top of page

Search CSNewbs

286 items found for ""

  • 6.1 - Security Principles | Unit 2 | OCR Cambridge Technicals | CSNewbs

    6.1 - Security Principles Exam Board: OCR Specification: 2016 - Unit 2 There are three key principles of data security that are protected in legislation such as the Data Protection Act (2018 ). Organisations storing personal or sensitive information must ensure that these three principles are upheld at all times . Confidentiality What it means: Information should only be accessed by individuals or groups with the authorisation to do so. ​ How to uphold this principle: An organisation should use protection measures like usernames and passwords to ensure that only authorised people can access the sensitive data. Tiered levels of access or permissions can also limit who has access to the data. Integrity What it means: Information is maintained so that it is up-to-date , correct and fit for purpose . ​ How to uphold this principle: Organisations should carry out regular data maintenance to update information (e.g. confirm contact details once a year). If storing data in a spreadsheet or database, record-locking should be used so that only person can edit at a time, preventing the data from becoming incorrect. Availability What it means: Information is available to the individuals or groups that need to use it. It should only be available to those who are authorised . ​ How to uphold this principle: Staff should have the correct privileges so that they can easily access data when required. Data could be stored online , e.g. cloud storage so that it is available remotely using an internet connection. Data must also be kept safe from unauthorised access . Staff should not make additional copies of information which could be lost or stolen. Q uesto's Q uestions 6.1 - Security Principles: ​ 1a. Describe what is meant by ' confidentiality ' . [1 ] 1b. Explain two ways that an organisation can keep data confidential . [4 ] ​ 2a. Describe what is meant by ' integrity ' . [1 ] 2b. Explain two ways that an organisation can preserve the integrity of its data . [4 ] ​ 3a. Describe what is meant by ' availability ' . [2 ] 3b. Explain two ways that an organisation can keep its data available . [4 ] 5.2 - Data Flow Diagrams Topic List 6.2 - Risks

  • Python | Section 8 Practice Tasks | CSNewbs

    top Python - Section 8 Practice Tasks Task One Write a program with a blank list. ​ Use the .append() command to add your three favourite ice-cream flavours to this list and then print the list. Example solution: Task Two Write a program with a list of any 5 numbers. ​ Print the list. ​ Delete the first and third numbers. Print the list. Example solution: Task Three Write a program with a list of three different animals. ​ Write an input line that lets the user type an animal. ​ Add what the user has written to the list and print the list. Example solution: Task Four Sort your list from task two into order. Then print the list. Example solution: Task Five Copy the text on the right and put it into a list named countries. ​ Count the number of countries in the list. ​ Print the longest country. ​ Use a for loop to work out the length of each country. "Egypt", "Angola", " Eritrea " , "Mozambique" , "Ghana" , "Chad" , "Somalia" , "Namibia" , "Sudan" , "Libya" , "Algeria", "Morocco" , "Cameroon" Example solution: Task Six Create a dictionary (see 8c ) that asks users questions about yourself, such as first name, favourite colour or birthday. ​ Let the user answer each question and display the answer if they get it correct. Use the 'Using a Dictionary to Make a Game ' section of 8c to help you. Example solution: ⬅ 8c - Dictionar ies 9a - String Handling ➡

  • 1.6 - Information Formats | Unit 2 | OCR Cambridge Technicals | CSNewbs

    1.6 - Information Formats Exam Board: OCR Specification: 2016 - Unit 2 The following formats are used to display information on the internet . Web Pages Web pages can be used for a diverse range of purposes including advertising products, reporting information , displaying images and eCommerce (online shopping). ​ There are two types of web page: Static web page Static web pages contain content that is pre-built and remains the same each time the page is loaded . ​ Static web pages are cheaper and easier to create and load quicker ; they use basic HTML. It can be changed by the site editor but will appear the same for everyone who has access to it, such as a classic promotional website for a small company. Dynamic web page Dynamic web pages are generated when they are loaded and can appear different to different users . Dynamic web pages are harder to code but they can be linked to databases to allow them to show personalised content to whoever is viewing the site; they are written in server-side languages like PHP. ​ The Amazon homepage is an example of a dynamic web page as personalised deals based on previous user history will be shown if you are logged in with an account. Blogs Blogs are used to share information with like-minded individuals, such as those who enjoy the same hobbies or beliefs . Charities , game developers and other businesses also use blogs as a way of updating their customer base with what they have done or what they are working on. Blogs can feature multimedia such as text, images, videos and links to other sites. Advantages of Blogs Disadvantages of Blogs ✓ Share information with followers in the format of text, images and video . ​ ✓ Blogs and vlogs can unite people with similar interests , such as a cookery blog or travel vlog. X Takes a lot of effort and time to create posts, especially if videos need to be edited before posting. Potential customers could be lost if blogs aren't updated regularly . ​ X It can be difficult to build up a customer base directly from a blog. Posts must be engaging , researched and correct . Podcasts A podcast is a downloadable audio file , usually on a certain topic such as sports or gaming that can be listened to when convenient for the user. Spotify and Apple Music have a wide library of podcasts. Advantages of Podcasts Disadvantages of Podcasts ✓ Podcasts are not (usually) recorded live , so they can be edited and uploaded at a certain time each week. ​ ✓ Podcasts can be listened to when convenient for the user, so they can't 'miss' it and can catch up when is best for them. ​ ✓ Podcasts are becoming more and more popular , so the possible audience base is growing each year. Celebrity guests are one way to entice more listeners. X Takes time to record a podcast, especially if they need to be edited to add in music or sound effects or to remove mistakes . ​ X It can be difficult to build up an audience directly from a podcast. Podcasts should be on a topic that interests people and spoken in an engaging way. Streamed Audio & Video Streaming is the process of receiving video / audio data in a continuous flow . This allows the user to access the video / audio immediately , without having to wait for the file to download entirely. For example, the BBC provide live radio streaming online for their radio shows and BBC iPlayer allows users to watch 'catch up' programs that previously aired. YouTube is a widely-used streamed video platform and Spotify is a popular streamed audio service. Advantages of Streamed Media Disadvantages of Streamed Media ✓ Streaming does not require data to be downloaded entirely before use - users can watch / listen as soon as the connection starts . ​ ✓ Streaming is harder for users to share than downloading a file . Netflix uses this as a form of piracy protection . X Streaming requires high bandwidth so users may suffer performance issues on slower devices and networks . ​ X Streaming requires a constant network connection compared to downloadable media which can be used when offline / outside. Social Media Channels Social media channels provide a huge amount of data on users in an informal space. Organisations can receive feedback through user posts and comments . Real-time statistics like views, likes and shares provide an insight to user opinion . ​ Social media channels include traditional sites such as Facebook and Twitter as well as business and recruitment platforms such as LinkedIn . Discussion boards and forums , such as Reddit , are increasingly popular for users to discuss similar hobbies and interests such as politics, gaming and healthy eating. Advantages of Social Media Disadvantages of Social Media ✓ Social media can increase a business' online presence as it is online 24/7 for users to comment and interact with posts. ​ ✓ Posts can be shared between users and their contacts, allowing a post to 'go viral' and be seen by potentially millions of viewers . ​ ✓ Posts can be shared in different information styles such as text , images , video or hyperlinks to other websites. ​ ✓ Businesses can use social media to communicate with their customer s , such as direct messages on Facebook if a customer is unhappy. X Businesses may need to hire a social media manager to interact with customers , update posts and remove spam. ​ X Negative posts can be shared and spread very quickly , such as if a customer complains about how a business treated them poorly. ​ X Businesses must be cautious about what they post , to not accidentally offend others and damage their reputation . Emails Emails can be used to provide information to a large amount of people almost instantly . A company may use an email to advertise new products , inform potential customers of a marketing promotion or target specific users based on previous interactions. Advantages of Emails Disadvantages of Emails ✓ Faster (almost instant) and cheaper (usually free) to send an email compared to traditional letters . ​ ✓ Files can be attached to the email, such as images, videos or forms to complete. ​ ✓ An audit trail can be kept, recording communication between the company and its customers. ​ ✓ Emails can be sent, delivered and read at the user's convenience and to any internet-enabled device across the world . X An internet connection is required to open and read the email. Larger attachments may not open on mobile devices. ​ X Malware can spread through email attachments. Phishers use emails to gain access to personal information and account details . ​ X Some attachments sent via email may be unreadable on different devices / operating systems. ​ X Emails may automatically go into the spam / junk folder and be deleted without being read . Document Stores Document stores allow users to store online files in cloud storage . Common services are Google Drive , Dropbox and Microsoft's OneDrive . Storing documents in the cloud allows users to edit and access them from any location with an internet connection and opens up opportunities for collaboration . Many organisations offer cloud storage space for free up to a certain amount before charging customers for more data. ​ Document stores are very convenient for users and replace the need for portable storage devices like USB sticks. Teachers can use documents stores to share resources with other staff in a school . Documents stores can only be accessed with an internet connection so files will be unavailable during maintenance or network failure. Users rely on the cloud hosting provider, such as Microsoft and Google to keep the data secure and available . RSS Feeds RSS Feeds (short for Rich Site Summary ) allow users to subscribe to updates from their favourite websites. It is a web feed that updates whenever a subscribed site releases new information. For example, the BBC used to post updates for important news headlines which appeared in a subscribed user's RSS feed. As of 2020 most browsers no longer have built-in RSS functionality and it is rarely used . Q uesto's Q uestions 1.6 - Information Formats: ​ 1. Describe the difference between static and dynamic web pages . [4 ] ​ 2. For each type of information format describe its advantages and disadvantages . a. Blogs [8 ] b. Podcasts [8 ] c. Streamed Audio / Video [8 ] d. Social Media [8 ] e. Emails [8 ] ​ 3. Explain how document stores could be used by organisations and individuals . [4 ] ​ 4. Explain what an RSS feed is and how an organisation could use it . [3 ] 1.5 - WWW Technologies Topic List 1.7 & 1.8 - Internet Pros & Cons

  • 1.3 - Access & Devices | Unit 2 | OCR Cambridge Technicals | CSNewbs

    1.3 - Access & Storage Devices Exam Board: OCR Specification: 2016 - Unit 2 Handheld Devices Examples of handheld devices: Handheld devices are small, light and possibly can be worn on the human body. These devices are very portable and easy to transport but their small size restricts the space for a powerful processor or high memory capacity. Handheld devices are becoming more powerful over time with extra features, storage options and network connectivity. ​ Advantages: Light and portable so they can be easily carried on a person or in a pocket . Runs on battery power so do not need to be plugged into a power source (unless to charge) allowing for freedom of movement . ​ Disadvantages: Low processing power due to small size and no cooling system . Relies on battery power which may not last for long. More likely to be lost, damaged or stolen . Generally small memory / storage capacity and low versatility . Smartphone Small Tablet eReader Smartwatch Portable Devices Examples of portable devices: Portable devices are larger and more powerful than handheld devices and can be carried easily in a bag. Laptops and larger tablets are the main examples of portable devices. ​ ​ Advantages: Light and portable so they can be easily transported in a laptop bag or small rucksack. Runs on battery power so they can work without a power outlet , such as to complete work on a train or in a library. More powerful and versatile than handheld devices. ​ Disadvantages: Lower processing power and smaller memory / storage capacity than fixed devices like desktops. Reliant on their battery power which may only be a few hours. Laptop Large Tablet Fixed Devices Examples of fixed devices: Fixed devices are bulky devices that require a constant power connection . The most common example of a fixed device is a desktop computer which has a higher processing power and storage capacity than handheld and portable devices. ​ Advantages: Desktop computers have the highest processing power of commercially available home / work computers and contain sufficient cooling systems to maintain temperature. Desktops and games consoles have large storage capacities and can be upgraded / expanded to even larger sizes. Desktop computers are very versatile and are powerful enough to be used for thousands of different purposes, from basic word processing and web browsing to server roles and data mining. ​ Disadvantages: Reliant on a power outlet and cannot be transported whilst on. Heavy and difficult to move . May require additional components like a monitor. Typically more expensive than handheld and portable devices. Desktop Games Console Smart TV Shared Devices A shared device allows multiple users to access data at the same time . Cloud storage is the most common example of a shared device and is used by individuals, schools and businesses around the world through services such as Google Drive, Apple's iCloud and Microsoft's One Drive. A data centre is a dedicated building that contains computer systems - Facebook uses data centres across the globe so that their social media service can be available to users every second of the day. Database servers were explained in Unit 1 section 3.1 . ​ Advantages: A ccessible by multiple users at the same time . For example, the database server can be accessed by employees of a bank simultaneously. Data centres allow online services to run all hours of the day and year . For example, Google uses data centres across the world to ensure their services can be accessed all of the time. Cloud storage frees up physical space for users as the storage is located (usually) on third-party servers. Cloud storage devices allow authorised users such as clients or staff members to access information or work remotely (outside of the office). ​ Disadvantages: Shared devices are reliant on stable network connections . If a connection is lost, access to the device will be affected . Setting up shared devices within an organisation requires technical knowledge , especially for companies establishing their own cloud storage or data centre. Examples of shared devices: Cloud Storage Data Centre Database Server Q uesto's Q uestions 1.3 - Access & Storage Devices: ​ 1. Identify the type of device that the following devices fit into: a. Laptop b. Cloud storage c. Desktop computer d. Smartphone [4 ] ​ 2. Describe the advantages and disadvantages of using each of the 4 types of storage devices. a. Handheld devices [6 ] b. Portable devices [6 ] c. Fixed devices [6 ] d. Shared devices [6 ] ​ 3. For the following scenarios explain which specific device (not type) which would be suitable. You must also justify your choice . a. Working on a spreadsheet on a train before work. [4 ] b. Taking a video of a penalty in a football match to upload to Twitter. [4 ] c. Working on a file with team members located across the country. [4 ] d. Playing Civilization VI on highest settings whilst listening to rock climbing podcasts in a separate tab. [4 ] 1.2 - Storage Media Topic List 1.4 - Internet Connections

  • 4.1 - Security Threats - OCR GCSE (2020 Spec) | CSNewbs

    4.1: Security Threats Exam Board: OCR Specification: 2020 Types of Malware ​Malware is any type of harmful program that seeks to damage or gain unauthorised access to your computer system. Virus A virus can replicate itself and spread from system to system by attaching itself to infected files . A virus is only activated when opened by a human . Once activated, a virus can change data or corrupt a system so that it stops working . Worm A worm can replicate itself and spread from system to system by finding weaknesses in software . A worm does not need an infected file or human interaction to spread. A worm can spread very quickly across a network once it has infiltrated it. Trojan A trojan is a harmful program that looks like legitimate software so users are tricked into installing it . A trojan secretly gives the attacker backdoor access to the system . Trojans do not self replicate or infect other files. Spyware Spyware secretly records the activities of a user on a computer. The main aim of spyware is to record usernames, passwords and credit card information . All recorded information is secretly passed back to the attacker to use. Keylogger A keylogger secretly records the key presses of a user on a computer. Data is stored or sent back to the attacker. The main aim of a keylogger is to record usernames, passwords and credit card information . Keyloggers can be downloaded or plugged into the USB port . Ransomware Ransomware locks files on a computer system using encryption so that a user can no longer access them. The attacker demands money from the victim to decrypt (unlock) the data . ? ? ? ? Attackers usually use digital currencies like bitcoin which makes it hard to trace them. SQL Injection SQL ( Structured Query Language ) is a programming language used for manipulating data in databases . ​ A SQL injection is when a malicious SQL query (command) is entered into a data input box on a website. ​ If the website is insecure then the SQL query can trick the website into giving unauthorised access to the website’s database . ​ An SQL injection can be used to view and edit the contents of a database or even gain administrator privileges . ' or 1 = 1 DoS Attack A DoS (Denial of Service ) attack is when a computer repeatedly sends requests to a server to overload the system . A server overload will slow the system and may take websites offline temporarily. ​ A DDoS (Distributed Denial of Service ) attack is a coordinated attack using a botnet of infected systems to overload a server with requests . A botnet is a large group of devices controlled and used maliciously by an attacker. Brute-Force Attack Every possible combination is tested in order from start to finish . This is not a quick method but it should break the password eventually and can be sped up if multiple computer systems are used at the same time. Social Engineering Social engineering means to trick others into revealing their personal data by posing as a trusted source . For example, impersonating an IT technician of a school via email and asking for a student's username and password . Interception This is when data packets on a network are intercepted by a third party (e.g. a hacker) and copied to a different location than the intended destination. ​ Software called packet sniffers are used to intercept and analyse data packets. 4.1 - Security Threats: 1. What is malware ? [ 2 ] 2a. Describe three characteristics of a virus . [3 ] 2b. Describe three characteristics of a worm . [3 ] 2c. What is a trojan ? [ 3 ] 2d. Describe how spyware and keyloggers work. [ 4 ] 2e. Explain how ransomware works and why it is difficult to trace attackers . [ 3 ] 2f. In your opinion, which malware do you think is the most dangerous and why ? [ 2 ] 3. Describe what an SQL injection is and how an attacker would use it. [ 3 ] ​ 4a. Describe what a DoS attack is and its impact . [2 ] 4b. Describe how a DDoS attack is different to a DoS attack . [2 ] ​ 5a. Describe a brute-force attack. [ 2 ] 5b. Describe social engineering and give an example of when it might be used . [2 ] 5c. Describe interception . [2 ] Q uesto's Q uestions 3.2b - Protocols & Layers Theory Topics 4.2 - Preventing Vulnerabilities

  • 3.2b - Protocols & Layers - OCR GCSE (2020 Spec) | CSNewbs

    3.2b: Protocols & Layers Exam Board: OCR Specification: 2020 Protocols A protocol is a set of rules that allow devices on a network to communicate with each other . TCP / IP (Transmission Control Protocol / Internet Protocol) TCP / IP is actually two separate protocols that combine together. ​​TCP is a protocol that allows packets to be sent and received between computer systems. It breaks the data into packets and reassembles them back into the original data at the destination. IP is a protocol in charge of routing and addressing data packets . This ensures data packets are sent across networks to the correct destination . It is also an addressing system - every device on a network is given a unique IP address so data packets can be sent to the correct computer system. HTTP is used to transfer web pages over the Internet so that users can view them in a web browser . All URLs start with either HTTP or HTTPS (e.g. https://www.csnewbs.com). HTTPS is a more secure version of HTTP that works with another protocol called SSL ( Secure Sockets Layer ) to transfer encrypted data . You should see a padlock symbol in the URL bar if your connection to that website is secure. HTTP/HTTPS (Hypertext Transfer Protocol) Transfer Protocols FTP ( File Transfer Protocol ) is used to transfer files across a network. It is commonly used to upload or download files to/from a web server . SMTP ( Simple Mail Transfer Protocol ) is a protocol used to send emails to a mail server and between mail servers . POP ( Post Office Protocol ) and IMAP (Internet Message Access Protocol ) are both protocols for receiving and storing emails from a mail server. POP will delete an email once it has been downloaded to a device . Pop! IMAP syncs the message with an email server so it can be accessed by different devices . IP vs MAC Address There are two versions of IP addressing currently used - IPv4 and IPv6 . IPv4 uses a 32-bit address that allows for over 4 billion unique addresses . IPv4 uses a numeric dot-decimal notation like this: 212.58.244.66 4 billion unique addresses may sound like a lot but there are nearly 8 billion people in the world. Therefore a newer version - IPv6 - was developed with a 128-bit address , represented in hexadecimal that allows for a mind-boggling number of unique addresses. A MAC address is a unique hexadecimal number assigned to each network interface card inside a networked device e.g. a router or a laptop . While an IP address may change , the MAC address can’t be changed . Networking Standards Networking standards are rules that allow computer systems to communicate across networks . Standards have been created to ensure devices can exchange data and work together . 4-Layer TCP/IP Model The TCP/IP model is split into 4 layers . The model is used to visualise the different parts of a network as each of the four layers has a specific role . ​ Splitting a network design into layers is beneficial to programmers as it simplifies design , making it easier to modify and use . ​ Each layer has a certain purpose and is associated with different protocols . ​ The four layers are explained below: 4 Allows humans and software applications to use the network e.g. browsers (HTTP /HTTPS ) and email (SMTP ) and file transfer (FTP ). 3 TCP breaks the data down into data packets . This layer makes sure the data is sent and received in the correct order and reassembled at the destination without errors. 2 IP is responsible for addressing and routing data packets . The optimal route for the data to take is calculated in this layer. Also known as the 'Internet Layer '. 1 Ethernet sets out the format of data packets . This layer handles transmission errors and passes data to the physical layer . Q uesto's Q uestions 3.2b - Protocols & Layers: 1. Describe each of the following protocols . It might be helpful to also draw an icon or small diagram for each one: a. TCP [ 2 ] b. IP [ 2 ] c. HTTP & HTTPS [ 3 ] d. FTP [ 2 ] e. SMTP [ 2 ] f. POP3 & IMAP [ 2 ] ​ 2. State which protocol would be used in the following scenarios : a. Transferring a music file to a friend over the internet. [ 1 ] b. Sending an email to a family member in America. [ 1 ] c. Using a webpage to enter a password securely. [ 1 ] d. Receiving an email from a bank. [ 1 ] ​ ​ 3a. What are networking standards ? [ 2 ] 3b. Describe why network designs are split into layers . [ 2 ] ​ 4. Create a diagram similar to the one above and describe each layer of the TCP/IP Model. [ 8 ] ​ 5. Look at the statements below and name the layer that is being described: a. This layer ensures data packets are sent and received correctly. b. This layer checks for errors in transmission and sets out the data packet format. c. This layer allows software like web browsers to interact with the network. d. This layer uses addresses to ensure data packets take the correct route. [ 7 ] 3.2a - Wired & Wireless Networks Theory Topics 4.1 - Security Threats

  • 2.3 - Quality of Information | Unit 2 | OCR Cambridge Technicals | CSNewbs

    2.3 - Quality of Information Exam Board: OCR Specification: 2016 - Unit 2 Information Characteristics Valid Information This is correct, up-to-date and complete information that fits its purpose . For example, detailed end-of-year financial data in the form of graphs. Biased Information This is technically correct, but slanted , information that presents a one-sided view . For example, end-of year financial data that focuses on profits and ignores significant losses. Relevant Information Information should be appropriate for the required purpose . Irrelevant information may get in the way of correct decision making. Accurate Information Information should be carefully selected and entirely correct , inaccurate information can lead to unwanted consequences such as higher costs and missed deadlines. Reliable Information Information from a source that can be verified and confirmed to be correct . For example, BBC News is a more reliable information source than social media posts. Information Quality The quality of information that an organisation uses will have a significant impact on further processes and decisions. ​ Good quality information that is accurate , valid or reliable can lead to better strategic decisions , meeting deadlines and innovation . ​ Poor quality information that is biased , inaccurate or out of date may lead to negative consequences such as loss of customer trust , fines and legal challenges . Positive Effects of Good Quality Information Reliable information received by the management team . Good quality research information. Good quality sales information. Accurate cost projection information. Informed decisions with a higher chance of success . Can lead to innovation and better understanding . Strategic decisions and planning ahead . Projects will stay within their budget . Accurate time expectations . Projects will be completed on time . Negative Effects of Poor Quality Information Biased survey with inaccurate results . Inaccurate stock information. Out of date information received by management . Inaccurate data has led to poor reviews online . Inaccurate time expectations. Misinformed decisions , not responding to customers needs . ??? Inaccurate delivery times , customers unhappy . Too much / little stock. Miss out on opportunities , possible fall in profits . Loss of customer trust , loss of customers and reputation . Financial issues . Projects take longer , cost more , stakeholders unhappy . Possible project failure . Q uesto's Q uestions 2.3 - Quality of Information: ​ 1. Describe 5 characteristics of information . [10 ] ​ 2. Explain 5 positive impacts of good quality information . [10 ] ​ 3. Explain 5 negative impacts of poor quality information . [10 ] 2.2 - Information Classification 2.4 - Information Management Topic List

  • OCR CTech IT | Unit 1 | 1.7 - Units of Measurement | CSNewbs

    1.7 - Units of Measurement Exam Board: OCR Specification: 2016 - Unit 1 All computer systems communicate, process and store data using binary . ​ Binary is a number system consisting entirely of 0s and 1s. ​ A single binary value (a 0 or a 1) is called a bit . 4 bits is called a nibble (e.g. 0101 or 1100). 8 bits is called a byte (e.g. 10101001 01011100). ​ There are two main measurement systems : Metric Units of Measurement The metric system is also known as the decimal system . Metric values (usually) have a prefix ending in ‘a’ such as mega byte or giga byte. ​ The gap between units is always 1,000 . For example, 1,000 bytes in a kilobyte and 1,000 kilobytes in 1 megabyte. Binary Units of Measurement Bi nary values have a prefix ending in ‘bi’ such as kibi byte or mebi byte. ​ The gap between units is always 1,024 . For example, 1,024 bytes in a kibibyte and 1,024 kibibytes in 1 mebibyte. ​ Computer scientists use the binary system of measurement because the storage size is technically more accurate . Q uesto's Q uestions 1.7 - Units of Measurement: ​ 1. a. How many bits in a nibble? b. Put the following values in order from largest to smallest: MiB, TiB, PiB, KiB, GiB c. How many gigabytes make a terabyte? d. How many tebibytes make a pebibyte? 1.6 - Hardware Troubleshooting 1.8 & 1.9 - Number Systems Topic List

  • 1.6 - Additional Hardware - Eduqas GCSE (2020 spec) | CSNewbs

    1.6: Additional Hardware Exam Board: Eduqas / WJEC Specification: 2020 + 1.6a - Internal Hardware Motherboard The motherboard is the main circuit board of a computer , unique for each device. It holds and connects the different components together , allowing data to be transferred between them. Components such as the CPU and ROM are directly attached to the motherboard. The motherboard has expansion slots for additional cards (i.e. sound cards) and ports (i.e. USB). Graphics Processing Unit (GPU) Sound Card A GPU is a microprocessor that performs complex calculations to generate graphical images to be displayed on a monitor . ​ There are two types of GPU, integrated GPUs within the motherboard circuitry or dedicated GPUs on an additional card (known as a 'graphics card'). ​ An integrated GPU is cheaper and generates less power because it uses the RAM of the computer . Integrated GPUs are used in tablets and laptops as they generate less heat and are optimal for general computing uses (e.g. web browsing or watching movies). ​ A dedicated GPU is more expensive and generates more heat, often requiring a fan because it contains its own memory . Dedicated cards are used by animation professionals and professional gamers who require the best graphics. Sound cards convert analogue sound waves into digital data (binary) when inputting audio through a microphone.​ 0010 1011 0101 0101 0110 0111 0101 0001 0101 0010 1011 0101 0101 0110 0111 0101 0001 0101 Sound cards also convert digital data (binary) into analogue sound waves to output audio through speakers or headphones. 1.6b - Embedded Systems Example: A washing machine has a control chip that manages the different program cycles. An embedded system is a computer system built into a larger machine to provide a means of control . ​ Embedded systems perform a specific pre-programmed task which is stored in ROM . ​ An embedded system uses a combination of hardware and software . Example: A traffic light has a control chip that determines when to change to a green or red light. 1.6c - Input & Output Devices Input devices are used by humans to interact with a computer system , through methods such as text , voice or touch . ​ Output devices show the result of computer processing , such as sound , printed text or a visual display on a monitor. ​ Storage devices , such as a USB stick or an external hard drive, are neither input nor output devices - see 1.4 . Input Devices These are just some of the more common input devices . A mouse and a keyboard have been described in further detail. Are there any devices below you haven't heard of before? Mouse Benefits: Easy to navigate a graphical user interface. A wireless mouse takes up less space . Faster to select options (e.g. in a video game). Drawbacks: Difficult to use for people with restricted hand movement . Difficult to use on some surfaces . Other input devices: ​ Scanner Controller Microphone Webcam Chip Reader OCR Scanner OMR Scanner Barcode Scanner Graphics Tablet Sensors (e.g. light or temperature) Touch Screen Remote Control Biometric Scanner (e.g. fingerprint or iris) Concept Keyboard Sip / Puff Switch Keyboard Benefits: Quick to input text . Easy to use with a familiar layout on most keyboards. Keys can be customised and shortcuts can be used . Drawbacks: Takes up a large amount of space on a desk. Difficult for people to use with restricted hand movement or poor eyesight . Output Devices Monitor These are just some of the more common output devices . ​ A monitor and a printer have been described in further detail. Are there any devices below you haven't heard of before? Other output devices: ​ ​ Plotter Speakers Projector Alarm Light Headphones Touch Screen Braille Terminal What is it? A monitor is required to see the result of human input and computer processing . Monitors can be bought in different sizes and resolutions for a range of purposes such as video editing or playing games . Monitors settings can be changed to alter the brightness or contrast . Printer What is it? A printer uses ink or toner to print a document (such as text or images) onto paper . Inkjet printers use ink cartridges , are generally slower and print in a lower quality . Laser printers use toner cartridges and are generally quicker and print to a higher quality . Q uesto's Q uestions 1.6 - Additional Hardware: 1.6a - Internal Hardware 1. What is the purpose of the motherboard ? [2 ] ​ 2a. What is the purpose of the GPU ? [ 2 ] 2b. Describe two differences between integrated and dedicated expansion cards . [ 4 ] ​ 3. Explain how a sound card works. [ 4 ] ​ 1.6b - Embedded Systems 1. What is an embedded system ? [3 ] ​ 2a. Give two examples of an embedded system. [ 2 ] 2b. Research and describe another example of an embedded system. [ 2 ] ​ 1.6c - Input & Out[ut Devices 1. Choose four input devices and describe at least two benefits and two drawbacks of using each one. [ 8 ] ​ 2. Describe three output devices . [ 3 ] ​ 3. Justify which input and output devices would be most suitable in the following scenarios: a. A teacher needs to take the class register . [ 4 ] b. A family want to communicate with their cousins in Australia. [ 4 ] c. The school movie club wants to play Star Wars in the assembly hall. [ 4 ] d. An e-sports player is taking part in an online multiplayer tournament . [ 4 ] e. A laboratory needs security so that only registered scientists can enter. [ 4 ] 1.5 - Performance 2.1 - Logical Operators Theory Topics

  • 5.2 - Utility Software - OCR GCSE (2020 Spec) | CSNewbs

    5.2: Utility Software What is utility software? Utility software are dedicated programs used for the maintenance and organisation of a computer system. ​ Anti-malware (such as an anti-virus or anti-spyware ), firewall and encryption software are examples of utilities and have been explained in section 4.2 . ​ Data Compression is another utility that has been explained in section 2.5 . ​ Other utility software include backup software , disk checkers , disk formatters and auto-updaters . Exam Board: OCR Specification: 2020 Defragmentation What is fragmentation and how does it happen? Over time files stored on a hard disk drive may become fragmented - this is when the file is split into parts that are saved in different storage locations . Fragmentation occurs when there is limited contiguous space in which to store a file . This may happen as data is stored and then later deleted on the hard drive . New files are created which may be bigger than the spaces left by the deleted files . The new files are then split up . Fragmentation increases access time - files that are fragmented take longer to load and read because of the distance between the fragments of the file. How does defragmentation work? Empty spaces are collected together on the hard disk drive and file fragments are moved to be stored together. ​ This means that fewer disc accesses are needed (requiring less physical movement ) as file fragments can be read consecutively . What are the effects of defragmentation? A defragmented file takes less time to read and access because the data is stored contiguously . The read/write head of the hard drive does not need to move as far to read the next piece of data because it is in the adjacent memory location , saving time . It also quicker to save new files because there is more free space together so it does not need to split the file and can store the data contiguously . Q uesto's Q uestions 5.2 - Utility Software: ​ 1. Explain what fragmentation is and how a file may become fragmented . [ 3 ] 2. Describe the process of defragmentation . [ 3 ] 3. Explain the effects of defragmenting a hard disk drive. [ 3 ] 5.1 - Operating Systems Theory Topics 6.1a - Impacts of Technology

  • 10.1 - Translators - Eduqas GCSE (2020 Spec) | CSNewbs

    10.1: Translators Exam Board: Eduqas / WJEC Specification: 2020 + What is a translator? A translator changes (translates) a program written in one language into another language (usually machine code ). There are three types of translator : Assembler An assembler converts low level assembly language into machine code . INP STA 33 INP STA 34 LDA 33 ADD OUT HLT Interpreter An interpreter converts high-level language one line at a time into machine code and executes it. PYT HON Compiler A compiler converts high-level language into machine code for execution at a later time. The entire program is converted at once . PYT HON 0010 1011 0101 0101 0110 0111 0101 0001 0101 0101 0010 1011 0101 0101 0110 0111 0101 0001 0101 0101 0010 1011 0101 0101 0110 0111 0101 0001 0101 0101 Differences between an interpreter and a Compiler: Interpreter Compiler Execution Method: An interpreter translates source code (high level code) into machine code one line at a time . ​ Execution Speed: An interpreter is slower than a compiler because the code must be reinterpreted each time the program is run. ​ Complexity: Interpreters are smaller, simpler programs . ​ Error Reporting: In error reporting, the interpreter would encounter the errors and report it to the user immediately and stops the program from running.​ ​ Repetition: Interpreted programs can be edited and run without translating the whole program . Interpreters must reinterpret the program every time it is run. Execution Method: A compiler translates all the source code (high level code) into machine code in one go . A compiler produces an executable file that will run on other machines without the compiler needing to be installed. ​ Execution Speed: Compilers can produce much more efficient code than interpreters making the compiled programs run faster . ​ Complexity: Compilers tend to be large complex programs . ​ ​ Error Reporting: The compiler would analyse the entire program , taking note of where errors have occurred and record them in an error file . ​ Repetition: Compilation requires analysis and the generation of the code only once , whereas interpreters must re-interpret each time. However, compiled programs have to be re-compiled after any changes have been made. x1 ∞ x1 Q uesto's Q uestions 10.1 - Translators: ​ 1. Briefly describe each type of translator : a. Assembler [ 1 ] b. Interpreter [ 2 ] c. Compiler [ 2 ] ​ 2. Compare interpreters and compilers for each of the following features : a. Execution Method b. Execution Speed c. Complexity d. Error Reporting e. Repetition [ 10 total ] 9.1 - IDE Tools Theory Topics 10.2 - Stages of Compilation

  • HTML Guide 2 - Essential Tags | CSNewbs

    2. Creating Essential Tags HTML Guide Watch on YouTube: What is a tag ? HTML uses tags to define the content of a webpage . ​ A tag uses angle brackets - they look just like my teeth... ​ Some examples of tags are and and ​ ​ ​ Most tags have a start tag and an end tag . The actual content is written in between the tags . For example : ​ The p tag is used to write a paragraph ​ Notice that the end tag uses a forward slash . < > Essential Tags There are three tags that are essential for every HTML web page : ​ - This tag declares the start and the end of your html web page. - The head is the part of the web page that the user will not see. - The body holds all of the content of the web page (text, images, video etc.) ​ Don't forget to use backslash for the end tags : / Use the image on the right to add the three essential tags (and their end tags) to your document. Now it is time to add something we can actually see! Text tags are up next. 1. Setup HTML Guide 3. Text Tags

bottom of page