top of page

Search CSNewbs

304 results found with an empty search

  • OCR CTech IT | Unit 1 | 2.4 - Operating Systems | CSNewbs

    Learn about different types of operating systems and the various roles that they manage, including memory, security and processing. Based on the 2016 OCR Cambridge Technicals Level 3 IT specification. 2.4: Operating Systems Exam Board: OCR Specification: 2016 - Unit 1 An operating system (OS) is software that manages the resources of a computer system . The operating system is loaded by the BIOS (Basic Input / Output System). Types of Operating System Single user operating systems are found on most desktop computers, laptops and tablets where only one person will use the device at a single time. Multi-user operating systems allow more than one user to access the processor simultaneously , such as a server that users, with correct permissions , can access remotely . However, one user should not be negatively impacted by another user on the same operating system and security must be managed carefully as data may be visible to other users . Single Processor operating systems have only a single processor (CPU), which is shared between users by dividing the CPU time into time-slices and allocating one of these to each user in turn. The time-slices are very short, giving each user the impression that their programs are running continuously. Multiple Processor operating systems have more than one processor (CPU). Users still have to share processors and it is a more complicated system but performance is improved as there are fewer users per processor. Some supercomputers have thousands of processors running in parallel. Operating systems can also be off-the-shelf , open-source or bespoke . See 2.1 . What are the roles of an Operating System? Manage Input / Output Devices Receives data from input devices (e.g. a keyboard). Sends data to output devices (e.g. a monitor) in the correct format . Manage Printing Checks the printer is free then uses spooling (storing data in a queue ) to print documents in order. Manage Backing (Secondary) Storage Ensures data is stored correctly and can be retrieved from secondary storage devices (e.g. hard drive / SSD ). Organises files in a hierarchical structure. Manage Memory (RAM) Ensures that programs / data do not corrupt each other and are stored in correct memory locations . Manage Processes Ensures different processes can utilise the CPU and do not interfere with each other or crash. On most OS the tasks appear to run simultaneously . Manage Security Allows users to create, manage and delete user accounts with different permissions. Allows users to logon and change passwords . User Interface The final function of an operating system is to provide a user interface . This includes: A folder and file system is displayed and manipulated allowing for copying , searching , sorting and deleting data. Icons are displayed to represent shortcuts to applications and files. Multiple windows can be opened at the same time and switched between. The interface can be customised , such as changing font sizes and the desktop background . System settings can be accessed such as network and hardware options . Q uesto's Q uestions 2.4 - Operating Systems: 1. Describe five different roles of the operating system. Include the importance of the operating system in performing each role. [ 5 ] 2. What is the difference between single user and multi-user operating systems? [2 ] 3. What is the difference between single processing and multi-processing operating systems? [2 ] 4. Using your knowledge from 2.1 Software Types, explain two advantages and one disadvantage to a company if they decided to use a closed source operating system. [6 ] 2.3 Utility Software Topic List 2.5 Communication Methods

  • Python | 12 - Error Handling | CSNewbs

    Learn how to handle errors in Python. Try practice tasks and learn through text and images. Perfect for students learning GCSE Computer Science in UK schools. Python 12 - Error Handling Errors When an error occurs in Python, you may see a chunk of red text like this. This is very useful when creating programs as it tells us the exact line of the error (10), and its type (NameError). However, a completed program should have code in place for when an unexpected error occurs – we call this exception handling . General Exception In this example, Python will attempt to run the code indented beneath try . If there are no errors then the code will stop just before except . If an error does occur then the Exception code will be run . If we enter a correct value then the program will execute normally: But if an error occurs (such as writing a string when an integer is expected) then the Exception code will run : You can add the else command to your code that will execute only if there are no errors : If a valid number is entered then the else code will be printed: If a code generating an error is entered then the except code will be printed: Practice Task 1 Create a program that asks the user to input their age. Don't forget to use the int command. Use try and except to print a message if a number is not inputted. Example solution: Specific Exceptions The Exception command used in the section above is for any general error that occurs. You can also use specific except commands for a variety of errors. Below is a program with two different specific exception commands for one try statement: If a Value Error occurs, such as when the wrong data type is entered , then related code will be printed: Or if the user tries to divide by zero then a Zero Division Error will be triggered which prints a relevant response: Other types of exception can be found here . Practice Task 2 Create a program that asks the user to input a number and then divides this value by 999. Create a Value Error and Zero Division Error exception and include an appropriate message in both. Example solution for Zero Division: ⬅ 11 - Graphical User Interfac e Extended Task 1 (Pork Pies) ➡

  • Scams & Staying Safe | Key Stage 3 | CSNewbs

    Learn how to spot a phishing email and other ways to stay secure online including choosing strong passwords. Scams & Staying Safe Part 1: Phishing Scams A phishing scam is when an attacker will send you an email pretending to be someone you trust . They are trying to get your username, password or other sensitive information . What does a phishing email look like? Capital letters and exclamation marks may be used to create a sense of urgency. A phishing email might be sent from a long, unrecognisable email address . It may be similar but slightly different to a real email address. An attacker might not know your name , so they will use your email address. A phishing email might contain spelling and grammar mistakes , so look carefully. Check any links carefully , if it looks suspicious, don't click it. Phishing emails try to rush you into making a silly decision. Don't panic and read the email carefully. Part 2: Secure webpages When you are browsing the web , you should stick to websites that you know and trust. Don't click on any links that you don't recognise , especially from strangers . How do i know a web page is secure? HTTP is a protocol (set of rules) for displaying a web page . If the web address at the top of your web browser starts with HTTP then it is not secure . Do not enter any personal information on an insecure web page. HTTPS is a protocol (set of rules) for displaying a secure web page. If you see a padlock in the address bar of your web browser then you know it is safer to enter information . Part 3: Strong passwords Your passwords must be secure so they cannot be broken easily. How to choose a strong password: ********* Passwords should be more than at least 8 characters long. Passwords should use numbers and punctuation marks . Aa Bb Cc Dd Ee Passwords should use uppercase and lowercase letters . You should use a different password for each account that you have. Passwords should not use words found in the dictionary . KS3 Home

  • 1.3 - Access & Devices | Unit 2 | OCR Cambridge Technicals | CSNewbs

    Learn about different categories of computer systems that can be used to access information including handheld, fixed and shared devices. Based on the 2016 OCR Cambridge Technicals Level 3 IT specification for Unit 2 (Global Information). 1.3 - Access & Storage Devices Exam Board: OCR Specification: 2016 - Unit 2 Handheld Devices Examples of handheld devices: Handheld devices are small, light and possibly can be worn on the human body. These devices are very portable and easy to transport but their small size restricts the space for a powerful processor or high memory capacity. Handheld devices are becoming more powerful over time with extra features, storage options and network connectivity. Advantages: Light and portable so they can be easily carried on a person or in a pocket . Runs on battery power so do not need to be plugged into a power source (unless to charge) allowing for freedom of movement . Disadvantages: Low processing power due to small size and no cooling system . Relies on battery power which may not last for long. More likely to be lost, damaged or stolen . Generally small memory / storage capacity and low versatility . Smartphone Small Tablet eReader Smartwatch Portable Devices Examples of portable devices: Portable devices are larger and more powerful than handheld devices and can be carried easily in a bag. Laptops and larger tablets are the main examples of portable devices. Advantages: Light and portable so they can be easily transported in a laptop bag or small rucksack. Runs on battery power so they can work without a power outlet , such as to complete work on a train or in a library. More powerful and versatile than handheld devices. Disadvantages: Lower processing power and smaller memory / storage capacity than fixed devices like desktops. Reliant on their battery power which may only be a few hours. Laptop Large Tablet Fixed Devices Examples of fixed devices: Fixed devices are bulky devices that require a constant power connection . The most common example of a fixed device is a desktop computer which has a higher processing power and storage capacity than handheld and portable devices. Advantages: Desktop computers have the highest processing power of commercially available home / work computers and contain sufficient cooling systems to maintain temperature. Desktops and games consoles have large storage capacities and can be upgraded / expanded to even larger sizes. Desktop computers are very versatile and are powerful enough to be used for thousands of different purposes, from basic word processing and web browsing to server roles and data mining. Disadvantages: Reliant on a power outlet and cannot be transported whilst on. Heavy and difficult to move . May require additional components like a monitor. Typically more expensive than handheld and portable devices. Desktop Games Console Smart TV Shared Devices A shared device allows multiple users to access data at the same time . Cloud storage is the most common example of a shared device and is used by individuals, schools and businesses around the world through services such as Google Drive, Apple's iCloud and Microsoft's One Drive. A data centre is a dedicated building that contains computer systems - Facebook uses data centres across the globe so that their social media service can be available to users every second of the day. Database servers were explained in Unit 1 section 3.1 . Advantages: A ccessible by multiple users at the same time . For example, the database server can be accessed by employees of a bank simultaneously. Data centres allow online services to run all hours of the day and year . For example, Google uses data centres across the world to ensure their services can be accessed all of the time. Cloud storage frees up physical space for users as the storage is located (usually) on third-party servers. Cloud storage devices allow authorised users such as clients or staff members to access information or work remotely (outside of the office). Disadvantages: Shared devices are reliant on stable network connections . If a connection is lost, access to the device will be affected . Setting up shared devices within an organisation requires technical knowledge , especially for companies establishing their own cloud storage or data centre. Examples of shared devices: Cloud Storage Data Centre Database Server Q uesto's Q uestions 1.3 - Access & Storage Devices: 1. Identify the type of device that the following devices fit into: a. Laptop b. Cloud storage c. Desktop computer d. Smartphone [4 ] 2. Describe the advantages and disadvantages of using each of the 4 types of storage devices. a. Handheld devices [6 ] b. Portable devices [6 ] c. Fixed devices [6 ] d. Shared devices [6 ] 3. For the following scenarios explain which specific device (not type) which would be suitable. You must also justify your choice . a. Working on a spreadsheet on a train before work. [4 ] b. Taking a video of a penalty in a football match to upload to Twitter. [4 ] c. Working on a file with team members located across the country. [4 ] d. Playing Civilization VI on highest settings whilst listening to rock climbing podcasts in a separate tab. [4 ] 1.2 - Storage Media Topic List 1.4 - Internet Connections

  • Unit 1 - Fundamentals of IT - Cambridge Technicals | CSNewbs

    Navigate between all Unit 1 (Fundamentals of IT) topics in the OCR Cambridge Technicals Level 3 IT 2016 specification. OCR Cambridge Technicals IT Level 3 Unit 1: Fundamentals of IT These pages are based on content from the OCR Cambridge Technicals 2016 Level 3 IT specification . This website is in no way affiliated with OCR . This qualification stopped in July 2025. The pages on the site will remain for at least two years. LO1 (Computer Hardware ) 1.1 - Computer Hardware 1.2 - Computer Components 1.3 - Types of Computer System 1.4 - Connectivity 1.5 - Communication Hardware 1.6 - Hardware Troubleshooting 1.7 - Units of Measurement 1.8 & 1.9 - Number Systems & Conversion LO2 (Computer Software ) 2.1 - Types of Software 2.2 - Applications Software 2.3 - Utility Software 2.4 - Operating Systems 2.5 - Communication Methods 2.6 - Software Troubleshooting 2.7 - Protocols LO3 (Networks & Systems ) 3.1 - Server Types 3.2 - Virtualisation 3.3 - Network Characteristics 3.4 - Connection Methods 3.5 - Business Systems LO4 ( Employability & Communication ) 4.1 - Communication Skills 4.2 - Communication Technology 4.3 - Personal Attributes 4.4 - Ready for Work 4.5 - Job Roles 4.6 & 4.7 - Bodies & Certification LO5 (Issues & Security ) 5.1 - Ethical Issues 5.2 - Operational Issues 5.3 - Threats 5.4 - Physical Security 5.5 - Digital Security 5.6 - Data & System Disposal

  • Greenfoot Guide #6 | Counter | CSNewbs

    Learn how to add a counter to Greenfoot to keep track of the score. Learn how to add and subtract points to the counter. Part 6 of the Greenfoot Tutorial for the Eduqas / WJEC GCSE 2016 specification. 6. The Counter Greenfoot Tutorial 1. Import the Counter The counter class can be imported into your Greenfoot world. Select Edit in the main Greenfoot window then ' Import Class... ' and choose Counter . Watch on YouTube: The Counter class will appear in the Actor classes list . Right-click on the Counter, choose the ' new Counter() ' option and drag it into the world. Now right-click on the background and select 'Save the World' once you have dragged the counter into the world. 2. Increase the Counter by 1 Two lines of code are required to increase the counter . Add this code when your main character is removing the collectible object . This code allows your main character to access the 'add' method from the Counter class . The method 'add ' just increases the value of the counter by the number in the brackets . To decrease the counter , type a negative value in the brackets, such as -1 . < Part 5 - Play Sounds 3. Compile and Run Click the Compile button at the top of the code editor . Then you can go back to the main Greenfoot window and click Run to test if your counter increases . Click on me if you've got an error that you're stuck with. Part 7 - Extension Ideas >

  • App Inventor 2 | Munchin' Pizza | CSNewbs

    Learn how to use App Inventor 2 to create simple programs. Try to complete task 3 on this page. Perfect for Key Stage 3 students to experiment with block coding, objects and properties. App Inventor Task 3 - Munchin' Pizza This page will teach you how to make a simple app that changes pictures when a button is pressed . You can make the app more complex by adding sounds or additional buttons. Step 1: Set up App Inventor 2 Open App Inventor 2 (use the button on the right) and create a new project. You will need to log in with a Google account. Download the picture images from the zipped folder on the App Inventor 2 Basics page here . Once you have downloaded the pizza pictures you will need to upload them. Find the Media tab on the right side of App Inventor and click 'Upload File...' You will need to upload each picture individually. In the Palette tab on the left side, drag two buttons into the middle screen so they look like this: In the Components tab on the right, click on Button1 and click the Rename button at the bottom to change it to Pizza . Then Rename Button2 to Munch . This will help us when we code later as it will be less confusing. Click on the second button (Munch) that you just dragged into the centre then look in the Properties tab on the right and scroll down to Text . Change 'Text for Munch' to something like 'Munch Pizza' . Now click on the first button in the centre (Pizza) and in the Properties tab, click on Image and select the first image. It should be the full slice of pizza. When you have set the image, you might notice it goes a bit crazy. Still in the Properties tab, change the Height and Width to 'Fill parent...' for both. This will make the image fit within the boundaries of the screen. Finally, change the Text for the Pizza button to be blank. Otherwise it will appear on top of the pizza and look odd. So far you should have a button disguised as a pizza and another button that tells you to munch that lovely cheesy deliciousness. If your program does not look like this, read the instructions above again carefully. Step 2: Code Click on the Blocks button in the top right to start adding code. In the Blocks tab on the left side click on Munch and drag the when Munch Click block into the centre. This block will execute any code inside of it whenever the munch button is clicked. In the Blocks tab on the left side click on Logic and drag an if then block and snap it inside the block you just dragged over. Click on the blue cog button and drag four else if blocks inside the if block at the bottom. The blocks at the top will automatically update when you drag the blocks under the if block underneath. Because we are using different images, we need to check which image is currently being displayed, so we know which picture to change to. Firstly we want to check if the first image is being displayed. Connect an = block from the Logic section. Then add a Pizza Image block from the Pizza section. Lastly grab a " " block from the Text section and write the name of your first image inside (e.g. pizza1.jpg) Don't forget the extension (.jpg). But what does this code actually mean? It is checking to see what the current pizza image is. And if it is pizza1.jpg then it is going to... ...change the picture to pizza2.jpg, as if someone has munched the pizza! Grab a set Pizza Image to block from Pizza and then snap another " " block from Text and add the pizza2.jpg text inside. Now that we have written the code to check the current picture and move it to the next one when pressed, we just need to copy this for the other four pizza pictures. Rather than select all the blocks again, right-clicking on the blocks and selecting 'Duplicate' will copy them. Copy each block and then change the values so that if pizza2.jpg is the current image, then it sets it to pizza3.jpg and so on. Make sure that pizza5.jpg sets the image to pizza1.jpg so that it goes round in a loop. Program 3 Complete! Step 3: Run The easiest way to run an app that you have created at home using App Inventor 2 is to download the free MIT AI2 Companion App on your smartphone from the Google Play Store . At the top of the App inventor program on your computer , click on Connect and AI Companion . This will generate a six-digit code you can type into your phone. If your school has the emulator installed, you can also use this to test your app. Extra Step: Challenges 1. Create your own images and upload them . You can easily create your own set of pictures and link them together. Why not try: Eating a different type of food (e.g. cookie or doughnut). A simple scene that changes from night to day. A simple character that changes appearance (like Pikachu powering up a thunder strike with each button press). 2. Add a sound effect whenever a button is pressed . In the video at the top of the page, you'll see I have a 'munch' sound whenever the button is pressed. You could record this sound yourself or use a sound effect site. Once you have got your sound file (it should be short and .mp3) you need to upload it, just like you uploaded your images. In the Designer layout click 'Upload file...' in the Media tab on the right. Then look in the Palette tab on the left side, open the Media section and drag a Sound block into the centre. It will appear underneath the phone screen in a section called 'non-visible components' which is fine. Now click on Properties on the right side and choose the sound file you just uploaded in the Source box. Click on the Blocks button in the top right to start adding the code! In the Blocks tab on the left side, click on Sound1 and drag the call Sound1 Play block directly underneath when Munch click . This will play the sound everytime the button is pressed. 3. Add more buttons . You could add a second clickable button which reverses the pattern and a third button that resets the order back to the first image. Adding new buttons is easy - drag them from the Palette tab in the Designer layout. Change the button text in the Properties tab and the name of the button in the Components tab. To add code, click on Blocks in the top right then you can duplicate the code for Munch by right-clicking and choosing Duplicate. Now just change the values to what you want. If you are making a reset button, you don't need an if then statement, just set the image to your first image when the button is clicked. Keep messing around with the program and have fun! KS3 Home Tasks 4, 5 & 6

  • 1.7 & 1.8 - Internet Pros & Cons | Unit 2 | OCR Cambridge Technicals | CSNewbs

    Learn about the advantages and disadvantages to individuals and organisations when using the internet. Based on the 2016 OCR Cambridge Technicals Level 3 IT specification for Unit 2 (Global Information). 1.7 & 1.8 - Internet Pros & Cons Exam Board: OCR Specification: 2016 - Unit 2 The internet has become easier and cheaper to access since the mid 1990s and today it is almost taken for granted. The rise of the internet, and the services it provides, has lead to advantages and disadvantages for both individuals and organisations . Advantages for Individuals Increased speed of personal communication Allows for instant messaging, emails and video chats across the world. Easy access to information The internet has free resources such as CSNewbs and Wikipedia, plus academic journals for research & study. 24/7 access to services Shopping, browsing and banking can be completed when convenient for the user. Social interaction with others Social media, discussion forums and online games provide entertainment and social interaction. Disadvantages for Individuals Potential for identity theft Uploading personal data and storing sensitive information risks hackers obtaining and utilising it. Cost of connection & services Internet service providers (ISPs) charge a monthly fee and equipment like a router needs installation. Cyberbullying & trolling The abuse of others on social media is possible. Anonymisation makes it harder to catch offenders. Spreading misinformation 'Fake news' or biased information can be easily spread on social media and lead to incorrect assumptions. Source of distraction Staff and students may neglect their work and study for entertainment or social media. Advantages for Organisations Share data quickly globally Files and information can be sent instantly to locations across the world. Cloud storage can store data. Online services always available E-commerce businesses can operate 24/7 globally, permit users to browse and accept payments. Easy internal communication Staff can use emails, video calls or instant messages to communicate. Open up the workplace Staff can work from home, on the commute to/from work and outside of the office. Disadvantages for Organisations Malicious attacks & threats Websites can be hacked / taken offline with DDoS attacks. Data can be stolen or corrupted. Cost of maintaining services Most companies require an IT department to oversee device installation and maintenance. Reputation and controversies Companies that leak data will damage their reputations. Social media posts could backfire. Q uesto's Q uestions 1.7 - Internet Pros & Cons: 1. List 5 points for the following categories (you may need to include researched / your own points for some): a. Advantages of the internet for individuals [5 ] b. Disadvantages of the internet for individuals [5 ] c. Advantages of the internet for organisations [5 ] d. Disadvantages of the internet for organisations [5 ] 1.6 - Information Formats Topic List 2.1 - Information Styles

  • 6.1b - Legislation - OCR GCSE (J277 Spec) | CSNewbs

    Learn about key computing laws including the Data Protection Act (2018), Computer Misuse Act (1990), Copyright, Designs and Patents Act (1988) and software licences. Based on the J277 OCR GCSE Computer Science specification (first taught from 2020 onwards). Exam Board: OCR 6.1b: Legislation Specification: J277 Watch on YouTube : Data Protection Act Computer Misuse Act Copyright, Designs & Patents Act Open Source Licence Proprietary Licence Data Protection Act (2018) In 2018 the European Union introduced GDPR (General Data Protection Regulation ) to protect the privacy of data for people in the EU. The UK matched this by updating the Data Protection Act introduced in 1998 to become the Data Protection Act (2018) . This act protects the data of individuals that is stored on computers and processed by organisations. How the Data Protection Act works: Each person who has their data stored is known as a data subject . An employee within an organisation must be appointed as a data controller and it is they who are responsible for registering with the Information Commissioner . The Information Commissioner is the person in the UK who is responsible for managing several laws , most significantly the Data Protection Act. When registering with the Information Commissioner, the organisation's data controller must be clear on exactly: What information they are collecting, Why it is being collected, What the data will be used for . The six principles of the Data Protection Act state that data must be: 1. Collected lawfully and processed fairly. 4. Data must be accurate and up-to-date. 2. Only used for the reasons specified. Principles of the Data Protection Act (2018) 5. Data must not be stored for longer than necessary, 3. Data must be relevant and not excessive. 6. Data must be stored and processed securely. Computer Misuse Act (1990) This act was introduced as computers became cheaper and more common at home and work . The act attempts to stop and punish those who use computers inappropriately . Breaking any of the three principles could result in fines and a jail sentence but only if it can be proved it was done on purpose and not by accident. The Computer Misuse Act (1990 ) includes three main principles : 1. No unauthorised access to data. Example: Hacking a computer system. 2. No unauthorised access to data that could be used for further illegal activities. Example: Accessing personal data to use as blackmail or identity theft. 3. No unauthorised modification of data. Example: Spreading a virus to change data. Copyright, Designs & Patents Act (1988) This act makes it a criminal offence to copy work that is not your own without the permission of the creator or the copyright holder. This can refer to text, images, music, videos or software. Owning the copyright of an image might not prevent others from copying and using it but this act means that the owner can bring legal proceedings in court to those who have stolen their work . However, it is difficult to trace who has stolen work once it has been uploaded to the internet and copies can easily spread, especially television shows and movies. This act specifically prohibits the following actions: Making copies of copyrighted material to sell to others . Importing and downloading illegally copied material (except for personal use). Distributing enough copyrighted material to have a noticeable effect on the copyright holder . Possessing equipment used to copy copyrighted material , as part of a business. Software Licences A software licence refers to how a user can legally use the software , there are two main types: Open Source Licence Source code is the software code written by programmers . If the software is open source it means that users can view and modify the source code . Linux, Python and Firefox are examples of open source software. Benefits Drawbacks Because the source code is available to edit , it can be customised to the organisation's needs . Often shared in the public domain so users can work together to modify, debug and improve a product. Unwanted features can be removed to make the software run faster . There are security risks - some editors may add malicious code to the program. Open source software is often low in price and sometimes free. It may be difficult to receive support as development is often distributed between people in different locations. The code may be prone to errors as it may not have been tested fully. It requires technical skills to be able to adapt source code efficiently and to maintain the code . Proprietary Licence Another term for a proprietary licence is closed source because the code is restricted - users are prevented from being able to view or modify the source code . You buy the right to use the software but you don't actually own it. Microsoft Office, Fortnite and Spotify are examples of closed source software. Benefits Drawbacks The code is well tested and has been professionally developed. Updates will generally be secure . Users must rely on the company to provide updates and fix issues. This might be infrequent or stop completely. The company can be held to account if it does not perform as listed in the terms and conditions upon purchase. Often not free and may be expensive. Most developers will provide some form of help/support . Users cannot modify, debug or improve the code for their own benefit. Q uesto's Q uestions 6.1b - Legislation: 1a. State the 6 principles of the Data Protection Act (2018) . [ 6 ] 1b. Explain how the Data Protection Act works . In your answer, you should include definitions of a data subject , the data controller and the Data Commissioner . [ 6 ] 2. Describe the 3 principles of the Computer Misuse Act (1990) . [3 ] 3a. What is the purpose of the Copyright, Designs & Patents Act (1988) ? [ 2 ] 3b. Describe 3 actions that CDPA (1988) prohibits . [ 3 ] 4a. Describe the difference between an open source and a proprietary licence . [ 2 ] 4b. State two benefits and two drawbacks of using software with a: Open source licence [ 4 ] Proprietary licence [ 4 ] 6.1a - Impacts of Technology Theory Topics

  • OCR CTech IT | Unit 1 | 5.4 - Physical Security | CSNewbs

    Learn about methods of physically protecting data such as biometric devices, RFID and tokens, privacy screens and shredding. Based on the 2016 OCR Cambridge Technicals Level 3 IT specification. 5.4 - Physical Security Exam Board: OCR Specification: 2016 - Unit 1 RFID & Tokens Radio-frequency identification (RFID) uses electromagnetic fields to attach tags to physical objects . RFID tags can be embedded within 'dumb' objects such as clothing, packages and even animals. RFID is used with security tokens (such as an ID keycard ) to permit the access of authorised people to certain areas. RFID can be used by IT companies to track equipment and manage access . Shredding This is the cutting up of documents (paper or CDs ) into small pieces so that they cannot be reassembled and read. Sensitive data on paper or optical disc should be shredded when no longer required. Locks A lock can be used to prevent access to server rooms or sensitive data stores . Only authorised personnel with the right key will have access. Physical Security Measures Biometrics Biometric devices require the input of a human characteristic (such a fingerprint , iris or voice scan ). The biometric data is checked against previously inputted data in a database . A match will allow access to the user. See more in section 1.1 . Privacy Screens These plastic screens are placed over a monitor to obscure the screen to anyone except the person sitting directly in front of them. This prevents shoulder surfing and prevents data from being read by unauthorised people nearby. Q uesto's Q uestions 5.4 - Physical Security: 1. Explain how locks can be used as a physical security method within an organisation. [2 ] 2. Explain what RFID is and how it can be used with tokens as a physical security method. [3 ] 3. Explain how biometric devices can be used as a physical security method. [3 ] 4. Explain how privacy screens are used to protect data. [2 ] 5. What is the purpose of shredding ? [2 ] 5.3 - Threats Topic List 5.5 - Digital Security

  • Unit 2 - Global Information - Cambridge Technicals IT Level 3 | CSNewbs

    Navigate between all Unit 2 (Global Information) topics in the OCR Cambridge Technicals Level 3 IT 2016 specification. OCR Cambridge Technicals IT Level 3 Unit 2: Global Information These pages are based on content from the OCR Cambridge Technicals 2016 Level 3 IT specification . This website is in no way affiliated with OCR . This qualification stopped in July 2025. The pages on the site will remain for at least two years. LO1 (Devices & The Internet ) 1.1 - Holders of Information 1.2 - Storage Media 1.3 - Access & Storage Devices 1.4 - Internet Connections 1.5 - WWW Technologies 1.6 - Information Formats 1.7 & 1.8 - Internet Pros & Cons LO2 (Information Styles & Quality ) 2.1 - Information Styles 2.2 - Information Classification 2.3 - Quality of Information 2.4 - Information Management LO3 (Categories & Analysis ) 3.1 - Data vs. Information 3.2 & 3.3 - Information Categories 3.4 - Stages of Data Analysis 3.5 - Data Analysis Tools 3.6 - Information Systems LO4 (Legislation ) 4.1 - UK Legislation 4.2 - Global Legislation 4.3 - Green IT LO5 (Flow of Information ) 5.1 - Data Types & Sources 5.2 - Data Flow Diagrams LO6 (Security & Protection ) 6.1 - Security Principles 6.2 - Risks 6.3 - Impacts 6.4 - Protection Measures 6.5 - Physical Protection 6.6 - Logical Protection

  • 5.1 - Computing Legislation | OCR A-Level | CSNewbs

    Learn about the laws related to computing - the Data Protection Act, Computer Misuse Act, Copyright Design and Patents Act and Regulation of Investigatory Powers Act. Based on the OCR H446 Computer Science A-Level specification. Exam Board: OCR A-Level Specification: Computer Science H446 5.1 - Computing-related Legislation Watch on YouTube : Data Protection Act Computer Misuse Act Copyright Design and Patents Act Regulation of Investigatory Powers Act Several key UK laws govern the ethical and legal use of computers and digital information including the Data Protection Act and Computer Misuse Act . Each act is designed to protect data , users or intellectual property in the digital age. Data Protection Act (2018) The Data Protection Act is a UK law designed to ensure that personal data is collected , stored and used responsibly . It gives individuals (data subjects ) rights over their personal information and sets rules for organisations that process it . Introduced in 1998 , it was updated in 2018 to align with the EU’s General Data Protection Regulation (GDPR ). The Data Protection Act's key principles include that data must be processed lawfully , fairly and transparently , used for specific purposes , kept accurate and up to date , stored securely and not kept longer than necessary . It also gives data subjects rights such as accessing their data , correcting inaccuracies , objecting to processing and requesting deletion . Organisations that break the law can face heavy fines and legal action from the Information Commissioner’s Office (ICO ). YouTube video uploading soon Computer Misuse Act (1990) The Computer Misuse Act (1990 ) is a UK law created to make unauthorised access and use of computer systems illegal . It was introduced in response to the rise of hacking and other cybercrimes as computers became more common . This act defines several offences , including: Unauthorised access to computer material , such as hacking into a system without permission . Unauthorised access with the intent to commit further offences , such as fraud or data theft . Unauthorised modification of data or programs , for example, spreading viruses or deleting files . Making , supplying or obtaining tools used for committing these offences . Penalties range from fines to imprisonment , depending on the severity of the crime . This act helps protect individuals , organisations and data from malicious attacks and misuse . YouTube video uploading soon Copyright, Designs & Patents Act (1988) The Copyright, Designs and Patents Act (1988 ) is a UK law that protects people’s creative and intellectual work from being copied or used without permission . It gives creators automatic legal rights over their original work , such as books , music , films and software . The act states that the copyright owner controls how their work is used , including the rights to copy , distribute or adapt it. Anyone wishing to use the work must get permission or a licence from the owner. It also includes exceptions , allowing limited use for purposes like education or research . This act helps ensure that creators are fairly rewarded for their work and that their intellectual property is legally protected . YouTube video uploading soon Regulation of Investigatory Powers Act (2000) The Regulation of Investigatory Powers Act (RIPA ) (2000 ) is a UK law that governs how public bodies and law enforcement can carry out surveillance and access electronic communications . It was introduced to balance national security and crime prevention with individuals’ right to privacy . RIPA allows authorised agencies , such as the police , intelligence services and local councils , to monitor communications , intercept phone calls or emails and use covert surveillance , but only with proper legal authorisation . It also regulates the use of informants and access to encrypted data . This act aims to ensure that surveillance is done lawfully , proportionately and for legitimate purposes , such as preventing or detecting serious crime or protecting public safety . YouTube video uploading soon This page is under active development. Check here for the latest progress update. Q uesto's K ey T erms Legislation: Data Protection Act (2018) Computer Misuse Act (1990) Copyright Design and Patents Act (1988) Regulation of Investigatory Powers Act (2000) D id Y ou K now? In 1985 , two journalists were arrested for ‘ hacking ’ into the emails of the Duke of Edinburgh ( Prince Philip ) after discovering an engineer’s username was ‘ 2222222222 ’ and password was ‘ 1234 ’. They were acquitted in court because no UK laws covered hacking , exposing a major legal gap that led to the creation of the Computer Misuse Act ( 1990 ) . 4.3 - Boolean Algebra A-Level Topics 5.2 - Moral & Ethical Issues

© CSNewbs 2025

The written, video and visual content of CSNewbs is protected by copyright. © 2025
bottom of page