Search CSNewbs
304 results found with an empty search
- 5.3 - Policies | F161 | Cambridge Advanced National in Computing | AAQ
Learn about policies related to application development, including a user guide, acceptable use policy (AUP), backup, codes of practice, staying safe online and the use of information. Resources based on Unit F161 (Developing Application Software) for the OCR Cambridge Advanced Nationals in Computing (H029 / H129) AAQ (Alternative Academic Qualification). Qualification: Cambridge Advanced Nationals in Computing (AAQ) Certificate: Computing: Application Development (H029 / H129) Unit: F161: Developing Application Software 5.3 - Policies Watch on YouTube : Policies You need to know the purpose , content and application of each policy to be considered when related to developing application platforms . What You Need to Know Policies ? YouTube video uploading soon Q uesto's Q uestions 5.3 - Policies: 1. What? [2 ] 2. What? [1 ] 3. What? [1 ] 4. What? [1 ] ? D id Y ou K now? 5.2 - Application Installation Topic List 6.1 - Legal Considerations
- OCR CTech IT | Unit 1 | 1.6 - Hardware Troubleshooting | CSNewbs
Learn about troubleshooting tests and information to record when a hardware error occurs. Based on the 2016 OCR Cambridge Technicals Level 3 IT specification. 1.6 - Hardware Troubleshooting Exam Board: OCR Specification: 2016 - Unit 1 What is troubleshooting? Troubleshooting means to analyse and solve a problem with a computer system. Hardware troubleshooting refers to fixing an issue with the physical parts of the computer or any connected devices. Hardware issues might occur as a result of damage (intentional or accidental), power surges or malware . Steps to Take When an Error Occurs Try to identify the problem by looking for the simplest explanation first (e.g. checking the power supply) and ask the user questions about the issue. Create a theory about what the cause of the problem could be and prepare to test the theory using a series of troubleshooting tests . Create a troubleshooting plan and record the steps that are taken before moving on to the next test. Check the system works after each stage of the plan. Create a findings document that explains if and how the problem was fixed, for future reference if the problem occurs again. Documentation Technicians and help desk (see 3.5 ) staff should document , on a fault sheet , the following information regarding the issue: The fault itself (such as 'system not turning on'). The system in question. The user logged in at the time. Exact date & time the problem occurred. Symptoms of the issue (such as 'slow load times' or 'beeping'). Problem history - checking if it has happened to this system before. Back up documentation - Whether the data been backed up recently. Troubleshooting Tools The following tools can be used to identify an error so a technician has a greater understanding of the problem. Event Viewer Event Viewer is a type of utility software that lists detailed information about an error when one occurs. It can be used to work out how to fix the issue and will display both minor and major faults. Power On Self Test (POST) On start-up, a power on self test (POST) checks memory, power, hardware and cooling systems are all working properly. Beep codes signal if an error has been detected; 1 beep will sound for no error but if multiple beeps are heard then an error has been discovered. Ping Test This is a connectivity test between two computers. A message is sent to the destination computer and waits for a return message named the echo reply . This procedure can be repeated with other systems until the source of the problem is identified from a computer that does not reply . Q uesto's Q uestions 1.6 - Hardware Troubleshooting: 1. Summarise the 'Steps to Take when an Error Occurs ' section into your own top three tips for what to do when a hardware error happens . [3 ] 2. List 6 pieces of information that an IT technician should record when a hardware error has occurred . [6 ] 3. Briefly explain the purpose of three troubleshooting tools . [6 ] 1.5 - Communication Hardware 1.7 - Units of Measurement Topic List
- OCR CTech IT | Unit 1 | 5.2 - Operational Issues | CSNewbs
Learn about operational issues including disaster planning, change management and data security. Based on the 2016 OCR Cambridge Technicals Level 3 IT specification. 5.2 - Operational Issues Exam Board: OCR Specification: 2016 - Unit 1 What are operational issues? Operational issues refer to potential problems that could disrupt the workflow and efficiency of an organisation . They relate to processes within an organisation and the way that the company operates on a daily basis . Security of Information Definition: Organisations must ensure that data is stored securely to minimise the chances of data loss , corruption or unauthorised manipulation . Having information stolen through a hacking attempt, for example, would negatively impact the company and its customers and possibly lead to consequences such as poor publicity , a loss of business and reputation , fines and bankruptcy . One principle of the Data Protection Act is that data must be stored securely . Organisations can use security methods such as firewalls , antiviruses or physical protection such as biometrics to keep personal information secure . Health & Safety Definition: Ensuring that employees, clients and visitors are physically protected on-site . The organisation should create a health and safety policy that staff need to read and possibly sign at the start of their work placement. The policy should include information about how to avoid injury when using the systems, how to safely maintain the equipment and whom to contact for help . Disaster & Recovery Planning Important data is often stored on a computer network, so a detailed and effective disaster recovery policy must be in place in case an unexpected disaster occurs. Disasters include natural disasters (e.g. fire, flood, lightning), hardware failure (e.g. power supply unit failing), software failure (e.g. virus damage) and malicious damage (e.g. hacking). There are three clear parts to a disaster recovery policy: Before the disaster: All of the possible risks should be analysed to spot if there are any weaknesses in preparation. Preventative measures should be taken after the analysis, such as making rooms flood-proof or storing important data at a different location . Staff training should take place to inform employees what should happen in the event of a disaster. During the disaster: The staff response is very important – employees should follow their training and ensure that data is protected and appropriate measures are put in place. Contingency plans should be implemented while the disaster is taking place, such as uploading recent data to cloud storage or securing backups in a safe room and using alternative equipment until the disaster is over. After the disaster: Recovery measures should be followed, such as using backups to repopulate computer systems. Replacement hardware needs to be purchased for equipment that is corrupted or destroyed. Software needs to be reinstalled on the new hardware. Disaster recovery policies should also be updated and improved . Organisational Policies Definition: Creating policies that outline acceptable computer and network use . Workplaces and schools often require people to sign an acceptable use policy ( AUP ) before being allowed to use the network . An AUP may include the philosophy of the organisation , rules for the personal use of IT resources and the consequences of breaching the policy . An AUP is similar to codes of practice from 5.1 . Change Management Definition: Change management is a formal approach by an organisation to lead a change in the way a business or project is run . This may include editing budgets , redefining expected deadlines , reconsidering how resources are used or changing staff roles . Advantages of change management: Reduces the likelihood of things going wrong during development. Creates a clear log of changes and improvements that are to be made. Allows changes to be approved and discussed before they happen. Formalises the process and sets out clear rules for changes . Disadvantages of change management: Can make the process of change more complicated . It can reduce the responsiveness of developers if everything must go through a formal process. It can be challenging to implement successfully. To work effectively, it needs everyone to follow the process . Scales of Change There are two main reasons why major change will occur in an organisation. Change Drivers Definition: Companies must change to stay up to date with the times and new technology . Change drivers are factors that force a business to change , such as: New legislation New competitors in the market New platforms (e.g. mobile technology and game consoles) to sell products on Economic changes Changes in business practice Social changes Change Needs Definition: Companies must change if the needs and focus of the organisation are altered over time . This reflects the changing needs of the business , often due to advancements in technology , such as: New equipment (e.g. replacing a slow network with a faster fibre optics network) Customer interaction (e.g.communicating with customers in new ways, such as social media apps) Workplace shifts (e.g. providing remote access for employees to access work and services at home) Q uesto's Q uestions 5.2 - Operational Issues: 1. Describe 3 possible consequences to an organisation if data is not stored securely . [6 ] 2. Describe the purpose of a health and safety policy and state 3 things that may be included in one. [4 ] 3a. Describe, giving specific examples , different types of possible disaster . [5 ] 3b. Describe the steps an organisation should take before , during and after a disaster occurs . [10 ] 4. Describe 3 things that may be included within an Acceptable Use Policy (AUP ). [3 ] 5a. What is change management ? Give 2 examples of when change management may be used. [4 ] 5b. Describe the advantages and disadvantages of a company deciding to implement change management . [8 ] 6a. Describe the difference between change drivers and change needs . [2 ] 6b. Describe 3 examples of change drivers and 3 examples of change needs . [6 ] 5.1 - Ethical Issues Topic List 5.3 - Threats
- 1.1 - Computational Thinking | OCR A-Level | CSNewbs
Learn about the different parts of computational thinking including thinking abstractly, ahead, procedurally, logically and concurrently. Based on the OCR H446 Computer Science A-Level specification. Exam Board: OCR A-Level Specification: Computer Science H446 1.1 - Computational Thinking Watch on YouTube : Thinking Abstractly Thinking Ahead Thinking Procedurally Thinking Logically Thinking Concurrently Computational thinking is the process of approaching and solving problems in a logical , systematic way (like a computer would ) using techniques such as abstraction , decomposition , pattern recognition and algorithmic thinking . There are five categories of computational thinking you need to know. Thinking Abstractly Abstraction is the process of removing unnecessary detail so that a problem can be represented more simply . It helps programmers focus on the essential features of a task, reducing complexity and making solutions easier to design , understand and maintain . When programming , abstraction can be applied by simplifying real-world systems into models that contain only the information needed for solving the problem . Because abstractions leave out certain details , they always differ from reality , and it is important to understand which elements have been included , which have been excluded and why . YouTube video uploading soon Thinking Ahead Programs often make use of inputs and outputs to receive data from the user or another system and then return results or feedback. Many programs rely on preconditions - rules or requirements that must be met before a function or procedure runs correctly - to prevent errors and ensure reliable behaviour . Caching is a technique where previously calculated or frequently accessed data is stored temporarily so it can be retrieved more quickly . This improves performance but can use extra memory and risks becoming outdated if the cached data no longer matches the current state . Reusable program components , such as functions , procedures and modules , are important because they reduce duplication , make programs easier to maintain , and allow well-tested code to be used across multiple solutions . YouTube video uploading soon Thinking Procedurally Pseudocode , program code and flowcharts are ways of representing a sequence of steps in an algorithm , showing clearly the order in which instructions should be carried out . Sub-procedures (such as functions and procedures ) are used in programs to break complex tasks into smaller , reusable parts , making the code easier to understand , test , maintain and debug . A structure diagram is a visual representation that shows how a program is broken down into its main components and sub-components , helping programmers plan the overall design and understand how different parts of the program fit together . YouTube video uploading soon Thinking Logically Decisions are needed in computer programs so that the software can choose different actions based on the data it receives or the situation it is in , rather than always following the same sequence of instructions. These decisions are controlled by logical conditions - statements that evaluate to true or false - which determine which path the program will take; for example, if score > 100 might trigger a bonus feature only when the condition is true . Because decisions allow the program to branch , they directly affect the flow of execution , enabling different outcomes , repeated actions or alternative processes depending on the conditions met . YouTube video uploading soon Thinking Concurrently Concurrency means designing a program so that multiple tasks can be processed at the same time , rather than strictly one after another. Programmers need to identify which parts of a program can safely run concurrently - for example, independent calculations or background tasks - and which parts must wait for others to finish because they rely on shared data or sequential results . Concurrent processing can bring benefits such as faster performance , better use of multicore processors and improved responsiveness , but it also introduces drawbacks, including increased complexity and the need for careful coordination to avoid errors when tasks depend on one another . YouTube video uploading soon This page is under active development. Check here for the latest progress update. Q uesto's K ey T erms Computational Thinking: abstraction, thinking abstractly, thinking ahead, precondition, caching, reusable components, thinking procedurally, thinking logically, concurrency, thinking concurrently D id Y ou K now? Building a Lego set is a great example of both abstraction and decompostition . For example, the Eiffel Tower Lego set is an abstracted version of it is real-life counterpart condensed into 10,001 pieces . There are over 75 numbered bags inside the box to follow instructions step-by-step to construct the 4'11" model . A-Level Topics 2.1 - Programming Techniques
- OCR CTech IT | Unit 1 | 5.4 - Physical Security | CSNewbs
Learn about methods of physically protecting data such as biometric devices, RFID and tokens, privacy screens and shredding. Based on the 2016 OCR Cambridge Technicals Level 3 IT specification. 5.4 - Physical Security Exam Board: OCR Specification: 2016 - Unit 1 RFID & Tokens Radio-frequency identification (RFID) uses electromagnetic fields to attach tags to physical objects . RFID tags can be embedded within 'dumb' objects such as clothing, packages and even animals. RFID is used with security tokens (such as an ID keycard ) to permit the access of authorised people to certain areas. RFID can be used by IT companies to track equipment and manage access . Shredding This is the cutting up of documents (paper or CDs ) into small pieces so that they cannot be reassembled and read. Sensitive data on paper or optical disc should be shredded when no longer required. Locks A lock can be used to prevent access to server rooms or sensitive data stores . Only authorised personnel with the right key will have access. Physical Security Measures Biometrics Biometric devices require the input of a human characteristic (such a fingerprint , iris or voice scan ). The biometric data is checked against previously inputted data in a database . A match will allow access to the user. See more in section 1.1 . Privacy Screens These plastic screens are placed over a monitor to obscure the screen to anyone except the person sitting directly in front of them. This prevents shoulder surfing and prevents data from being read by unauthorised people nearby. Q uesto's Q uestions 5.4 - Physical Security: 1. Explain how locks can be used as a physical security method within an organisation. [2 ] 2. Explain what RFID is and how it can be used with tokens as a physical security method. [3 ] 3. Explain how biometric devices can be used as a physical security method. [3 ] 4. Explain how privacy screens are used to protect data. [2 ] 5. What is the purpose of shredding ? [2 ] 5.3 - Threats Topic List 5.5 - Digital Security
- 2.4b - Binary Addition & Shifts - OCR GCSE (J277 Spec) | CSNewbs
Learn about how to perform binary addition and binary shifts. Based on the J277 OCR GCSE Computer Science specification (first taught from 2020 onwards). 2.4b: Binary Addition & Shifts Exam Board: OCR Specification: J277 Watch on YouTube : Binary Addition Overflow Errors Binary Shifts Issues with Shifts Binary Addition Binary addition is a method of adding binary values without having to convert them into denary. How to add binary numbers: What is an overflow error? An overflow error occurs when a binary value is too large to be stored in the bits available . With a byte (8 bits ) the largest number that can be held is 255 . Therefore any sum of two binary numbers that is greater than 255 will result in an overflow error as it is too large to be held in 8 bits . What is binary shift? Binary shift is used to multiply and divide binary numbers . The effect of shifting left is to multiply a binary number. The effect is doubled by each place that is shifted . x The effect of shifting right is to divide a binary number. ÷ Shifting by 1 has an effect of 2 . Shifting by 2 has an effect of 4 . Shifting by 3 has an effect of 8 . For example, shifting left by 2 places has an effect of multiplying by 4 . Another example: Shifting right by 3 places has an effect of diving by 8 . How to shift a binary number: Binary Shifts Watch on YouTube Watch on YouTube Q uesto's Q uestions Binary Addition: 1. Explain what an overflow error is. [ 2 ] 2. Add together the following binary values. If an overflow error occurs you must state one has occurred. a. 010110012 and 010001012 [2 ] b. 110110112 and 010111012 [2 ] c. 001101102 and 011010112 [2 ] d. 110110112 and 010101112 [2 ] e. 011011012 and 110101102 [2 ] Binary Shifts: 1a. Draw a diagram to show the effect of multiplying and dividing a binary number . [2 ] 1b. Draw a diagram or table to show the effect a shift has for each place from 1 to 4 . For example, a shift of 1 place has an effect of 2. [4 ] 2. State the effect of the following shifts: a. Shift right by 2 places. b. Shift left by 1 place. c. Shift left 3 places. d. Shift right by 4 places. [ 1 each ] 3. Shift the following binary numbers and state the effect of the shift: a. 10101011 : Shift left by 2 places. b. 11101100 : Shift right by 3 places. c. 00001011 : Shift right by 2 places. d. 01101110 : Shift left by 1 place. [ 2 each ] 2.4a - Number Systems Theory Topics 2.4c - Character Storage
- 2.2 - Information Classification | Unit 2 | OCR Cambridge Technicals | CSNewbs
Learn about how information can be classified into groups including private, public, sensitive and confidential. Based on the 2016 OCR Cambridge Technicals Level 3 IT specification for Unit 2 (Global Information). 2.2 - Information Classification Exam Board: OCR Specification: 2016 - Unit 2 Information can be classified into different groups . Some data may fall into more than one classification. Sensitive Information Description: Information that should be protected from being publicly released as it could harm the safety or privacy of an organisation or an individual . Examples: Medical data that could be embarrassing to an individual if released. Financial data that will negatively impact the company if made public to competitors. Non-Sensitive Information Description: Information that can be released publicly with no fear of negative consequence . Examples: Store information including shop addresses , opening hours and the names of senior managers. Product information including prices , online reviews and general availability . Private Information Description: Private information relates to an individual and it should not be shared with anyone else without the data subject's permission . Private information is protected by the Data Protection Act and would need to be stored securely so it cannot be accessed without authorisation. Examples: Home addresses, contact information, birth dates and banking details . Employee data such as linked bank accounts and addresses. Public Information Description: Released to the public and can therefore be seen by anyone . Public information is non-sensitive . Examples: Social media usernames, posts and shared images. Public business information including addresses, promotional material and opening times. A government report like the national census every ten years. Personal Information Description: Identifiable data about a specific individual . Examples: Full name , date of birth , gender , marital status, medical history, sexual orientation and voting history. Business Information Description: Any kind of data about a specific business. This information could be public or private. Examples: Address of its headquarters Financial data or employee details. Annual sales figures . Confidential Information Description: Private data that is more restricted than sensitive information , with access limited to only those who need to know. Examples: Doctor / therapist notes Business Profits and losses Trade secrets Classified Information Description: Highly sensitive information stored by a government institution , requiring the highest levels of restricted access . Access is usually restricted by law and only viewable by authorised individuals or groups. In the UK there are three levels of classified information: OFFICIAL , SECRET and TOP SECRET . Examples: Military data Terrorism precautions Crime scene reports Anonymised Information Description: Anonymisation removes personally identifiable data from information so that an individual cannot be identified . This allows the information to be used in much wider context without running the risk of legal action. Examples: Partially anonymised information - where some of the personal information has been removed and replaced by a symbol . Completely anonymised information - where all identifiable data has been removed . Bank details are often partially or completely anonymised. A partially anonymised credit card number might be listed as: **** - **** - **** - 7427 Problems with anonymising data include: If sensitive data is not anonymised enough and the person can be identified . Useful information could be lost if too much data is anonymised . The public could lose trust in an organisation if data is insufficiently anonymised . Q uesto's Q uestions 2.2 - Information Classification: 1. Describe each type of information classification and give at least two examples : a. Sensitive information [3 ] b. Non-Sensitive information [3 ] c. Private information [3 ] d. Public information [3 ] e. Business information [3 ] f. Confidential information [3 ] g. Classified information [3 ] h. Anonymised information (partial and complete) [6 ] 2. State which classification(s) the following pieces of information would be categorised as. It might fit into more than one category. a. Shop opening times [1 ] b. Medical history [1 ] c. Twitter username [1 ] d. Crime scene report [1 ] 3. Describe three problems that organisations should consider when anonymising data . [6 ] 2.1 - Information Styles Topic List 2.3 - Quality of Information
- Key Stage 3 Python | Turtle | CSNewbs
The final part of a quick guide to the basics of Python aimed at Key Stage 3 students. Learn about importing turtle to command a moving object. Python - #6 - Turtle Import the Turtle The turtle library stores all of the code to create and move an object called a turtle . The turtle library must be imported into your Python program before you can use it to draw lines, shapes and colours . Create a new Python program and save the file as PythonTurtle . Write import turtle as the first line of code. Basic Shapes The turtle can be controlled by writing how many pixels it should travel forward and the angle it should point left or right . Moving Forwards turtle.forward(100) will move the turtle forward by 100 pixels. turtle.forward(200) will move the turtle forward by 200 pixels. When using the left command or the right command, the turtle won't actually move , but it will rotate by the number of degrees that you state. For example, typing turtle.left(90) will point the turtle upwards . Rotating Left & Right Copy the code to the right to make the turtle draw a square. Then try to make: A Rectangle A Triangle A Pentagon A Hexagon Square Rectangle Triangle Pentagon Hexagon Hint: To work out the angles, divide 360 by the number of sides. Using Loops You can use a for loop to repeat code . This is especially helpfully with intricate shapes with many sides. The code below will print a square but in only 3 lines instead of the 8 lines from task 2. This is the number of times the code underneath will be repeated . Change it to a higher number to repeat it more often . Each line after the 'for num in range' line must be indented . Press the tab key once on your keyboard to indent your code. Task 3 - Copy the code above to make the turtle draw a square using a loop. Then try to make: A Heptagon An Octagon A Circle A Pentagram (5-sided Star) Square Heptagon Octagon Circle Pentagram Hint: To work out the angles, divide 360 by the number of sides. Advanced Features Choose a background colour turtle .bgcolor("red") Choose the line size and colour turtle.pensize(6) turtle.color("green") Fill a shape turtle.color("yellow") turtle.begin_fill() (put your turtle's directions in here) turtle.end_fill() Lift the pen turtle.penup() turtle.pendown() Speed up/Slow down the turtle turtle.speed(speed=10) Change the turtle's appearance turtle.shape("turtle") Other options include "circle" and "arrow". Task 4 - Use the code above to make: A blue square on a red background. A yellow triangle on a pink background. Two different coloured circles - not touching each other. Three different shapes of three different colours - not touching each other. Complex Shapes Use everything that you have learned on this page to help you create more complex shapes. You could try: A Flower A Word (like your name - you will need to use the penup() and pendown() commands. A Christmas tree A Landscape (green ground, blue sky, yellow sun) <<< Selection
- 11.2 - Legislation - Eduqas GCSE (2020 Spec) | CSNewbs
Learn about key computing laws including the Data Protection Act (2018) (GDPR), Computer Misuse Act (1990), Copyright Designs and Patents Act (1988), Creative Commons and the Regulation of Investigatory Powers Act. Based on the 2020 Eduqas (WJEC) GCSE specification. 11.2: Legislation Exam Board: Eduqas Specification: 2020 Data Protection Act (2018) In 2018 the European Union introduced GDPR (General Data Protection Regulation ) to protect the privacy of data for people in the EU. The UK matched this by updating the Data Protection Act introduced in 1998 to become the Data Protection Act (2018) . This act protects the data of individuals that is stored on computers and processed by organisations. How the Data Protection Act works: Each person who has their data stored is known as a data subject . An employee within an organisation must be appointed as a data controller and it is they who are responsible for registering with the Information Commissioner . The Information Commissioner is the person in the UK who is responsible for managing several laws , most significantly the Data Protection Act. When registering with the Information Commissioner, the organisation's data controller must be clear on exactly: What information they are collecting, Why it is being collected, What the data will be used for . The six principles of the Data Protection Act state that data must be: 1. Collected lawfully and processed fairly. 2. Only used for the reasons specified. 3. Data must be relevant and not excessive. 4. Data must be accurate and up-to-date. 5. Data must not be stored for longer than necessary, 6. Data must be stored and processed securely. Computer Misuse Act (1990) This act was introduced as computers became cheaper and more common at home and work . The act attempts to stop and punish those who use computers inappropriately . Breaking any of the three principles could result in fines and a jail sentence but only if it can be proved it was done on purpose and not by accident. The Computer Misuse Act (1990 ) includes three main principles : 1. No unauthorised access to data. Example: Hacking a computer system. 2. No unauthorised access to data that could be used for further illegal activities. Example: Accessing personal data to use as blackmail or identity theft. 3. No unauthorised modification of data. Example: Spreading a virus to change data. Freedom of Information Act (2000) This act allows people to request public authorities to release information . Public authorities include local councils , government departments , universities and hospitals . A freedom of information request must be formally submitted in a letter or email and a reply from the organisation is required within twenty days of receiving the request. A simple freedom of information request might be the average response times of the local ambulance service in the past year. Certain requests will not be accepted , such as if processing the request would be too expensive or if it involves sensitive information protected by the Data Protection Act (2018 ). Regulation of Investigatory Powers Act (2000) This act (often shortened to RIPA ) was introduced in response to the increase in both criminal and terrorist activities on the internet, it is used to monitor and access online communication of suspected criminals . If criminal activity is suspected by an individual then this act grants the following powers : Internet Service Providers (ISPs) must provide access to the suspect's online communication , such as emails or social media. Locked or encrypted data may be accessed such as online messages. ISPs could install surveillance equipment or software to track the suspect's online activity . Surveillance may take place to physically track the suspect , e.g. in private vans or by undercover officers in public spaces. Access must be granted to personal information . This act became controversial as its use widened and local councils were using it for minor offences - a Scottish council used the act to monitor dog barking and a council in Cumbria gathered video evidence about who was feeding pigeons . The act has since been changed to only allow the surveillance of crime suspects . Copyright, Designs & Patents Act (1988) This act makes it a criminal offence to copy work that is not your own without the permission of the creator or the copyright holder. This can refer to text, images, music, videos or software. Owning the copyright of an image might not prevent others from copying and using it but this act means that the owner can bring legal proceedings in court to those who have stolen their work . However, it is difficult to trace who has stolen work once it has been uploaded to the internet and copies can easily spread, especially television shows and movies. This act specifically prohibits the following actions: Making copies of copyrighted material to sell to others . Importing and downloading illegally copied material (except for personal use). Distributing enough copyrighted material to have a noticeable effect on the copyright holder . Possessing equipment used to copy copyrighted material , as part of a business. Creative Commons (CC) Licensing A CC licence allows people to share their copyrighted work while still retaining rights to the material . There are different types of licence that specify exactly what can and can't be done to the copyrighted material. For example: An attribution licence allows copyrighted material to be edited and distributed but the original owner must be credited . A non-commercial licence allows copyrighted material to be shared and edited but no profit must be gained through its distribution. CC licences are not automatically given , they must be granted by the copyright owner . To ensure you are not illegally using copyrighted work change the Tools and Licence setting when using Google Images to filter work with CC licenses applied . Telecommunications Regulation Act (2000) This act allows organisations to lawfully monitor communications made online and on the phone by employees while at work . All users of the network should be aware that their communication is being monitored when they are using emails , the internet or telephone calls . The act was introduced to ensure that employees are using the computer systems for the correct purpose , to prevent illegal activity and to monitor staff performance . Codes of Conduct One way that organisations try to ensure that staff are held to professional standards and display appropriate behaviour is to create a code of conduct . This is a set of rules or requirements that employees must follow or they may be punished, such as a temporary ban from the network or being fired. There are two types of codes of conduct: Formal codes of conduct are a set of written rules that clearly state expected behaviour , such as what employees can access online at work . Schools may have this too, and you might have to sign a document at the start of the year before you can use the computers. Informal codes of conduct are used by small organisations where there might not be a written set of rules , but newer employees follow the habits and expectations of senior members of staff. This is harder to monitor but provides a more relaxed working environment. Q uesto's Q uestions 11.2 - Legislation: 1a. State the 6 principles of the Data Protection Act (2018) . [ 6 ] 1b. Explain how the Data Protection Act works . In your answer, you should include definitions of a data subject , the data controller and the Data Commissioner . [ 6 ] 2. Describe the 4 principles of the Computer Misuse Act (1990) . [3 ] 3. Describe the purpose of the Freedom of Information Act (1990) and state an example of a freedom request . [ 3 ] 4a. What is the purpose of RIPA (2000) ? [ 2 ] 4b. Describe 3 actions that RIPA (2000) allows the government / police to do . [ 3 ] 5a. What is the purpose of the Copyright, Designs & Patents Act (1988) ? [ 2 ] 5b. Describe 3 actions that CDPA (1988) prohibits . [ 3 ] 6a. What is a Creative Commons ( CC ) licence ? [ 2 ] 6b. Describe 2 types of CC licence . [ 4 ] 7a. What is the purpose of the Telecommunications Regulation Act (2003) ? [ 2 ] 7b. Describe 3 reasons why this act was introduced . [ 3 ] 8a. What is the purpose of a code of conduct ? [ 2 ] 8b. Describe the difference between formal and informal codes of conduct . [ 2 ] 11.1 - Impacts of Technology Theory Topics
- 3.2a - Wired & Wireless Networks - OCR GCSE (J277 Spec) | CSNewbs
Learn about the differences between wired and wireless networks. Based on the J277 OCR GCSE Computer Science specification (first taught from 2020 onwards). 3.2a: Wired & Wireless Networks Exam Board: OCR Specification: J277 Watch on YouTube : Wired Networks Wireless Networks Encryption Wired Connections Wireless Connections Wireless connections, such as WiFi or Bluetooth , use no cables but require a wireless network interface card (WNIC ). Wireless connections generally have a slower speed and can be affected by the computer's distance from the wireless router as well as obstacles like walls or bad weather. Wired connections use physical cables , such as copper or fibre optic wires , and require a network interface card (NIC ) to connect to a network. These wired connections use a wired connection protocol - most commonly Ethernet . Restricted Movement Faster More Secure NIC Required Freedom of Movement Slower Less Secure WNIC Required Encryption Wireless connections are less secure and require encryption . Encryption is the process of scrambling data into an unreadable format so that attackers cannot understand it if intercepted during transmission. The original data (known as plaintext ) is converted to scrambled ciphertext using an encryption key . Only at the correct destination will the encryption key be used to convert the ciphertext back into plaintext to be understood by the receiving computer. Q uesto's Q uestions 3.2a - Wired & Wireless Networks: 1. Briefly compare wired and wireless networks in terms of movement , transmission speed , security and required hardware . You could answer this in the form of a table. [ 8 ] 3.1b - Network Hardware & Internet Theory Topics 3.2b - Protocols & Layers
- Greenfoot Guide #5 | Play Sounds | CSNewbs
Learn how to play sound files in Greenfoot. Part 5 of the Greenfoot Tutorial for the Eduqas / WJEC GCSE 2016 specification. 5. Play Sounds 1. Check the Sounds Folder Greenfoot Tutorial Sound files must be placed the ' sounds ' folder of your Greenfoot project to be used in the game. In the Component 2 exam of the WJEC / Eduqas 2016 specification , an audio file will be placed in the sounds folder already . For this example game you can download the audio clips to the right and paste them into your sounds folder . Watch on YouTube: Click the audio icon to download a zip folder of the two sound files below . Copy the files into the sounds folder of your Greenfoot project . < Part 4 - Remove Objects 2. Add the playSound Method Add the code to play the sound at the same time as when the collectible object is removed . The name of the file and its extension (e.g. .wav or .mp3 ) must be written in speech marks after the playSound method. Part 6 - The Counter >
- Python | Extended Task 3 | CSNewbs
Test your ability to create a more complex program in Python based on a given scenario. Perfect for students learning GCSE Computer Science in UK schools. Extended Task 3 Hi, Susanna here, I want to make a blackjack-like program that I can play for fun at home in between revising for Computer Science. The aim of my blackjack game is to get as close to 21 as possible with the most number of cards, without going over. So... The user can choose whether to be hit with a new card (a number between 1 and 8) or fold and stop. Each number they are dealt adds up to their total . If the total goes over 21, then they lose . If they bust (when over 21) or folded then their final number and their number of cards is displayed . Blackjack For this task, you will need to create a document and include the following sections (with screenshots where appropriate): An introduction to explain the Purpose of your program . A List of Requirements for a successful program. Screenshots of your code (with comments in your code to show understanding). Testing – Create a plan to show how you will test your program and then explanations of any errors that you found and how they were fixed . An Evaluation of what worked, what didn’t, and how you met each of your requirements from your original list. Also, discuss further improvements that you could have made to improve your program. Example solution: Helpful reminders for this task: Think about the type of loop that you need. Will you need more than one loop? What variables will you need? Remember to use an input . What will you ask the user? How will you use their response? Remember to use ‘import random’ and randint to create a random number . What outputs do you need and when? What should you display… After each hand? At the beginning? At the end? ⬅ Extended Task 2 (Lottery) Extended Task 4 (Vet Surgery) ➡








