top of page

Search CSNewbs

304 results found with an empty search

  • 5.3 - HCI Designs, Documents, Diagrams | F160 | Cambridge Advanced National in Computing AAQ

    Learn about designs, documents and diagrams related to human-computer interaction including processing and data handling, data flow diagrams (level 0 and level 1), flowcharts and user interface designs (visualisation and wireframe diagrams). Based on Unit F160 (Fundamentals of Application Development) for the OCR Cambridge Advanced National in Computing (H029 / H129) (AAQ - Alternative Academic Qualification). Qualification: Cambridge Advanced National in Computing (AAQ) Unit: F160: Fundamentals of Application Development Certificate: Computing: Application Development (H029 / H129) 5.3 - Human Computer Interface Designs, Documents and Diagrams Watch on YouTube : Data flow diagrams Flowcharts Visualisation diagrams Wireframe diagrams There are four types of documents / diagrams you need to know that can be used to design human-computer interfaces : data flow diagrams (DFDs ), flowcharts , visualisation diagrams and wireframe designs . For each type of diagram , you need to know its components and conventions , when it is appropriate for use , and how to create it . Each diagram is also effective for different uses and you must be able to consider how specific diagrams can be made more effective . Human-Computer Interface Diagrams Data Flow Diagrams A data flow diagram (DFD ) is a visual representation of how data is transferred within a system or organisation . They do not show decision logic or sequencing , but focus on where data comes from , where it goes and how it is processed . DFDs are typically categorised into Level 0 and Level 1 formats, which differ based on complexity . Flowcharts A flowchart is a diagram that shows the sequence of steps in a process using specific symbols . Flowcharts can be used as a project planning tool (section 3.2 ) to visualise workflows , task order and decision-making paths . It is also useful as a human-computer interface diagram to show the steps and decisions users may take as they interact with the application . The video says ' 3.2d ' because flowcharts also appear in section 3.2 as a project planning tool . Visualisation Diagrams Visualisation diagrams are graphical representations used to show the layout , structure and appearance of a software application's interface . They're often used for planning , design and feedback purposes. Traditionally, they would be drawn on paper in pencil and annotated , but modern diagrams are mocked up on a computer so they can be easily shared with team members and clients . Wireframe Diagrams Wireframe diagrams are basic visual guides used to represent the structure and layout of a user interface (UI ) without any design styling . They focus on function , layout and interaction , not aesthetics . Wireframe diagrams are used in the early design stages to plan the UI layout before visual design begins. Q uesto's Q uestions 5.3 - Human Computer Interface Designs, Documents & Diagrams: 1. Explain what the purpose of data flow diagrams are, the difference between Level 0 and Level 1 and what makes them effective . [6 ] 2. Draw a wireframe diagram for the YouTube homepage . [3 ] 3. Explain how visualisation diagrams are created and how they can be made more effective . [ 5 ] The first type of flowchart , the ' flow process chart ', was developed by engineers Frank and Lillian Gilbreth in 1921 . The book (and original movie ) ' Cheaper by the Dozen ' is about this couple . D id Y ou K now? 5.2 - Visual Design Considerations Topic List 6.1 - Job Roles

  • OCR CTech IT | Unit 1 | 1.8 & 1.9 - Number Systems | CSNewbs

    Learn about the denary, binary and hexadecimal number systems and how to convert between them. Based on the 2016 OCR Cambridge Technicals Level 3 IT specification. 1.8 & 1.9 - Number Systems & Conversion Exam Board: OCR Specification: 2016 - Unit 1 What is binary? What is denary? Denary (also known as decimal ) is the number system that you've been using since primary school. Denary is a base 10 number system. This means that it has 10 possible values - 0, 1, 2, 3, 4, 5, 6, 7, 8, and 9 . How to convert from binary to denary: How to convert from denary to binary: What is hexadecimal? Hexadecimal is a base 16 number system. This means that it has 16 possible values - 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E and F . Hexadecimal is used as a shorthand for binary because it uses fewer characters to write the same value . This makes hexadecimal less prone to errors when reading or writing it , compared to binary. For example, 100111101011 is 9EB. Hexadecimal only uses single-character values. Double-digit numbers are converted into letters - use the table on the right to help you understand. How to convert from binary to hexadecimal: How to convert from hexadecimal to binary: Converting from denary to hexadecimal / hexadecimal to denary To convert from denary to hexadecimal or the other way round you must convert to binary first . Denary > Binary > Hexadecimal Hexadecimal > Binary > Denary Use the videos on this page if you need help converting to or from binary. The most common number systems question in exams are from denary to hexadecimal or from hexadecimal to denary so make sure that you practice these conversions. Q uesto's Q uestions 1.8 & 1.9 - Number Systems: 1. Explain why hexadecimal numbers are used as an alternative to binary . [ 2 ] 2. Convert the following values from binary to denary : a. 00101010 b. 11011011 c. 01011101 d. 11101110 e. 01011111 [1 each ] 3. Convert the following values from denary to binary : a. 35 b. 79 c. 101 d. 203 e. 250 [1 each ] 4. Convert the following values from binary to hexadecimal : a. 11110101 b. 01100111 c. 10111010 d. 10010000 e. 11101001 [1 each ] 5. Convert the following values from hexadecimal to binary : a. C2 b. 8A c. DE d. 54 e. F7 [1 each ] 6. Convert the following values from denary to hexadecimal : a. 134 b. 201 c. 57 d. 224 e. 101 [1 each ] 7. Convert the following values from hexadecimal to denary : a. 32 b. A5 c. 88 d. C0 e. BE [1 each ] Watch on YouTube Watch on YouTube Watch on YouTube Watch on YouTube By now you should know that computer systems process data and communicate entirely in binary . Section 1.7 explained different binary storage units such as bits (a single 0 or 1), nibbles (4 bits) and bytes (8 bits). Binary is a base 2 number system. This means that it only has 2 possible values - 0 or 1 . Click the banners above to try self-marking quizzes (Google Form) on these topics. Denary to Binary: Binary to Denary: Binary to Hexadecimal: Hexadecimal to Binary: 1.7 - Units of Measurement Topic List 2.1 Software Types

  • 3.1 - Network Characteristics - Eduqas GCSE (2020 spec) | CSNewbs

    Learn about the advantages and disadvantages of networks, the five types of network - LAN, WAN, PAN, MAN and VPN - and differences between wired and wireless networks. Based on the 2020 Eduqas (WJEC) GCSE specification. 3.1: Network Characteristics Exam Board: Eduqas Specification: 2020 What is a network? A network is more than one computer system connected together allowing for communication and sharing of resources . There are many benefits but also some drawbacks to using a network compared to having an unconnected ('standalone' ) computer: Advantages of Networks Easily share files , software and hardware between computers. Disadvantages of Networks There is an initial cost because network devices like routers are required . Larger companies will need to buy and maintain a server . Log in from any connected computer and access your data and files. A network manager / administrator might need to be employed to maintain the network . An administrator can monitor network activity and control security settings. Data from computers on the network can be automatically backed up on central storage. Security breaches are more likely and malware , such as worms, can spread quickly across the network. If the web server fails , all connected computers won't be able to access files or log on . Network Types Networks can be split into different types , usually categorised by their geographical distance apart and the area that they serve. Local Area Network A local area network (LAN ) has computer systems situated geographically close together , usually within the same building or small site , like a school or office . Wide Area Network A wide area network (WAN ) has computer systems situated geographically distant to each other, possibly across a country or even across the world . The internet is an example of a WAN that spans the globe. Personal Area Network A PAN is a personal network for an individual , such as a photographer connecting a smartphone, desktop computer and printer together. Metropolitan Area Network A MAN is larger than a LAN but smaller than a WAN and typically covers a relatively large area like a university campus, town or city . Virtual Private Network A VPN allows for a secure and encrypted connection to a public network like the internet. It is often used to protect an individual's privacy by concealing their real location. Wired & Wireless Networks Wired Connections Wireless Connections Wireless connections, such as WiFi or Bluetooth , use no cables but require a wireless network interface card (WNIC ). Wireless connections generally have a slower speed and can be affected by the computer's distance from the wireless router as well as obstacles like walls or bad weather. Wired connections use physical cables , such as copper or fibre optic wires , and require a network interface card (NIC ) to connect to a network. These wired connections use a wired connection protocol - most commonly Ethernet . Restricted Movement Faster More Secure NIC Required Freedom of Movement Slower Less Secure WNIC Required Q uesto's Q uestions 3.1 - Network Characteristics: 1. A retirement home for the elderly is considering installing a LAN , give 3 benefits and 3 drawbacks they might find of using a network . [6 ] 2a. Describe the difference between a LAN and WAN . [2 ] 2b. Give an example of how a LAN and a WAN could each be used . [ 2 ] 3 . Explain the differences between a PAN , MAN and VPN . [ 3 ] 4. For each of the scenarios below, state which network type would be most suitable : a. The IT rooms of a secondary school . [ 1 ] b. A study in a house with a desktop and printer. [ 1 ] c. Using online banking when abroad on a holiday to stay secure . [ 1 ] d. A large technology company with offices across Europe . [ 1 ] e. Council offices with several locations across Manchester . [ 1 ] 5. Briefly compare wired and wireless networks . [ 8 ] 2.2 - Boolean Algebra 3.2 - Data Packets & Switching Theory Topics

  • 4.2 - Data Structures | OCR A-Level | CSNewbs

    Learn about data structures including arrays, records, lists, tuples, linked-lists, graphs, stacks, queues, trees, binary search trees and hash tables. Based on the OCR H446 Computer Science A-Level specification. Exam Board: OCR A-Level 4.2 - Data Structures Specification: Computer Science H446 Watch on YouTube : Arrays Records Lists & tuples Stacks Queues Linked lists Trees Graphs Hash tables Data structures are used to organise and store data so it can be accessed and processed efficiently , often through the use of an index or reference . They can be static , meaning their size is fixed during program execution , or dynamic , allowing them to grow or shrink as data changes . Arrays An array is a data structure that stores a collection of items of the same data type , with each item accessed using an index . A one-dimensional (1D ) array is a simple sequence of values , such as test scores for a single person : scores = [12, 15, 18, 20] . A two-dimensional (2D ) array is like a table or grid , made up of rows and columns - for example, storing a timetable or test scores for a class . A three-dimensional (3D ) array stores data in multiple layers , like a series of 2D grids . For example, test scores for a class across multiple subjects . This page is under active development. Check here for the latest progress update. YouTube video uploading soon Records A record groups together related but different types of data under one name . Each individual piece of data within a record is called a field and each field can have a different data type (e.g. string , integer , Boolean ). For example, a student record might include fields such as Name (string ), Age (integer ) and Enrolled (Boolean ). Records are often used in databases or programming to represent real-world entities where multiple attributes need to be stored together . YouTube video uploading soon Lists & Tuples A list stores an ordered collection of items , which can be changed (mutable ) after creation. Items in a list can be added , removed or modified , and they can be of different data types . For example, in Python : myList = [10, "apple", True] . A tuple is similar to a list but is immutable , meaning its contents cannot be changed once created . Tuples are often used for fixed sets of data that should not be altered , such as coordinates or dates . For example: myTuple = (3, 5, 7) . YouTube video uploading soon Stacks A stack stores data in a last in , first out (LIFO ) order, meaning the most recently added item is the first one to be removed . It works much like a stack of plates - you can only add or remove from the top . Two integral functions are push and pop . The push operation adds (or “pushes”) a new item onto the top of the stack . The pop operation removes (or “pops”) the item from the top of the stack . Stacks are commonly used in undo features , function calls and expression evaluation , where tracking the most recent item first is important . YouTube video uploading soon Queues A queue stores items in a first in , first out (FIFO ) order, meaning the first item added is the first one removed . New items are added at the rear of the queue using an enqueue operation, and items are removed from the front using a dequeue operation. Queues are often used in task scheduling , print spooling and data buffering , where operations must occur in the same order they were requested . YouTube video uploading soon Linked Lists A linked list is a dynamic data structure made up of a series of elements called nodes , where each node contains data and a pointer to the next node in the sequence . Unlike arrays, linked lists do not store elements in contiguous memory locations , making it easy to insert or delete items without having to shift other elements . The head is the first node in the list , and the last node usually points to null , indicating the end of the list . YouTube video uploading soon Trees A tree is a hierarchical data structure made up of nodes connected by branches , starting from a single root node . Each node can have child nodes , and nodes without children are called leaf nodes . Trees are useful for representing data with natural hierarchies , such as file systems or organisational charts . A binary search tree is a special type of tree where each node has at most two children - a left and a right . All values in the left subtree are smaller than the parent node , and all values in the right subtree are larger . This structure allows for efficient searching , insertion and deletion of data , often much faster than in lists or arrays . YouTube video uploading soon Graphs A graph is made up of nodes (also called vertices ) connected by edges and is used to represent relationships between items. Graphs can be directed , where edges have a specific (one-way) direction , or undirected , where connections go both ways . They can also be weighted , where edges have values such as distance or cost , or unweighted , where all connections are equal . Graphs are widely used in computing, for example, in social networks (users and friendships ), maps (locations and routes ) and network routing algorithms . YouTube video uploading soon Hash Tables A hash table stores key–value pairs and allows for very fast data access . It uses a hash function to convert a key (such as a name or ID ) into an index (hash value ), which determines where the associated data (value ) is stored in memory . When retrieving data , the same hash function is applied to the key to find the value’s location instantly , making lookups close to constant time complexity on average . If two keys produce the same hash (a collision ), techniques such as chaining or linear probing are used to handle it . Hash tables are commonly used in databases , caches and programming languages for tasks like fast searching and indexing . YouTube video uploading soon Q uesto's K ey T erms Arrays: array, 1-dimensional, 2-dimensional, 3-dimensional, static Records: record, field, data type, primary key Lists and Tuples: list, tuple, mutable, immutable, dynamic Stacks and Queues: stack, queue, last in first out (LIFO), first in first out (FIFO), push, pop, enqueue, dequeue, pointer Linked Lists: linked list, null Trees & Graphs: tree, binary tree, binary search tree, root node, branch, graph, weights, directions Hash Table: hash table, key, value, collision, linear probing, chaining D id Y ou K now? Trees are used for dialogue options in narrative video games , displaying possible paths based on the player’s previous choices . The final ' suicide mission ' of Mass Effect 2 has hundreds of possible variations depending on ship upgrades , squad member loyalty , and assigned roles during the last mission . 4.1 - Data Types A-Level Topics 4.3 - Boolean Algebra

  • OCR CTech IT | Unit 1 | 2.4 - Operating Systems | CSNewbs

    Learn about different types of operating systems and the various roles that they manage, including memory, security and processing. Based on the 2016 OCR Cambridge Technicals Level 3 IT specification. 2.4: Operating Systems Exam Board: OCR Specification: 2016 - Unit 1 An operating system (OS) is software that manages the resources of a computer system . The operating system is loaded by the BIOS (Basic Input / Output System). Types of Operating System Single user operating systems are found on most desktop computers, laptops and tablets where only one person will use the device at a single time. Multi-user operating systems allow more than one user to access the processor simultaneously , such as a server that users, with correct permissions , can access remotely . However, one user should not be negatively impacted by another user on the same operating system and security must be managed carefully as data may be visible to other users . Single Processor operating systems have only a single processor (CPU), which is shared between users by dividing the CPU time into time-slices and allocating one of these to each user in turn. The time-slices are very short, giving each user the impression that their programs are running continuously. Multiple Processor operating systems have more than one processor (CPU). Users still have to share processors and it is a more complicated system but performance is improved as there are fewer users per processor. Some supercomputers have thousands of processors running in parallel. Operating systems can also be off-the-shelf , open-source or bespoke . See 2.1 . What are the roles of an Operating System? Manage Input / Output Devices Receives data from input devices (e.g. a keyboard). Sends data to output devices (e.g. a monitor) in the correct format . Manage Printing Checks the printer is free then uses spooling (storing data in a queue ) to print documents in order. Manage Backing (Secondary) Storage Ensures data is stored correctly and can be retrieved from secondary storage devices (e.g. hard drive / SSD ). Organises files in a hierarchical structure. Manage Memory (RAM) Ensures that programs / data do not corrupt each other and are stored in correct memory locations . Manage Processes Ensures different processes can utilise the CPU and do not interfere with each other or crash. On most OS the tasks appear to run simultaneously . Manage Security Allows users to create, manage and delete user accounts with different permissions. Allows users to logon and change passwords . User Interface The final function of an operating system is to provide a user interface . This includes: A folder and file system is displayed and manipulated allowing for copying , searching , sorting and deleting data. Icons are displayed to represent shortcuts to applications and files. Multiple windows can be opened at the same time and switched between. The interface can be customised , such as changing font sizes and the desktop background . System settings can be accessed such as network and hardware options . Q uesto's Q uestions 2.4 - Operating Systems: 1. Describe five different roles of the operating system. Include the importance of the operating system in performing each role. [ 5 ] 2. What is the difference between single user and multi-user operating systems? [2 ] 3. What is the difference between single processing and multi-processing operating systems? [2 ] 4. Using your knowledge from 2.1 Software Types, explain two advantages and one disadvantage to a company if they decided to use a closed source operating system. [6 ] 2.3 Utility Software Topic List 2.5 Communication Methods

  • Computer Science Newbies

    Homepage for learning about computer science in school. Discover topics across GCSE and Level 3 IT subjects, plus programming languages including Python, HTML and Greenfoot. C omputer S cience P ros Official 2025 CSPros: Walter Thomas Zach Pippa Marcus Ryan Jess Asher Zac Leighton Folu Holly James Jack Harry Aarav Trisha Mario Hiba Rory Clark Lucy Divya Luke Callum James Zoya Timucin Matthew 2024 CSPros: 2023 CSPros: Henry Zain Iman Alex I-C Alex B Tomos Aidan Rahul Hussain Diyar Sam Harry Will Alex H 2022 CSPros: Logan Eleanor Mark Edward Alfie Henry Enzo Sam George Harry Ella Kav

  • 5.2 - Data Flow Diagrams | Unit 2 | OCR Cambridge Technicals | CSNewbs

    Learn about the elements of a data flow diagram and factors that may disrupt them. Based on the 2016 OCR Cambridge Technicals Level 3 IT specification for Unit 2 (Global Information). 5.2 - Data Flow Diagrams Exam Board: OCR Specification: 2016 - Unit 2 A data flow diagram is a visual representation of how data is transferred within a system or organisation . Data flow diagrams are often abbreviated to just 'DFD '. You will need to recognise the symbols , understand the diagrams and explain how data flow can be affected . Data Flow Diagram Symbols The common symbols used in a DFD are shown below: External Entity (e.g. Employee, Customer) Alternative DFD symbols you may see on the exam paper (both sets of symbols have been accepted in previous exam papers): Process (e.g. Calculate Pay, Review Application) Data Store (e.g. Staff Database, Customer Database) External Entity Process Data Store Data Flow Level 0 data flow diagrams show the transfer of data in a simple manner . Processes may be generalised and not shown separately , for a more basic overview . Below is an example of a Level 0 DFD to show the process of an employee submitting an application to be promoted : Level 1 data flow diagrams show the transfer of data in a more detailed manner . Processes are shown separately , for a more complex and realistic overview . Below is an example of a Level 1 DFD to show the process of an employee submitting an application to be promoted . The individual processes have been expanded from the Level 0 DFD above to show how the application must first be signed off by an administrator before it is reviewed by management: Rules for Drawing a Level 1 DFD Data flows only in one direction . Every data flow is labelled (with the data itself , not the action). Every data flow connects to at least one process . At least one input or output for each external entity . Impacts Affecting the Flow of Information There are several reasons why the flow of information within an organisation may be delayed or inefficient , such as: Information characteristics e.g. information is entered incorrectly, causing delays. Human error e.g. information is lost or staff don't follow protocol. Hardware failure e.g. network connection breaking or system failure. Communication breakdown e.g. meetings postponed or emails unread. Q uesto's Q uestions 5.2 - Data Flow Diagrams: 1. Draw the symbols for the four parts of a data flow diagram . [4 ] 2. Look at the image of the Level 1 DFD . State one example of: An external entity A process A data flow A data store [1 each ] 3. Give one difference between a Level 0 and Level 1 DFD . [2 ] 4. State three rules for drawing a correct data flow diagram . [3 ] 5. After heavy snow, a school has decided to shut for the next two days. Many parents were not informed of this decision and are angry that they brought their children in. Give three reasons why the transfer of data (the data being a message about school closure) might not have flowed efficiently in this example. [6 ] 1 Level 0 Data Flow Diagram Level 1 Data Flow Diagram 5.1 - Data Types & Sources Topic List 6.1 - Security Principles

  • Key Stage 3 Python | Inputs | CSNewbs

    The third part of a quick guide to the basics of Python aimed at Key Stage 3 students. Learn about creating and using inputs. Python - #3 - Inputs 1. Asking Questions Input means to enter data into a program. Use the input command to ask a question. You must save the answer into a suitably named variable using the = symbol. Task 1 - Create a new Python program and save the file as 3-Inputs.py Use the picture to help you ask what someone's name is. Run the program and type your name. When you run the program (F5) you can type your answer on any question line in the Python Shell . 2. Asking more Questions There is no limit to how many questions you can ask in Python. It is the most important way to interact with the user of your program. Task 2 - Ask two more questions on topics of your choice. 3. Using Variables in a Sentence When we have printed the answers so far, they have not been very informative! You can print variables together with sentences so that they mean more. Use a comma ( , ) between variables and sentences . Task 3 - Use the pictures to help you add commas and sentences to your program to be more informative. BONUS: After I took the screenshot of my code I added in print lines in the two blanks spaces that print a line of dashes. Try to do the same to make your program easier to read. 4. Using Integers An integer is a whole number . When you are asking a question that you know will have a number for an answer , you need to add int ( before your input. Don't forget to add double close brackets at the end of the question line ! Task 4 - Underneath your previous questions (don't delete anything) ask 2 questions that will have numbers for answers. You must use int ( - see the image for help. Challenge Programs Use everything that you have learned on this page to help you create these programs... Challenge Task 1 - Funny Food Create a new Python program. Save it as ' 3-FunnyFood.py ' Add a comment at the top with your name and the date. Create a program that asks two questions, one for their favourite colour and one for their favourite food. Print a funny sentence using both of their answers. BONUS : Try to use only one print line. Remember: Break up variables in a print line by using commas. When you run it, it could look something like this: Challenge Task 2 - Trivia Question Create a new Python program. Save is as ' 3-Trivia.py ' Add a comment at the top with your name and the date. Create a program that asks the user a trivia question of your choice. Print the correct answer AND their answer. BONUS : Use only one print line. BONUS : Try to use only two lines in total . Remember: Break up variables in a print line by using commas. When you run it, it could look something like this: Challenge Task 3 - Getting to School Create a new Python program. Save it as ' 3-School.py ' Add a comment at the top with your name and the date. Create a program that asks two questions, one for how they get to school and one for how long it takes. Don't forget - use int( and then double close brackets for a number! Print an appropriate response that uses both of their answers. BONUS : Use two separate input lines. BONUS : Try to use only one print line . Remember: Break up variables in a print line by using commas. When you run it, it could look something like this: <<< #2 Variables #4 Calculations >>>

  • HTML List of Tags | CSNewbs

    A complete list of tags required for students to know how to use in the 2016 Eduqas GCSE specification. Follow the links on each tag to see how to use them. Here you can find a list of tags. Click a tag to see how to use it. Tags for Eduqas GCSE:

  • Memory | Key Stage 3 | CSNewbs

    Learn about the three main types of memory in a computer system - RAM (Random Access Memory), ROM (Read Only Memory) and Cache Memory. Memory What is memory? Memory is where a computer stores information , instructions and data so it can use them quickly when needed . There are three main types of memory : RAM Random Access Memory ROM Read Only Memory Cache Memory What is Random Access Memory? RAM is volatile (this means that when power is lost, the data is deleted ). Every program that is being run by the computer (such as Google Chrome, Spotify or Microsoft Word) is stored in RAM . RAM is made up of a large number of storage locations , and each is identified with a unique address . What is Read Only Memory? ROM is non-volatile (this means that data is saved, even when the power is off ). The start-up instructions (for when a computer is switched on ) are stored in ROM . ROM is read-only, which means that it cannot be edited or changed . What is Cache Memory? Cache memory is fast to access because it is built into the CPU (or very close to it) . Cache memory stores data that needs to be accessed very frequently . Cache memory is very expensive , so there is only a small amount in most computers. How can a computer run faster? There are many reasons why a computer may be running slowly . Here are some methods related to memory that can help speed up a system : Close unnecessary programs to free up RAM so it doesn't run out of memory space . Add more RAM so the computer can run more programs at once without slowing down . Increase the cache size so the CPU can access important data more quickly . KS3 Home Note: Only larger systems like desktop computers can have their components easily upgraded and replaced.

  • 6.1b - Legislation - OCR GCSE (J277 Spec) | CSNewbs

    Learn about key computing laws including the Data Protection Act (2018), Computer Misuse Act (1990), Copyright, Designs and Patents Act (1988) and software licences. Based on the J277 OCR GCSE Computer Science specification (first taught from 2020 onwards). Exam Board: OCR 6.1b: Legislation Specification: J277 Watch on YouTube : Data Protection Act Computer Misuse Act Copyright, Designs & Patents Act Open Source Licence Proprietary Licence Data Protection Act (2018) In 2018 the European Union introduced GDPR (General Data Protection Regulation ) to protect the privacy of data for people in the EU. The UK matched this by updating the Data Protection Act introduced in 1998 to become the Data Protection Act (2018) . This act protects the data of individuals that is stored on computers and processed by organisations. How the Data Protection Act works: Each person who has their data stored is known as a data subject . An employee within an organisation must be appointed as a data controller and it is they who are responsible for registering with the Information Commissioner . The Information Commissioner is the person in the UK who is responsible for managing several laws , most significantly the Data Protection Act. When registering with the Information Commissioner, the organisation's data controller must be clear on exactly: What information they are collecting, Why it is being collected, What the data will be used for . The six principles of the Data Protection Act state that data must be: 1. Collected lawfully and processed fairly. 4. Data must be accurate and up-to-date. 2. Only used for the reasons specified. Principles of the Data Protection Act (2018) 5. Data must not be stored for longer than necessary, 3. Data must be relevant and not excessive. 6. Data must be stored and processed securely. Computer Misuse Act (1990) This act was introduced as computers became cheaper and more common at home and work . The act attempts to stop and punish those who use computers inappropriately . Breaking any of the three principles could result in fines and a jail sentence but only if it can be proved it was done on purpose and not by accident. The Computer Misuse Act (1990 ) includes three main principles : 1. No unauthorised access to data. Example: Hacking a computer system. 2. No unauthorised access to data that could be used for further illegal activities. Example: Accessing personal data to use as blackmail or identity theft. 3. No unauthorised modification of data. Example: Spreading a virus to change data. Copyright, Designs & Patents Act (1988) This act makes it a criminal offence to copy work that is not your own without the permission of the creator or the copyright holder. This can refer to text, images, music, videos or software. Owning the copyright of an image might not prevent others from copying and using it but this act means that the owner can bring legal proceedings in court to those who have stolen their work . However, it is difficult to trace who has stolen work once it has been uploaded to the internet and copies can easily spread, especially television shows and movies. This act specifically prohibits the following actions: Making copies of copyrighted material to sell to others . Importing and downloading illegally copied material (except for personal use). Distributing enough copyrighted material to have a noticeable effect on the copyright holder . Possessing equipment used to copy copyrighted material , as part of a business. Software Licences A software licence refers to how a user can legally use the software , there are two main types: Open Source Licence Source code is the software code written by programmers . If the software is open source it means that users can view and modify the source code . Linux, Python and Firefox are examples of open source software. Benefits Drawbacks Because the source code is available to edit , it can be customised to the organisation's needs . Often shared in the public domain so users can work together to modify, debug and improve a product. Unwanted features can be removed to make the software run faster . There are security risks - some editors may add malicious code to the program. Open source software is often low in price and sometimes free. It may be difficult to receive support as development is often distributed between people in different locations. The code may be prone to errors as it may not have been tested fully. It requires technical skills to be able to adapt source code efficiently and to maintain the code . Proprietary Licence Another term for a proprietary licence is closed source because the code is restricted - users are prevented from being able to view or modify the source code . You buy the right to use the software but you don't actually own it. Microsoft Office, Fortnite and Spotify are examples of closed source software. Benefits Drawbacks The code is well tested and has been professionally developed. Updates will generally be secure . Users must rely on the company to provide updates and fix issues. This might be infrequent or stop completely. The company can be held to account if it does not perform as listed in the terms and conditions upon purchase. Often not free and may be expensive. Most developers will provide some form of help/support . Users cannot modify, debug or improve the code for their own benefit. Q uesto's Q uestions 6.1b - Legislation: 1a. State the 6 principles of the Data Protection Act (2018) . [ 6 ] 1b. Explain how the Data Protection Act works . In your answer, you should include definitions of a data subject , the data controller and the Data Commissioner . [ 6 ] 2. Describe the 3 principles of the Computer Misuse Act (1990) . [3 ] 3a. What is the purpose of the Copyright, Designs & Patents Act (1988) ? [ 2 ] 3b. Describe 3 actions that CDPA (1988) prohibits . [ 3 ] 4a. Describe the difference between an open source and a proprietary licence . [ 2 ] 4b. State two benefits and two drawbacks of using software with a: Open source licence [ 4 ] Proprietary licence [ 4 ] 6.1a - Impacts of Technology Theory Topics

  • 3.2 - Project Planning Tools | F160 | Cambridge Advanced National in Computing AAQ

    Learn about project planning tools such as the Arrow diagram, Critical Path Analysis (CPA)/Critical Path Method (CPM), Flowcharts, Gantt charts, PERT charts and SWOT (Strengths / Weaknesses / Opportunities / Threats) analysis. Based on Unit F160 (Fundamentals of Application Development) for the OCR Cambridge Advanced National in Computing (H029 / H129) (AAQ - Alternative Academic Qualification). Qualification: Cambridge Advanced National in Computing (AAQ) Unit: F160: Fundamentals of Application Development Certificate: Computing: Application Development (H029 / H129) 3.2 - Project Planning Tools Watch on YouTube : Project planning tools Arrow diagram Critical path analysis Flowcharts Gantt charts PERT charts SWOT analysis Project Planning Tools Project planning tools help to visualise the project by clearly showing tasks , timelines and dependencies . They also break down complex work into smaller , manageable steps and can be used to track progress and identify delays . Each tool suits different project needs and has its own advantages and disadvantages . Choosing the right tool makes planning more accurate , efficient and successful . Arrow Diagram The arrow diagram method is a project planning tool that represents tasks as arrows connected in sequence to show their order and dependencies . It helps identify the critical path . This is the longest sequence of dependent tasks that determines the project’s minimum completion time . This method is useful for visualising task relationships , spotting bottlenecks and showing the order of activities . Critical Path Analysis Critical path analysis ( CPA ), also known as the critical path method ( CPM ), is a project planning tool used to identify the critical path . This is the sequence of tasks that determines the shortest possible project duration . It highlights tasks that cannot be delayed without affecting the overall timeline . Critical path analysis helps prioritise resources , manage dependencies and minimise project delays . Flowcharts A flowchart is a diagram that represents a process or workflow using standard symbols and arrows to show the sequence of steps . It helps visualise decision points and actions and clearly highlights the flow of information or tasks . Flowcharts make complex processes easier to understand , communicate ideas to clients and troubleshoot potential problems . Gantt Charts A Gantt chart is a visual project management tool that displays tasks along a timeline , showing their start and end dates . It helps track task dependencies , overlaps and progress at a glance . Gantt charts are useful for coordinating work , meeting deadlines and ensuring all project stages are completed in order . PERT Charts A PERT ( program evaluation and review technique ) chart is a project planning tool that maps tasks , their dependencies and timelines in a network diagram . It uses three time estimates ( optimistic , most likely and pessimistic ) to calculate expected completion times for each task . PERT charts are especially useful for scheduling complex projects and identifying the critical path to meet deadlines . SWOT Analysis SWOT analysis is a strategic planning tool used to identify a project’s strengths , weaknesses , opportunities and threats . Strengths and weaknesses focus on internal factors ( controllable by the organisation ), while opportunities and threats look at external influences ( outside of the organisation's control ). It helps guide decision-making by highlighting advantages , weaknesses to address and potential risks or openings in the wider environment . Q uesto's Q uestions 3.2 - Project Planning Tools: 1. Define the term 'critical path ' and explain why it is calculated . [3 ] 2. Explain the S , W , O and T in SWOT analysis (not just what they stand for). [4 ] 3. Choose three project planning tools and describe the advantages and disadvantages of each . [ 12 ] Henry Gantt , an American engineer , created the Gantt chart in the 1910s . It has been used as a planning tool in many major projects , including building the Hoover Dam . D id Y ou K now? 3.1 - Planning Projects Topic List 4.1 - Gathering Client Requirements

© CSNewbs 2026

The written, video and visual content of CSNewbs is protected by copyright. © 2026
bottom of page