Search CSNewbs

249 results found for ""

  • Computer Science Newbies

    C omputer S cience Newb ie s CSNewbs is aimed at GCSE Computer Science and OCR Cambridge Technicals IT students . ​ The site is viewed in the UK and internationally by thousands of users each week . ​ Click here for frequently asked questions and information about CSNewbs . ​ TEACHER RESOURCES ! Take a free sneak peek at the Eduqas GCSE resources coming soon ! Quick links to popular topics on CSNewbs: Python You are viewing the mobile version of CSNewbs. The site may appear better on a desktop or laptop . Eduqas GCSE Topics CSNewbs last updated: Sunday, 11th October, 2020 You are viewing the desktop version of CSNewbs. Have you tried it on mobile ? OCR Cambridge Technicals Level 3 IT

  • 4.6 - Graphical Representation - Eduqas GCSE (2020 Spec) | CSNewbs

    4.6: Graphical Representation Exam Board: Eduqas / WJEC Specification: 2020 + There are two main types of used in computer systems: (also known as ) and graphics. graphics raster bitmap vector Raster (Bitmap) Graphics Vector Graphics Raster graphics are made up of a grid of . pixels Vector graphics use ( to mathematically form shapes. objects lines and curves ) If scaled to a larger size, a vector graphic does not lose any image quality . If scaled to a larger size, a raster graphic loses image quality . Raster graphics are generally larger in file size because data is stored for each pixel . Vector graphics are generally smaller in file size . Examples of raster images include photographs and screenshots. Examples of vector graphics include and cartoons. logos How to Calculate File Size File Size = Resolution x Colour Depth The of an image is the in pixels by the in pixels. resolution width multiplied height x The (also known as ) is the number of that are used to . colour depth bit depth bits represent each pixel's colour (0 or 1 / black or white). 2 bits will allow for 4 colours, 3 bits for 8 colours, 4 for 16 etc. A colour depth of ( ) allows for . 1 bit represents 2 colours 1 byte 8 bits 256 different colours ​ Remember you must , not the number of available colours (e.g. not 256). multiply the colour depth 8 ​ The ( , , ) uses 3 bytes (a byte of , a byte of and a byte of ) that together can represent 16.7 million different colours. RGB Red Green Blue colour model 256 red shades 256 green shades 256 blue shades Example Height = 6 bits ​ Resolution = height x width Resolution = 8 x 6 = 48 bits -------------------------- Colour Depth = (only 2 colours) 1 bit -------------------------- File Size = Resolution x Colour Depth File Size = 48 x 1 = 48 bits ​ File Size in bytes = 48 ÷ 8 = 6 bytes File Size in kilobytes = 6 ÷ 1000 = 0.00 6 kilobytes Width = 8 bits Look carefully at the exam question to see if the examiner is . expecting the answer in bits, bytes or kilobytes ​ then: Always calculate the file size in bits first the file size to . Divide in bits by 8 convert to bytes the file size to . Divide in bytes by 1000 convert to kilobytes Metadata for Graphics Metadata is . Common image metadata includes: additional data about a file ​ Dimensions Colour depth Make Model Orientation Exposure time Metadata is important, For example, the dimensions must be known so the image can be . displayed correctly Metadata for a smartphone-taken picture: width in pixels, e.g. 720 height in pixels, e.g. 480 uesto's uestions Q Q 4.6 - Graphical Representation: 1. Describe three differences between raster (bitmap) and vector images . [ 6 ] ​ How many with a of... 2. colours can be represented colour depth 1 bit a. [ 1 ] 5 bits b . [ 1 ] 1 byte c. [ 1 ] ​ How is the of an calculated? [ ] 3. file size image 2 ​ [ 4a. An image file has a width of 10 pixels , a height of 8 pixels and a colour depth of 2 . What is the file size in bytes ? 3 ] ​ [ 4b. An image file has a width of 120 pixels , a height of 120 pixels and a colour depth of 1 . What is the file size in kilobytes ? 3 ] ​ [ 4c. An image file has a width of 32 pixels , a height of 21 pixels and a colour depth of 1 . What is the file size in bytes ? 3 ] ​ 5. State what is meant by metadata and give three examples of metadata for a graphics file. [ 3 ] 4.5 Character Sets & Data Types Theory Topics 4.7 - Sound Representation

  • 4.7 - Character Sets & Data Types - Eduqas GCSE (2016 Spec) | CSNewbs

    4.7: Character Sets & Data Types Exam Board: Eduqas / WJEC Specification: 2016 + What is a Character Set? A character set is a that . table matches together a character and a binary value . Character sets are necessary as they allow computers to exchange data ​ Two common character sets are and . ASCII Unicode ASCII Unicode ( American Standard Code for Information Interchange ) 0100 0001 0100 0010 0100 0011 Uses Binary 128 Tiny Set of Characters Less Memory Required per Character U+0042 U+0055 U+004E Uses Hexadecimal 137,000+ Large Set of Characters More Memory Required per Character What are the different data types? When programming, should be given . variables appropriate data types Character String Integer A , such as a letter, number or punctuation symbol. single character ​ Examples: A , including letters, numbers and punctuation. sequence of characters ​ Examples: A . whole number ​ ​ ​ Examples: T 8 ? Harry Waters 14:50pm Ice Age 4 475 -8432 56732 Real Boolean are always stored as a , not an integer. Telephone numbers string True / False Yes / No 0 / 1 An answer that only has . two possible values ​ Examples: A . decimal number ​ ​ Examples: 65.3 -321.1234 909.135 Be careful with punctuation. 32.10 is a real but £32.10 is a string. uesto's uestions Q Q 4.7 - Character Sets & Data Types: 1. What is a character set and why are they needed ? [ 2 ] ​ [ 2. Describe 3 differences between ASCII and Unicode . 6 ] ​ 3. State the 5 different data types . [ 5 ] ​ 4. State which data type is most suitable for the following variables: a. Age [ 1 ] b. Surname [ 1 ] c. Height (in metres) [ 1 ] d. First Initial [ 1 ] e. Phone number [ 1 ] f. Right-Handed? [ 1 ] 4.6 Compression Theory Topics 4.8 - Data Structures

  • 4.5 - Character Sets & Data Types - GCSE (2020 Spec) | CSNewbs

    4.5: Character Sets & Data Types Exam Board: Eduqas / WJEC Specification: 2020 + What is a Character Set? A character set is a that . table matches together a character and a binary value . Character sets are necessary as they allow computers to exchange data ​ Two common character sets are and . ASCII Unicode ASCII Unicode ( American Standard Code for Information Interchange ) 0100 0001 0100 0010 0100 0011 Uses Binary 128 Tiny Set of Characters Less Memory Required Per Character U+0042 U+0055 U+004E Uses Hexadecimal 137,000+ Large Set of Characters More Memory Required per Character What are the different data types? When programming, should be given . variables appropriate data types Character String Integer A , such as a letter, number or punctuation symbol. single character ​ Examples: A , including letters, numbers and punctuation. sequence of characters ​ Examples: A . whole number ​ ​ ​ Examples: T 8 ? Harry Waters 14:50pm Ice Age 4 475 -8432 56732 Real Boolean are always stored as a , not an integer. Telephone numbers string True / False Yes / No 0 / 1 An answer that only has . two possible values ​ Examples: A . decimal number ​ ​ Examples: 65.3 -321.1234 909.135 Be careful with punctuation. 32.10 is a real but £32.10 is a string. uesto's uestions Q Q 4.5 - Character Sets & Data Types: 1. What is a character set and why are they needed ? [ 2 ] ​ [ 2. Describe 3 differences between ASCII and Unicode . 6 ] ​ 3. State the 5 different data types . [ 5 ] ​ 4. State which data type is most suitable for the following variables: a. Age [ 1 ] b. Surname [ 1 ] c. Height (in metres) [ 1 ] d. First Initial [ 1 ] e. Phone number [ 1 ] f. Right-Handed? [ 1 ] 4.4 Arithmetic Shift Theory Topics 4.6 - Graphical Representation

  • 3.9 - Protection Against Threats - GCSE (2020 Spec) | CSNewbs

    3.9: Protection Against Threats Exam Board: Eduqas / WJEC Specification: 2020 + Network Forensics & Penetration Testing What is network forensics? is the to . Network forensics is used to on a network and to about how the network is performing. Network forensics monitoring of a network identify unauthorised intrusions record and analyse attacks gather other information ​ It is important for organisations to so that identify weaknesses in their networks they or malware. can fix them and be prepared for any type of attack ​ Footprinting - Footprinting is one method of . This is when a by about the . evaluating a network’s security security team puts itself in the attacker’s shoes obtaining all publicly available information organisation and its network Footprinting allows the company to could find out about a system. The company can then about its systems that is . discover how much detail a potential attacker limit the technical information publicly available Penetration Tests are carried out as part of ethical hacking. Penetration tests Ethical hacking is when an organisation gives to specific ' ' to try and attack a system so that the and then fixed. permission good hackers weak points can be highlighted The purpose of a penetration test is to review the system's security to and to . find any risks or weaknesses fix them ​ There are : four main types of penetration tests are to see how much by somebody with a registered account. Internal tests damage could be done within the company are for white hat hackers to try and . External tests infiltrate a system from outside the company are done with , to would have to do to infiltrate the system. Blind tests no inside information simulate what a real attacker + are conducted by the company's and the cooperating together to find faults in the system. Targeted tests IT department penetration team Anti-Malware & Firewalls Anti-Malware Software Anti-malware software is used to locate and delete malware, like viruses, on a computer system. The software scans each file on the computer and compares it against a database of known malware . Files with similar features to malware in the database are identified and deleted . There are thousands of known malware, but by attackers, so anti-malware software to keep systems secure. new forms are created each day must be regularly updated Other roles of anti-malware software: all incoming and outgoing . Checking emails and their attachments . Checking files as they are downloaded . Scanning the hard drive for viruses and deleting them Firewall A . firewall manages incoming and outgoing network traffic to check whether it should be by examining the . Each data packet is processed given access to the network source and destination address ​ Unexpected packets will be out and to the network. data filtered not accepted Other roles of a firewall include: / malicious . Blocking access to insecure web sites certain from . Blocking programs accessing the internet unexpected / . Blocking unauthorised downloads specific on a network . Preventing users accessing certain files Other Methods of Protection Double Authentication Also known as ( ), this is a method of someone's by requiring , such as a password and a pin code sent to a mobile. two-factor authentication 2FA confirming identity two forms of authorisation 4392 Secure Passwords Usernames must be matched with a to the chances of a system. secure password minimise unauthorised users accessing ​ Passwords should contain a mix of uppercase and lowercase , . Passwords should be of a substantial (at least 8 characters) and should be . letters punctuation and numbers length regularly changed ******** User Access Levels are used to particular files. Access levels only allow certain users to access and edit ' Read-Only ' access is when a user can only view a file and is not allowed to change any data . ​ For example, a teacher might set homework instructions as for students to view. read-only ' Read and Write ' access allows a user to read and edit the data in a file. ​ For example, a teacher might set an online workbook as access for students to fill in. read and write so that can view and change data. The more users who have access to a file, the more likely it is to be compromised. Certain users may also have to a file - when they can't view or edit it. It is important to set access levels only authorised users no access Encryption is the process of into an so that it during transmission. Encryption scrambling data unreadable format attackers cannot understand if intercepted ​ The (known as ) is using an . Only at the correct destination will the be used to back into to be understood by the receiving computer. original data plaintext converted to scrambled ciphertext encryption key encryption key convert the ciphertext plaintext ​ A very simple method of encryption is to use the . is used on the to . Using on the will reverse the encryption to . XOR logical operator XOR plaintext and key together create the ciphertext XOR again ciphertext and key reveal the plaintext Encryption using XOR = 00110100 Plaintext = Key 10100110 XOR = 10010010 Ciphertext Decryption using XOR ​ = 10010010 Ciphertext = / Key 10100110 XOR = 00110100 Plaintext uesto's uestions Q Q 3.9 - Protection Against Threats: ​ 1a. What is network forensics ? Why is it important ? [ 3 ] [ 1b. Explain what is meant by footprinting and why companies do it . 2 ] [ 2. What is an ethical hacker ? 2 ] [ 3a. Describe the purpose of penetration tests . 2 ] 3b. Describe each type of penetration test . [ 8 ] ​ 4. Describe the purpose of anti-malware software and its different roles . [ 4 ] 5. Describe the purpose of a firewall and its different roles . [ 4 ] ​ [ 6a. Describe double authentication . 2 ] 6b. State three rules for choosing a strong password . [ 3 ] 7. Describe the three types of access level . [ 6 ] [ 8a. Describe the purpose of encryption . 2 ] 8b. Explain how encryption works, using the terms plaintext , key and ciphertext . [ 4 ] 3.8 - Cyber Threats Theory Topics 4.1 - Number Systems

  • 9.3 - Protection Methods - Eduqas GCSE (2016 Spec) | CSNewbs

    9.3: Protection Methods Protection Against Malware The following methods can be used to from . protect computer systems malware Antivirus Software Firewall Updates & Patches It is vital to and the operating system as attackers are creating and . keep applications up to date new malware daily finding exploits in weak code ​ A is a . Patches may need to be installed when have been identified by the developers. often release patches to fix errors. patch software update with edited code to fix any bugs or security flaws errors or weaknesses Video game developers Other Methods of Protection Two Factor Authentication (2FA) This is a method of someone's by requiring , such as a password and a pin code sent to a mobile. confirming identity two forms of authorisation 4392 Use Malware Removal Tools ​ Download and applications that will for you. Be careful, some software that labels itself as malware removal is actually malware itself. install anti-malware remove infected files Security Staff ​ Staff may be hired to , for example by guarding server rooms or checking ID badges. protect important data Protection Against Keyloggers ​ One method is to prevent access to the keyboard port at the back of the computer (e.g. USB port) so others can't connect a physical keylogger to capture key strokes. Also a firewall could be used to prevent a device driver being installed which would save key strokes into a file for malicious users to view. Malware and Security Training ​ Companies should to common and to only and software manufacturers. train staff spot phishing scams use trusted websites Many companies spend money on to teach employees about cyber security to and corruption. training days minimise the chance of data loss Software Protection The following are considered in the of . methods of protection design, testing and creation stages developing software Secure by Design This method puts . security as the most important concept when creating and designing software ​ By focusing on security when designing software there should be . less need for later updates and patches and attacks are less likely to succeed Too Many Permissions Apps to use device features (such as the camera or microphone of a smartphone) when they are downloaded. Programmers should only that the . require permission request permission for features software requires ​ - and the worst part is that you've given permission for it to do it Users can avoid suspicious apps by reading reviews, , only downloading the software you need / will use and . Some malicious apps steal data or spy on users ! checking there are no unnecessary permission requests uninstall apps if permissions change Scripting Restrictions is a set of instructions executed on a website. For example, Facebook uses a script to post a status and another to read your private messages. A script JavaScript ​ The is a security precaution that . For example, if you are using JavaScript to post a status on Facebook then visit an infected site, that site can't also use JavaScript to access your Facebook data, because even though they both use JavaScript, they are . Same Origin Policy (SOP) prevents websites from using scripts on other sites that you have open from a different origin or infect a computer with malware . Programmers should set when creating websites. Without SOP an infected website could access personal data by maliciously using the same scripts as other websites you have used scripting restrictions Validation with Parameters , it is usually a or limit. A parameter is a measure that is used when validating data range For example, the parameters of a may be whether the data is . length check between 1 and 10 characters ​ Programmers must ensure on websites to such as an SQL injection. validation is used with suitable parameters prevent attacks 9.3 - Protection Methods: ​ 1. Describe the purpose of antivirus software and its different roles . [ 4 ] 2. Describe the purpose of firewalls and its different roles . [ 4 ] 3. What is a patch ? Why are they important ? [ 4 ] 4. Describe four other methods of protection . [ 8 ] ​ [ 5a. What is meant by ' secure by design '? 2 ] 5b. What are two intended consequences if software is secure by design ? [ 2 ] 6. What is a permission ? Why should permissions be managed ? [ 4 ] 7. What is Same Origin Policy ( SOP )? Why is it important? [ 3 ] 8. What is a parameter ? Why is validation used when data is input online ? [ 2 ] Antivirus software is used to locate and delete viruses on a computer system. The software scans each file on the computer and compares it against a database of known viruses . Files with similar features to viruses in the database are identified and deleted . There are thousands of known viruses, but by attackers, so antivirus software to keep systems secure. new forms are created each day must be regularly updated Other roles of antivirus software: all incoming and outgoing . Checking emails and their attachments . Checking files as they are downloaded . Scanning the hard drive for viruses and deleting them A . firewall manages incoming and outgoing network traffic to check whether it should be by examining the . Each data packet is processed given access to the network source and destination address ​ Unexpected packets will be out and to the network. data filtered not accepted Other roles of a firewall include: / malicious . Blocking access to insecure web sites certain from . Blocking programs accessing the internet unexpected / . Blocking unauthorised downloads specific on a network . Preventing users accessing certain files Exam Board: Eduqas / WJEC Specification: 2016 + uesto's uestions Q Q 9.2 - Cyber Attacks Theory Topics 9.4 - Identifying Vulnerabilities

  • 3.1 - Network Characteristics - Eduqas GCSE (2020 spec) | CSNewbs

    3.1: Network Characteristics Exam Board: Eduqas / WJEC Specification: 2020 + What is a network? A network is allowing for and . more than one computer system connected together communication sharing of resources There are many benefits but also some drawbacks to using a network compared to having an unconnected ( ) computer: 'standalone' Advantages of Networks Easily , and between computers. share files software hardware Disadvantages of Networks Larger companies will need to buy and . There is an because like routers are . initial cost network devices required maintain a server and and files. Log in from any connected computer access your data A network manager / administrator might need to be employed to maintain the network . An administrator can monitor network activity and control security settings. Data from computers on the network can be automatically backed up on central storage. and , such as worms, can across the network. Security breaches are more likely malware spread quickly If the web server fails , all connected computers won't be able to access files or log on . Network Types Networks can be split into , usually categorised by their apart and the that they serve. different types geographical distance area Local Area Network A ( ) has computer systems situated , usually within the , like a . local area network LAN geographically close together same building or small site school or office Wide Area Network A ( ) has computer systems situated to each other, possibly or even . The that spans the globe. wide area network WAN geographically distant across a country across the world internet is an example of a WAN Personal Area Network A PAN is a personal network for an individual , such as a photographer connecting a smartphone, desktop computer and printer together. Metropolitan Area Network A is larger than a LAN but smaller than a WAN and typically covers a relatively large area like a . MAN university campus, town or city Virtual Private Network A allows for a like the internet. It is often used to an individual's by concealing their real location. VPN secure and encrypted connection to a public network protect privacy Wired & Wireless Networks Wired Connections Wireless Connections Wireless connections, such as or , use but require a ( ). WiFi Bluetooth no cables wireless network interface card WNIC Wireless connections generally have a and can be the computer's from the wireless router as well as like walls or bad weather. slower speed affected by distance obstacles Wired connections use , such as , and require a ( ) to connect to a network. physical cables copper or fibre optic wires network interface card NIC These wired connections use a wired connection protocol - most commonly . Ethernet Restricted Movement Faster More Secure NIC Required Freedom of Movement Slower Less Secure WNIC Required uesto's uestions Q Q 3.1 - Network Characteristics: ​ A retirement home for the elderly is considering installing a , give and they might find . [ ] 1. LAN 3 benefits 3 drawbacks of using a network 6 ​ Describe the between a and . [ ] 2a. difference LAN WAN 2 Give an example of how a and a could each . [ 2b. LAN WAN be used 2 ] ​ 3 differences between a , and . [ . Explain the PAN MAN VPN 3 ] ​ For each of the below, state which would be : 4. scenarios network type most suitable The IT rooms of a secondary . [ a. school 1 ] A study in a with a desktop and printer. [ b. house 1 ] Using online banking when abroad on a holiday to stay . c. secure [ 1 ] A large technology company with offices across . d. Europe [ 1 ] Council offices with several locations across . e. Manchester [ 1 ] ​ Briefly and . 5. compare wired wireless networks [ 8 ] 2.2 - Boolean Algebra 3.2 - Data Packets & Switching Theory Topics

  • 3.1 - Network Characteristics - Eduqas GCSE (2016 Spec) | CSNewbs

    3.1: Network Characteristics Exam Board: Eduqas / WJEC Specification: 2016 + What is a network? A network is allowing for and . more than one computer system connected together communication sharing of resources There are many benefits but also some drawbacks to using a network compared to having an unconnected ( ) computer: 'standalone' Advantages of Networks Easily , and between computers. share files software hardware Disadvantages of Networks Larger companies will need to buy and . There is an because like routers are . initial cost network devices required maintain a server and and files. Log in from any connected computer access your data A network manager / administrator might need to be employed to maintain the network . An administrator can monitor network activity and control security settings. Data from computers on the network can be automatically backed up on central storage. and , such as worms, can across the network. Security breaches are more likely malware spread quickly If the web server fails , all connected computers won't be able to access files or log on . Network Types Networks can be split into , usually categorised by their apart and the that they serve. different types geographical distance area Local Area Network A ( ) has computer systems situated , usually within the , like a . local area network LAN geographically close together same building or small site school or office Wide Area Network A ( ) has computer systems situated to each other, possibly or even . The that spans the globe. wide area network WAN geographically distant across a country across the world internet is an example of a WAN Personal Area Network A PAN is a personal network for an individual , such as a photographer connecting a smartphone, desktop computer and printer together. Metropolitan Area Network A is larger than a LAN but smaller than a WAN and typically covers a relatively large area like a . MAN university campus, town or city Virtual Private Network A allows for a like the internet. It is often used to an individual's by concealing their real location. VPN secure and encrypted connection to a public network protect privacy Wired & Wireless Networks Wired Connections Wireless Connections Wireless connections, such as or , use but require a ( ). WiFi Bluetooth no cables wireless network interface card WNIC Wireless connections generally have a and can be the computer's from the wireless router as well as like walls or bad weather. slower speed affected by distance obstacles Wired connections use , such as , and require a ( ) to connect to a network. physical cables copper or fibre optic wires network interface card NIC These wired connections use a wired connection protocol - most commonly . Ethernet Restricted Movement Faster More Secure NIC Required Freedom of Movement Slower Less Secure WNIC Required uesto's uestions Q Q 3.1 - Network Characteristics: ​ A retirement home for the elderly is considering installing a , give and they might find . [ ] 1. LAN 3 benefits 3 drawbacks of using a network 6 ​ Describe the between a and . [ ] 2a. difference LAN WAN 2 Give an example of how a and a could each . [ 2b. LAN WAN be used 2 ] ​ 3 differences between a , and . [ . Explain the PAN MAN VPN 3 ] ​ For each of the below, state which would be : 4. scenarios network type most suitable The IT rooms of a secondary . [ a. school 1 ] A study in a with a desktop and printer. [ b. house 1 ] Using online banking when abroad on a holiday to stay . c. secure [ 1 ] A large technology company with offices across . d. Europe [ 1 ] Council offices with several locations across . e. Manchester [ 1 ] ​ Briefly and . 5. compare wired wireless networks [ 8 ] 2.2 - Boolean Algebra 3.2 - Data Packets & Switching Theory Topics

  • CSN+ Preview | CSNewbs

    About CSNewbs Plus (CSN+) CSN+ is a premium collection of resources made for teachers that follows the Computer Science specifications covered on the website . ​ Currently, these resources are in development , with the Eduqas GCSE resource pack arriving first, based on the Eduqas GCSE Computer Science 2020 specification . Free zip folder download of all resources for Eduqas GCSE topic 1.1 (The CPU) What is included in the CSNewbs+ GCSE collection? 39 presentation slides 39 starters 39 task answer documents 19 revision activity pages 7 topic tests & answers ​ ​ See below for more details: + Complete presentation slides for each of the 39 theory topics in the Eduqas GCSE 2020 specification . ​ PowerPoint and Google Slides compatible. Activity resources to print . Including diagrams , tables and worksheets for lesson tasks . All answers included for teachers to use. Starter questions that recap the previous topic. For teachers to print before the lesson. All answers included in the lesson slides. 39 starters . Comprehensive answers for all lesson tasks and previous exam question answers . 39 task answer documents containing answers for over 100 lesson tasks for teachers to use . Revision templates for students to complete, to print on A3 paper . 19 pages and 7 revision lesson slides . Exercise book headings and the driving question (lesson focus) 7 end-of-topic tests with brand new questions . All answers included for teachers. What is included on the presentation slides? The following breakdown shows the presentation slides for 1.1 (The CPU): A title slide The content covered from the Eduqas GCSE specification Exercise book headings and the driving question (lesson focus) Answers to the starter activity questions Lesson objectives An explanation of the topic Clear explanations of the content First task. Students use slides or CSNewbs to complete. All answers on separate teacher document. Task 2. Table provided in teacher resource pack to print. Further explanations of the content Third task Exam questions from previous Eduqas papers. Answers included in the task answers documents. Free zip folder download of all resources for Eduqas GCSE topic 1.1 (The CPU)

  • Privacy Policy | CSNewbs

    Computer Science Newbies Privacy Policy What type of information do you collect? We receive, collect and store any information you enter on our website or provide us in any other way. In addition, we collect the Internet protocol (IP) address used to connect your computer to the Internet. For users with registered accounts, we collect your login; e-mail address; password; computer and connection information and purchase history. We may use software tools to measure and collect session information, including page response times, length of visits to certain pages, page interaction information, and methods used to browse away from the page. For customers of the site we also collect personally identifiable information (including name, email, password, communications); payment details (including credit card information), comments, feedback, product reviews, recommendations, and personal profile How do you collect information? When you conduct a transaction on our website, as part of the process, we collect personal information you give us such as your name, address and email address. Your personal information will be used for the specific reasons stated above only. Why do you collect such personal information? We collect such Non-personal and Personal Information for the following purposes: To provide and operate the CSN+ service; To provide our Users with ongoing customer assistance and technical support; To be able to contact our Visitors and Users with general or personalized service-related notices and promotional messages; To create aggregated statistical data and other aggregated and/or inferred Non-personal Information, which we or our business partners may use to provide and improve our respective services; To comply with any applicable laws and regulations. How do you store, use, share and disclose your site visitors' personal information? Our company is hosted on the Wix.com platform. Wix.com provides us with the online platform that allows us to sell our products and services to you. Your data may be stored through Wix.com’s data storage, databases and the general Wix.com applications. They store your data on secure servers behind a firewall. All direct payment gateways offered by Wix.com and used by our company adhere to the standards set by PCI-DSS as managed by the PCI Security Standards Council, which is a joint effort of brands like Visa, MasterCard, American Express and Discover. PCI-DSS requirements help ensure the secure handling of credit card information by our store and its service providers ​ How do you communicate with your site visitors? We may contact you to notify you regarding your account, to troubleshoot problems with your account, to resolve a dispute, to send updates about our company, or as otherwise necessary to contact you to enforce our User Agreement, applicable national laws, and any agreement we may have with you. For these purposes, we may contact you via email. How do you use cookies and other tracking tools? The following essential cookies are used on this site: ​ RF-TOKEN (Used for security reasons during your session on the site.) hs (Used for security reasons during your session on the site.) svSession (Used in connection with user login.) SSR-caching (Used to indicate the system from which the site was rendered. Duration of 1 minute.) _wixCIDX (Used for system monitoring/debugging. Duration of 3 months.) _wix_browser_sess (Used for system monitoring/debugging during your session on the site.) consent-policy (Used for cookie banner parameters. Duration of 12 months.) smSession (Used to identify logged in site members during your session on the site.) TS* (Used for security and anti-fraud reasons during your session on the site.) Session (Used for system effectiveness measurement. Duration of 30 minutes.) fedops.logger.sessionId (Used for stability/effectiveness measurement. Duration of 12 months.) ​ To learn more about cookies please visit https://www.allaboutcookies.org/ ​ How can your site visitors withdraw their consent? If you have a registered account and don’t want us to process your data anymore, please contact us at the site email address listed at the bottom of this page. ​ Privacy policy updates We reserve the right to modify this privacy policy at any time, so please review it frequently. Changes and clarifications will take effect immediately upon their posting on the website. If we make material changes to this policy, we will notify you here that it has been updated, so that you are aware of what information we collect, how we use it, and under what circumstances, if any, we use and/or disclose it. ​ Questions and contact information If you would like to: access, correct, amend or delete any personal information we have about you, you are invited to contact us at:

© CSNewbs 2020