top of page

Search CSNewbs

304 results found with an empty search

  • 3.1 - Data vs Information | Unit 2 | OCR Cambridge Technicals | CSNewbs

    Learn about the technical difference between data and information, with examples. Based on the 2016 OCR Cambridge Technicals Level 3 IT specification for Unit 2 (Global Information). 3.1 - Data vs. Information Exam Board: OCR Specification: 2016 - Unit 2 The terms 'data ' and 'information ' are often used interchangeably but they do not mean the same thing . The term 'data ' refers to unprocessed facts or statistics that have no context . For example, 53% is data - it is a statistic that has no context. The term 'information ' refers to data that has been processed , organised and structured into context . For example, 53% of pumpkin stock was sold in 2019 is information - it is data that has been given context (meaning). Data Processing Information Q uesto's Q uestions 3.1 - Data vs. Information: 1. Describe , using examples , the difference between data and information . [4 ] 2.4 - Information Management 3.2 & 3.3 - Information Categories Topic List

  • 6.5 - Physical Protection | Unit 2 | OCR Cambridge Technicals | CSNewbs

    Learn about methods of protecting data physically including biometrics, security staff and locks. Based on the 2016 OCR Cambridge Technicals Level 3 IT specification for Unit 2 (Global Information). 6.5 - Physical Protection Exam Board: OCR Specification: 2016 - Unit 2 RFID & Tokens Radio-frequency identification (RFID) uses electromagnetic fields to attach tags to physical objects . RFID tags can be embedded within 'dumb' objects such as clothing, packages and even animals. RFID is used with security tokens (such as an ID keycard ) to permit the access of authorised people to certain areas. RFID can be used by IT companies to track equipment and manage access . Shredding This is the cutting up of documents (paper or CDs ) into small pieces so that they cannot be reassembled and read. Sensitive data on paper or optical disc should be shredded when no longer required. Locks A lock can be used to prevent access to server rooms or sensitive data stores . Only authorised personnel with the right key will have access. Physical Security Measures Backup Backups should be taken regularly and stored at a secure location away from the main site. Backups could also be stored on cloud servers so that any damage to the organisation's building will not affect the backup as well. Biometrics Biometric devices require the input of a human characteristic (such a fingerprint , iris or voice scan ). The biometric data is checked against previously inputted data in a database . A match will allow access to the user. Security Staff Staff may be employed to physically prevent unauthorised people from accessing certain areas of a building where sensitive information is stored. They may check ID keycards or use surveillance like CCTV to monitor who is entering and exiting a secure area. Q uesto's Q uestions 6.5 - Physical Protection: 1. Explain how locks can be used as a physical security method within an organisation. [2 ] 2. Explain what RFID is and how it can be used with tokens as a physical security method. [3 ] 3. Explain how biometric devices can be used as a physical security method. [3 ] 4. Explain how security staff can be employed to protect data. [2 ] 5. What is the purpose of shredding ? [2 ] 6. Why should backups be stored off-site ? [1 ] 6.4 - Protection Measures Topic List 6.6 - Logical Protection

  • 5.3 - Policies | F161 | Cambridge Advanced National in Computing | AAQ

    Learn about policies related to application development, including a user guide, acceptable use policy (AUP), backup, codes of practice, staying safe online and the use of information. Resources based on Unit F161 (Developing Application Software) for the OCR Cambridge Advanced Nationals in Computing (H029 / H129) AAQ (Alternative Academic Qualification). Qualification: Cambridge Advanced Nationals in Computing (AAQ) Certificate: Computing: Application Development (H029 / H129) Unit: F161: Developing Application Software 5.3 - Policies Watch on YouTube : Policies You need to know the purpose , content and application of each policy to be considered when related to developing application platforms . What You Need to Know Policies ? YouTube video uploading soon Q uesto's Q uestions 5.3 - Policies: 1. What? [2 ] 2. What? [1 ] 3. What? [1 ] 4. What? [1 ] ? D id Y ou K now? 5.2 - Application Installation Topic List 6.1 - Legal Considerations

  • OCR CTech IT | Unit 1 | 5.2 - Operational Issues | CSNewbs

    Learn about operational issues including disaster planning, change management and data security. Based on the 2016 OCR Cambridge Technicals Level 3 IT specification. 5.2 - Operational Issues Exam Board: OCR Specification: 2016 - Unit 1 What are operational issues? Operational issues refer to potential problems that could disrupt the workflow and efficiency of an organisation . They relate to processes within an organisation and the way that the company operates on a daily basis . Security of Information Definition: Organisations must ensure that data is stored securely to minimise the chances of data loss , corruption or unauthorised manipulation . Having information stolen through a hacking attempt, for example, would negatively impact the company and its customers and possibly lead to consequences such as poor publicity , a loss of business and reputation , fines and bankruptcy . One principle of the Data Protection Act is that data must be stored securely . Organisations can use security methods such as firewalls , antiviruses or physical protection such as biometrics to keep personal information secure . Health & Safety Definition: Ensuring that employees, clients and visitors are physically protected on-site . The organisation should create a health and safety policy that staff need to read and possibly sign at the start of their work placement. The policy should include information about how to avoid injury when using the systems, how to safely maintain the equipment and whom to contact for help . Disaster & Recovery Planning Important data is often stored on a computer network, so a detailed and effective disaster recovery policy must be in place in case an unexpected disaster occurs. Disasters include natural disasters (e.g. fire, flood, lightning), hardware failure (e.g. power supply unit failing), software failure (e.g. virus damage) and malicious damage (e.g. hacking). There are three clear parts to a disaster recovery policy: Before the disaster: All of the possible risks should be analysed to spot if there are any weaknesses in preparation. Preventative measures should be taken after the analysis, such as making rooms flood-proof or storing important data at a different location . Staff training should take place to inform employees what should happen in the event of a disaster. During the disaster: The staff response is very important – employees should follow their training and ensure that data is protected and appropriate measures are put in place. Contingency plans should be implemented while the disaster is taking place, such as uploading recent data to cloud storage or securing backups in a safe room and using alternative equipment until the disaster is over. After the disaster: Recovery measures should be followed, such as using backups to repopulate computer systems. Replacement hardware needs to be purchased for equipment that is corrupted or destroyed. Software needs to be reinstalled on the new hardware. Disaster recovery policies should also be updated and improved . Organisational Policies Definition: Creating policies that outline acceptable computer and network use . Workplaces and schools often require people to sign an acceptable use policy ( AUP ) before being allowed to use the network . An AUP may include the philosophy of the organisation , rules for the personal use of IT resources and the consequences of breaching the policy . An AUP is similar to codes of practice from 5.1 . Change Management Definition: Change management is a formal approach by an organisation to lead a change in the way a business or project is run . This may include editing budgets , redefining expected deadlines , reconsidering how resources are used or changing staff roles . Advantages of change management: Reduces the likelihood of things going wrong during development. Creates a clear log of changes and improvements that are to be made. Allows changes to be approved and discussed before they happen. Formalises the process and sets out clear rules for changes . Disadvantages of change management: Can make the process of change more complicated . It can reduce the responsiveness of developers if everything must go through a formal process. It can be challenging to implement successfully. To work effectively, it needs everyone to follow the process . Scales of Change There are two main reasons why major change will occur in an organisation. Change Drivers Definition: Companies must change to stay up to date with the times and new technology . Change drivers are factors that force a business to change , such as: New legislation New competitors in the market New platforms (e.g. mobile technology and game consoles) to sell products on Economic changes Changes in business practice Social changes Change Needs Definition: Companies must change if the needs and focus of the organisation are altered over time . This reflects the changing needs of the business , often due to advancements in technology , such as: New equipment (e.g. replacing a slow network with a faster fibre optics network) Customer interaction (e.g.communicating with customers in new ways, such as social media apps) Workplace shifts (e.g. providing remote access for employees to access work and services at home) Q uesto's Q uestions 5.2 - Operational Issues: 1. Describe 3 possible consequences to an organisation if data is not stored securely . [6 ] 2. Describe the purpose of a health and safety policy and state 3 things that may be included in one. [4 ] 3a. Describe, giving specific examples , different types of possible disaster . [5 ] 3b. Describe the steps an organisation should take before , during and after a disaster occurs . [10 ] 4. Describe 3 things that may be included within an Acceptable Use Policy (AUP ). [3 ] 5a. What is change management ? Give 2 examples of when change management may be used. [4 ] 5b. Describe the advantages and disadvantages of a company deciding to implement change management . [8 ] 6a. Describe the difference between change drivers and change needs . [2 ] 6b. Describe 3 examples of change drivers and 3 examples of change needs . [6 ] 5.1 - Ethical Issues Topic List 5.3 - Threats

  • Privacy Policy | CSNewbs

    Computer Science Newbies Privacy Policy Updated 5th April 2025 1. Information Collected I do not collect any personal information from visitors as the website: Does not require users to create accounts. Does not process any transactions or collect payment details. Is intended solely for educational purposes, providing information about Computer Science. 2. Cookies and Analytics The Wix platform may automatically collect non-personal information such as: Your IP address Browser type Device information Pages viewed This is used for general site performance monitoring and visitor statistics. You can manage cookies through your browser settings. The following essential cookies are used on this site: RF-TOKEN (Used for security reasons during your session on the site.) hs (Used for security reasons during your session on the site.) svSession (Used in connection with user login.) SSR-caching (Used to indicate the system from which the site was rendered. Duration of 1 minute.) _wixCIDX (Used for system monitoring/debugging. Duration of 3 months.) _wix_browser_sess (Used for system monitoring/debugging during your session on the site.) consent-policy (Used for cookie banner parameters. Duration of 12 months.) TS* (Used for security and anti-fraud reasons during your session on the site.) Session (Used for system effectiveness measurement. Duration of 30 minutes.) fedops.logger.sessionId (Used for stability/effectiveness measurement. Duration of 12 months.) To learn more about cookies please visit All About Cookies . 3. Use of Information Any information collected automatically by Wix is used solely to: Improve the performance and content of the website. Ensure the website runs smoothly and securely. I do not sell, rent, or share visitor information. 4. Third-Party Services As the website is hosted on Wix.com, their privacy practices also apply. You can view the Wix Privacy Policy here . 5. Changes to This Policy I may update this Privacy Policy from time to time. Any changes will be posted on this page with an updated date. 6. Contact If you have any questions about this Privacy Policy, please contact me at:

  • Python | 6a - For Loops | CSNewbs

    Learn how to create and use for loops in Python. Try practice tasks and learn through text and images. Perfect for students learning GCSE Computer Science in UK schools. top Python 6a - For Loops Types of Loop The third construct of programming (after Sequence and Selection) is Iteration . If you iterate something, then you repeat it. There are two key loops to use in Python: for loops and while loops . A for loop is count controlled – e.g. “For 10 seconds I will jump up and down”. The loop will continue until the count (e.g. 10 seconds) has finished . A while loop is condition controlled – e.g. “While I am not out of breath, I will jump up and down.” The loop will continue as long as the condition remains true . Simple For Loops (1 Range Value) for i in range (5): print ( "This is a loop!" ) This is a loop! This is a loop! This is a loop! This is a loop! This is a loop! for i in range (8): print ( "Jaffa Cakes aren't biscuits" ) Jaffa Cakes aren't biscuits Jaffa Cakes aren't biscuits Jaffa Cakes aren't biscuits Jaffa Cakes aren't biscuits Jaffa Cakes aren't biscuits Jaffa Cakes aren't biscuits Jaffa Cakes aren't biscuits Jaffa Cakes aren't biscuits The i is a count variable , it is used to measure each iteration (turn) of the loop. In the range brackets write the number of times to loop the indented code. Don’t forget the colon at the end and remember that everything you want to repeat must be indented (press tab key once). For Loops Task 1 (Repeat Your Name ) Example solutions (shortened): Create a simple for loop that prints your name twenty times. For Loops Task 2 (Are We There Yet? ) Christopher Christopher Christopher ... Create a simple for loop that prints the sentence 'Are we there yet?' 150 times. Are we there yet? Are we there yet? Are we there yet? ... Counting Using i (2 Range Values) For loops can be used to count by referring to the iteration inside the loop itself using i : for i in range (5): print ( "Loop number" , i) Loop number 0 Loop number 1 Loop number 2 Loop number 3 Loop number 4 for i in range (1,6): print ( "Loop number" , i) Loop number 1 Loop number 2 Loop number 3 Loop number 4 Loop number 5 There are two important things to know about how Python counts using for loops. Python will automatically start counting at 0 rather than 1. The second value in the range is an exclusive limit - it will stop 1 before this value. For example, if you wanted to count 1 to 10 you would need to write range(1,11) . For Loops Task 3 (100 to 150 ) Create a for loop that prints all numbers from 100 to 150 . You don't need to print any additional text, just the i variable. Example solution (shortened): 100 101 102 ... ... 148 149 150 Using a Step (3 Range Values) A third value can be added to the range brackets of a for loop to define a step . A step is the number to go up (or down ) with each iteration . for i in range (2,11,2): print ( i) 2 4 6 8 10 for i in range (18,0,-3): print ( i) 18 15 12 9 6 3 In most programs defining a step is not essential , Python will assume it is +1 if you don't include it. For Loops Task 4 (Even Numbers 10 to 30 ) Example solution for Task 4 (shortened): Create a for loop that prints all even numbers from 10 to 30 . Use a step . For Loops Task 5 (Countdown ) Use a for loop with a negative step to print a countdown from 10 to 1 . 10 12 14 ... ... 26 28 30 Using Variables with For Loops Variables can be used to make for loops suitable for a range of different purposes. loopnum = int ( input ( "Times to repeat: " )) for i in range (loopnum): print ( "Hello!" ) Times to repeat: 4 Hello! Hello! Hello! Hello! The loop above uses a variable in the range brackets to repeat the loop the specific number of times that the user enters . loopnum = int ( input ( "Times to repeat: " )) word = input ( "Word to repeat: " ) for i in range (loopnum): print (word ) Times to repeat: 3 Word to repeat: velociraptor velociraptor velociraptor velociraptor The loop above uses two variables that are input by the user ; one to define the range and another that is printed . For Loops Task 6 (Many Happy Birthdays ) Example solution for Task 6 (shortened): Ask the user to input their age then print 'Happy Birthday! ' that many times. For Loops Task 7 (House Number and Name ) Ask the user to enter their house number (e.g. 15 if they lived at 15 Cherry Road) and their name . Print their name as many times as their house number . For example, if Hannah lived at 103 Apple Lane then Hannah would be printed 103 times . Enter your age: 5 Happy Birthday! Happy Birthday! Happy Birthday! Happy Birthday! Happy Birthday! ⬅ Section 5 Practice Task s 6 b - While Loops ➡

  • 10.2 - Stages of Compilation - Eduqas (2020 Spec) | CSNewbs

    Learn about the six stages of compilation - lexical analysis, symbol table construction, syntax analysis, semantic analysis, code generation and code optimisation. Based on the 2020 Eduqas (WJEC) GCSE specification. 10.2: Stages of Compilation Exam Board: Eduqas / WJEC Specification: 2020 + A compiler translates source code (high-level language written by a programmer) into machine code in five separate stages : 1. Lexical Analysis The term 'lexical' refers to words and phrases . Source code needs to be broken down into tokens that can later be analysed. In lexical analysis: Spaces and comments are removed from the code. Identifiers , keywords and operators are replaced by tokens . A token is similar to a variable with a name and a value . A symbol table is created. T his table stores the addresses of all variables , labels and subroutines used in the program. 2. Syntax Analysis The term 'syntax' refers to sentence structure . In syntax analysis: The tokens created in the first stage are checked to see if they follow the syntax (spelling and grammar ) rules of the programming language. This process is called ' parsing ' . During parsing, if a syntax error is found then an error message is displayed and compilation stops . 3. Semantic Analysis The term 'semantic' refers to logic . Variables are checked in this stage to ensure they are used correctly: Variable checks ensure they are correctly declared and use a valid data type (for example integers are not assigned to decimal values). Operation checks ensure they are correct for the data type used ( for example dividing a number must result in an real value ). 4. Code Generation The machine code (data in a binary format ) is generated . 0010 1011 0101 0101 0110 0111 0101 0001 0101 0101 0101 0110 5. Code Optimisation The code is optimised so it is fast , efficient and uses as little of the computer's resources as possible. Q uesto's Q uestions 10.2 - Stages of Compilation: 1 a. List the 6 stages of compilation in order . [6 ] 1b. Create a poster or flowchart describing each of the 6 stages of compilation : 1. Lexical Analysis 2. Symbol Table Creation 3. Syntax Analysis 4. Semantic Analysis 5. Code Generation 6. Code Optimisation [ 10 total ] 10.1 - Translators Theory Topics 10.3 - Programming Errors

  • 6.1 - Security Principles | Unit 2 | OCR Cambridge Technicals | CSNewbs

    Learn about the three principles of information security - confidentially, integrity and availability. Based on the 2016 OCR Cambridge Technicals Level 3 IT specification for Unit 2 (Global Information). 6.1 - Security Principles Exam Board: OCR Specification: 2016 - Unit 2 There are three key principles of data security that are protected in legislation such as the Data Protection Act (2018 ). Organisations storing personal or sensitive information must ensure that these three principles are upheld at all times . Confidentiality What it means: Information should only be accessed by individuals or groups with the authorisation to do so. How to uphold this principle: An organisation should use protection measures like usernames and passwords to ensure that only authorised people can access the sensitive data. Tiered levels of access or permissions can also limit who has access to the data. Integrity What it means: Information is maintained so that it is up-to-date , correct and fit for purpose . How to uphold this principle: Organisations should carry out regular data maintenance to update information (e.g. confirm contact details once a year). If storing data in a spreadsheet or database, record-locking should be used so that only person can edit at a time, preventing the data from becoming incorrect. Availability What it means: Information is available to the individuals or groups that need to use it. It should only be available to those who are authorised . How to uphold this principle: Staff should have the correct privileges so that they can easily access data when required. Data could be stored online , e.g. cloud storage so that it is available remotely using an internet connection. Data must also be kept safe from unauthorised access . Staff should not make additional copies of information which could be lost or stolen. Q uesto's Q uestions 6.1 - Security Principles: 1a. Describe what is meant by ' confidentiality ' . [1 ] 1b. Explain two ways that an organisation can keep data confidential . [4 ] 2a. Describe what is meant by ' integrity ' . [1 ] 2b. Explain two ways that an organisation can preserve the integrity of its data . [4 ] 3a. Describe what is meant by ' availability ' . [2 ] 3b. Explain two ways that an organisation can keep its data available . [4 ] 5.2 - Data Flow Diagrams Topic List 6.2 - Risks

  • 3.1 - Application Programming Interfaces (APIs) | F161 | Cambridge Advanced National in Computing | AAQ

    Learn about Application Programming Interfaces (APIs), including their roles, types (composite, internal, private, public, partner) and architecture (REST, SOAP, RPC). Resources based on Unit F161 (Developing Application Software) for the OCR Cambridge Advanced Nationals in Computing (H029 / H129) AAQ (Alternative Academic Qualification). Qualification: Cambridge Advanced Nationals in Computing (AAQ) Certificate: Computing: Application Development (H029 / H129) Unit: F161: Developing Application Software 3.1 - Application Programming Interface (API) Watch on YouTube : API roles API architecture You must know the role and uses of Application Programming Interfaces (APIs ) as well as the uses , advantages and disadvantages of each API type (composite , internal , private , public , partner ). You must also understand the uses , advantages and disadvantages of API architecture (REST , SOAP , RPC ). What You Need to Know API Roles ? YouTube video uploading soon API Architecture ? YouTube video uploading soon Q uesto's Q uestions 3.1 - Application Programming Interface (API): 1. What? [2 ] 2. What? [1 ] 3. What? [1 ] 4. What? [1 ] ? D id Y ou K now? 2.3 - Data States Topic List 3.2 - Protocols

  • Python | Section 5 Practice Tasks | CSNewbs

    Test your understanding of imported commands in Python including random and time. Try practice tasks and learn through text and images. Perfect for students learning GCSE Computer Science in UK schools. top Python - Section 5 Practice Tasks Task One: Random Numbers Ask the user to input 4 different numbers . Put the four variables in a list with square brackets and use the choice command from section 5a to randomly select one. Example solutions: Enter number 1: 10 Enter number 2: 20 Enter number 3: 30 Enter number 4: 40 The computer has selected 30 Enter number 1: 2023 Enter number 2: 2024 Enter number 3: 2025 Enter number 4: 2026 The computer has selected 2026 Task Two: Logging In You will make a program for logging into a system. Print a greeting then ask the user for their name . Wait 2 seconds then print a simple login message with the user’s name . Then print the current time (current hour and minute ). Example solutions: Welcome to Missleton Bank Please enter your name: Steve Steveson Logging you in Steve Steveson The time is 08:02 Welcome to Missleton Bank Please enter your name: Gracie Jones Logging you in Gracie Jones The time is 15:53 Task Three: Random Wait Generate a random number between 3 and 10 to represent seconds . Print this number then print the current hour, minute and second . Wait for the random number of seconds then print the current time again. Example solutions: The random wait will be 6 seconds. The time is 08:17:57 The time is 08:18:03 The random wait will be 3 seconds. The time is 08:21:39 The time is 08:21:42 Task Four: Independence Checker Create a program that displays how many days three specific countries have been independent for. The user will choose either Fiji , Samoa or Australia and the difference between today's date and the day they become independent will be displayed. Fiji became independent on 10th October 1970 . Samoa became independent on 13th December 1962 . Australia became independent on 1st January 1901 . Use the 'Today's Date ' and 'Between Dates ' parts of Section 5c to help you get today's date , make the other three dates and find the difference . Making Samoa's independence date would be samoadate = date(1962,12,13) for example. Example solutions: Enter FIJI, SAMOA or AUSTRALIA to check how long it has been independent for: AUSTRALIA Australia has been independent for 44822 days. Enter FIJI, SAMOA or AUSTRALIA to check how long it has been independent for: FIJI Fiji has been independent for 19338 days. Task Five: Square Root Create a program that asks the user to enter a whole number . Calculate the square root of the number. Round the answer down to the nearest whole number using the floor command. Example solutions: Enter a number: 156 The rounded down square root is 12 Enter a number: 156 The rounded down square root is 12 ⬅ 5e - More Librarie s 6a - For Loops ➡

  • 1.1 - The CPU | OCR A-Level | CSNewbs

    Explains the components of the CPU, the different registers, buses, how the FDE cycle works, CPU performance factors, pipelining, Von Neumann architecture and Harvard architecture. Based on the OCR H446 Computer Science A-Level specification. Exam Board: OCR A-Level 1.1 - Structure and Function of the Processor Specification: Computer Science H446 Watch on YouTube : CPU components Registers Buses The FDE cycle CPU performance Pipelining Von Neumann vs Harvard Contemporary architecture The Central Processing Unit ( CPU ) is the most important component in every computer system. The purpose of the CPU is to process data and instructions by constantly repeating the fetch-decode-execute cycle . In this cycle, instructions are fetched from RAM and transferred into the registers of the CPU to be decoded and executed . CPU Components The CPU has three key components : The control unit directs the flow of data and instructions inside the CPU and manages the FDE cycle , especially decoding instructions . The arithmetic logic unit ( ALU ) performs all arithmetic calculations and logical operations inside the CPU . Registers are small , ultra-fast storage locations that temporarily hold data , instructions or addresses during processing . The CPU also contains cache memory , which is temporary storage space for frequently accessed data . Registers A register is a small storage space for temporary data , instructions or addresses in the CPU . Each register has a specific role in the FDE cycle : The Program Counter ( PC ) stores the memory address of the next instruction to be fetched from RAM . The Memory Address Register ( MAR ) stores the memory address currently being accessed , which may be an instruction or data . The Memory Data Register ( MDR ) stores the data that is transferred from RAM to the CPU . The Current Instruction Register ( CIR ) stores the instruction that has been fetched from RAM . The Accumulator ( ACC ) stores data currently being processed and the result of calculations or logical operations made by the ALU . Buses Data and signals are transmitted between components across internal connections called buses . There are three types of computer bus : The data bus transmits data and instructions between the CPU , memory and other components such as input/output devices . It is bidirectional (data is sent both ways ). The address bus transmits the location in memory that the CPU is accessing . It is unidirectional (one-way ) from the CPU to RAM . The control bus transmits control signals (e.g. 'read ' or 'write ') from the CPU to coordinate other components . It is bidirectional . The FDE Cycle In the Fetch Decode Execute (FDE ) cycle , instructions are fetched from RAM , then decoded (understood) and executed (processed) in the CPU . This cycle is performed by the CPU millions of times every second using the registers and buses explained above. This cycle is how the CPU processes data and instructions for each program or service that requires its attention . CPU Performance The performance of the CPU is affected by three main factors : Clock speed is t he number of cycles per second , so a higher clock speed means more instructions can be executed per second . The number of cores is important as more cores allow a CPU to carry out multiple instructions simultaneously , improving multitasking and parallel processing . Cache memory is small and very fast memory inside the CPU that stores frequently used instructions , reducing the time needed to access RAM . Pipelining Pipelining is the concurrent processing of multiple instructions . An instruction can be fetched while another is decoded and another is executed . This overlapping of instructions increases the overall speed of program execution . Computer Architecture Computer architecture refers to the design and organisation of a system’s components and how they interact . There are two types of architecture to know: Von Neumann architecture uses a single main memory (RAM ) that stores both program instructions and data . This means instructions and data travel along the same buses , which can cause a bottleneck (congestion ). Harvard architecture separates the storage of program instructions and data into two different memory locations . This allows instructions and data to be fetched at the same time , improving performance . You also need to know about c ontemporary (modern) architecture , which includes features such as onboard ( integrated ) graphics , performance boosting mode , out-of-order execution and virtual cores . Q uesto's K ey T erms Components of the CPU: control unit (CU), arithmetic logic unit (ALU), registers, cache memory Registers: program counter (PC), memory address register (MAR), memory data register (MAR), current instruction register ( CIR), accumulator (ACC) Buses: data bus, address bus, control bus, unidirectional, bidirectional FDE Cycle: fetch stage, decode stage, execute stage CPU Performance: clock speed , number of cores , cache memory Pipelining: pipelining Computer architecture: Von Neumann, Harvard, contemporary D id Y ou K now? The Apollo Guidance Computer ( AGC ) for NASA's Apollo 11 mission , when humans first set foot on the moon , had a CPU clock speed of about 1 megahertz - slower than many GCSE-level calculators used today. A-Level Topics 1.2 - Types of Processor

  • Python | 5d - Colorama | CSNewbs

    Learn how to change the colour of text in Python using the colorama library. Try practice tasks and learn through text and images. Perfect for students learning GCSE Computer Science in UK schools. top Python 5d - COlorama What is Colorama? Colorama is a library that allows the colour of text to be changed. Information about the library can be found on the Python Package Index (PyPi) website . Copyright of the library is held by Jonathan Hartley & Arnon Yaari. Colorama can be imported when using some online editors like Replit . Colorama is not available as a default library on the standard Python offline editor (IDLE) . Using Colorama The three main commands using Colorama are: Fore to change the text colour. Back to change the highlight colour. Style to make the text appear dim or bright. from colorama import Fore print (Fore. GREEN + "Hello There" ) Hello There from colorama import Back print (Back.YELLOW + "Goodbye Now" ) Goodbye Now from colorama import Style print (Style.DIM + "Hi Again" ) Hi Again There are 8 possible colours to choose with the Fore and Back commands. You must write the colour name in CAPITAL LETTERS . BLACK CYAN GREEN MAGENTA RED WHITE YELLOW There is also the RESET option, e.g. Fore.RESET The 2 options to choose with the Style command are DIM and BRIGHT . You can also use Style.RESET_ALL Colorama Task 1 ( Traffic Lights) Create a simple traffic light program . The user is prompted for an input . Typing "GO " will output a suitable message in GREEN , typing "WAIT " will output a message in YELLOW and typing "STOP " will output a response in RED . Example solutions: What should the driver do? STOP You must stop your car. What should the driver do? GO It is safe to continue driving. ⬅ 5c - Date & Tim e 5e - M ore Libraries ➡

© CSNewbs 2026

The written, video and visual content of CSNewbs is protected by copyright. © 2026
bottom of page