside the European Economic Area (EEA) to an area with lower protection.<br />
* People who store data must be registered with the Information Commissioner’s Office (ICO).<br />
* If you store data, the data must be protected and safe.<br />
* If companies have information about you that is wrong, it is your right to as them to change it.<br />
<br />
===Your right to view/request===</div>H.Quartermainehttps://www.trccompsci.online/mediawiki/index.php?title=Software_can_produce_great_good_but_with_it_come_the_ability_to_do_great_harm_-_BE&diff=1538Software can produce great good but with it come the ability to do great harm - BE2017-02-16T10:23:27Z<p>H.Quartermaine: /* Background: */</p>
<hr />
<div>==Background:==<br />
There are both advantages and disadvantages to the software we use in our daily lives, from apps on your mobile phone to self service terminals at supermarkets. However there are some services the majority of people won't have heard of in their lives never mind used, these are services like the TOR project which aims to make tracking of users much harder in order to allow private communications across a less open internet. Although TOR was initially created for use by the us military it was released to the wider public in 2004 raising many concerns to its reliability.<br />
<br />
==Benefits:==<br />
Meep<br />
<br />
==Drawbacks:==</div>H.Quartermainehttps://www.trccompsci.online/mediawiki/index.php?title=Software_can_produce_great_good_but_with_it_come_the_ability_to_do_great_harm_-_BE&diff=1530Software can produce great good but with it come the ability to do great harm - BE2017-02-16T10:14:51Z<p>H.Quartermaine: </p>
<hr />
<div>==Background:==<br />
<br />
==Benefits:==<br />
<br />
==Drawbacks:==</div>H.Quartermainehttps://www.trccompsci.online/mediawiki/index.php?title=Software_can_produce_great_good_but_with_it_come_the_ability_to_do_great_harm&diff=1529Software can produce great good but with it come the ability to do great harm2017-02-16T10:14:13Z<p>H.Quartermaine: </p>
<hr />
<div>== How it can be beneficial: ==<br />
one of the main benefit of advancement of software is that we can utilize it in such a way in that we can advance the medical field. For example, we will be able to use software to create a 3D representation of the human anatomy that we can then impalement into people who need replacements like hip and shoulder joints. Another one of the major benefits of software is that we can augment what we actually see. This is good in different fields like construction, health care and military. An example of this is in the army, This is because they use a device like a Microsoft Holo Lens and they can then detect when a enemy is present but it detects that one of there own is also there and it blocks them out.</div>H.Quartermainehttps://www.trccompsci.online/mediawiki/index.php?title=Software_can_produce_great_good_but_with_it_come_the_ability_to_do_great_harm&diff=1524Software can produce great good but with it come the ability to do great harm2017-02-16T10:10:31Z<p>H.Quartermaine: </p>
<hr />
<div>==Background:==<br />
<br />
== How it can be beneficial: ==<br />
one of the main benefit of advancement of software is that we can utilize it in such a way in that we can advance the medical field. For example, we will be able to use software to create a 3D representation of the human anatomy that we can then impalement into people who need replacements like hip and shoulder joints. Another one of the major benefits of software is that we can augment what we actually see. This is good in different fields like construction, health care and military. An example of this is in the army, This is because they use a device like a Microsoft Holo Lens and they can then detect when a enemy is present but it detects that one of there own is also there and it blocks them out.<br />
<br />
<br />
==Drawbacks:==</div>H.Quartermainehttps://www.trccompsci.online/mediawiki/index.php?title=Software_can_produce_great_good_but_with_it_come_the_ability_to_do_great_harm&diff=1522Software can produce great good but with it come the ability to do great harm2017-02-16T10:10:00Z<p>H.Quartermaine: </p>
<hr />
<div>==Background==<br />
<br />
== How it can be beneficial: ==<br />
one of the main benefit of advancement of software is that we can utilize it in such a way in that we can advance the medical field. For example, we will be able to use software to create a 3D representation of the human anatomy that we can then impalement into people who need replacements like hip and shoulder joints. Another one of the major benefits of software is that we can augment what we actually see. This is good in different fields like construction, health care and military. An example of this is in the army, This is because they use a device like a Microsoft Holo Lens and they can then detect when a enemy is present but it detects that one of there own is also there and it blocks them out.<br />
<br />
<br />
==Drawbacks:==</div>H.Quartermainehttps://www.trccompsci.online/mediawiki/index.php?title=Software_can_produce_great_good_but_with_it_come_the_ability_to_do_great_harm&diff=1518Software can produce great good but with it come the ability to do great harm2017-02-16T10:04:03Z<p>H.Quartermaine: </p>
<hr />
<div><br />
<br />
== How it can be beneficial: ==<br />
one of the main benefit of advancement of software is that we can utilize it in such a way in that we can advance the medical field. For example, we will be able to use software to create a 3D representation of the human anatomy that we can then impalement into people who need replacements like hip and shoulder joints. Another one of the major benefits of software is that we can augment what we actually see. This is good in different fields like construction, health care and military. An example of this is in the army, This is because they use a device like a Microsoft Holo Lens and they can then detect when a enemy is present but it detects that one of there own is also there and it blocks them out.<br />
<br />
<br />
==Drawbacks:==</div>H.Quartermainehttps://www.trccompsci.online/mediawiki/index.php?title=Software_can_produce_great_good_but_with_it_come_the_ability_to_do_great_harm&diff=1517Software can produce great good but with it come the ability to do great harm2017-02-16T10:03:35Z<p>H.Quartermaine: </p>
<hr />
<div><br />
<br />
== How it can be beneficial: ==<br />
one of the main benefit of advancement of software is that we can utilize it in such a way in that we can advance the medical field. For example, we will be able to use software to create a 3D representation of the human anatomy that we can then impalement into people who need replacements like hip and shoulder joints. Another one of the major benefits of software is that we can augment what we actually see. This is good in different fields like construction, health care and military. An example of this is in the army, This is because they use a device like a Microsoft Holo Lens and they can then detect when a enemy is present but it detects that one of there own is also there and it blocks them out.<br />
<br />
<br />
==Drawbacks==</div>H.Quartermainehttps://www.trccompsci.online/mediawiki/index.php?title=Communication_Methods&diff=1051Communication Methods2016-12-31T13:06:17Z<p>H.Quartermaine: </p>
<hr />
<div>==Parallel Vs Serial==<br />
[[File:SVP.png]]<br />
==Serial Data Transmission==<br />
<br />
In serial data transmission each bit is sent one after another by varying the line voltage between 0 & 5 volts for each bit, for two way communication a return wire is required. Serial Data Transmission is commonly used in USB and crossover cables.<br />
<br />
===Uses=== <br />
Long distance communication<br />
<br />
===Advantages===<br />
Only need one signal path per way, can be used to route over telecommunications, saves cost of cabling<br />
<br />
===Disadvantages===<br />
Signal strength degrades over distance, so repeaters and so on required<br />
<br />
<br />
<br />
==Parallel Data Transmission==<br />
<br />
Each binary word is transmitted as one, with a signal path for each bit, additional signal paths for Return, Ready/Busy, & one strobe wire are required Ready/Busy is the status of the receiver, strobe wire used after signal placed onto wires on Strobe receiver will set Busy & read after read the receiver sets Ready.<br />
<br />
===Uses===<br />
Short distance data communication<br />
<br />
===Advantages===<br />
Offers faster transmission when compared to Serial<br />
<br />
===Disadvantages===<br />
Skew can easily affect data transmission, leading to errors. This is a result of distance, some bits may arrive at slightly different times. Reading the value could be inaccurate if you read before all bits have arrived.<br />
<br />
[[File:Skew.png]]<br />
<br />
==Baud Rate==<br />
Frequency at which a signal can change (ie from 0 to 5 volt), a baud signal of one changes once per second<br />
<br />
[[File:baudrate.png]]<br />
<br />
==Bit Rate==<br />
Number of bits transmitted per second, bit rate does not equal Baud rate if more than one bit is sent per time, 2 bits can be sent each time with more voltage levels.<br />
<br />
==Bandwidth==<br />
How fast data can be transmitted over a transmission media without significant reduction in strength greater bandwidth means greater the data rate can be sent there is a direct relationship between bit rate and bandwidth. The greater the bandwidth of the transmission system, the higher is the bit rate that can be transmitted over that system.<br />
On a cable, bandwidth is measured in Mhz, network Cable has 500 Mhz bandwidth which means 500 million cycles per second more cycles = more data.<br />
<br />
<br />
==Latency==<br />
It is the time delay between initiation and the first effect, WAN latency due to distance eg: between ground stations and satellites<br />
<br />
===Propagation Latency===<br />
Time taken to pass through a logic gate<br />
<br />
===Transmission Latency===<br />
Time taken to pass through a medium<br />
<br />
===Processing Latency===<br />
Time taken to pass around a network<br />
<br />
==Protocols==<br />
Is a set of agreed:<br />
*Rules<br />
*Codes<br />
*Signals<br />
That allow the transfer of data from one system to another<br />
And consists of:<br />
*Handshake<br />
*Message<br />
*Goodbye<br />
<br />
There are multiple commonly used protocols:<br />
===TCP/IP and UDP===<br />
Sending and receiving data over a network<br />
===HTTP and HTTPS===<br />
Retrieve pages from the world wide web<br />
===FTP===<br />
Transfer and upload files, often anonymously<br />
===TELNET, SSH===<br />
To connect to and manage a server<br />
===POP3 and SMTP===<br />
Send and receive email<br />
<br />
==Handshaking==<br />
Handshaking sets several variables required for the data transmission:<br />
*Communication protocol<br />
*Pre-agreed signal, codes, rules to ensure successful transmission<br />
Sender checks receiver is connected & ready<br />
Sender waits for response<br />
Sender signals it will start sending data <br />
Receiver signals ready, and sender sends data<br />
Receiver indicates data received & ready<br />
<br />
Communication protocol<br />
Pre-agreed signal, codes, rules to ensure successful transmission<br />
Handshaking protocol - Exchange of signals to establish a connection<br />
Sender checks receiver is connected & ready<br />
Sender waits for response<br />
Sender signals it will start sending data <br />
Receiver signals ready, and sender sends data<br />
Receiver indicates data received & ready<br />
<br />
Communication protocol<br />
Pre-agreed signal, codes, rules to ensure successful transmission<br />
Handshaking protocol - Exchange of signals to establish a connection<br />
Sender checks receiver is connected & ready<br />
Sender waits for response<br />
Sender signals it will start sending data <br />
Receiver signals ready, and sender sends data<br />
Receiver indicates data received & ready<br />
<br />
==Asynchronous Transmission==<br />
one character is transmitted at a time using start and stop bits to identify the beginning and the end of the character. A parity bit is usually sent to allow for checking for errors during the transmission. It is suitable for relatively small amounts of data.<br />
<br />
==Synchronous vs Asynchronous==<br />
Synchronous means at the same time<br />
*2 devices will synchronise their transmission signals (based on system clock)<br />
*Sending device will control transmission rate to match receiving device<br />
*Once synchronised data can be sent with no other information<br />
*If devices aren’t synchronised data will be lost<br />
Asynchronous is simply transmission between 2 devices that don’t share a common clock signal.<br />
<br />
==Start & Stop Bits==<br />
*Arrival of data signaled by start bit<br />
*Arrival can’t be predicted so it wakes receiver<br />
*Clock & timing must match on both machines<br />
*End of transmission is signaled by a stop bit<br />
*Each unit of data is transmitted separately with start & stop bits</div>H.Quartermainehttps://www.trccompsci.online/mediawiki/index.php?title=Communication_Methods&diff=1039Communication Methods2016-12-31T12:29:19Z<p>H.Quartermaine: </p>
<hr />
<div><br />
[[File:SVP.png]]<br />
<br />
<br />
<br />
==Serial Data Transmission==<br />
<br />
In serial data transmission each bit is sent one after another by varying the line voltage between 0 & 5 volts for each bit, for two way communication a return wire is required. Serial Data Transmission is commonly used in USB and crossover cables.<br />
<br />
===Uses=== <br />
Long distance communication<br />
<br />
===Advantages===<br />
Only need one signal path per way, can be used to route over telecommunications, saves cost of cabling<br />
<br />
===Disadvantages===<br />
Signal strength degrades over distance, so repeaters and so on required<br />
<br />
<br />
<br />
==Parallel Data Transmission==<br />
<br />
Each binary word is transmitted as one, with a signal path for each bit, additional signal paths for Return, Ready/Busy, & one strobe wire are required Ready/Busy is the status of the receiver, strobe wire used after signal placed onto wires on Strobe receiver will set Busy & read after read the receiver sets Ready.<br />
<br />
===Uses===<br />
Short distance data communication<br />
<br />
===Advantages===<br />
Offers faster transmission when compared to Serial<br />
<br />
===Disadvantages===<br />
Skew can easily affect data transmission, leading to errors<br />
[[File:Skew.png]]<br />
<br />
<br />
<br />
==Baud Rate==<br />
Frequency at which a signal can change (ie from 0 to 5 volt), a baud signal of one changes once per second<br />
<br />
[[File:baudrate.png]]<br />
<br />
==Bit Rate==<br />
Number of bits transmitted per second, bit rate does not equal Baud rate if more than one bit is sent per time, 2 bits can be sent each time with more voltage levels.<br />
<br />
==Bandwidth==<br />
How fast data can be transmitted over a transmission media without significant reduction in strength greater bandwidth means greater the data rate can be sent there is a direct relationship between bit rate and bandwidth. The greater the bandwidth of the transmission system, the higher is the bit rate that can be transmitted over that system.<br />
On a cable, bandwidth is measured in Mhz, network Cable has 500 Mhz bandwidth which means 500 million cycles per second more cycles = more data.<br />
<br />
<br />
==Latency==<br />
It is the time delay between initiation and the first effect, WAN latency due to distance eg: between ground stations and satellites<br />
<br />
===Propagation Latency===<br />
Time taken to pass through a logic gate<br />
<br />
===Transmission Latency===<br />
Time taken to pass through a medium<br />
<br />
===Processing Latency===<br />
Time taken to pass around a network<br />
<br />
==Protocols==<br />
Is a set of agreed:<br />
*Rules<br />
*Codes<br />
*Signals<br />
That allow the transfer of data from one system to another<br />
And consists of:<br />
*Handshake<br />
*Message<br />
*Goodbye</div>H.Quartermainehttps://www.trccompsci.online/mediawiki/index.php?title=File:Baudrate.png&diff=1034File:Baudrate.png2016-12-31T12:17:29Z<p>H.Quartermaine: </p>
<hr />
<div></div>H.Quartermainehttps://www.trccompsci.online/mediawiki/index.php?title=File:SVP.png&diff=1033File:SVP.png2016-12-31T12:13:46Z<p>H.Quartermaine: </p>
<hr />
<div></div>H.Quartermainehttps://www.trccompsci.online/mediawiki/index.php?title=Communication_Methods&diff=1032Communication Methods2016-12-31T12:12:30Z<p>H.Quartermaine: </p>
<hr />
<div>==Serial Data Transmission==<br />
<br />
In serial data transmission each bit is sent one after another by varying the line voltage between 0 & 5 volts for each bit, for two way communication a return wire is required. Serial Data Transmission is commonly used in USB and crossover cables.<br />
<br />
===Uses=== <br />
Long distance communication<br />
<br />
===Advantages===<br />
Only need one signal path per way, can be used to route over telecommunications, saves cost of cabling<br />
<br />
===Disadvantages===<br />
Signal strength degrades over distance, so repeaters and so on required<br />
<br />
<br />
<br />
==Parallel Data Transmission==<br />
<br />
Each binary word is transmitted as one, with a signal path for each bit, additional signal paths for Return, Ready/Busy, & one strobe wire are required Ready/Busy is the status of the receiver, strobe wire used after signal placed onto wires on Strobe receiver will set Busy & read after read the receiver sets Ready.<br />
<br />
===Uses===<br />
Short distance data communication<br />
<br />
===Advantages===<br />
Offers faster transmission when compared to Serial<br />
<br />
===Disadvantages===<br />
Skew can easily affect data transmission, leading to errors<br />
[[File:Skew.png]]</div>H.Quartermainehttps://www.trccompsci.online/mediawiki/index.php?title=Communication_Methods&diff=1030Communication Methods2016-12-31T12:11:55Z<p>H.Quartermaine: </p>
<hr />
<div>==Serial Data Transmission==<br />
<br />
In serial data transmission each bit is sent one after another by varying the line voltage between 0 & 5 volts for each bit, for two way communication a return wire is required. Serial Data Transmission is commonly used in USB and crossover cables.<br />
<br />
===Uses=== <br />
Long distance communication<br />
<br />
===Advantages===<br />
Only need one signal path per way, can be used to route over telecommunications, saves cost of cabling<br />
<br />
===Disadvantages===<br />
Signal strength degrades over distance, so repeaters and so on required<br />
<br />
<br />
<br />
==Parallel Data Transmission==<br />
<br />
Each binary word is transmitted as one, with a signal path for each bit, additional signal paths for Return, Ready/Busy, & one strobe wire are required Ready/Busy is the status of the receiver, strobe wire used after signal placed onto wires on Strobe receiver will set Busy & read after read the receiver sets Ready.<br />
<br />
===Uses===<br />
Short distance data communication<br />
<br />
===Advantages===<br />
Offers faster transmission when compared to Serial<br />
<br />
===Disadvantages===<br />
Skew can easily affect data transmission, leading to errors<br />
[[File:Skew.PNG]]</div>H.Quartermainehttps://www.trccompsci.online/mediawiki/index.php?title=File:Skew.png&diff=1028File:Skew.png2016-12-31T12:10:57Z<p>H.Quartermaine: </p>
<hr />
<div></div>H.Quartermainehttps://www.trccompsci.online/mediawiki/index.php?title=Communication_Methods&diff=1026Communication Methods2016-12-31T12:09:13Z<p>H.Quartermaine: </p>
<hr />
<div>==Serial Data Transmission==<br />
<br />
In serial data transmission each bit is sent one after another by varying the line voltage between 0 & 5 volts for each bit, for two way communication a return wire is required. Serial Data Transmission is commonly used in USB and crossover cables.<br />
<br />
===Uses=== <br />
Long distance communication<br />
<br />
===Advantages===<br />
Only need one signal path per way, can be used to route over telecommunications, saves cost of cabling<br />
<br />
===Disadvantages===<br />
Signal strength degrades over distance, so repeaters and so on required<br />
<br />
==Parallel Data Transmission==<br />
<br />
Each binary word is transmitted as one, with a signal path for each bit, additional signal paths for Return, Ready/Busy, & one strobe wire are required Ready/Busy is the status of the receiver, strobe wire used after signal placed onto wires on Strobe receiver will set Busy & read after read the receiver sets Ready.<br />
<br />
===Uses===<br />
Short distance data communication<br />
<br />
===Advantages===<br />
Offers faster transmission when compared to Serial<br />
<br />
===Disadvantages===<br />
Skew can easily affect data transmission, leading to errors</div>H.Quartermainehttps://www.trccompsci.online/mediawiki/index.php?title=Communication_Methods&diff=1013Communication Methods2016-12-31T11:42:05Z<p>H.Quartermaine: </p>
<hr />
<div>=Serial Data Transmission=<br />
<br />
In serial data transmission each bit is sent one after another by varying the line voltage between 0 & 5 volts for each bit, for two way communication a return wire is required. Serial Data Transmission is commonly used in USB and crossover cables.<br />
===Uses=== <br />
Long distance communication<br />
===Why===<br />
Only need one signal path per way, can be used to route over telecommunications, saves cost of cabling<br />
===But===<br />
Signal strength degrades over distance, so repeaters and so on required</div>H.Quartermainehttps://www.trccompsci.online/mediawiki/index.php?title=Communication_Methods&diff=1012Communication Methods2016-12-31T11:40:40Z<p>H.Quartermaine: Created page with "=Serial Data Transmission= In serial data transmission each bit is sent one after another by varying the line voltage between 0 & 5 volts for each bit, for two way communicat..."</p>
<hr />
<div>=Serial Data Transmission=<br />
<br />
In serial data transmission each bit is sent one after another by varying the line voltage between 0 & 5 volts for each bit, for two way communication a return wire is required. Serial Data Transmission is commonly used in USB and crossover cables.<br />
Uses – Long distance communication<br />
Why – Only need one signal path per way, can be used to route over telecommunications, saves cost of cabling<br />
But – signal strength degrades over distance, so repeaters and so on required</div>H.Quartermainehttps://www.trccompsci.online/mediawiki/index.php?title=Client_Server_/_Peer_to_Peer&diff=883Client Server / Peer to Peer2016-12-21T13:16:50Z<p>H.Quartermaine: </p>
<hr />
<div>'''Client-Server'''<br />
<br />
In client-server networks, client devices make requests for network services to servers, multiple servers may be used for different services. A large network may have a file server, print server, email server, back-up etc. All data is stored on a central server that users can then access, this makes it easier to back up data as it is all in one place. Login servers can be used allowing user accounts and passwords to be the same across all machines, allowing for easy control over access rights.<br />
<br />
'''Peer-Peer''''<br />
<br />
Unlike Client-Server networks, there are no dedicated servers in peer-peer networks. Each workstation in the network acts as both client and server, leaving each individual user to choose what is to be shared between workstations. If passwords are required they are have to be changed individually between multiple devices, making these kind of networks extremely difficult to scale into large organisations. They are also more insecure due to permission management of shares being managed individually.</div>H.Quartermainehttps://www.trccompsci.online/mediawiki/index.php?title=Client_Server_/_Peer_to_Peer&diff=882Client Server / Peer to Peer2016-12-21T13:10:42Z<p>H.Quartermaine: Created page with "'''Client-Server''' In client-server networks, client devices make requests for network services to servers, multiple servers may be used for different services. A large netw..."</p>
<hr />
<div>'''Client-Server'''<br />
<br />
In client-server networks, client devices make requests for network services to servers, multiple servers may be used for different services. A large network may have a file server, print server, email server, back-up etc. All data is stored on a central server that users can then access, this makes it easier to back up data as it is all in one place. Login servers can be used allowing user accounts and passwords to be the same across all machines, allowing for easy control over access rights</div>H.Quartermaine