Compilers and Interpreters

Compilers and Interpreters There are two types of translator for converting a high-level language such as Pascal into machine code; compilers and interpreters. These relieve programmers of the tedium and complexity of low-level programming and hence make programming considerably easier and less error prone. Compiler This type of translator takes the whole source code and compiles it into object code. The object code (sometimes called machine code) can then be run. Pascal is an example of a programming language that uses compilation. Interpreter This type of translator takes the source code and translates the first line of the program, and then executes it. It then does the second line, and the third line, until it gets to the end of the code. BASIC, LISP, Prolog and APL are examples of programming languages that uses interpretation. Compilers plus Interpreters. Some programs written in languages such as JAVA are both compiled and interpreted! A program is firstly compiled into an 'intermediate code'. It is then distributed to users who use a wide range of computers such as Mac or PCs. These computers then run their own 'interpreter' to convert the compiled code into a code they can use. Languages such as JAVA are said to be platform-independent, because any program written in that language can run on any machine. These types of languages are ideal for use on the

  • Ranking:
  • Word count: 3673
  • Level: AS and A Level
  • Subject: Computer Science
Access this essay

information systems assignment 2

Legislation Data Protection Act The Data Protection Act gives individuals the right to know what information is held about them. It provides a framework to ensure that personal information is handled properly. The Act works in two ways. Firstly, it states that anyone who processes personal information must comply with eight principles, which make sure that personal information is: * Fairly and lawfully processed * Processed for limited purposes * Adequate, relevant and not excessive * Accurate and up to date * Not kept for longer than is necessary * Processed in line with your rights * Secure * Not transferred to other countries without adequate protection The second area covered by the Act provides individuals with important rights, including the right to find out what personal information is held on computer and most paper records. Should an individual or organisation feel they're being denied access to personal information they're entitled to, or feel their information has not been handled according to the eight principles, they can contact the Information Commissioner's Office for help. Complaints are usually dealt with informally, but if this isn't possible, enforcement action can be taken. The Data Protection Act (DPA) is a United Kingdom Act of Parliament. It defines a legal basis for handling in the United Kingdom of information relating to people

  • Ranking:
  • Word count: 4456
  • Level: AS and A Level
  • Subject: Computer Science
Access this essay

Equipment needed for a Graphic PC

Let's Help Jakub List . R.A.M Random Access Memory (RAM) is a form of computer data storage. The industry standard is around 4GB. RAM is important for graphic computers because if you have a low RAM it will not be able to cope with high resolution pictures and so you need more RAM. 2. HD Monitor A HD monitor has a high resolution, 1920 x 1080 pixels. It is important to graphic design because on a normal monitor you would not be able to see the picture properly. With a HD monitor the picture would be more clear and easy to see. 3. Graphic Card A Graphic card is an expansion card which generates output images to a display. The graphic card is responsible for generating all the text and pictures that are displayed on your screen. It is important to have a good Graphic card because so it can display high resolution images. A really good graphics card is easy to spot. It has lots of memory and a fast processor. 4. Processor The processor acts like the brain of the computer. It carries out the instructions of a computer program and it also performs the input/output operations of an operating system. You need a good processor for a graphics PC because it can process the images faster. 5. Hard drive The hard drive is needed to store images on the computer. A graphics PC needs a relatively big hard drive to store all the images. You would need at least 500 GB. 6.

  • Ranking:
  • Word count: 1832
  • Level: AS and A Level
  • Subject: Computer Science
Access this essay

An introduction to Identity Theft

An Introduction to IDENTITY THEFT Created By Ruth Sutton P06003790 INDEX Introduction Page 3 What is Identity Theft? 4 Prevalence and Statistics 5 The Criminal, Your Personal Information, Methodology & Tools 7 Card Skimming 7 Bin Raiding 7 Useful Documents 8 Shoulder Surfing 8 Spoof Means 8 Advance Fee & 419 Fraud 9 Corporate Identity Theft 10 Corporate Scams 10 Telesales Scam 10 Bogus Invoice Scam 10 Network Invasion 11 Affects on the Victim 12 Preventative Measures 13 The Victims Recovery 14 Conclusion 15 Bibliography 16 INTRODUCTION The purpose of this document is to explore and explain "Identity Theft", it will document some of the available statistics. It will report the sources of information, methodology and tools used by the criminal to carry out the offence, the affects on the victim, preventative measures, and finally the steps of recovery for the victims of Identity Theft. What is "Identity Theft" Identity Theft is the use of another persons, living or deceased or a company's (and its directors) personal and private information which is then used for the purposes of; * Assuming another's identity in all aspects

  • Ranking:
  • Word count: 2563
  • Level: AS and A Level
  • Subject: Computer Science
Access this essay

Data privacy is the relationship between collection and distribution of data and the public expectation of privacy and the legal issues surrounding them. There are many policies and ordinance that protect our data, but the big question is who is in contro

Who will be responsible for your personal data and will you have any control over how it will be used? What is privacy? Privacy is the ability of individual and groups to determine for themselves when, how and to what extend information about themselves is shared with others. In today's world where the rapid growth of technology is questioning the privacy of our personal and sensitive data, how do we make sure our data is secure? Data privacy is the relationship between collection and distribution of data and the public expectation of privacy and the legal issues surrounding them. There are many policies and ordinance that protect our data, but the big question is who is in control of these rules and regulations? Privacy issues arise wherever personally restricted information is collected and stored. In this 21st century, most of us use databases to store information, and make our life easier. Data privacy issues can arise in response to information from a wide range of sources, such as: Hospitals storing health records, social networking sites like Face book, introduction of biometrics, identity cards and internet databases. Databases provide us with many benefits. They make our life easier; they are less time-consuming and also quite cheap in the longer run. In the hospitals and medical centers technology has enhanced medical care through electronic medical and genetic

  • Ranking:
  • Word count: 698
  • Level: AS and A Level
  • Subject: Computer Science
Access this essay

Memory Managment Operating Systems

Ricki Lambert Operating systems Assignment 2 Memory Management Introduction Memory management is a control of the operating system. Memory management is the most vital part of keeping computers resources in order. Without this kind of management the computer would experience severe problems when multiple threads are to be run, and when processes are completed and memory is to be regained. The management system is therefore capable of allocating and de-allocating memory when needed by the system. When a system has too little memory it will become unstable and therefore almost unusable. The memory managing sector of the operating system will also allocate an orderly fashion for the executable files to be dealt with, this then allows for the memory management system to determine what is in the memory for optimum performance and C.P.U utilization. It must be constantly active searching through its system and deciding what parts are being used by whom and what threads and applications need to be moved in and out of the system. When the memory becomes to full there must be an application or process to free some of it. A list can be seen below of the main purposes of the memory management sector. . Relocation of memory 2. Allocation of memory 3. Protection of memory 4. Sharing of memory 5. Logical organisation of memory 6. Physical organisation of memory Address

  • Ranking:
  • Word count: 1301
  • Level: AS and A Level
  • Subject: Computer Science
Access this essay

Operating systems. In this article, we are going to make a comparison between Mac and the Windows operating systems. First, lets us see that how a common user can differentiate these two operating systems.

Operating systems can be compared on the basis of their various features. In this article, we are going to make a comparison between Mac and the Windows operating systems. First, lets us see that how a common user can differentiate these two operating systems. What Windows has and Mac doesn't have: · Larger software directory · Best for custom built computers · Lower cost when used with customized pc Shortfalls of Windows over Mac · More prone to viruses, bugs, malwares, spywares and spam wares with low stability as compared to Mac · Costs more in the long run as certain hardware updates cost more money · Poor GUI and productivity. Mac can perform twice or thrice faster than Windows as it does not require you to wait for a process to end for an infinite period of time What Mac has and Windows does not have: · Better GUI · It costs just $129 to upgrade Leopard with all features available for use. No business edition, no premium edition. · Costs less in the long run. Most of Mac upgrades cost less than those of Windows OS Disadvantages of Mac over Windows: · Smaller software library · Low user familiarity with the interface · Cost can rise if not used for a larger amount of time. Now let us peep into the technical details about these

  • Ranking:
  • Word count: 1048
  • Level: AS and A Level
  • Subject: Computer Science
Access this essay

Principles of Computer Networks

BTEC National Certificate for IT Practitioners Unit 27 Principles of Computer Networks Assignment 1 Introductions In this assignment I am going to describe the types of networks available and how they relate to particular network standards and protocols and I am also going to describe, using examples, why different network standards and protocols are necessary LAN This is type of network which covers a small office, home or a school network. A LAN uses either wired Ethernet or wireless RF technology. Using a LAN can be much easier when there is a printer available or sharing a file throughout the network. Updating software is much easier because updating software will automatically update all the other software's. LAN has much higher transmission rates because it is wired connection rather than wireless. Ethernet and Wi-Fi as most widely used technologies, however many others such as token rings have been used before. This relates to standard IEEE 802.2. This standard allows two connectionless and one connection orientated operational mode: Type 1 which allows frames to be sent to a single destination or multiple destinations on the same network is a connectionless mode. Type 2 is the oriented operational connection mode. In this mode it uses something called sequence numbering which makes sure that when the data is send it gets to the destination in the correct

  • Ranking:
  • Word count: 4762
  • Level: AS and A Level
  • Subject: Computer Science
Access this essay

The systems development life cycle (SDLC) is a conceptual model used in project management that describes the stages involved in an information system development project.

Contents What is systems development life cycle (SDLC)? 2 Prototyping 3 Types of Software Prototyping 3 Wireframes/Paper Prototypes 3 Visual Prototypes 4 Wireframes/Paper 4 Interactive Prototypes 4 Benefits of Software Prototyping 4 Disadvantages of Prototyping 5 Insufficient analysis: 5 User confusion of prototype and finished system: 5 Developer attachment to prototype: 6 Excessive development time of the prototype: 6 Expense of implementing prototyping 6 Best projects to use Prototyping 6 When to use 7 Rapid Application Development (RAD) 7 Usage of RAD 10 Dynamic Systems Development Method 12 Critical Success Factors of DSDM 13 DSDM Model Limitations 14 DSDM Model Advantages 14 Waterfall model 15 Requirement Analysis & Definition: 16 System & Software Design: 16 Implementation & Unit Testing: 16 Integration & System Testing: 16 Limitations of the Waterfall Life Cycle Model 17 Advantages 17 Spiral model 18 Advantages 19 Limitation / Disadvantages 19 What is systems development life cycle (SDLC)? The systems development life cycle (SDLC) is a conceptual model used in project management that describes the stages involved in an information system development project. Even though the system is small, it is better to have a proper system development plan, not only because it helps to save the time and the money, but also because it has a proper

  • Ranking:
  • Word count: 5488
  • Level: AS and A Level
  • Subject: Computer Science
Access this essay

The software that manages a database is called a Database Management System (DBMS). The main purposes of a DBMS are to add, delete, and update the data in the database and to provide various ways to view the data. Popular DBMS software available today is

Table of Contents Question Title Page Number A). Database 1 B). Tables 2 C). Attributes (Columns) 3 D). Tuples (Rows) 4 E). Primary Key 5 F). Composite Primary Key 6 G). Foreign Keys 7 References 8 A). Database A Database is any collection of data organized for storage in a computer memory and designed for easy access by authorized users. The data may be in the form of text, numbers, or encoded graphics. The software that manages a database is called a Database Management System (DBMS). The main purposes of a DBMS are to add, delete, and update the data in the database and to provide various ways to view the data. Popular DBMS software available today is Microsoft Access, Microsoft SQL Server and Oracle. Databases are used in many applications, spanning virtually the entire range of computer software. Databases are the preferred method of storage for large multi-user applications, where coordination between many users is needed. Even individual users find them convenient, and many electronic mail programs and personal organizers are based on standard database technology. Software database drivers are available for most database platforms so that application software can use a common application programming interface to retrieve the information stored in a database. Two commonly used database application programming interfaces are JDBC and ODBC.

  • Ranking:
  • Word count: 1333
  • Level: AS and A Level
  • Subject: Computer Science
Access this essay