Search CSNewbs
304 results found with an empty search
- GCSE Key Terms | CSNewbs
A key term generator to display randomised or sequential terms from the OCR GCSE Computer Science (J277) course. Filter terms by topics and 'favourite' tricky terms to focus on later. Perfect for students learning GCSE Computer Science in UK schools. GCSE Key Terms Generator If you see this message, your school may be using a strict network filter which has blocked it. The tool uses basic JavaScript and should work fine on a home network. Use this tool to check your understanding of the OCR GCSE J277 specification's key terms . OCR GCSE Homepage
- App Inventor 2 | Pop-up Blob | CSNewbs
Learn how to use App Inventor 2 to create simple programs. Try to complete the final task (7) on this page. Perfect for Key Stage 3 students to experiment with block coding, objects and properties. App Inventor Task 7 - Pop-up Blob The previous apps have been preparing you to make a longer and more complicated app. Now we will put together all of the skills you have learned to create a fun game. Check the video: Open App Inventor 2 (use the button below) and create a new project. You will need to log in with a Google account. App Inventor 2 Ready for a challenge? This is what the program looks like in Designer layout. To the left are the components with all their Properties correct. To the right are the Components names. Put the three labels and button inside a HorizontalArrangement from the Layout section of Palette . The Text for ScoreLabel is 'Score: 0'. The Text for TimeRemainingLabel is 'Time Remaining:'. The Text for SecondsLabel is '20'. Place an ImageSprite inside a Canvas (both from the Drawing and Animation section of Palette ). Download the blob image from the Basics page here and upload it as the Picture for the ImageSprite . Change to Blocks layout and drag a initialize global to block from Variables . Type 'Score' in the empty space to create a variable that we will use to track how many times the blob has been touched. Attach a 0 block from Math to start the score at 0. This big block of code uses some of the concepts which you have used before. Whenever the Blob is touched the variable Score is increased by 1. The X and Y coordinates of the Blob are changed by random numbers so it will appear in a random location on the screen. The bottom blocks change the ScoreLabel to show the current score. Every second that the timer ticks we want to check if the score is more than 1 (to check it hasn't reached 0). If it is more than 1 second then the time will count down by 1. In the else part you need to add the following: Set Blob Enabled to false . Set Blob Visible both to false . Set TimeRemainingLabel Visible to false . Set SecondsLabel Visible to false . When the Reset Button is clicked the score variable is changed to 0 and the Seconds label is rewritten to 0. Make sure you use the " " block from Text and not a block from Math. Inside the when ResetButton Click block you need to reverse the code you have added for the else block when the timer ticks: Set Blob Enabled to true . Set Blob Visible both to true . Set TimeRemainingLabel Visible to true . Set SecondsLabel Visible to true . Extra Step: Challenges 1. Large score display . If you watch the video at the top of the page again, you will see that when the time runs out (is less than 1) some of the labels turn invisible and the TextColour and FontSize of the ScoreLabel changes. Try to do the same in your app. Remember to reverse what you have done in the code for the reset button; otherwise, the labels will still be invisible! 2. Customise your game . Change the background of the Canvas to an image, change the blob to a different image and add a sound when the character is 'popped'. 3. *HARDER Challenge* Add a High Score Label . Follow these hints carefully and use the colours to help you. You need to initialize a new Variable called HighScore and set it to 0 . You also need to add a new HighScoreLabel and put it in your Horizontal Arrangement in Designer layout. Add an if then block in the else part of the When Timer Timer block you already have. If Score > HighScore then HighScore = Score . This will change the value of HighScore to the current Score if it is higher than the current high score. Remember to make the HighScoreLabel display the new HighScore . KS3 Home
- Python | Section 4 Practice Tasks | CSNewbs
Test your understanding of selection (if statements) and operators (mathematical and logical). Try practice tasks and learn through text and images. Perfect for students learning GCSE Computer Science in UK schools. top Python - Section 4 Practice Tasks Task One: Spanish Numbers Create a very simple Spanish translation program. Let the user enter a number between one and four then print the Spanish word for that number using if , three elif s and else . One in Spanish is uno , two is dos , three is tres and four is cuatro . If they enter anything else print “I only know 1 to 4 in Spanish!” . Example solutions: Enter a number between 1 and 4: 3 tres Enter a number between 1 and 4: 5 I only know 1 to 4 in Spanish! Task Two: School Trip A school is organising a trip to Alton Towers . The coaches they are hiring can fit 45 people . Enter the total number of people going on the trip and work out how many coaches will be full (using integer division ) and how many people will be left over on a partly full coach (using modulo division ). Example solutions: How many people are going on the trip? 100 There will be 2 full coaches and 10 people on another coach. How many people are going on the trip? 212 There will be 4 full coaches and 32 people on another coach. Task Three: Driving Tractors There are different rules in the United Kingdom for what farmers at certain ages can drive . Ask the user to input their age and then output the relevant information below: Children under 13 cannot drive any tractors. A trained and supervised 13 to 15 year old can drive a low-powered tractor on private flat grass. 16 year olds with a provisional category F licence can drive tractors less than 2.45 metres wide. Young adults from 17 to 20 with the correct licence and training c an drive tracked vehicles that weigh less than 3,500kg. Adults over 21 years old , with the correct licence and training, can drive all types of tractor. Note: Always be safe around machinery in farms regardless of your age. Driving without adequate training and a licence is illegal. Example solutions: How old are you? 8 You cannot drive any type of tractor. How old are you? 13 If you are trained and supervised you can drive a low-powered tractor on private flat grass. How old are you? 19 With the correct licence and training you can drive tracked vehicles that weigh less than 3,500kg. Task Four: Avoid the Three Choose a category like planets , people in your class or months of the year. Secretly choose three of them . Ask the user to enter a word in your category. If they enter one of the three that you chose, they lose . Example solutions: I have secretly selected three months you must avoid! Enter a month of the year: April AHA! You chose one of the secret months, you lose! I have secretly selected three months you must avoid! Enter a month of the year: December Well done, you didn't choose one of my three! ⬅ 4c - Logical Opera tors 5a - Random ➡
- 1.1 - Programs & Applications | F160 | Cambridge Advanced National in Computing | AAQ
Learn about the differences and characteristics of programs and applications. Resources based on Unit F160 (Fundamentals of Application Development) for the OCR Cambridge Advanced Nationals in Computing (H029 / H129) AAQ (Alternative Academic Qualification). Qualification: Cambridge Advanced National in Computing (AAQ) Unit: F160: Fundamentals of Application Development Certificate: Computing: Application Development (H029 / H129) 1.1 - Programs & Applications Watch on YouTube : Programs & Applications The terms 'program ' and 'application ' do not mean the same thing. A program performs individual operations while an application may use several programs together to create a functional tool for a user . For example, a program may calculate the total of a range of numbers . An example of an application is Microsoft Excel , which is spreadsheet software with a range of programs built in , including the ability to calculate totals , as well as many other functions . Programs and Applications Every topic in Unit F160 ( Fundamentals of Application Development ) comes with YouTube videos to help you learn . Some pages only have one video , while others have several . Programs Applications A program is a set of instructions that a computer can understand and execute to perform specific tasks . It is written in a programming language like Python or Java and instructs the computer how to perform individual operations . Programs can be simple (e.g. printing a message to the screen) or complex (e.g. managing a database or running a web server ). An application is a type of program designed to be user-friendly and help users complete specific tasks . Examples of applications include word processors (e.g. Microsoft Word), web browsers (e.g. Google Chrome) and mobile apps (e.g. Instagram). Applications are made up of one or more programs . Examples A program has a specific purpose , that is understood and executed by the computer . An example is a program that can sort data into alphabetical order . This may be used in an application like spreadsheet software . A video editing application may include several programs , each with a specific purpose , such as a program to import video , one to apply filters , another to edit audio and another to export the finished video . Characteristics Characteristics of a program: Programs are created using programming languages like Python or Java . They are translated into a format the computer understands and then run . Each program is designed to perform a specific function or set of functions . They may not have a user interface and may not require user interaction , such as an operating system's background processes . Programs may consist of smaller sub-programs that can be reused in different applications . Characteristics of an application: Applications are designed to meet user requirements . They are designed for specific tasks , such as editing photos or sending emails. Most have a user interface to provide a way for humans to interact with the application, e.g. menus and buttons . Applications may be designed to run on specific operating systems , such as an iPhone app designed for iOS. They may involve multiple programs working together . Devices that use Programs and Applications Every type of computer system will use programs and/or applications for different, specific purposes . Desktops and laptops run operating systems , software applications and utilities . Game consoles use applications for gaming , streaming and social features like group voice chats. Smart TVs use apps for streaming and browsing and programs for remote control . Smart speakers use programs to process voice commands , control smart home devices and play music based on user input . Smartphones and tablets use mobile apps for communication , games and productivity . AR (augmented reality ), VR (virtual reality ) and MR (mixed reality ) devices use programs to generate and manage 3D environments , track user movements and respond to inputs . Embedded systems like washing machines , smart fridges and cars use programs to manage their operations and interfaces . Q uesto's Q uestions 1.1 - Programs & Applications: 1. Explain the differences between a program and an application , using examples . [4 ] 2. Give 3 characteristics of a program and 3 features of an application . [6 ] 3. Briefly summarise how four different devices would use programs or applications . [4 ] As of 2025 , the Google Play Store has over 3.5 million apps and is close to reaching 150 billion downloads ! D id Y ou K now? Topic List 1.2 - Operating Systems
- 4.6 - Graphical Representation - Eduqas GCSE (2020 Spec) | CSNewbs
Learn about how images are represented in a computer system, including vector and bitmap graphics, file size, resolution, colour depth and metadata. Based on the 2020 Eduqas (WJEC) GCSE specification. 4.6: Graphical Representation Exam Board: Eduqas / WJEC Specification: 2020 + There are two main types of graphics used in computer systems: raster (also known as bitmap ) and vector graphics. Raster (Bitmap) Graphics Vector Graphics Raster graphics are made up of a grid of pixels . Vector graphics use objects (lines and curves ) to mathematically form shapes. If scaled to a larger size, a vector graphic does not lose any image quality . If scaled to a larger size, a raster graphic loses image quality . Raster graphics are generally larger in file size because data is stored for each pixel . Vector graphics are generally smaller in file size . Examples of raster images include photographs and screenshots. Examples of vector graphics include logos and cartoons. How to Calculate File Size File Size = Resolution x Colour Depth The resolution of an image is the width in pixels multiplied by the height in pixels. x The colour depth (also known as bit depth ) is the number of bits that are used to represent each pixel's colour . 1 bit represents 2 colours (0 or 1 / black or white). 2 bits will allow for 4 colours, 3 bits for 8 colours, 4 for 16 etc. A colour depth of 1 byte (8 bits ) allows for 256 different colours . Remember you must multiply the colour depth , not the number of available colours (e.g. 8 not 256). The RGB (Red , Green , Blue ) colour model uses 3 bytes (a byte of 256 red shades , a byte of 256 green shades and a byte of 256 blue shades ) that together can represent 16.7 million different colours. Example Height = 6 bits Resolution = height x width Resolution = 8 x 6 = 48 bits -------------------------- Colour Depth = 1 bit (only 2 colours) -------------------------- File Size = Resolution x Colour Depth File Size = 48 x 1 = 48 bits File Size in bytes = 48 ÷ 8 = 6 bytes File Size in kilobytes = 6 ÷ 1000 = 0.00 6 kilobytes Width = 8 bits Look carefully at the exam question to see if the examiner is expecting the answer in bits, bytes or kilobytes . Always calculate the file size in bits first then: Divide the file size in bits by 8 to convert to bytes . Divide the file size in bytes by 1000 to convert to kilobytes . Metadata for Graphics Metadata is additional data about a file . Common image metadata includes: Dimensions Colour depth Make Model Orientation Exposure time Metadata is important, For example, the dimensions must be known so the image can be displayed correctly . Metadata for a smartphone-taken picture: width in pixels, e.g. 720 height in pixels, e.g. 480 Q uesto's Q uestions 4.6 - Graphical Representation: 1. Describe three differences between raster (bitmap) and vector images . [ 6 ] 2. How many colours can be represented with a colour depth of... a. 1 bit [ 1 ] b . 5 bits [ 1 ] c. 1 byte [ 1 ] 3. How is the file size of an image calculated? [2 ] 4a. An image file has a width of 10 pixels , a height of 8 pixels and a colour depth of 2 . What is the file size in bytes ? [3 ] 4b. An image file has a width of 120 pixels , a height of 120 pixels and a colour depth of 1 . What is the file size in kilobytes ? [3 ] 4c. An image file has a width of 32 pixels , a height of 21 pixels and a colour depth of 1 . What is the file size in bytes ? [3 ] 5. State what is meant by metadata and give three examples of metadata for a graphics file. [ 3 ] 4.5 Character Sets & Data Types Theory Topics 4.7 - Sound Representation
- 4.1 - Data Types | OCR A-Level | CSNewbs
Learn about data types (integer, real, character, string, Boolean), positive and negative binary, denary, hexadecimal, sign and magnitude, two’s complement, binary addition, binary subtraction, normalisation of floating point numbers, floating point arithmetc, bitwise manipulation, masks (AND, OR, XOR) and character sets (ASCII, Unicode). Based on the OCR H446 Computer Science A-Level specification. Exam Board: OCR A-Level 4.1 - Data Types Specification: Computer Science H446 Watch on YouTube : Data types Denary & binary Sign and magntiude Two's complement Binary addition Binary subtraction Hexadecimal & binary Hexadecimal & denary Floating point Floating point normalisation Floating point addition Floating point subtraction Binary shifts Masks (AND, OR, XOR) Character sets This is a mathematical topic that requires conversion between the binary , denary (decimal ) and hexadecimal number systems . Representing positive and negative binary values is included, as well as adding and subtracting binary numbers and using normalised floating point to represent decimal numbers . Data Types Data types are needed so that the computer knows how to store , process and interpret data correctly . They help ensure that only valid operations are performed on data . For example, you can add two numbers , but not a number and a word . Common data types: Integer : A whole number , e.g. 7 or -12 . Real : A decimal number , e.g. 3.14 or -0.5 . Boolean : A data type with only two possible values - True or False . Character : A single letter , digit or symbol , e.g. ‘k ’, ‘7 ’, or ‘? ’. String : A sequence of characters treated as text, e.g. “CSNewbs ”. Converting from one data type to another is called casting , e.g. age = str(age) would convert the variable age to a string in Python . YouTube video uploading soon Binary Binary is a base-2 number system with all values comprised only of 0 and 1 , e.g. 01011001 . Denary (also called decimal ) is the base-10 number system you grew up learning, with 10 possible values between 0 and 9 , e.g. 453 . Computers use binary because they are built from electronic components (transistors ) that have two states (on and off ), which are easily represented by 1s and 0s . All data processed and stored by the computer (e.g. numbers , text , images and sounds ) are represented in binary . To convert an 8-bit binary value to denary , write 128 - 64 - 32 - 16 - 8 - 4 - 2 - 1 above the binary and add together the values with a 1 underneath . For example, 10101101 is 173 (128 + 32 + 8 + 4 + 1 ). YouTube video uploading soon Storing Negative Numbers -183 Sign and Magnitude and Two’s Complement are two methods of representing negative numbers in binary . In Sign and Magnitude , the most significant bit (MSB ) represents the sign - 0 for positive and 1 for negative - while the remaining bits store the number’s magnitude (value ). For example, in 8-bit form, 0 101 0010 is +82 and 1 101 0010 is -82 . However, this method has two representations of zero (+0 and -0 ), which can cause problems and may give incorrect results if used to add or subtract . In Two’s Complement , negative numbers are represented by inverting all bits of the positive value and adding 1 to the result. This method has only one zero and makes binary addition and subtraction simpler . YouTube video uploading soon YouTube video uploading soon Binary Addition & Subtraction Binary addition works from right to left but only uses the digits 0 and 1 . The key rules are: 0 + 0 = 0 0 + 1 = 1 1 + 0 = 1 1 + 1 = 10 (write down 0 and carry 1 to the next left column ). 1 + 1 = 1 = 11 (write down 1 and carry 1 to the next left column ). If the final addition produces an extra carry bit , it may indicate an overflow error , if the result is too large to fit in the available bits . Binary subtraction can be done using borrowing , similar to denary subtraction , or more commonly by using two’s complement . In two’s complement subtraction , you add the negative version of one number (found by inverting the bits and adding 1 ) to the other to perform subtraction using binary addition rules . YouTube video uploading soon YouTube video uploading soon Hexadecimal 9E8A Hexadecimal is a base-16 number system using the digits 0 to 9 and the letters A to F, where A = 10 and F = 15 in denary . It’s often used in computing because it provides a shorter , more readable way to represent long binary values . For example, two hex digits represent eight binary bits , making conversions quick and efficient . To convert from binary to hexadecimal , split the binary number into groups of four bits (from right to left ) and convert each group into its hex equivalent . Example: 1101 0110 → 1101 (14 → D ) and 0110 (6 ) → D6 . To convert hexadecimal to binary , replace each hex digit with its 4-bit binary equivalent . Example: 2F → 0010 (2 ) and 1111 (15 → F ) → 0010 1111 . The easiest method to convert between denary and hexadecimal is to convert the value to binary first . Example: 26 → 0001 1010 → 1A . YouTube video uploading soon YouTube video uploading soon Floating Point Floating point is a way of representing real (decimal ) numbers in binary using a mantissa and an exponent . It allows computers to store a wide range of values efficiently , including very small and very large numbers . Floating point normalisation means adjusting the number so that the mantissa begins with a 01 (if it is positive ) or 10 (if it is negative ). This ensures the representation is unique and uses all available bits in the mantissa for precision . To add or subtract floating point numbers , the exponents must first be made equal by shifting the mantissa of the smaller number . Once aligned , the mantissas are added or subtracted , and the result is then normalised again to maintain the correct form . YouTube video uploading soon YouTube video uploading soon Binary Shifts A binary shift moves all the bits in a binary number left or right by a set number of places . A left shift moves all bits to the left , filling the empty right-hand bits with zeros . Each left shift multiplies the number by 2 . For example, shifting 0001 0100 (20 ) one place left gives 0010 1000 (40 ). A right shift moves all bits to the right , discarding the rightmost bits . Each right shift divides the number by 2 . For example, shifting 0010 1000 (40 ) two places right gives 0000 1010 (10 ). YouTube video uploading soon Masks A mask is a binary pattern used with bitwise operations (such as AND , OR and XOR ) to manipulate specific bits within a binary value . An AND mask is used to clear (set to 0 ) specific bits . Any bit ANDed with 0 becomes 0 , and any bit ANDed with 1 stays the same . For example, 1011 0110 AND 0000 1111 = 0000 0110 - the mask keeps only the lower four bits . An OR mask is used to set (turn on ) specific bits . Any bit ORed with 1 becomes 1 , and with 0 stays the same . For example, 1010 0000 OR 0000 1111 = 1010 1111 . An XOR mask is used to toggle (invert ) specific bits . Any bit XORed with 1 flips (0 → 1 or 1 → 0 ), while XORed with 0 stays the same . For example, 1010 1010 XOR 0000 1111 = 1010 0101 . YouTube video uploading soon Character Sets A character set is a collection of characters (letters , numbers , symbols and control codes ) that a computer can recognise , store and process . Each character is represented by a unique binary code . ASCII (American Standard Code for Information Interchange ) is an early character set that uses 7 bits to represent 128 characters , including English letters , digits , punctuation and control characters . It’s simple and compact but limited to English and basic symbols . Extended ASCII uses 8 bits for 256 characters . Unicode was developed to overcome ASCII’s limitations by representing characters from all languages and writing systems . It uses up to 32 bits and includes over 140,000 characters , allowing consistent representation of text across different devices and platforms . YouTube video uploading soon This page is under active development. Check here for the latest progress update. Q uesto's K ey T erms Data Types: integer, real, Boolean, character, string Number Systems: binary, denary (decimal), hexadecimal, sign and magnitude, two's complement, binary addition, binary subtraction, floating point, floating point normalisation, floating point addition, floating point subtraction Binary shifts: left shift, right shift Masks: mask, bitwise operator, AND, OR, XOR Character Sets: character set, ASCII, Unicode D id Y ou K now? Gottfried Wilhelm Leibniz , a German mathematician , is credited with inventing the binary number system in the 17th century , hundreds of years before computers existed. Leibniz biscuits are named after him. 3.4 - Web Technologies A-Level Topics 4.2 - Data Structures
- Python | Extended Task 4 | CSNewbs
Test your ability to create a more complex program in Python based on a given scenario. Perfect for students learning GCSE Computer Science in UK schools. Extended Task 4 Hi, Jacob Mortimer here from Cats & Dogs Veterinary Surgery . There was a flood last week, and our computer systems were totally destroyed . I need you to create a program , using a file , that allows my receptionist to: Add new animals to the file . Search through the file and print the details of a specific animal . Allow a specific animal to be removed from the file . Vet Surgery For this task, you will need to create a document and include the following sections (with screenshots where appropriate): An introduction to explain the Purpose of your program . A List of Requirements for a successful program. Screenshots of your code (with comments in your code to show understanding). Testing – Create a plan to show how you will test your program and then explanations of any errors that you found and how they were fixed . An Evaluation of what worked, what didn’t, and how you met each of your requirements from your original list. Also, discuss further improvements that you could have made to improve your program. Reminders for this task: You will need to create a selection of options for the user to choose from. Subroutines and a while true loop may help. Section 10 will help you to open, write and read from files . Section 10c shows how to edit data in a file. You will need to adapt this code and not write the line that has been selected, instead of writing a modified version of it. There are multiple ways to approach this program, and your solution might look different from the example. Break the problem down and focus on one part at a time. Example solution: Entering 1 allows the user to enter the details of a new animal which is saved into the file . Entering 4 will stop the loop and ends the program. Entering 2 allows the user to enter the details of an animal to search for . If the animal is in the file, their details are printed clearly on a new line. Entering 3 allows the user to enter the details of an animal to remove from the file . If the animal is in the file, all lines are transferred into a temporary file except for the line to be removed . ⬅ Extended Task 3 (Blackjack) Extended Task 5 (Colour Collection) ➡
- 1.3.2 - Software Categories | F160 | Cambridge Advanced National in Computing | AAQ
Learn about the purpose, characteristics, advantages, disadvantages, examples and client requirements of application software categories including open, closed, shareware, freeware and embedded software. Resources based on Unit F160 (Fundamentals of Application Development) for the OCR Cambridge Advanced National in Computing (H029 / H129) AAQ (Alternative Academic Qualification). Qualification: Cambridge Advanced National in Computing (AAQ) Unit: F160: Fundamentals of Application Development Certificate: Computing: Application Development (H029 / H129) 1.3.2 - Application Software Categories Watch on YouTube : Open Software Closed Software Shareware Freeware Embedded Software There are five application software categories you need to know : Open Closed Shareware Freeware Embedded For each software category you need to know : Its purpose and common characteristics . The types of devices the software may be used on. The advantages and disadvantages of using the software. How client requirements affect the selection of that software. Application Categories Open Software Closed Software Open (usually known as open-source ) software is developed to be freely accessible and allow users to view , modify and distribute the source code . Its purpose is to promote collaboration and customisation when developing software . Closed (or closed-source or proprietary ) software is developed and distributed by a company or individual who owns the source code . The purpose is to maintain control , generate profit and ensure a consistent user experience . Shareware Shareware is closed software that is distributed for free on a trial basis , often with limited features or time restrictions . The purpose is to let users try before they buy , encouraging them to later purchase the full version . Freeware Freeware is closed software that is completely free to use , usually without restrictions like time limits or limited features , but still owned by a developer or company . The purpose is to provide software for free while retaining control over its code and distribution . Embedded Software Embedded software is designed to run on specific hardware and perform dedicated tasks . It is usually built into devices that are not traditional computers (like washing machines or microwaves ), allowing those devices to function efficiently and potentially automatically . Q uesto's Q uestions 1.3.2 - Application Software Categories: 1. Summarise the five categories of application software in two sentences each . [5 ] 2. An independent video game company has made a short game with just three levels. Justify which application software category they should use and why . [4 ] 3. Describe the advantages and disadvantages of using embedded software . [ 4 ] WinRAR is a shareware compression tool with a 40-day free trial , but it never actually locks users out. Since 1995 , WinRAR has been downloaded an estimated 500 million times . D id Y ou K now? 1.3.1 - Application Types Topic List 1.3.3 - Application Software Types
- OCR CTech IT | Unit 1 | 4.5 - Job Roles | CSNewbs
Learn about the different skills and attributes that are required for IT roles including a network manager, programmer, animator and technician. Based on the 2016 OCR Cambridge Technicals Level 3 IT specification. 4.5 - Job Roles Exam Board: OCR Specification: 2016 - Unit 1 There are several different IT-related roles within most companies. Each role requires specific skills and attributes to be performed successfully. Try to apply the most suitable personal attributes that were described in 4.3 , as well as any other important skills relevant to the role , such as programming. Self-motivation Leadership Respect Dependability Punctuality Problem Solving Determination Independence Time Management Team Working Numerical Skills Verbal Skills Planning & Organisation Network Manager A network manager must control a group of employees with strong leadership to clearly set out their vision for the team. They must be able to motivate and encourage the team members to meet objectives . Because a network manager is high-ranking, there may not be many senior staff above them so they must be self-motivated and able to complete tasks independently , without being monitored . Network managers must be dependable and decisive , able to weigh up the consequences of a decision and make tough calls whilst under pressure . Time management is an important attribute for a network manager, they must be able to prioritise tasks and ensure deadlines are kept to . IT Technician IT technicians must have good interpersonal skills so that they can communicate clearly with other employees or customers. They should be able to use simplified terminology to help another person with their problem. They must be able to use questioning effectively to work out what the issue is to begin to solve it. IT technicians should have plenty of experience with hardware and software troubleshooting and be able to use a range of troubleshooting tools to solve a problem. They need to be respectful to customers and employees when solving a problem and show determination , as well as self-motivation , to fix issues within acceptable time limits . Programmer A programmer needs to be competent in specific programming languages that the company use. It would be beneficial to have knowledge of more than one programming language so they can be more versatile and approach a problem in different ways . Programmers need to have a logical mind so that they are able to creatively solve problems. Using computational thinking is an important set of skills that programmers should have - for example, by using decomposition to break a large problem into smaller, more manageable chunks. They must have good planning and organisational skills so that they can stay on top of the numerous tasks that need to be done. They need good time management skills to prioritise the more important tasks and stick to a deadline . Programmers must be patient individuals, all programs will contain errors that must be debugged and rewritten numerous times. Good interpersonal skills are necessary so programmers can work efficiently in teams - often multiple programmers will work on subsections of the same program that fit together later. Web Designer & Animator Web designers create , plan and code web pages to fit specific requirements made by their customers. They must create both the technical and graphical aspects of the web page, editing both how it looks and how it works. Web designers could also be responsible for maintaining a site that currently exists. They would need to have sufficient knowledge of using HTML (HyperText Markup Language ) for the structure and content of the webpage and CSS (Cascading Style Sheets ) for the formatting and style . An animator may use a mixture of digital and hand-drawn images or even puppets and models. The main skill of animation is still artistic ability , but there is an ever-increasing need for animators to be experienced with technical computer software . Animators usually work as part of a team with strict deadlines . Q uesto's Q uestions 4.5 - Job Roles: 1. Describe the key skills and personal attributes that a new programmer should have. [10 ] 2. A brief job description of a web designer and an animator are shown above on this page. Use the descriptions of what makes a suitable network manager, IT technician and programmer to help you explain which personal attributes and skills are required for: a) A web designer b) An animator [8 each ] 4.4 - Ready for Work Topic List 4.6 & 4.7 - Bodies & Certification
- 1.6 - Information Formats | Unit 2 | OCR Cambridge Technicals | CSNewbs
Learn about different formats for presenting data on the internet including webpages, blogs, streamed video and audio, document stores and RSS feeds. Based on the 2016 OCR Cambridge Technicals Level 3 IT specification for Unit 2 (Global Information). 1.6 - Information Formats Exam Board: OCR Specification: 2016 - Unit 2 The following formats are used to display information on the internet . Web Pages Web pages can be used for a diverse range of purposes including advertising products, reporting information , displaying images and eCommerce (online shopping). There are two types of web page: Static web page Static web pages contain content that is pre-built and remains the same each time the page is loaded . Static web pages are cheaper and easier to create and load quicker ; they use basic HTML. It can be changed by the site editor but will appear the same for everyone who has access to it, such as a classic promotional website for a small company. Dynamic web page Dynamic web pages are generated when they are loaded and can appear different to different users . Dynamic web pages are harder to code but they can be linked to databases to allow them to show personalised content to whoever is viewing the site; they are written in server-side languages like PHP. The Amazon homepage is an example of a dynamic web page as personalised deals based on previous user history will be shown if you are logged in with an account. Blogs Blogs are used to share information with like-minded individuals, such as those who enjoy the same hobbies or beliefs . Charities , game developers and other businesses also use blogs as a way of updating their customer base with what they have done or what they are working on. Blogs can feature multimedia such as text, images, videos and links to other sites. Advantages of Blogs Disadvantages of Blogs ✓ Share information with followers in the format of text, images and video . ✓ Blogs and vlogs can unite people with similar interests , such as a cookery blog or travel vlog. X Takes a lot of effort and time to create posts, especially if videos need to be edited before posting. Potential customers could be lost if blogs aren't updated regularly . X It can be difficult to build up a customer base directly from a blog. Posts must be engaging , researched and correct . Podcasts A podcast is a downloadable audio file , usually on a certain topic such as sports or gaming that can be listened to when convenient for the user. Spotify and Apple Music have a wide library of podcasts. Advantages of Podcasts Disadvantages of Podcasts ✓ Podcasts are not (usually) recorded live , so they can be edited and uploaded at a certain time each week. ✓ Podcasts can be listened to when convenient for the user, so they can't 'miss' it and can catch up when is best for them. ✓ Podcasts are becoming more and more popular , so the possible audience base is growing each year. Celebrity guests are one way to entice more listeners. X Takes time to record a podcast, especially if they need to be edited to add in music or sound effects or to remove mistakes . X It can be difficult to build up an audience directly from a podcast. Podcasts should be on a topic that interests people and spoken in an engaging way. Streamed Audio & Video Streaming is the process of receiving video / audio data in a continuous flow . This allows the user to access the video / audio immediately , without having to wait for the file to download entirely. For example, the BBC provide live radio streaming online for their radio shows and BBC iPlayer allows users to watch 'catch up' programs that previously aired. YouTube is a widely-used streamed video platform and Spotify is a popular streamed audio service. Advantages of Streamed Media Disadvantages of Streamed Media ✓ Streaming does not require data to be downloaded entirely before use - users can watch / listen as soon as the connection starts . ✓ Streaming is harder for users to share than downloading a file . Netflix uses this as a form of piracy protection . X Streaming requires high bandwidth so users may suffer performance issues on slower devices and networks . X Streaming requires a constant network connection compared to downloadable media which can be used when offline / outside. Social Media Channels Social media channels provide a huge amount of data on users in an informal space. Organisations can receive feedback through user posts and comments . Real-time statistics like views, likes and shares provide an insight to user opinion . Social media channels include traditional sites such as Facebook and Twitter as well as business and recruitment platforms such as LinkedIn . Discussion boards and forums , such as Reddit , are increasingly popular for users to discuss similar hobbies and interests such as politics, gaming and healthy eating. Advantages of Social Media Disadvantages of Social Media ✓ Social media can increase a business' online presence as it is online 24/7 for users to comment and interact with posts. ✓ Posts can be shared between users and their contacts, allowing a post to 'go viral' and be seen by potentially millions of viewers . ✓ Posts can be shared in different information styles such as text , images , video or hyperlinks to other websites. ✓ Businesses can use social media to communicate with their customer s , such as direct messages on Facebook if a customer is unhappy. X Businesses may need to hire a social media manager to interact with customers , update posts and remove spam. X Negative posts can be shared and spread very quickly , such as if a customer complains about how a business treated them poorly. X Businesses must be cautious about what they post , to not accidentally offend others and damage their reputation . Emails Emails can be used to provide information to a large amount of people almost instantly . A company may use an email to advertise new products , inform potential customers of a marketing promotion or target specific users based on previous interactions. Advantages of Emails Disadvantages of Emails ✓ Faster (almost instant) and cheaper (usually free) to send an email compared to traditional letters . ✓ Files can be attached to the email, such as images, videos or forms to complete. ✓ An audit trail can be kept, recording communication between the company and its customers. ✓ Emails can be sent, delivered and read at the user's convenience and to any internet-enabled device across the world . X An internet connection is required to open and read the email. Larger attachments may not open on mobile devices. X Malware can spread through email attachments. Phishers use emails to gain access to personal information and account details . X Some attachments sent via email may be unreadable on different devices / operating systems. X Emails may automatically go into the spam / junk folder and be deleted without being read . Document Stores Document stores allow users to store online files in cloud storage . Common services are Google Drive , Dropbox and Microsoft's OneDrive . Storing documents in the cloud allows users to edit and access them from any location with an internet connection and opens up opportunities for collaboration . Many organisations offer cloud storage space for free up to a certain amount before charging customers for more data. Document stores are very convenient for users and replace the need for portable storage devices like USB sticks. Teachers can use documents stores to share resources with other staff in a school . Documents stores can only be accessed with an internet connection so files will be unavailable during maintenance or network failure. Users rely on the cloud hosting provider, such as Microsoft and Google to keep the data secure and available . RSS Feeds RSS Feeds (short for Rich Site Summary ) allow users to subscribe to updates from their favourite websites. It is a web feed that updates whenever a subscribed site releases new information. For example, the BBC used to post updates for important news headlines which appeared in a subscribed user's RSS feed. As of 2020 most browsers no longer have built-in RSS functionality and it is rarely used . Q uesto's Q uestions 1.6 - Information Formats: 1. Describe the difference between static and dynamic web pages . [4 ] 2. For each type of information format describe its advantages and disadvantages . a. Blogs [8 ] b. Podcasts [8 ] c. Streamed Audio / Video [8 ] d. Social Media [8 ] e. Emails [8 ] 3. Explain how document stores could be used by organisations and individuals . [4 ] 4. Explain what an RSS feed is and how an organisation could use it . [3 ] 1.5 - WWW Technologies Topic List 1.7 & 1.8 - Internet Pros & Cons
- 2.1 - Systems Software | OCR A-Level | CSNewbs
Learn about operating systems, memory management (segmentation and paging), scheduling, interrupts, the BIOS, device drivers and virtual machines Based on the OCR H446 Computer Science A-Level specification. Exam Board: OCR A-Level 2.1 - Systems Software Specification: Computer Science H446 Watch on YouTube : Operating systems functions Paging & segmentation Interrupts Scheduling algorithms Types of operating system BIOS Device drivers Virtual machines This topic looks at how the operating system manages the resources of a computer system . It also includes programs related to the operating system , such as the BIOS , device drivers and virtual machines . Operating Systems The operating system performs essential functions to keep a computer running efficiently . It provides a user interface , such as a command line or graphical user interface ( GUI ), and ensures system security by managing access rights and protecting files . The OS manages hardware , coordinating devices like the CPU , printers and hard drives and provides built-in utilities for tasks such as file management and disk defragmentation . It acts as a platform for software , allowing applications to be installed and run . The OS also schedules jobs , handles interrupts from devices, and manages memory , ensuring each process has the resources it needs without conflicts. Paging & Segmentation Paging is a memory management method that splits memory into equal-sized blocks called pages . This makes memory use more efficient as programs don’t need to be stored in one continuous block but unused space may be wasted inside a page . Segmentation divides memory into segments of different sizes based on program structure . This makes it easier to organise parts of a program , but because segments are different sizes , it can leave small unused gaps in memory that can’t be easily filled by other data. Interrupts An interrupt is a signal that tells the CPU to pause its current task and respond to something more urgent . Interrupts can come from hardware , such as a keyboard press , or from software , such as an error . When an interrupt occurs , the CPU saves its current state by placing current register values into a stack . The CPU runs an interrupt service routine ( ISR ) to handle the interrupt event . After the ISR finishes , the CPU restores its state by popping values from the stack and continues the original program . Scheduling Scheduling algorithms are used by the CPU to decide the order in which processes are executed . They aim to manage CPU time efficiently and ensure all programs get a fair share of resources . Common scheduling algorithms include: First-Come First-Served : Processes are executed in the order they arrive to the CPU . Round Robin : Each process gets a fixed time slice in turn , cycling through all processes. Shortest Job First / Shortest Time Remaining : These methods identify the process with the shortest estimated runtime to be executed first . Multi-Level Feedback Queue : Uses multiple queues with different priority levels . Processes can be moved between queues to avoid starvation . Types of OS Different types of operating systems exist depending on the computer system and purpose : Multitasking OS : Allows a single computer to run multiple programs at the same time by quickly switching between them. Multi-user OS : Lets multiple users access the computer and its resources simultaneously , often via a network . Distributed OS : Manages a group of networked computers as a single system , sharing resources and tasks . Embedded OS : Designed for devices with specific functions , like microwaves or smart TVs , often with limited resources . Real-time OS : Provides immediate processing and responses for time-critical tasks , used in systems like medical devices or industrial robots . The BIOS The BIOS (Basic Input/Output System ) is firmware stored in ROM that helps the computer start up and manage initial communication between hardware and the operating system . During the start-up sequence , the BIOS first checks that essential hardware (e.g. the CPU and RAM ) is present and working correctly by running a Power-On Self Test (POST ). Signals are transmitted to all connected components . The BIOS then runs the bootstrap program to locate and load the operating system from a connected storage device into RAM . Once the OS is loaded , control is handed over to it, allowing the computer to become fully operational . Device Drivers A device driver is software that allows the operating system to communicate with hardware devices such as printers , graphics cards or keyboards . Hardware and the OS speak different ' languages ', so the driver translates OS instructions into commands the device can understand and vice versa. They are needed because, without drivers , the OS wouldn’t know how to control the hardware or use its features properly. Drivers also allow devices to work with different versions of an operating system and enable updates that improve performance or fix bugs . Virtual Machines A virtual machine is a software-based computer that runs an operating system and applications like a real computer , using part of the host computer’s hardware . It is isolated from the main system , so it can operate safely without affecting the host . Virtual machines are commonly used for testing software , running multiple operating systems and safely handling untrusted files . They provide flexibility , efficient hardware use and a secure environment for experimentation . Q uesto's K ey T erms Operating Systems: user interface, file management, user management Memory Management: paging, segmentation, virtual memory Interrupts: interrupt, interrupt service routine, stack Scheduling Algorithms: first come first serve, round robin, shortest job first, shortest time remaining, multilevel feedback queue Types of Operating System: multitasking, multi-user, distributed, embedded, real-time BIOS: ROM - power-on self-test (POST) Device Drivers: device driver Virtual Machines: virtual machine, thin clients, servers D id Y ou K now? New versions of the Android operating system used to be named alphabetically after sweet treats , from Cupcake , Donut and Eclair to Nougat , Oreo and Pie - the final named update in 2019 . 1.3 - Input, Output & Storage A-Level Topics 2.2 - Applications Generation
- OCR CTech IT | Unit 1 | 1.2 - Computer Components | CSNewbs
Learn about required internal hardware including the CPU, motherboard and PSU. Find out about ports and expansion cards. Based on the 2016 OCR Cambridge Technicals Level 3 IT specification. 1.2 Computer Components Exam Board: OCR Specification: 2016 - Unit 1 This page describe the various components inside of computer systems . The first three are necessary in every type of computer: Processor Motherboard Power Supply Unit The main role of a processor is to manage the functions of a computer system by processing data and instructions . The primary processor of each computer system is the Central Processing Unit ( CPU ). A processor is attached to the motherboard using a connection point called a CPU socket . The motherboard is the main circuit board of a computer on which components such as the CPU and ROM are connected . The motherboard contains PCI slots for expansion cards and ports for external devices to be connected . The power supply unit (PSU ) converts electricity from AC (Alternating Current) from the mains power supply to DC (Direct Current) which the computer system can use . The PSU of desktop computers is internal whereas portable devices require an external 'charger '. Memory Computer memory is split into two types - volatile and non-volatile . Volatile storage is temporary (data is lost whenever the power is turned off ). Non-volatile storage saves the data even when not being powered , so it can be accessed when the computer is next on and can be stored long-term . Random Access Memory (RAM) Read-Only Memory (ROM) Cache Memory RAM is volatile (temporary) storage that stores all programs that are currently running . RAM also stores parts of the operating system to be accessed by the CPU. RAM is made up of a large number of storage locations, each can be identified by a unique address . ROM is non-volatile storage that cannot be changed . ROM stores the boot program / BIOS for when the computer is switched on. The BIOS then loads up the operating system to take over managing the computer. Cache memory is volatile (temporary) storage that stores frequently accessed data . It is very quick to access and faster than other types of memory like RAM because it is stored on the processor itself. RAM ( R andom A ccess M emory) ROM ( R ead O nly M emory) Cache Memory Secondary Storage Magnetic Storage Optical Storage Optical Storage Characteristics: X - Low CAPACITY : 700 MB (CD ), 4.7 GB (DVD ), 25 GB (Blu-ray ). X - Not DURABLE because discs are very fragile and can break or scratch easily. ✓ - Discs are thin and very PORTABLE . X - Optical discs have the Slowest ACCESS SPEED . Magnetic Disks are spelled with a k and Optical Discs have a c. Magnetic Storage Characteristics: ✓ - Large CAPACITY and cheaper per gigabyte than solid state . X - Not DURABLE and not very PORTABLE when powered on because moving it can damage the device. ✓ - Relatively quick ACCESS SPEED but slower than Solid State . Optical storage uses a laser to project beams of light onto a spinning disc, allowing it to read data from a CD , DVD or Blu-Ray . This makes optical storage the slowest of the four types of secondary storage. Disc drives are traditionally internal but external disc drives can be bought for devices like laptops. A magnetic hard disk drive (HDD ) is a common form of secondary storage within desktop computers. A read/write head moves nanometres above the disk platter and uses the magnetic field of the platter to read or edit data. Hard disk drives can also be external and connected through a USB port . An obsolete (no longer used) type of magnetic storage is a floppy disk but these have been replaced by solid state devices such as USB sticks which are much faster and have a much higher capacity. Another type of magnetic storage that is still used is magnetic tape . Magnetic tape has a high storage capacity but data has to be accessed in order (serial access ) so it is generally only used by companies to back up or archive large amounts of data . Solid State Storage Cloud Storage When you store data in 'the cloud ', using services such as Google Drive, your data is stored on large servers owned by the hosting company . The hosting company (such as Google) is responsible for keeping the servers running and making your data accessible on the internet . Cloud storage is typically free for a certain amount of storage and users can buy more storage space when they need it - the scalable nature of this storage type makes it very flexible for businesses. Cloud storage is very convenient as it allows people to work on a file at the same time and it can be accessed from different devices . However, if the internet connection fails , or the servers are attacked then the data could become inaccessible . Cloud storage is also known as 'virtual storage ' because the data is saved remotely , freeing up physical storage space for users on their own devices . There are no moving parts in solid state storage . SSD s (Solid State Drives ) are replacing magnetic HDDs (Hard DIsk Drives) in modern computers and video game consoles because they are generally quieter , faster and use less power . A USB flash drive ( USB stick ) is another type of solid state storage that is used to transport files easily because of its small size. Memory cards , like the SD card in a digital camera or a Micro SD card in a smartphone , are another example of solid state storage. Solid State Characteristics: X - High CAPACITY but more expensive per gigabyte than magnetic . ✓ - Usually DURABLE but cheap USB sticks can snap or break . ✓ - The small size of USB sticks and memory cards mean they are very PORTABLE and can fit easily in a bag or pocket. ✓ - Solid State storage has the fastest ACCESS SPEED because they contain no moving parts . Cloud Storage Characteristics: ✓ - Huge CAPACITY and you can upgrade your subscription if you need more storage. ✓ / X - Cloud storage is difficult to rank in terms of PORTABILITY , DURABILITY and ACCESS SPEED because it depends on your internet connection. A fast connection would mean that cloud storage is very portable (can be accessed on a smartphone or tablet) but a poor connection would make access difficult . Storage Protocols SCSI ( Small Computer System Interface ) is a protocol (set of rules) for attaching external devices to a computer system, such as a printer, storage drive or scanner. SAS ( Serial Attached SCSI ) is an improved version of SCSI that enables many more external devices (up to 128) to be connected at the same time to a computer system. Expansion Cards Expansion cards are dedicated circuit boards with a specific purpose that are attached to the motherboard . Most of the following expansion cards can also exist as integrated components on the motherboard, rather than a separate card. Graphics Card Sound Card Processes graphical data (e.g. videos or animations) and converts it into a displayable output on a monitor . Network Interface Card (NIC) 0010 1011 0101 0101 0110 0111 0101 0001 0101 Sound cards convert analogue sound waves into digital data (binary) when inputting audio through a microphone. Sound cards also convert digital data (binary) into analogue sound waves to output audio through speakers or headphones. 0010 1011 0101 0101 0110 0111 0101 0001 0101 Allows computers to connect to networks (such as the Internet ) and enables them to transfer data to other computers. Transfers data between servers across a network. Fibre channel allows for quick transfer speeds and is primarily used to connect data storage to servers in large data centres. Fibre Channel Card Storage Controller Card Required for the computer to manage and use any attached storage devices . Ports A port is the interface between external devices and the computer . Ports allow data to be transferred from and to these devices. USB Port Connects storage devices such as USB sticks or external hard drives . Connects input devices such as a keyboard or mouse, as well as other devices for data transfer such as a camera or smartphone. Ethernet Port Connects computers to network devices such as a modem or router, allowing access to the internet . FireWire Port Developed for Apple products, FireWire transfers data at a high speed from devices such as camcorders and external hard drives . FireWire supports isochronous devices , meaning data is sent in a steady , continuous stream . SATA Port Allows fast data transfer to external HDD , SSD or optical drives . SD Port Enables data from an SD card to be transferred from a device like a camera to the computer. Micro SD Port Allows data from a micro SD card to be transferred from devices such as smartphones , tablets and handheld games consoles to a computer. Q uesto's Q uestions 1.2 - Computer Components: Vital Components: 1. Describe the purpose of the following components : a. The CPU (Central Processing Unit ) [2 ] b. The motherboard [2 ] c. The PSU (Power Supply Unit ) [2 ] Primary Memory: 2a. What is the difference between primary and secondary memory ? [2 ] 2b. What is the difference between volatile and non-volatile storage ? [2 ] 2c. For each of the three types of primary memory , describe its role and give an example of what it can store. [6 ] Secondary Storage: 3a. For magnetic , optical and solid-state storage rank these three secondary storage mediums in terms of capacity , durability , portability and speed . [9 ] 3b. For the following scenarios justify which secondary storage medium should be used and why it is the most appropriate : Sending videos and pictures to family in Australia through the post. [3 ] Storing a presentation to take into work. [3 ] Storing project files with other members of a group to work on together. [3 ] Backing up an old computer with thousands of file to a storage device. [3 ] Additional Components: 4a. State the purpose of five different expansion cards . [5 ] 4b. What is the purpose of the motherboard ? [2 ] Ports: 5a. Describe the six different ports . [6 ] 5b. What is the difference between SCSI and SAS ? [2 ] 1.1 - Computer Hardware Topic List 1.3 - Computer System Types







