| Quality criterion | What it means | Example |
|---|---|---|
| Accuracy | Correctness of the data | Correct postcode for a customer |
| Relevance | Useful for the purpose | Age of a user is needed for a health‑app, not favourite colour |
| Age / Timeliness | How recent the data is | Stock levels updated every hour |
| Completeness | All required fields are present | Every order record contains product ID, quantity and price |
| Consistency | No contradictions within the data set | Same customer ID does not have two different addresses |
| Validity | Data conforms to defined rules (e.g., format, range) | Phone number follows the national format |
| Uniqueness | Each entity appears only once | Only one employee record per employee number |
Encryption transforms readable data (plaintext) into unreadable data (ciphertext) using an algorithm and a key. It safeguards the confidentiality, integrity and, indirectly, the availability of information.
| Protocol / Method | Type (symmetric / asymmetric / hybrid) | Typical use | Advantages | Disadvantages |
|---|---|---|---|---|
| AES (Advanced Encryption Standard) | Symmetric | File‑level, full‑disk, VPN payloads | Very fast, strong security (128/192/256‑bit keys) | Key distribution problem |
| RSA | Asymmetric | Secure key exchange, digital signatures | No prior secret key needed; supports authentication | Slower, large keys (2048 bits +) required for adequate security |
| TLS/SSL (HTTPS) | Hybrid (asymmetric for handshake, symmetric for data) | Web traffic, email (STARTTLS), VPN‑like tunnels | Provides confidentiality + integrity for data in transit; widely supported | Requires certificate management; vulnerable to mis‑configuration |
| IPsec | Hybrid | Site‑to‑site and remote‑access VPNs, secure LANs | Transparent to applications; works at network layer | Complex configuration; interoperability issues between vendors |
| PGP / S/MIME | Asymmetric (used for end‑to‑end email) | Email encryption & signing | Only sender & intended recipient can read the message; supports non‑repudiation | Key‑management overhead for end users |
| Threat | Encryption counter‑measure | Resulting benefit |
|---|---|---|
| Eavesdropping on network traffic | TLS/SSL (HTTPS) or IPsec VPN | Data remains confidential while in transit |
| Lost / stolen storage device | Full‑disk encryption (BitLocker, FileVault, LUKS) | Data unreadable without proper authentication |
| Unauthorised email access | End‑to‑end encryption (PGP / S/MIME) | Only sender and intended recipient can view the message |
| Malware attempting data exfiltration | Application‑level encryption of sensitive fields (e.g., credit‑card numbers) | Even if intercepted, data is unintelligible |
When a block cipher such as AES (block size = 16 bytes) is used with padding, the ciphertext length C is:
\( C = \left\lceil \dfrac{P}{b} \right\rceil \times b \)
where P is the plaintext length in bytes and b the block size. This shows that encryption can increase storage requirements – an important design consideration.
When a student registers for a course, the system:
| Method | How it works | Typical use‑case | Advantages | Disadvantages |
|---|---|---|---|---|
| Batch processing | Collects data over a period, then processes it all at once | Payroll, end‑of‑day sales reports | Efficient use of resources; easy to schedule | Not suitable for time‑critical decisions |
| Online (transaction) processing | Processes each transaction immediately as it occurs | Banking, e‑commerce checkout | Provides up‑to‑date information; supports immediate feedback | Requires higher system availability; can be resource‑intensive |
| Real‑time processing | Data is processed within a guaranteed time limit (often milliseconds) | Air‑traffic control, industrial control systems | Enables instant response; essential for safety‑critical systems | Complex, expensive hardware/software; strict timing constraints |
INPUT dataVolume, responseTimeRequirement, resourceAvailability
IF responseTimeRequirement = "none" OR responseTimeRequirement > 1 hour THEN
SELECT "Batch processing"
ELSE IF responseTimeRequirement ≤ 5 seconds AND resourceAvailability = "high" THEN
SELECT "Real‑time processing"
ELSE
SELECT "Online (transaction) processing"
END IF
OUTPUT selectedMethod
FOR each employee IN employeeFile
READ basicPay, overtimeHours
grossPay = basicPay + (overtimeHours * overtimeRate)
tax = grossPay * taxRate
netPay = grossPay - tax
WRITE employeeID, netPay TO payrollReport
END FOR
| Computer type | Typical use | Key characteristics |
|---|---|---|
| Mainframe | Large‑scale transaction processing (banks, airlines) | Very high reliability, massive I/O capacity, supports many simultaneous users |
| Supercomputer | Complex scientific calculations (climate modelling, particle physics) | Extreme processing speed, parallel architectures, specialised cooling |
| Personal computer / Laptop | General office, education, home use | Moderate performance, interactive OS, portable (laptop) |
| Embedded system | Appliances, automotive control units, IoT devices | Dedicated function, limited resources, often real‑time |
Utilities are specialised system‑software tools that maintain, analyse or optimise a computer. Examples include:
| Aspect | Custom software | Off‑the‑shelf software |
|---|---|---|
| Development cost | High (design, coding, testing) | Low (purchase licence) |
| Fit to business process | Exact match | May need adaptation or work‑arounds |
| Time to deploy | Long (months‑to‑years) | Immediate or short‑term |
| Maintenance | Owner responsible | Vendor provides updates |
| UI type | Typical device / context | Common symbols |
|---|---|---|
| Command‑line interface (CLI) | Servers, network equipment, developer tools | Prompt (e.g., >), text commands, error codes |
| Graphical user interface (GUI) | Desktops, laptops, tablets | Windows, icons, menus, buttons, scrollbars |
| Dialogue box (modal / non‑modal) | Any GUI application | OK / Cancel buttons, checkboxes, radio buttons, input fields |
| Touch / gesture interface | Smartphones, tablets, kiosks | Swipe, pinch, tap, drag‑and‑drop icons |
| Voice‑controlled interface | Smart speakers, mobile assistants | Wake word, spoken commands, audio feedback |
[Sensor] → (measure) → [Controller] → (compare to set‑point) → [Actuator] → (adjust environment) → [Sensor] …
READ currentTemperature FROM temperatureSensor
SET desiredTemperature = 22°C
IF currentTemperature < desiredTemperature - 0.5 THEN
TURN heater ON
ELSE IF currentTemperature > desiredTemperature + 0.5 THEN
TURN heater OFF
ELSE
MAINTAIN current state
END IF
INPUT requiredAccuracy, budget, environmentVariability
IF requiredAccuracy = "high" AND budget ≥ "moderate" THEN
SELECT "Calibrated sensor with closed‑loop control"
ELSE IF environmentVariability = "low" THEN
SELECT "Simple open‑loop sensor"
ELSE
SELECT "Periodic manual checks"
END IF
OUTPUT chosenMonitoringMethod
Create an account or Login to take a Quiz
Log in to suggest improvements to this note.
Your generous donation helps us continue providing free Cambridge IGCSE & A-Level resources, past papers, syllabus notes, revision questions, and high-quality online tutoring to students across Kenya.