top of page

Search CSNewbs

304 results found with an empty search

  • 1.3.3 - Application Software Types | F160 | Cambridge Advanced National in Computing | AAQ

    Learn about the purpose, characteristics, advantages, disadvantages, examples and client requirements of application software types, including off-the-shelf, custom off-the-shelf and bespoke software. Resources based on Unit F160 (Fundamentals of Application Development) for the OCR Cambridge Advanced National in Computing (H029 / H129) AAQ (Alternative Academic Qualification). Qualification: Cambridge Advanced National in Computing (AAQ) Unit: F160: Fundamentals of Application Development Certificate: Computing: Application Development (H029 / H129) 1.3.3 - Application Software Types Watch on YouTube : Off-the-Shelf Software Custom Off-the-Shelf Software Bespoke Software There are three application software types you need to know : Off-the-shelf software Custom off-the-shelf software Bespoke software For each software type , you need to know : Its purpose and common characteristics . The advantages and disadvantages of using the software. How client requirements affect the selection of that software. Application Software Types Off-the-Shelf Software Off-the-shelf software is pre-made and available for anyone to buy and use . It is designed for general users and common tasks . It is pre-developed and ready-made with standard features for a wide audience , not custom-built for a specific user. Its purpose is to provide a cost-effective , quick-to-deploy solution for popular applications . Custom Off-the-Shelf Software Custom off-the-shelf software is pre-built like regular off-the-shelf software , but can be slightly customised to meet specific user needs . It offers a balance between quick setup and limited personalisation . It supports configurable features such as add-ons , plugins or modules to extend or adapt functionality while the base software remains maintained and updated by the original developer . Bespoke Software Bespoke software is designed and built specifically for one organisation or user . It fits their exact needs but usually costs more and takes longer to develop . An example is a bespoke system developed for a specific bank with custom software to handle financial regulations , unique products and security needs . Other examples include government systems , hospital patient management and air traffic control . Q uesto's Q uestions 1.3.3 - Application Software Types: 1. Explain the differences in purpose and characteristics between off-the-shelf and custom off-the-shelf software. [4 ] 2. A dental surgery needs new software to manage its customer bookings . Justify which application software type they should use and why . [4 ] 3. Describe two advantages and two disadvantages of the three application software types on this page. [ 12 ] Off-the-shelf software gets its name from the days when software like Microsoft Word was sold on physical discs in shops , for customers to take off the shelf and install at home . D id Y ou K now? 1.3.2 - Software Categories Topic List 2.1 - Software Development Models

  • 8.4 - Searching & Sorting Algorithms - Eduqas GCSE (2020 Spec) | CSNewbs

    Learn about sorting algorithms - merge and bubble sort - and searching algorithms - linear and bubble search. Based on the 2020 Eduqas (WJEC) GCSE specification. 8.4: Sorting & Searching Algorithms Exam Board: Eduqas / WJEC Specification: 2020 + Merge Sort Merge sort is a sorting algorithm based on the idea of ‘divide and conquer ’. A merge sort divides a list into half , again and again until each data item is separate . Then the items are combined in the same way as they were divided , but now in the correct order . When the individual lists are all merged together as one list again, then the data is in order and the algorithm will end . Bubble Sort This algorithm is based on the comparison of adjacent data elements . Data elements are swapped if they are not in the correct order . A bubble sort is not suitable for large sets of data. Linear Search A linear search is the most simple search algorithm. Each data item is searched in order from the first value to the last as if they were all laid out in a line . The list does not have to be in any order before it is searched . This search is also known as a sequential search because the list is searched in a sequence from start to end. For large lists , this search is not very efficient . Binary Search A binary search is a much more efficient searching algorithm as it generally searches through fewer data and is often much quicker - especially for large data sets. In a binary search, the middle point of the data is selected with each iteration and many data items can be ignored. However, the list of data must already be sorted in order before a binary search can take place. Q uesto's Q uestions 8.3 - Searching & Sorting Algorithms: Linear Search Explain step-by-step how the number 8 would be found in the following list using a linear search : 12, 5, 3, 2, 8, 19, 14, 6 [4 ] Binary Search Explain step-by-step how the number 2 would be found in the following list using a binary search : 1, 2, 3, 4, 5, 6, 7, 8, 9, 10 [6 ] Merge Sort Explain step-by-step how a merge sort would sort the following list of numbers: 4, 8, 5, 1, 3, 6, 7, 2 [6 ] Bubble Sort Explain step-by-step how a bubble sort would sort the following list of numbers: 3, 2, 6, 4, 1, 4 [6 ] Watch on YouTube Watch on YouTube Watch on YouTube Watch on YouTube 8.3 - Writing Algorithms Theory Topics 8.5 - Validation & Verification

  • OCR CTech IT | Unit 1 | 1.1 - Computer Hardware | CSNewbs

    Learn about input and output devices used with computer systems. Based on the 2016 OCR Cambridge Technicals Level 3 IT specification. 1.1 - Computer Hardware Exam Board: OCR Specification: 2016 - Unit 1 Input Devices An input device allows data, such as text, images, video or sound, to be entered into a computer system. Common input devices: Mouse Keyboard Scanner Controller Microphone Webcam Chip Reader OCR / OMR Scanner Barcode Scanner Graphics Tablet Sensors (e.g. light or temperature) Touch Screen Remote Control Biometric Scanner (e.g. fingerprint or iris) Concept Keyboard Output Devices There are many outputs created by a computer system, including printed documents, on-screen data and sound. Common output devices: Monitor Printer (e.g. inkjet or laser) Plotter Speakers Projector Alarm Light Headphones Touch Screen Braille Terminal Communication devices can be found in 1.5 . Biometric Devices A biometric device uses a human characteristic as part of its security mechanism, such as a fingerprint , iris (eye), face o r voice . Organisations using biometrics must instruct each employee to first input their information to a database , by scanning their fingerprint for example. Whenever the scanner scans a finger it searches in its database to see if the fingerprint matches one that it already holds . Only authorised employees will have already scanned their fingerprints so if there is no match then access is not allowed . Advantages of biometric devices: Security is improved as biometrics can't be shared like passwords can. Even if a password is exposed the system can't be accessed without having the biometric too. Biometric scanners verify that a user is who they claim to be. Using a biometric device (e.g. fingerprint scanner) might be quicker and easier than entering a username and password. Disadvantages of biometric devices: Can be expensive to install and all users must take the time to initially set up by entering their biometric into the database so they will be recognised by the system. Unreliable in that it can be affected by the environment (e.g. dirty fingers can't be used with a fingerprint scanner or voice recognition may not work in a loud environment). Disabled users might not be able to provide the biometric required. Privacy concerns - users might not want their personal characteristics stored on a computer system. Q uesto's Q uestions 1.1 - Computer Hardware: 1. Make a list of 5 input devices and 5 output devices . Challenge yourself to look up and include devices from this page you may not be familiar with. [10 ] 2a. State 3 human features that may be recorded by a biometric device . [3 ] 2b. Describe how a biometric device works . [3 ] 2c. A school is considering installing biometric devices to allow only sixth form students to enter certain parts of the school. Describe 3 advantages and 3 disadvantages to the school of using biometrics in this way. [10 ] Topic List 1.2 - Computer Components

  • 3.1 - Compression, Encryption & Hashing | OCR A-Level | CSNewbs

    Learn about lossy and lossless compression and the lossless compression algorithms run-length encoding and dictionary coding. This topic also covers symmetric and asymmetric encryption and the uses of hashing. Based on the OCR H446 Computer Science A-Level specification. Exam Board: OCR A-Level 3.1 - Compression, Encryption and Hashing Specification: Computer Science H446 Watch on YouTube : Lossy & Lossless Compression Lossless Compression Algorithms Encryption Hashing Lossy vs Lossless Compression Compression is the process of reducing the size of a file so it takes up less storage space and can be transmitted more quickly over a network . It works by encoding data more efficiently or removing unnecessary information . The main benefits of compression include faster file transfer speeds , reduced storage requirements and improved performance when streaming data . Lossy compression permanently removes some data that is less important to human perception , such as subtle sounds or image details , resulting in smaller file sizes but slightly lower quality . Lossless compression reduces file size without losing any data , allowing the original file to be perfectly restored after it is decompressed . YouTube video uploading soon Lossless Compression Algorithms There are two types of lossless compression that you need to know: Run-Length Encoding (RLE ) is a simple form of lossless compression that reduces file size by storing repeating data as a single value and a count . For example, a sequence like AAAAABBBCCCC could be stored as A5B3C4 , saving space in files with many repeated elements , such as pixels in images . Dictionary Encoding replaces repeating patterns of data with shorter codes that reference entries in a dictionary . The dictionary stores common sequences once , and each repetition is replaced by a shorter reference , making it efficient for text and other data with recurring patterns . YouTube video uploading soon Encryption Encryption is the process of converting readable data (plaintext ) into an unreadable form (ciphertext ) to prevent unauthorised access . It ensures the confidentiality and security of information during storage or transmission . There are two key types of encryption : Symmetric encryption uses the same key for both encryption and decryption , meaning the sender and receiver must share the key securely . It is fast and efficient , making it suitable for encrypting large amounts of data . However, key distribution is a major risk if the key is intercepted . Asymmetric encryption uses a pair of keys - a public key for encryption and a private key for decryption . It is more secure for communication but slower due to complex mathematical processes . Asymmetric encryption is often used to exchange symmetric keys securely before data transfer . YouTube video uploading soon Hashing Hashing is the process of applying a mathematical function (hash function ) to data to produce a fixed-size value , known as a hash . It is a one-way process , meaning the original data cannot be reconstructed from the hash . Hashing is commonly used for data integrity checks , password storage and digital signatures . Even a tiny change in the input data produces a completely different hash , making it useful for detecting tampering or corruption . YouTube video uploading soon This page is under active development. Check here for the latest progress update. Q uesto's K ey T erms Compression: lossy compression, lossless compression, run-length encoding, dictionary encoding Encryption: plaintext, ciphertext, key, symmetric encryption, asymmetric encryption Hashing: hash function, hash D id Y ou K now? Alan Turing and his team used pattern recognition to analyse recurring sequences in encrypted German messages , helping to break the Enigma code , which was a major factor in the Allies’ victory in World War II . 2.4 - Programming Languages A-Level Topics 3.2 - Databases

  • Python | CSNewbs

    Learn how to create simple programs in Python. Try practice tasks and learn through text and images. Perfect for students learning GCSE Computer Science in UK schools. Formerly pynewbs.com. Follow the instructions in each section and try the practice tasks on every page . At the end of each section are larger problems to solve. Pyt hon Sections 0. Setting up Python Installing and Using Python 1. Printing and Variables a. Printing b. Comments c. Creating Variables d. Using Variables Section 1 Practice Tasks 2. Inputting Data a. Inputting Text b. Inputting Numbers Section 2 Practice Tasks 7. Subroutines a. Procedures b. Functions Section 7 Practice Tasks 8. Lists a. Using Lists b. 2D Lists c. Dictionaries Section 8 Practice Tasks 9. String Handling a. Basic String Handling b. Number Handling Section 9 Practice Tasks 3. Data Types & Calculations a. Data Types b. Simple Calculations Section 3 Practice Tasks 4. Selection a. If Statements b. Mathematical Operators ( & MOD / DIV) c. Logical Operators Section 4 Practice Tasks 5. Importing from Libraries a. Random b. Sleep c. Date & Time d. Colorama e. More Libraries (math) Section 5 Practice Tasks 6. Loops a. For Loops b. While Loops Section 6 Practice Tasks 10. File Handling a. Open & Write to Files b. Read & Search Files c. Remove & Edit Lines Section 10 Practice Tasks 11. User Interfaces a. Graphical User Interface 12. Authentication a. Error Handling Extended Tasks Extended Task 1 (Pork Pies) Extended Task 2 (Lottery) Extended Task 3 (Blackjack) Extended Task 4 (Vet Surgery) Extended Task 5 (Colour Collection) Extended Task 6 (Guess the Word) Extended Task 7 (Guess the Number)

  • 8.2 - Understanding Algorithms - Eduqas GCSE (2020 Spec) | CSNewbs

    Learn about algorithms including pseudocode and flowcharts. Based on the 2020 Eduqas (WJEC) GCSE specification. 8.2: Understanding Algorithms Exam Board: Eduqas / WJEC Specification: 2020 + What is an algorithm? An algorithm is a set of instructions , presented in a logical sequence . In an exam you may be asked to read and understand an algorithm that has been written. To prove your understanding you may be asked to respond by actions such as listing the outputs of the algorithm, correcting errors or identifying an error within it. Programmers create algorithm designs as a method of planning a program before writing any code. This helps them to consider the potential problems of the program and makes it easier to start creating source code. There are two main methods of defining algorithms : Defining Algorithms - Pseudocode & Flowcharts Pseudocode Pseudocode is not a specific programming language but a more general method of describing instructions . It should be unambiguous, and it should not resemble any particular kind of programming language (e.g. Python or Java), so it can theoretically be turned into working code in any language. Generally, pseudocode can be written in any way that is readable and clearly shows its purpose. However, the Eduqas exam board advises that pseudocode for the programming exam should follow the conventions below : Annotation { Write your comment in curly brackets} Define data type price is integer firstname is string Declare a variable's value set price = 100 set firstname = "Marcella" Input / output output "Please enter your first name" input firstname Selection (must have indentation) if firstname = "Steven" then output "Hello" + firstname elif firstname = "Steve" then output "Please use full name" else output "Who are you?" end if Iteration (while loop) while firstname ! = "Steven" output "Guess my name." input firstname repeat Iteration (for loop) for i in range 10 input item next i Define a subroutine Declare Sub1 [Subroutine content indented] End Sub1 Call a subroutine call Sub1 Flowcharts A flowchart can be used to visually represent an algorithm. The flowchart symbols are: Algorithm Examples Below are two different methods for representing the same algorithm - a program to encourage people to buy items cheaply at a supermarket. The program allows the price of items in a supermarket to be entered until the total reaches 100. The total price and the number of items entered are tracked as the program loops. Once the total reaches 100 or more, an if statement checks how many items have been entered and a different message is printed if there are 20 or more items, 30 or more items or less than 20 items. Pseudocode Flowchart {This is a program to see how many items you can buy in a supermarket before you spend over £100} total is integer, itemsentered is integer, itemprice is integer set total = 0 set itemsentered = 0 while total < 100 output "enter the price of the next item" input itemprice total = total + itemprice itemsentered = itemsentered + 1 repeat if itemsentered >= 20 then output "You are on your way to saving money." elif itemsentered => 30 then output "You're a real money saver." else output "Look for better deals next time." end if Reading Algorithms In an exam you may be asked to read an algorithm and prove your understanding , most commonly by listing the outputs . Start from the first line and follow the program line by line , recording the value of variables as you go . When you encounter a for loop , repeat the indented code as many times as stated in the range . Example Algorithm: Start NewProgram i is integer maxvalue is integer input maxvalue for i = 1 to maxvalue output (i * i) ??????? output 'program finished' End NewProgram Example Questions: 1. List the outputs produced by the algorithm if the 'maxvalue' input is 5 . 2. State the code that has been replaced by '???????' and what the code's purpose is. Example Answers: 1. Outputs: 1 4 9 16 25 program finished 2. Missing Code: next i Purpose: Moves the loop to the next iteration. Watch on YouTube Q uesto's Q uestions 8.2 - Understanding Algorithms: 1a. Read the algorithm shown on the left and list all outputs in the correct order if the inputs are 2 for height and 72 for weight . 1b. Give the code that is missing from line 25 . 8.1 - Programming Principles Theory Topics 8.3 - Writing Algorithms

  • 3.3 - Networks | OCR A-Level | CSNewbs

    Learn about the characteristics of networks, protocols, standards, the internet, TCP/IP stack, DNS servers, protocol layering, LANs, WANs, packet and circuit switching, network security and threats, firewalls, proxies, encryption, network hardware, client-server and peer to peer networks. Based on the OCR H446 Computer Science A-Level specification. Exam Board: OCR A-Level 3.3 - Networks Specification: Computer Science H446 Watch on YouTube : Purpose of networks (LAN & WAN) Protocols & standards Protocol layering & TCP/IP stack Domain Name System (DNS) Packet & circuit switching Network security threats Network security protection Network hardware Client-server & peer-to-peer This topic looks at how data is transferred between computer systems on networks , including the required devices , protocols , network types and potential security threats . Purpose of Networks A network is a group of connected computers that can share data , resources and communicate with each other . The main purpose of a network is to allow users to share files , hardware (like printers ), internet connections and other services efficiently . A Local Area Network (LAN ) covers a small geographical area , such as a single building or school , and is usually owned and managed by one organisation . A Wide Area Network (WAN ) covers a large geographical area , connecting multiple LANs through public or leased communication lines such as the internet . YouTube video uploading soon Protocols & Standards Protocols are sets of rules that define how data is transmitted and received over a network , ensuring that devices can communicate reliably . Standards are agreed specifications that ensure different hardware and software systems are compatible and can work together . They are needed so that networks remain interoperable , secure and efficient , regardless of the devices or manufacturers involved . Common network protocols include: HTTP /HTTPS is used for transferring web pages over the internet . FTP aids the transfer of files across a network . SMTP is used to send emails and IMAP /POP receive emails . TCP/IP is the core suite of protocols that controls how data is packaged , addressed , transmitted and received across networks . YouTube video uploading soon Protocol Layering & TCP/IP Stack Protocol layering is used to divide complex networking tasks into manageable sections , making systems easier to design , understand and troubleshoot . It also allows different technologies or protocols to work together , as each layer only interacts with the ones directly above and below it. The four layers are: Application layer : Provides network services to end users , such as web browsing (HTTP ) or email (SMTP ). Transport layer : Manages data transmission between devices, ensuring it arrives reliably and in the correct order (e.g. TCP , UDP ). Internet layer : Handles addressing and routing of data packets between networks using IP (Internet Protocol ). Link layer : Manages the physical connection between devices and controls how data is transmitted over the network hardware . YouTube video uploading soon Domain Name System (DNS) The Domain Name System ( DNS ) translates human-readable domain names (like www.csnewbs.com ) into IP addresses that computers use to identify each other on a network . When a user enters a web address , the request is sent to a DNS server to find the matching IP address . If the server doesn’t have it stored locally , it queries other DNS servers higher in the hierarchy until it finds the correct address . The IP address is then returned to the user’s device , allowing it to connect to the correct web server to access the requested web page . YouTube video uploading soon Packet & Circuit Switching Packet switching and circuit switching are methods of data transmission , describing how data is sent across a network from one device to another . With packet switching , data is split into small packets , each sent independently across the network and reordered at the destination . This makes efficient use of network resources and allows many users to share the same connections . However, packets can arrive out of order or be delayed , causing variable performance . With circuit switching , a dedicated communication path is established between two devices for the duration of a session , as in traditional phone networks . It provides a reliable and consistent connection with guaranteed bandwidth . The drawback is that it wastes resources , as the dedicated line cannot be used by others . YouTube video uploading soon Network Security Threats There is a range of potential threats associated with network use to be aware of, including the following: Hackers can attempt to gain unauthorised access to computer systems or networks , often to steal , alter or destroy data . Viruses are malicious programs that attach themselves to other files and spread , potentially damaging or deleting data . Denial of Service ( DoS ) attacks overload a network or website with traffic , making it unavailable to legitimate users . Spyware secretly monitors user activity and collects information such as passwords or browsing habits . An SQL injection involves inserting malicious SQL code into a database query to access or alter sensitive data . Phishing uses fraudulent emails or messages to trick users into revealing personal information . Pharming redirects users from legitimate websites to fake ones designed to steal login details or financial information . YouTube video uploading soon Network Security Protection Minimising or preventing network threats is vital and can be achieved with the following measures : Firewalls monitor and control incoming and outgoing network traffic , blocking unauthorised access while allowing safe communication . Secure passwords help protect user accounts by making it difficult for attackers to guess or crack them, especially when they are long and complex . Anti-virus software scans and removes malicious programs , such as viruses and worms , before they can damage files or systems . Anti-spyware software detects and removes spyware , preventing it from secretly collecting personal or sensitive information from a user’s device . YouTube video uploading soon Network Hardware A range of network hardware is required for devices to transfer data to another location , including the following: A modem converts digital data into analogue signals and back , allowing internet access over phone or cable lines . A router directs data between networks and assigns IP addresses to connected devices . Cables provide the physical connections between devices . A Network Interface Card ( NIC ) enables a computer to connect to a network . A Wireless Access Point ( WAP ) allows wireless devices to join a wired network via WiFi . On a local area network ( LAN ), hubs broadcast data to all devices , whereas switches send data only to the intended destination , improving network efficiency . YouTube video uploading soon Client-Server & Peer-to-Peer A client–server network has a central server that provides resources and services to client computers . It allows for centralised management , making it easier to back up data and enforce security policies . However, it relies heavily on the server - if it fails , users may lose access to resources . A peer-to-peer (P2P ) network has no central server ; instead, each computer can act as both a client and a server , sharing resources directly . It is cheap and easy to set up , making it suitable for small networks . The drawback is that it can be less secure and harder to manage , as data and security depend on individual users . YouTube video uploading soon This page is under active development. Check here for the latest progress update. Q uesto's K ey T erms Purpose of networks: local area network (LAN), wide area network (WAN) Protocols: protocol, standard, protocol layers, TCP/IP stack, application layer, transport layer, internet layer, link layer DNS: Domain Name System Switching: packet switching, circuit switching Network security: hackers, viruses, unauthorised access, denial of service, spyware, SQL injection, phishing, pharming, firewalls, secure passwords, anti-virus, anti-spyware Network hardware: modem, router, cable, NIC, Wireless Access Points, hub, switch Client-server & peer-to-peer D id Y ou K now? The first computer worm is considered to be Creeper (in 1971 ), which spread across ARPANET computers and displayed the message: “ I’m the creeper, catch me if you can! ”. A second program called Reaper was then created to delete Creeper , making it arguably the first antivirus . 3.2 - Databases A-Level Topics 3.4 - Web Technologies

  • 6.2 - Communication Skills | F160 | Cambridge Advanced National in Computing AAQ

    Learn about how communication skills contribute to software application development, including verbal, written and questioning techniques. Based on Unit F160 (Fundamentals of Application Development) for the OCR Cambridge Advanced National in Computing (H029 / H129) (AAQ - Alternative Academic Qualification). Qualification: Cambridge Advanced National in Computing (AAQ) Unit: F160: Fundamentals of Application Development Certificate: Computing: Application Development (H029 / H129) 6.2 - Communication Skills Watch on YouTube : Communication skills Developers working to create applications must be able to effectively communicate with team members , clients and users in a range of different ways . There are five communication skills you need to know: appropriate language , verbal , non-verbal , questioning techniques and written communication . You need to be aware of how each communication skill contributes to software application development and when they would be used appropriately by various job roles and in different stages of application development . Communication Skills Forms of Communication Appropriate language must be used to meet the needs of the audience by tailoring vocabulary , tone and technical detail to suit the client . Non-verbal communication includes body language , facial expressions , gestures , posture , eye contact and appearance . Question techniques have different goals , such as probing questions being used to explore detail and clarifying questions to check understanding . Verbal communication relates to spoken words and includes articulation , tone and pace , but also listening skills . Written communication is through emails , reports , documentation , messages and comments . It requires clarity , accuracy and professionalism . Q uesto's Q uestions 6.2 - Communication Skills: 1. Give examples of when written communication would be used in application development and by which job roles . [3 ] 2. Describe four different types of questions , with an example of each that relates to application development . [4 ] 3. Explain why effective non-verbal communication is important in application development . [ 3 ] Studies estimate that adults ask about 30 questions a day , whereas 4-year-olds ask on average 300 questions a day . D id Y ou K now? 6.1 - Job Roles Topic List

  • 6.3 - Impacts | Unit 2 | OCR Cambridge Technicals | CSNewbs

    Learn about the negative impacts that data loss will have on an organisation including reputation loss, fines and possible bankruptcy. Based on the 2016 OCR Cambridge Technicals Level 3 IT specification for Unit 2 (Global Information). 6.3 - Impacts Exam Board: OCR Specification: 2016 - Unit 2 If a risk to data (see 6.2 ) occurs then there are a number of different impacts that may consequently negatively affect an organisation . Loss of Intellectual Property 'Intellectual property ' refers to anything that an organisation or individual has designed, developed or created themselves . For an individual, this could be a manuscript , artwork or piece of music . For an organisation, it could be primary data they have collected, blueprints for an upcoming design or a report following data analysis. The impact of having intellectual property lost depends on the property itself and how easy it would be for the victim to recreate or recollect the data . Competitors that stole intellectual property could use it at their advantage. Also, the effect of an upcoming announcement to the public would decrease if it was leaked ahead of time. In 2017 HBO suffered large property leaks when Game of Thrones episodes were stolen before air date resulting in pirated versions appearing online well before they were due to be shown on TV. Loss of Service and Access If usernames and passwords are stolen then individuals may be unable to access services that they have paid for, an example being if WiFi details were stolen so that a hacker can access the internet using someone else's account. If a hacker is permitted access to a system they can change the account settings such as the password to lock out the original owners of that account, leaving them without access. Other services can be targeted with malicious attacks like a DDOS attack so that users cannot log into a web page or online service. If users cannot access an account they may use alternative methods and providers , such as avoiding one type of cloud storage provider that has let them down and choosing another. Breach of Confidential Information Confidential information is of a highly sensitive nature and could lead to other negative impacts if it got into the hands of unauthorised people . Confidential information, such as medical histories, should be stored securely with multiple physical and logical protections in place to ensure that it keeps its integrity . If confidential information was breached then it could lead to a loss of reputation as the holder would be regarded as ineffective at protecting the data . Legal consequences would also follow as the Data Protection Act ( 2018 ) would be broken : fines, court cases and even imprisonment would be possible further impacts. An organisation would expect to see penalties from the Information Commissioner's Office (ICO) if they failed to protect personal details by breaking the DPA . Loss of Third Party Data Many organisations will store data not only for their own purposes but for other individuals and businesses too; a key example being cloud storage providers . Users can store data on public cloud services such as Google Drive or DropBox and access their information using the internet from any networked device they please. If services like cloud storage services are hacked or taken offline (e.g. because of an attack or network problems) and data is lost then customers, especially those that pay, will be furious. This will lead to a loss of reputation, trust and even legal proceedings if personal and sensitive data is lost. Larger businesses will use private cloud storage, hosted in data centres that they maintain themselves, to avoid relying on third parties . Loss of Reputation Organisations spend years to build up a reputation where customers trust them and want to use their products or services. Data loss can immediately destroy that reputation and cause once-loyal customers to look elsewhere and choose their competitors . Failing to keep data safe means that an organisation has been unable to follow their legal and moral duty of keeping information secure and could lead to a loss of trade , resulting in reduced earnings and sales . Identity Theft If an individual's personal information is stolen by attackers then one impact is identity theft - when the attacker uses the victim's data for fraud or impersonation . Identity theft can lead to financial loss to the victim if loans , products or services are purchased in their name . The victim may have to contact their bank and other organisations to cancel transactions and there is no guarantee their money will be returned. Credit checks may be affected, leading to future financial difficulty for the victim. Threat to National Security If data of a classified nature (such as military arrangements, security weak-points or upcoming government plans) is lost and falls into the hands (most probably by hacking) of those who intend to bring harm to the country then the consequences can be disastrous. Spies of foreign countries or terrorists could use classified information to target vulnerable locations or events resulting in casualties. Threats could also be economic in nature if large amounts of money are stolen or redirected to malicious bodies. Recent Examples of Security Failure Q uesto's Q uestions 6.3 - Impacts: 1. Describe how each of the impacts above could affect a bank storing large amounts of customer data including financial records. [12 ] 2. Research three recent hacking examples . For each situation describe the impacts that occurred as a result of data loss . [12 ] Click the icons to read BBC News articles about recent examples of hacks and security breaches . Virgin Media Boots Marriott Hotels Facebook Messenger 6.2 - Risks Topic List 6.4 - Protection Measures

  • 8.3 - Writing Algorithms - Eduqas GCSE (2020 Spec) | CSNewbs

    Learn about how to write algorithms, including pseudocode and the different flowchart symbols. Based on the 2020 Eduqas (WJEC) GCSE specification. 8.3: Writing Algorithms Exam Board: Eduqas / WJEC Specification: 2020 + Pseudocode Reminder Generally, pseudocode can be written in any way that is readable and clearly shows its purpose. However, the Eduqas exam board advises that pseudocode for the programming exam should follow the conventions below : Annotation { Write your comment in curly brackets} Define data type price is integer firstname is string Declare a variable's value set price = 100 set firstname = "Marcella" Input / output output "Please enter your first name" input firstname Selection (must have indentation) if firstname = "Steven" then output "Hello" + firstname elif firstname = "Steve" then output "Please use full name" else output "Who are you?" end if Iteration (while loop) while firstname ! = "Steven" output "Guess my name." input firstname repeat Iteration (for loop) for i in range 10 input item next i Define a subroutine Declare Sub1 [Subroutine content indented] End Sub1 Call a subroutine call Sub1 Writing Algorithms In an exam you may be asked to write an algorithm using pseudocode . Previous exams have offered up to 10 marks for a single algorithm . While this may seem daunting, it means you can still gain marks for an incomplete program , so don't leave it blank no matter what! You must decompose the problem and break it down into more manageable chunks . Here's an example question : “A teacher is marking tests. Write an algorithm that allows the teacher to input the number of tests to mark and then the mark of each test. Output the average mark, highest mark and lowest mark. The tests are marked out of 100.” This specific algorithm can be broken down into pre-code and three main parts : Part 0: Declare and assign variables. Part 1: Input the number of tests to mark. Part 2: Input the mark of each test. Part 3: Output the average, lowest and highest marks. Part 0: Variables Read the question carefully and work out the variables you will need in your algorithm. I have highlighted them in blue below: “A teacher is marking tests. Write an algorithm that allows the teacher to input the number of tests to mark and then the mark of each test . Output the average mark , highest mark and lowest mark . The tests are marked out of 100.” There is an additional variable to track as the average mark can only be worked out if we also know the total marks . number_of_tests is integer test_mark is integer average_mark is real highest_mark is integer lowest_mark is integer total is integer number_of_tests = 0 test_mark = 0 average_mark = 0 highest_mark = -1 lowest_mark = 101 total = 0 Before you write the actual program, you must declare the variables you will need and assign values to them. Firstly, declare the data type of each variable . A whole number is an integer and a decimal number is a real . The average must be a real data type because it is the result of division (total ÷ number_of_tests) and could be a decimal number . When assigning values, most numerical variables will be 0 . Most string values would be " " . However this question is a bit more complicated - the highest mark must start as a really low value and the lowest mark must start as a really high value . This is ensure the first mark entered becomes the highest and lowest mark - this will make sense later. Part 1: Input Number of Tests output “Enter the number of tests to mark: ” input number_of_tests After declaring and assigning your variables the next parts will depend on the algorithm you need to write. This example requires the user to input the number of tests . Part 2: Input Each Mark (Loop) for i = 1 to number_of_tests output “Enter the test mark: ” input test_ mark For part 2 we need the teacher to enter each test’s mark . This is best done as a loop as we do not know how many tests the teacher has to mark until they have typed it in (part 1). All code within the loop must be indented . if test_mark > highest_mark then highest_mark = test_mark endif if test_mark < lowest_mark then lowest_mark = test_mark endif We also need to work out what the highest and lowest marks are. This must be done within the loop as the test marks are entered. The test mark is compared to the current highest and lowest marks . If it is higher than the current highest mark it becomes the new highest mark . If it is lower than the current lowest mark it becomes the new lowest mark . This is why we set the highest_mark and lowest_mark to extreme values at the start - so the first mark entered becomes the new highest and lowest . total = total + test_mark next i The final steps of part 2 are to update the total marks and to close the loop . The total is increased by the test mark that has been entered. The ‘next i ’ command states that the current iteration has ended . The indentation has now stopped. Part 3: Outputs average_mark = total / number_of_tests output “The average mark is:” , average_mark output “The highest mark is:” , highest_mark output “The lowest mark is:” , lowest_mark Before the average can be output, it must be calculated by dividing the total by the number of tests . Then the average , highest and lowest marks can be output . Full Answer number_of_tests is integer test_mark is integer average_mark is real highest_mark is integer lowest_mark is integer total is integer number_of_tests = 0 test_mark = 0 average_mark = 0 highest_mark = -1 lowest_mark = 101 total = 0 output “Enter the number of tests to mark: ” input number_of_tests for i = 1 to number_of_tests output “Enter the test mark: ” input test_ mark if test_mark > highest_mark then highest_mark = test_mark endif if test_mark < lowest_mark then lowest_mark = test_mark endif total = total + test_mark next i average_mark = total / number_of_tests output “The average mark is:” , average_mark output “The highest mark is:” , highest_mark output “The lowest mark is:” , lowest_mark This example is slightly more complicated than some of the recent previous exam questions for writing algorithms. Remember to decompose the problem by identifying the variables you need first. Q uesto's Q uestions 8.3 - Writing Algorithms: 1. A violin player performs a piece of music 8 times . They record a score out of 5 how well they think they performed after each attempt. Write an algorithm using pseudocode that allows the violinist to enter the 8 scores and displays the highest score , lowest score and average score . An example score is 3.7. [10 ] 2. A cyclist wants a program to be made that allows them to enter how many laps of a circuit they have made and the time in seconds for each lap . For example they may enter 3 laps, with times of 20.3 , 23.4 and 19.8 seconds . The program should output the quickest lap time , slowest lap time , total amount of time spent cycling and the average lap time . Create an algorithm using pseudocode for this scenario. [10 ] 8.2 - Understanding Algorithms Theory Topics 8.4 - Sorting & Searching

  • 3.6 - 7 Layer OSI Model - Eduqas GCSE (2020 spec) | CSNewbs

    Learn about networking standards and the seven layers of the Open Systems Interconnected (OSI) model - Application, Presentation, Session, Transport, Network, Data Link and Physical. Based on the 2020 Eduqas (WJEC) GCSE specification. 3.6: 7-Layer OSI Model Exam Board: Eduqas / WJEC Specification: 2020 + What are networking standards? Networking standards are rules that allow computer systems to communicate across networks . Standards have been created to ensure devices can exchange data and work together . What is the 7-layer OSI Model? The OSI ( Open Systems Interconnection ) model is split into 7 layers . The model is used to visualise the different parts of a network as each of the seven layers has a specific role . Splitting a network design into layers is beneficial to programmers as it simplifies design , making it easier to modify and use . Each layer has a certain purpose and is associated with different protocols . The seven layers are explained below: 7 Allows humans and software applications to use the network e.g. browsers (HTTP /HTTPS ) and email (SMTP ) and file transfer (FTP ). 6 The purpose of the presentation layer is to display data in a standard format that other devices can accept and understand . 5 The session layer establishes a connection between computers allowing data to be sent between them. Data can be synchronised in each session to allow for efficient data transfer . 4 TCP breaks the data down into data packets . This layer makes sure the data is sent and received in the correct order and reassembled at the destination without errors. 3 IP is responsible for addressing and routing data packets . The optimal route for the data to take is calculated in this layer. Also known as the 'Internet Layer '. 2 Ethernet sets out the format of data packets . This layer handles transmission errors and passes data to the physical layer . 1 This layer converts the data packets into bits so they can be transferred across a physical connection using routers and switches . Q uesto's Q uestions 3.6 - 7-Layer OSI Model: 1a. What are networking standards ? [ 2 ] 1b. Describe why network designs are split into layers . [ 2 ] 2. Create a diagram similar to the one above and describe each layer of the OSI Model. [ 14 ] 3. Look at the statements below and name the layer that is being described: a. This layer ensures data packets are sent and received correctly. b. This layer checks for errors in transmission and sets out the data packet format. c. This layer displays data in a format that can be understood. d. This layer allows software like web browsers to interact with the network. e. This layer transfers bits across a connection using routers. f. This layer establishes a connection between computer systems. g. This layer uses addresses to ensure data packets take the correct route. [ 7 ] 3.5 - Protocols Theory Topics 3.7 - The Internet

  • Algorithms | CSNewbs

    Learn how pseudocode and flowcharts are written as part of algorithms. This content is based on the 2016 Eduqas / WJEC GCSE Computer Science specification. Algorithms Pseudocode Pseudocode Pseudocode is not a specific programming language but a more general method of describing instructions . It should be unambiguous, and it should not resemble any particular kind of programming language (e.g. Python or Java), so it can theoretically be turned into real code in any language. Generally, pseudocode can be written in any way that is readable and clearly shows its purpose. However, the Eduqas exam board advises that pseudocode for the programming exam should follow the conventions below : Annotation { Write your comment in curly brackets} Define data type price is integer firstname is string Declare a variable's value set price = 100 set firstname = "Marcella" Input / output output "Please enter your first name" input firstname Selection (must have indentation) if firstname = "Steven" then output "Hello" + firstname elif firstname = "Steve" then output "Please use full name" else output "Who are you?" end if Iteration (while loop) while firstname ! = "Steven" output "Guess my name." input firstname repeat Iteration (for loop) for i in range 10 input item next i Define a subroutine Declare Sub1 [Subroutine content indented] End Sub1 Call a subroutine call Sub1 Flowcharts flowchart A flowchart can be used to visually represent an algorithm. The flowchart symbols are: Algorithm Example example Pseudocode {This is a program to see how many items you can buy in a supermarket before you spend over £100} total is integer, itemsentered is integer, itemprice is integer set total = 0 set itemsentered = 0 while total < 100 output "enter the price of the next item" input itemprice total = total + itemprice itemsentered = itemsentered + 1 repeat if itemsentered >= 20 then output "You are on your way to saving money." elif itemsentered => 30 then output "You're a real money saver." else output "Look for better deals next time." end if Stop Flowchart

© CSNewbs 2025

The written, video and visual content of CSNewbs is protected by copyright. © 2025
bottom of page