Thursday 23 October 2014

Purpose and Function of the CPU - quiz






Purpose and function of the CPU


heatsink
1 (a) In a computer, what covers the microprocessor?
The Heat Sink

(b) Why is this needed?
To stop the microprocessor from overheating and becoming damaged

2. The microprocessor contains integrated circuits that make up the CPU.
(a) What do the initials CPU stand for?
Central Processing Unit
 
(b) Describe the functions of these components of the CPU.
(i) The control unit
The control unit is responsible for controlling much of the operation of the rest of the processor. It does this by issuing control signals to the other areas of the processor, instructing them on what should be performed next.
(ii) The Arithmetic and Logic unit (ALU)
The ALU carries out mathematical and logical computations.
(iii) Registers
Register are memory locations within the CPU itself for storing data and instructions. They are designed to be quickly accessed for fast data retrieval


3. List and describe the stages of the fetch-decode-execute cycle.
The Fetch-Decode-Execute cycle describes the basic steps a CPU carries out to process an instruction.

Fetch - The program Counter copies the address of the next instruction it contains into the Memory Address Register (MAR).  
Decode - The CPU examines the instruction in the current instruction register (CIR) and 'decodes' it. This means a special part of the CPU called the 'decode' unit will make the rest of the CPU ready to carry out the instruction. It does this by issuing a series of 'micro-instructions'.
Execute - The instruction within the instruction register is carried out (executed) by the CPU. The part that executes instructions is called the 'execute unit'.
Reset - Now that the CPU is executing an instruction, the Program counter can now be reset to point to the next instruction

This is the Fetch-Decode-Executecycle that is present in every sequential processing computer.

4. List three common household devices, other than computers, which contains microprocessors.

Ovens
Microwaves
Washing Machines

 



Friday 17 October 2014

Ethics

Wiki Leaks is an international, online, non-profit, journalistic organisation which publishes secret information, news leaks, and classified media from anonymous sources.

Julian Assange
He is the editor and chief of the website wiki Leaks, which he co-founded in 2006 after an earlier career in hacking and programming. He achieved particular prominence in 2010 when he published U.S. military and diplomatic documents leaked by Chelsea Manning onto Wiki Leaks. Assange has been under investigation in the United States since that time. In the same year, the Swedish Director of Public Prosecution opened an investigation into sexual offences that Assange is alleged to have committed. In 2012, facing extradition to Sweden, he was granted political asylum by Ecudor and took refuge at theEmbassy of Ecuador in London. 

Chelsea Manning
Chelsea Elizabeth Manning (born Bradley Edward Manning, December 17, 1987) is a United States Army soldier who was convicted in July 2013 of violations of the Espionage Act and other offenses, after releasing the largest set of classified documents ever to be leaked to the public. Manning was sentenced in August 2013 to 35 years' imprisonment, with the possibility of parole in the eighth year, and to be dishonaorably discharged from the Army. Manning is a trans woman who, in a statement the day after sentencing, said she had felt female since childhood, wanted to be known as Chelsea, and desired to begin hormone replacement therapy. From early life and through much of her Army life, Manning was known as Bradley; she was diagnosed with gender identity disorder while in the Army.
Assigned in 2009 to an Army unit in Iraq as an intelligence analyst, Manning had access to classified databases. In early 2010, she leaked classified information to WikiLeaks and confided this to Adrian Lamo, an online acquaintance. Lamo informed Army Courterintelligence, and Manning was arrested in May that same year. The material included videos of the July 12, 2007 Baghdad airstrike, and the 2009 Granai airstrike in Afghanistan; 250,000 U.S. diplomatic cables; and 500,000 Army reports that came to be known as the Iraq War logs and Afghan War logs. Much of the material was published by WikiLeaks or its media partners between April and November 2010.
Manning was ultimately charged with 22 offenses, including aiding the enemy, which was the most serious charge and could have resulted in a death sentence. She was held at the Marine Corps Brig, Quantico in Virginia, from July 2010 to April 2011 under Prevention of Injury status—which entailed de facto solitary confinement and other restrictions that caused domestic and international concern—before being transferred to Fort Leavenworth, Kansas, where she could interact with other detainees. She pleaded guilty in February 2013 to 10 of the charges. The trial on the remaining charges began on June 3, 2013, and on July 30 she was convicted of 17 of the original charges and amended versions of four others, but was acquitted of aiding the enemy. She is serving her sentence at the maximum-security U.S. Disciplinary Barracks at Fort Leavenworth.

Edward Snowden
Edward Joseph "Ed" Snowden (born June 21, 1983) is an American computer professional who leaked classified information from the National Security Agency (NSA), starting in June 2013. A former system administrator for the Central Intelligence Agency (CIA) and a counterintelligence trainer at the Defense Intelligence Agency (DIA), he later worked for the private intelligence contractor Dellinside an NSA outpost in Japan. In March 2013, he joined the consulting firm Booz Allen Hamilton inside the NSA center in Hawaii. In June 2013, he came to international attention after disclosing to several media outlets thousands of classified documents that he acquired while working as an NSA contractor for Dell and Booz Allen Hamilton. Snowden's leaked documents revealed numerous global surveillance programs, many of them run by the NSA and the Five Eyes with the cooperation of telecommunication companies and European governments. A subject of controversy, Snowden has been variously called a hero, awhistleblower, a dissident, a patriot,and a traitor. His disclosures have fueled debates overmass surveillancegovernment secrecy, and the balance between national security and information privacy. Two court rulings since the initial leaks have split on the constitutionality of the NSA's bulk collection of telephone metadata.
On May 20, 2013, Snowden flew from Hawaii to Hong Kong, where in early June he revealed numerous classified NSA documents to journalists Glenn Greenwald and Laura Poitras, both of whom he had summoned to Hong Kong for that purpose. On June 9, four days after the press first exposed a secret NSA program based on his leaks, Snowden made his identity public. On June 14 the U.S. Department of Justice charged him with two counts of violating the Espionage Act and theft of government property, punishable by up to 30 years in prison. The U.S. Department of State revoked his passport on June 22. According to Russian President Vladimir Putin, Snowden met with Russian diplomats while in Hong Kong. On June 23, Snowden—who later said he had been ticketed for onward travel via Havana, Cuba—flew to Moscow's Sheremetyevo International AirportABC News reported that Snowden "could not enter Russia because he did not have a Russian visa and he could not travel to safe haven opportunities in Latin America because the United States had canceled his passport." Snowden remained in the airport transit zone for 39 days, during which time he applied for asylum in 21 countries. On August 1, 2013, Russian authorities granted him a one-year temporary asylum. A year later, Russia issued Snowden a three-year residency permit allowing him to travel freely within the country and to go abroad for not longer than three months. He lives in an undisclosed location in Russia and is seeking asylum in the European Union.

Thursday 16 October 2014

Freedom of Speech

There is no freedom of speech online anymore. New laws have been applied that do not allow you to share personl information of others online, cyberbully, post pornography, take others identity etc.

Twitter rules state:
Posting another person’s private and confidential information is a violation of the Twitter Rules
Some examples of private and confidential information include:
  • credit card information
  • social security or other national identity numbers
  • addresses or locations that are considered and treated as private
  • non-public, personal phone numbers
  • non-public, personal email addresses
  • images or videos that are considered and treated as private under applicable laws
Keep in mind that although you may consider certain information to be private, not all postings of such information may be a violation of this policy. We may consider the context and nature of the information posted, local privacy laws, and other case-specific facts when determining if this policy has been violated. For example, if information was previously posted or displayed elsewhere on the Internet prior to being put on Twitter, it may not be a violation of this policy.
If the private information you’re reporting is not your own, please note that you must have documentation that you’re authorized to act on behalf of the person whose confidential information is posted.

I think that it is right for people to be prosecuted for what they say online of they go against the law. Beacause if they didnt then many would have their personal information posted, many children would be cyberbullied online, stalkers would get an advantage because they would be able to find inormation they wanted on a person. we have these laws to keep our personal life safe online.

Monday 13 October 2014

Computing and the Enviroment

Many of the technologies we use every day consume a lot more resources and power than they need to, and using and manufacturing them can create a mess. Here are a few of the ways that technology can harm the environment:
  • Pollution - Air, water, heat and noise pollution can all be caused by producing and using technology
  • Consuming resources - Non-renewable resources, including precious metals like gold, are used to make technology. Many others, such as coal, are consumed to generate the electricity to use technology. Even some renewable resources, like trees and water, are becoming contaminated or are used up faster than they can renew themselves because of technology.
  • Waste - Manufacturing technology creates large amounts of waste, and used computers and electronics get thrown out when they break or become outdated. Called "technotrash," these electronics contain all sorts of hazardous materials that are very unsafe for the environment. They need to be disposed of using special methods.
  • Disrupting ecology - Clearing land where animals used to live to build factories and allowing pollution to contaminate the food chain can greatly affect the environment's natural cycles.
  • Health hazards - Using toxic materials that can harm our health can cause cancer, and technology addiction can lead to other health problems like obesity and carpal tunnel syndrome.

You can encourage manufacturers by choosing to buy more energy-efficient and less hazardous electronics and by supporting companies that make protecting the environment a priority. You can also do your own part to reduce enviromental impact by not being wasteful and disposing of your electronics safely and properly.

Freedom of Information Act

The Freedom of Information Act 2000 provides public access to information held by public authorities.
It does this in two ways:
  • public authorities are obliged to publish certain information about their activities; and
  • members of the public are entitled to request information from public authorities.

The Act covers any recorded information that is held by a public authority in England, Wales and Northern Ireland, and by UK-wide public authorities based in Scotland. Information held by Scottish public authorities is covered by Scotland’s own Freedom of Information (Scotland) Act 2002.
Public authorities include government departments, local authorities, the NHS, state schools and police forces. However, the Act does not necessarily cover every organisation that receives public money. For example, it does not cover some charities that receive grants and certain private sector organisations that perform public functions.

Recorded information includes printed documents, computer files, letters, emails, photographs, and sound or video recordings.

The Act does not give people access to their own personal data such as their health records or credit reference file. If a member of the public wants to see information that a public authority holds about them, they should make a subject access request under the Data Protection Act 1998.


Saturday 11 October 2014

Netiquette

The word netiquette is a combination of ’net’ (from internet) and ’etiquette’. It means respecting other users’ views and displaying common courtesy when posting your views to online discussion groups.

Basic Rules
  1. Refrain from personal abuse. You may express robust disagreement with what someone says, but don't call them names or threaten them with personal violence.
  2. Don't spam. That is, don't repeatedly post the same advertisement for products or services. Most sites have strict and specific rules about who is allowed to post ads and what kind of ads they are.
  3. Write clearly and succinctly. On a site that has many non-native English speakers, avoid using slang they may not understand.
  4. Remember that your posts are public. They can be read by your partner, your children, your parents, or your employer.
  5. Stay on-topic, especially when you're new. Don't post about football in a hair-care forum or about hair care in a gardening forum!
  6. Don't expect other people to do your homework for you. If you're looking for technical help, for example, don't ask questions you could easily answer yourself by reading the manual or online help provided with the product. When you do ask for help, include details of what attempts you've made to solve the problem. It will save time and also show people that you are making an effort to help yourself.
  7. Do not post copyrighted material to which you do not own the rights. Sites vary in how strict they are about this, but as well as facing the possibility of legal action by the rights holder, you may also get the site sued.
  8. The site's owner, perhaps assisted by one or more moderators, has the final say in enforcing the rules.



Phising and Spam

Friday 10 October 2014

The Copyright Designs and patents Act

The Act simplifies the different categories of work which are protected by copyright, eliminating the specific treatment of engravings and photographs.

- literary, dramatic and musical works: these must be recorded in writing or otherwise to be granted copyright, and copyright subsists from the date at which recording takes place
- artistic works: includes buildings, photographs, engravings and works of artistic craftsmanship.
- sound recordings and films
- broadcasts: a broadcast is a transmission by wireless telegraphy which is intended for, and capable of reception by, members of the public.
- cable programmes. A cable programme is a part of a service which transmits images, sound or other information to two or more different places or to members of the public by any means other than wireless telegraphy. There are several exceptions, including general Internet use, which may be modified by Order in council
- published editions means the published edition of the whole or part of one or more literary, dramatic or musical works.

When you want to use someone elses work, name, pictures etc without permission from the orginal creator you need copyright. it is illegal to use someone else work with copyright permission and you can be fined up to £1000. 

The Data Protetion Act

1. Personal data shall be processed fairly and lawfully and, in particular, shall not be processed unless - at least one of the conditions in Schedule 2 is met, and in the case of sensitive personal data, at least one of the conditions in Schedule 3 is also met.
2. Personal data shall be obtained only for one or more specified and lawful purposes, and shall not be further processed in any manner incompatible with that purpose or those purposes.
3. Personal data shall be adequate, relevant and not excessive in relation to the purpose or purposes for which they are processed.
4. Personal data shall be accurate and, where necessary, kept up to date.

5. Personal data processed for any purpose or purposes shall not be kept for longer than is necessary for that purpose or those purposes.

6. About the rights of individuals e.g. personal data shall be processed in accordance with the rights of data subjects.
7. Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data.
8. Personal data shall not be transferred to a country or territory outside the European Economic Area unless that country or territory ensures an adequate level of protection for the rights and freedoms of data subjects in relation to the processing of personal data.
The Data Protection Act protects personal information and controls how personal information is used by the government, organisations or businesses.

The Computer Misue Act

The Computer Misuse Act of 1990 is a law in the United Kingdom that makes certain activities illegal, such as hacking into other people’s systems, misusing software, or helping a person to gain access to protected files of someone else's computer. The act was created after the 1984-1985 R v. Gold case, which was appealed in 1988. The appeal was successful, inspiring parliament to create a law that would make punishable the behavior committed by Robert Schifreen and Stephen Gold.

The computer Misue act recognised the following new offences:
 - Unauthorised access to computer material
 - Unauthorised access with intent to commit or facilitate a crime
 - Unoauthorised modification of computing material
 - Making, supplying or obtaining anything which can be used in computer misuse offences