Umaima Zeeshan
Topic 1 Hardware and software
1.1 Hardware
What are contemporary digital devices?
Contemporary digital devices are electronic devices that have become ubiquitous in modern society. They
are designed to make our lives easier and more convenient, by providing us with access to information,
communication, and entertainment. Examples of contemporary digital devices include smartphones,
laptops, tablets, desktops, smartwatches, gaming consoles, digital cameras, and many others. These devices
are constantly evolving, with new features and functions being added to meet the changing needs of users.
What are the features and functions of contemporary digital devices?
Contemporary digital devices typically have a wide range of features and functions, including:
● Portability: Refers to the device's size and weight, making it convenient for users to carry and use it
on the go.
● Performance: Describes the processing power, speed, and memory of a device, which determine its
ability to run multiple applications and tasks simultaneously.
● Storage: Refers to the device's internal storage capacity, typically measured in gigabytes (GB) or
terabytes (TB), and the ability to store and access data and files.
● User interface: The graphical and/or command-line interface that allows users to interact with the
device, such as touch screens, buttons, and keyboards.
● Connectivity: Refers to the device's ability to connect to other devices or networks using various
cable types such as USB, HDMI, Wi-Fi, and others.
● Media support: Refers to the device's ability to play and display various types of media such as
audio, video, and images.
● Energy consumption: Refers to the amount of energy consumed by the device, and its impact on
battery life and environmental sustainability.
● Expansion capability: Refers to the ability to add or upgrade the device's components, such as
RAM, storage, or graphics card.
● Security features: Refers to the device's built-in security features, such as encryption, password
protection, biometric authentication, and others, to protect against unauthorized access to the
device and its data.
These are some of the most common features and functions found on contemporary digital devices, but the
exact set of features may vary between different devices.
Types of contemporary digital devices with examples
● computers (desktop PCs, tablets, smart TVs, games consoles, microprocessors/single board
computers, wearable computers, supercomputers)
● peripheral devices (keyboards, mouses, joysticks, microphones, scanners, monitors, speakers,
printers, video cameras, webcams, touch screens, graphics tablets, biometric scanners, barcode
readers, chip and pin devices, sensors)
● mobile phones (smartphones)
Umaima Zeeshan
● storage devices (magnetic storage, solid state, and optical hard drives, magnetic tape drives,
removable solid-state (SSID) cards, network-attached storage (NAS), RAID storage)
Storage devices
● Magnetic storage: Magnetic storage devices use magnetic fields to store and retrieve data on
spinning disks. Examples include traditional hard disk drives (HDD) and floppy disk drives.
● Solid-state drives (SSD): Solid-state drives use NAND flash memory to store and retrieve data,
providing faster access to data than traditional magnetic drives.
● Optical hard drives: Optical hard drives use laser beams to read and write data on spinning disks.
They are typically used for archiving large amounts of data, as they have a longer lifespan than
traditional magnetic drives.
● Magnetic tape drives: Magnetic tape drives store data on a continuous strip of magnetic tape. They
are used for backup and archive purposes, as they provide a low-cost method of storing large
amounts of data.
● Removable solid-state (SSID) cards: Removable solid-state cards are small, portable storage devices
that use NAND flash memory to store and retrieve data. Examples include Secure Digital (SD)
cards and Micro SD cards.
● Network-attached storage (NAS): Network-attached storage devices are standalone storage devices
that connect to a network, allowing multiple users to access and store data on a single device.
● RAID storage: RAID (Redundant Array of Inexpensive Disks) storage uses multiple hard drives to
provide data redundancy, performance improvement, and larger storage capacity. There are various
RAID levels, each with different benefits and drawbacks.
Understand the technologies used by digital devices and how they impact the design and use of
devices:
● Global Positioning System (GPS): GPS technology uses a network of satellites to determine the
location of a device, allowing for location-based services and navigation.
● Biometrics: Biometric technology uses unique physical characteristics, such as fingerprints, facial
recognition, and iris scans, to identify and authenticate users.
● Touchscreen: Touchscreen technology allows users to interact with a device using touch gestures,
such as tapping, swiping, and pinch-to-zoom, eliminating the need for physical buttons.
● Sensors: Sensors allow digital devices to detect and respond to the physical environment, such as
accelerometers, gyroscopes, and magnetometers.
● Memory: Memory technology, such as RAM and flash memory, is used to store and retrieve data
and information on a device, allowing for fast access to data.
● Storage: Storage technology, such as hard drives, solid-state drives, and removable flash cards,
provides long-term storage for data and files on a device.
● Battery power: Battery technology powers digital devices, and improvements in battery technology
have allowed for longer battery life and faster charging times.
● Miniaturization: Miniaturisation technology allows for smaller and more compact devices, making
them more portable and convenient to use.
● Processor: Processor technology, such as CPU and GPU, provides the processing power necessary
for a device to run applications and perform tasks.
Umaima Zeeshan
● Radio-frequency identification (RFID): RFID technology uses radio waves to communicate
between devices, allowing for wireless identification and tracking of objects.
● Near-field communication (NFC): NFC technology allows for short-range wireless communication
between devices, allowing for simple and secure data transfer.
● Quick response (QR) code: QR code technology uses a two-dimensional barcode to encode
information, allowing for quick and convenient transfer of data between devices.
● Connectivity: Connectivity technology, such as Wi-Fi, Bluetooth, and cellular networks, allows for
communication and data transfer between devices and networks.
The term ‘technological convergence’ in the context of digital devices.
Technological convergence refers to the integration of multiple technologies into a single device or system.
In the context of digital devices, technological convergence means that devices are becoming more versatile
and capable of performing multiple tasks, such as communication, entertainment, and computing, in a
single device. This convergence is made possible by the development of new technologies and the integration
of existing technologies into a single platform.
For example, a smartphone is a device that converges multiple technologies, including communication (e.g.,
voice, text, and data), entertainment (e.g., music, video, and games), and computing (e.g., productivity apps,
internet browsing), into a single device that is portable and easily accessible. Technological convergence is
changing the way we interact with technology and transforming the digital landscape, making it more
convenient, accessible, and integrated into our daily lives.
The concept of and the need for features and functions of embedded systems
Embedded systems are computer systems that are integrated into other devices or products and perform
specific functions. They are designed to perform a specific task and are used in a variety of applications,
including consumer electronics, automobiles, medical devices, and industrial control systems.
The need for features and functions of embedded systems is driven by the requirement for specialized,
real-time, and low-power processing capabilities in these devices. These systems need to be efficient and
reliable, as they often control critical systems or perform safety-critical functions. Some of the key features
and functions of embedded systems include:
● Real-time performance: Embedded systems often need to perform specific tasks in real-time,
meaning they need to respond to events and changes in their environment within a specific time
frame.
● Low-power consumption: Embedded systems often operate on limited power sources, such as
batteries, and need to be designed to minimize power consumption.
● Reliability: Embedded systems need to be highly reliable as they often control critical systems or
perform safety-critical functions.
● Small size: Embedded systems need to be small and compact to be integrated into other devices and
products.
● Ease of programming: Embedded systems need to be easy to program and maintain, as they are
often used in applications that require frequent updates or changes.
Umaima Zeeshan
● Interoperability: Embedded systems often need to communicate and interact with other systems,
devices, or networks, and need to be designed to be interoperable with these other systems.
● Cost-effectiveness: Embedded systems need to be cost-effective.
The concept of and the need for firmware, including where it is stored:
Firmware is a type of software that is stored in non-volatile memory, such as read-only memory (ROM),
flash memory, or electrically erasable programmable read-only memory (EEPROM), and is used to control
the behavior of hardware devices. It provides low-level control for the device and is responsible for tasks such
as initializing the hardware, executing low-level control functions, and responding to requests from the
operating system.
The need for firmware is driven by the requirement to provide low-level control for hardware devices, as well
as the need to create a separation between the hardware and software components of a device. This
separation allows the hardware and software components to be designed and developed independently, and
makes it easier to update or change the software without affecting the hardware.
Firmware is stored in the non-volatile memory of the device and is typically integrated into the hardware
during the manufacturing process. This makes firmware a crucial part of the device, as it is responsible for
controlling the device's behavior and ensuring that it operates correctly. The location of firmware varies
depending on the device, but it is typically stored in a dedicated memory chip on the device's motherboard
or in the memory of the device itself.
In summary, firmware is an essential component of many digital devices and is needed to provide low-level
control and to separate the hardware and software components of the device. It is stored in non-volatile
memory, such as ROM or flash memory, and is integrated into the device during the manufacturing process.
Factors that can be used to assess the performance of digital devices:
a. Speed: The speed of a digital device refers to how quickly it can process data and complete tasks. This can
be measured in terms of clock speed, processing power, or data transfer rates.
b. Capacity: The capacity of a digital device refers to its ability to store data. This can be measured in terms
of the amount of storage space available, such as gigabytes (GB) or terabytes (TB), or the number of files that
can be stored on the device.
c. Portability: The portability of a digital device refers to its ability to be easily carried and used in different
locations. This can be assessed by factors such as size, weight, and battery life.
d. Bandwidth: Bandwidth refers to the amount of data that can be transferred between two points in a given
period of time. This is important for digital devices that need to transfer large amounts of data, such as
streaming video or downloading files.
Umaima Zeeshan
e. Power efficiency: Power efficiency refers to how much energy a digital device uses in relation to its
performance. This can be assessed by measuring the device's battery life or the amount of power it consumes
when in use.
These factors can be used to assess the performance of digital devices and help determine which devices are
best suited for specific tasks or applications. By considering these factors, it is possible to make informed
decisions about which devices to use and how to optimize their performance.
How to calculate data file size and time needed to transmit a file
● File size: The file size can be measured in bytes, kilobytes (KB), megabytes (MB), gigabytes (GB), or
terabytes (TB). The file size can be determined by right-clicking on the file and selecting
"Properties" or "Get Info".
● Data transfer rate: The data transfer rate refers to the speed at which data is transmitted, measured
in bits per second (bps). Common data transfer rates include kilobits per second (Kbps), megabits
per second (Mbps), and gigabits per second (Gbps).
To calculate the time needed to transmit a file, you can use the following formula:
Time = File size / Data transfer rate
For example, if you have a file with a size of 100 MB and a data transfer rate of 10 Mbps, the time needed to
transmit the file would be:
Time = 100 MB / (10 Mbps / 8) = 100 MB / 1.25 MB/s = 80 seconds
Note that the data transfer rate in this example is converted from Mbps to MB/s by dividing by 8. This
conversion is necessary because the file size is typically measured in bytes, while the data transfer rate is
measured in bits.
How to convert between binary and denary, as defined by the International Electrotechnical
Commission
Binary to Denary:
Write down the binary number to be converted.
Start from the rightmost digit and assign it a value of 2^0 (1).
For each subsequent digit to the left, double the previous value and add 1.
For each digit in the binary number that is 1, add the corresponding value to the total.
The total is the denary equivalent of the binary number.
Denary to Binary:
Write down the denary number to be converted.
Umaima Zeeshan
Divide the number by 2 and record the quotient and remainder.
Repeat step 2 until the quotient is 0.
Write down the remainders in reverse order to get the binary equivalent of the denary number.
For example, to convert the denary number 12 to binary, you would follow these steps:
12 / 2 = 6 with a remainder of 0
6 / 2 = 3 with a remainder of 0
3 / 2 = 1 with a remainder of 1
1 / 2 = 0 with a remainder of 1
The binary equivalent of 12 is 1100.
It's important to note that the IEC defines binary and denary as a way of counting and organizing numbers,
but the actual conversion process is universal.
1.2 Software
The purpose of systems software and applications software
● Systems software: Systems software refers to software that provides the underlying functionality
and services for a computer system. It includes operating systems, device drivers, utility programs,
and firmware. The purpose of systems software is to manage the hardware and software resources of
a computer and provide a platform for other software to run on.
● Applications software: Applications software refers to software designed for specific tasks and
functions, such as word processing, spreadsheet management, and gaming. Applications software is
built on top of systems software and utilizes the underlying services and resources provided by the
systems software. The purpose of applications software is to provide end-users with the tools they
need to complete specific tasks and work more efficiently.
The role of the operating system in managing:
● Devices: The operating system plays a crucial role in managing devices such as printers, keyboards,
mice, and other peripherals. It communicates with the hardware and ensures that the device is
recognized and functional. The operating system also controls the flow of data to and from the
device, ensuring that data is transmitted and received properly.
● Processes: The operating system is responsible for managing and scheduling processes, which are
the tasks that the computer is performing. It allocates resources such as memory and CPU time to
processes and decides which processes should run at any given time. The operating system also
monitors the execution of processes and terminates any that are not responding.
● Users: The operating system provides the means for multiple users to log in to a single computer
and work simultaneously. It manages user accounts, permissions, and access to resources. The
operating system ensures that each user has the necessary privileges to complete their tasks and that
their actions do not interfere with other users.
Umaima Zeeshan
● Security: The operating system plays a crucial role in ensuring the security of the computer and its
data. It provides mechanisms for controlling access to resources and data, such as user accounts and
permissions. The operating system also includes security features such as firewalls and anti-virus
software to protect against malicious attacks. Additionally, the operating system can monitor and
report on suspicious activity, such as unauthorized access attempts, to help prevent security
breaches.
The different sources of software and copyright types:
● Free software: Free software refers to software that is available to use and distribute for free, but may
still be subject to copyright restrictions. This type of software is usually distributed with a license
that allows for free use and distribution, but may restrict the user from making modifications to the
source code.
● Open-source software: Open-source software is software that is available with the source code and is
licensed in such a way that users are allowed to modify and distribute the software. The main idea
behind open-source software is to allow users to improve and customize the software as they see fit.
Open-source software is often developed collaboratively by a large community of developers.
● Proprietary software: Proprietary software is software that is owned by a specific individual or
company and is protected by copyright laws. This type of software is usually sold for a fee and the
source code is not made available to the public. Users are limited in what they can do with the
software and are usually restricted from making any modifications to the code.
● Creative Commons: Creative Commons is a type of copyright license that allows creators to share
their work with others while still retaining some control over how their work is used. Creative
Commons licenses vary in the extent to which they allow others to use and distribute the work, but
all require attribution to the original creator. Some Creative Commons licenses allow for
commercial use, while others restrict it.
Understand licensing options:
● Single user license: A single user license is a type of software license that allows only one person to
use the software on a single device. This type of license is commonly used for personal or home use.
● Multiple user license: A multiple user license is a type of software license that allows multiple
individuals to use the software on multiple devices. This type of license is commonly used in a
business or organizational setting, where multiple people need to use the same software.
● Institutional license: An institutional license is a type of software license that is intended for use by
educational institutions, such as schools or universities. This type of license often includes special
pricing and usage terms that are specific to the needs of educational institutions.
Umaima Zeeshan
● Fixed term license: A fixed term license is a type of software license that is valid for a specified period
of time, after which the license must be renewed or the software will no longer work. This type of
license is commonly used for subscription-based software.
● Indefinite license: An indefinite license is a type of software license that does not have an expiration
date and is valid for an unlimited period of time. This type of license is commonly used for
perpetual licenses, which allow the user to use the software indefinitely.
● Network license: A network license is a type of software license that allows multiple devices to
access the software simultaneously over a network. This type of license is commonly used in a
business or organizational setting, where multiple devices need to access the same software.
The purpose of, and how to manage, software updates:
● Patch: A patch is a software update that fixes specific bugs or security vulnerabilities in a software
program. The purpose of a patch is to address these issues and improve the stability and security of
the software. To manage software patches, it is recommended to regularly check for updates from
the software vendor and apply them in a timely manner.
● Automatic: Automatic software updates refer to the process of automatically downloading and
installing updates without user intervention. This can be convenient for users as it ensures that their
software is always up-to-date with the latest bug fixes and security patches. However, it is important
to ensure that the automatic update feature is enabled and configured properly to prevent any
potential compatibility issues.
● Upgrade: An upgrade is a software update that introduces new features or significantly improves
the functionality of a software program. Upgrades are usually offered by the software vendor and
may require the user to purchase a new license or pay a fee to access the new features. To manage
software upgrades, it is recommended to regularly check for new releases and consider the cost and
benefits before deciding to upgrade.
● Compatibility Issues: Compatibility issues occur when a software update is not compatible with the
hardware or other software programs installed on a user's system. This can result in errors or
unexpected behavior and can be a major concern for users. To avoid compatibility issues, it is
recommended to regularly check for updates and review the software vendor's documentation and
system requirements before installing any updates. Additionally, it is important to regularly back up
important data to protect against data loss in case of any unexpected issues.
●
How to select softwares to meet the needs and requirments of individuals and organistations
When selecting software to meet the needs and requirements of individuals and organizations, it is
important to follow these steps:
1. Identify the needs and requirements: First, identify the specific needs and requirements of the
individual or organization. This may include the type of software needed, the specific features
required, and the budget.
2. Research options: Once you have identified the needs and requirements, research the available
software options. Look for software that meets the specific requirements and fits within the budget.
You can do this by reading reviews, asking for recommendations, and comparing features and
pricing.
3. Evaluate the software: After identifying potential software options, evaluate each option to
determine if it meets the specific requirements. This may involve testing the software or watching
demos to ensure that it meets the needs of the individual or organization.
4. Consider scalability: When selecting software for an organization, it is important to consider
scalability. Look for software that can grow and evolve with the organization, rather than a
short-term solution that may need to be replaced in the future.
5. Consider support and training: Finally, when selecting software, consider the support and training
that is available. Look for software that has strong support options and resources, as well as training
and educational materials to help users get up to speed quickly.