top of page

Search CSNewbs

304 results found with an empty search

  • 3.1 - Network Characteristics - Eduqas GCSE (2020 spec) | CSNewbs

    Learn about the advantages and disadvantages of networks, the five types of network - LAN, WAN, PAN, MAN and VPN - and differences between wired and wireless networks. Based on the 2020 Eduqas (WJEC) GCSE specification. 3.1: Network Characteristics Exam Board: Eduqas / WJEC Specification: 2020 + What is a network? A network is more than one computer system connected together allowing for communication and sharing of resources . There are many benefits but also some drawbacks to using a network compared to having an unconnected ('standalone' ) computer: Advantages of Networks Easily share files , software and hardware between computers. Disadvantages of Networks There is an initial cost because network devices like routers are required . Larger companies will need to buy and maintain a server . Log in from any connected computer and access your data and files. A network manager / administrator might need to be employed to maintain the network . An administrator can monitor network activity and control security settings. Data from computers on the network can be automatically backed up on central storage. Security breaches are more likely and malware , such as worms, can spread quickly across the network. If the web server fails , all connected computers won't be able to access files or log on . Network Types Networks can be split into different types , usually categorised by their geographical distance apart and the area that they serve. Local Area Network A local area network (LAN ) has computer systems situated geographically close together , usually within the same building or small site , like a school or office . Wide Area Network A wide area network (WAN ) has computer systems situated geographically distant to each other, possibly across a country or even across the world . The internet is an example of a WAN that spans the globe. Personal Area Network A PAN is a personal network for an individual , such as a photographer connecting a smartphone, desktop computer and printer together. Metropolitan Area Network A MAN is larger than a LAN but smaller than a WAN and typically covers a relatively large area like a university campus, town or city . Virtual Private Network A VPN allows for a secure and encrypted connection to a public network like the internet. It is often used to protect an individual's privacy by concealing their real location. Wired & Wireless Networks Wired Connections Wireless Connections Wireless connections, such as WiFi or Bluetooth , use no cables but require a wireless network interface card (WNIC ). Wireless connections generally have a slower speed and can be affected by the computer's distance from the wireless router as well as obstacles like walls or bad weather. Wired connections use physical cables , such as copper or fibre optic wires , and require a network interface card (NIC ) to connect to a network. These wired connections use a wired connection protocol - most commonly Ethernet . Restricted Movement Faster More Secure NIC Required Freedom of Movement Slower Less Secure WNIC Required Q uesto's Q uestions 3.1 - Network Characteristics: 1. A retirement home for the elderly is considering installing a LAN , give 3 benefits and 3 drawbacks they might find of using a network . [6 ] 2a. Describe the difference between a LAN and WAN . [2 ] 2b. Give an example of how a LAN and a WAN could each be used . [ 2 ] 3 . Explain the differences between a PAN , MAN and VPN . [ 3 ] 4. For each of the scenarios below, state which network type would be most suitable : a. The IT rooms of a secondary school . [ 1 ] b. A study in a house with a desktop and printer. [ 1 ] c. Using online banking when abroad on a holiday to stay secure . [ 1 ] d. A large technology company with offices across Europe . [ 1 ] e. Council offices with several locations across Manchester . [ 1 ] 5. Briefly compare wired and wireless networks . [ 8 ] 2.2 - Boolean Algebra 3.2 - Data Packets & Switching Theory Topics

  • OCR CTech IT | Unit 1 | 2.2 - Applications Software | CSNewbs

    Learn about the different types of applications software including productivity programs, business tools and IDEs. Based on the 2016 OCR Cambridge Technicals Level 3 IT specification. 2.2: Applications Software Exam Board: OCR Specification: 2016 - Unit 1 What is applications software? Don't confuse applications software and apps . Apps generally have a single purpose , such as a game like Angry Birds or the torch tool on a phone. Applications software can be used for a number of different functions depending on the user's needs and their purpose. Productivity Software This is general use software for completing a range of tasks accurately and efficiently . Key examples include word processors (e.g. Microsoft Word or Google Docs), presentation software (e.g. Microsoft PowerPoint or Google Slides) and web browsers (e.g. Microsoft Edge or Google Chrome). Email applications (e.g. Microsoft Outlook or Gmail) are beneficial to organisations because staff can send information to many customers at once which is a simpler and less costly method of communication than something like sending letters or leaflets in the mail. Emails can also include attachments of important documents and include multimedia elements like images and videos to make communication more interesting . Databases and Spreadsheets Database tables and spreadsheets can store both numerical and textual data ready for analysis . Examples include simple database tables and financial spreadsheets of a company's profits each year. Microsoft Access is an example of database software that uses tables of records and Microsoft Excel is an example of spreadsheet software . Data can be sorted numerically or alphabetically for both software types but graphs can be created from spreadsheets to visualise data . When using spreadsheets (or databases) records can be locked ('record locking' ) so that only one person can make edits to a specific record at any one time. Edits will be saved before unlocking the file. This will stop data being incorrectly overwritten and will ensure that the data in the spreadsheet is up-to-date, accurate and fit for purpose. Development Tools These are tools for programmers who are creating or modifying software . An integrated development environment ( IDE ) is software used to create , edit and debug (fix) programs . An IDE features a number of tools , including: A source code editor to type program code into. It may contain features such as error highlighting and automatic formatting . Because IDEs use high-level languages like Python or Java , a translator is required to convert the source code into machine code ( binary ) so that it can be understood and processed by the CPU . A compiler is a type of translator that converts instructions into machine code (binary) in one go . An interpreter is a type of translator that converts instructions into machine code (binary) line by line . A debugger is used to test code and display errors . Other development tools aid programmers with developing and maintaining websites and apps for phones / tablets. An advantage of databases over spreadsheets is that data can be atomised - meaning it can be stored in separate tables (e.g. one for patients and one for doctors ) with records linked through relationships . This minimises data redundancy (duplication ), meaning there is a lower chance of making errors , and it is easier to search through the table as each record will only appear once . A search through a database is called a 'query '. Business Software This is specialist software for businesses , often made bespoke for an organisation based on their needs . Types of business software: Project management software allows teams of workers to collaborate and split large projects into manageable tasks with clear deadlines and assigned roles . A management information system (MIS ) processes a large amount of data and organises it for use in decision-making and general data analysis . See more about an MIS in section 3.5 . Multimedia programs such as video editors or animation suites can be used to create high-quality videos with images , audio and video clips . Collaboration tools for businesses allow employees to share ideas and resources in real-time . Publishing software allows users to implement text and images into eye-catching designs such as posters , leaflets or static adverts to include on a website. Expert systems use large databases for automatic decision-making , often making use of AI to quickly solve complex problems . A healthcare example of an expert system is a medical diagnosis program that may suggest possible illnesses when a patient's symptoms are input . CAD / CAM One example of business software used for the design and manufacture of a product is CAD / CAM (C omputer-A ided D esign / C omputer-A ided M anufacturing). CAD is used to create highly detailed digital designs and CAM translates these designs into instructions for manufacturing machines to make the product physically. These software packages use 3D modelling and image rendering along with exact measurements to create precise designs ready to be manufactured . Engineers use them to design and make mechanical parts and architects use them to create detailed building models and blueprints . Q uesto's Q uestions 2.2 - Applications Software: 1. State four different kinds of productivity software and briefly describe how each could be used . For example: "Word processors can be used to type up a letter in an office or write an essay for school." [8 ] 2. Describe two differences between database and spreadsheet software. [2 ] 3a. What is an Integrated Development Environment ? [1 ] 3b. Describe three tools used in an IDE. [6 ] 4. Giving brief examples of how they can be used, state four different types of business software . [8 ] 5. Suggest how a website design company could use each of the three types of applications software (Productivity Software , Development Tools and Business Software ). [ 6 ] 2.1 - Types of Software Topic List 2.3 - Utility Software

  • 5.1 - Computing Legislation | OCR A-Level | CSNewbs

    Learn about the laws related to computing - the Data Protection Act, Computer Misuse Act, Copyright Design and Patents Act and Regulation of Investigatory Powers Act. Based on the OCR H446 Computer Science A-Level specification. Exam Board: OCR A-Level Specification: Computer Science H446 5.1 - Computing-related Legislation Watch on YouTube : Data Protection Act Computer Misuse Act Copyright Design and Patents Act Regulation of Investigatory Powers Act Several key UK laws govern the ethical and legal use of computers and digital information including the Data Protection Act and Computer Misuse Act . Each act is designed to protect data , users or intellectual property in the digital age. Data Protection Act (2018) The Data Protection Act is a UK law designed to ensure that personal data is collected , stored and used responsibly . It gives individuals (data subjects ) rights over their personal information and sets rules for organisations that process it . Introduced in 1998 , it was updated in 2018 to align with the EU’s General Data Protection Regulation (GDPR ). The Data Protection Act's key principles include that data must be processed lawfully , fairly and transparently , used for specific purposes , kept accurate and up to date , stored securely and not kept longer than necessary . It also gives data subjects rights such as accessing their data , correcting inaccuracies , objecting to processing and requesting deletion . Organisations that break the law can face heavy fines and legal action from the Information Commissioner’s Office (ICO ). YouTube video uploading soon Computer Misuse Act (1990) The Computer Misuse Act (1990 ) is a UK law created to make unauthorised access and use of computer systems illegal . It was introduced in response to the rise of hacking and other cybercrimes as computers became more common . This act defines several offences , including: Unauthorised access to computer material , such as hacking into a system without permission . Unauthorised access with the intent to commit further offences , such as fraud or data theft . Unauthorised modification of data or programs , for example, spreading viruses or deleting files . Making , supplying or obtaining tools used for committing these offences . Penalties range from fines to imprisonment , depending on the severity of the crime . This act helps protect individuals , organisations and data from malicious attacks and misuse . YouTube video uploading soon Copyright, Designs & Patents Act (1988) The Copyright, Designs and Patents Act (1988 ) is a UK law that protects people’s creative and intellectual work from being copied or used without permission . It gives creators automatic legal rights over their original work , such as books , music , films and software . The act states that the copyright owner controls how their work is used , including the rights to copy , distribute or adapt it. Anyone wishing to use the work must get permission or a licence from the owner. It also includes exceptions , allowing limited use for purposes like education or research . This act helps ensure that creators are fairly rewarded for their work and that their intellectual property is legally protected . YouTube video uploading soon Regulation of Investigatory Powers Act (2000) The Regulation of Investigatory Powers Act (RIPA ) (2000 ) is a UK law that governs how public bodies and law enforcement can carry out surveillance and access electronic communications . It was introduced to balance national security and crime prevention with individuals’ right to privacy . RIPA allows authorised agencies , such as the police , intelligence services and local councils , to monitor communications , intercept phone calls or emails and use covert surveillance , but only with proper legal authorisation . It also regulates the use of informants and access to encrypted data . This act aims to ensure that surveillance is done lawfully , proportionately and for legitimate purposes , such as preventing or detecting serious crime or protecting public safety . YouTube video uploading soon This page is under active development. Check here for the latest progress update. Q uesto's K ey T erms Legislation: Data Protection Act (2018) Computer Misuse Act (1990) Copyright Design and Patents Act (1988) Regulation of Investigatory Powers Act (2000) D id Y ou K now? In 1985 , two journalists were arrested for ‘ hacking ’ into the emails of the Duke of Edinburgh ( Prince Philip ) after discovering an engineer’s username was ‘ 2222222222 ’ and password was ‘ 1234 ’. They were acquitted in court because no UK laws covered hacking , exposing a major legal gap that led to the creation of the Computer Misuse Act ( 1990 ) . 4.3 - Boolean Algebra A-Level Topics 5.2 - Moral & Ethical Issues

  • OCR A-Level | CSNewbs

    Navigate between all topics in the OCR A-Level Computer Science H446 specification. Includes all topics from Component 1 (Computer Systems) and Component 2 (Algorithms and Programming). OCR Computer Science A-Level These pages are based on content from the OCR H446 Computer Science specification . This website is in no way affiliated with OCR . Component 1: Computer Systems Paper 1 Playlist on YouTube This content is under active development. Check here for the latest progress update. OCR A-Level Key Term Generator 1. Hardware 1.1 - Structure & Function of the Processor (The CPU) 1.2 - Types of Processor 1.3 - Input, Output & Storage 2. Software 2.1 - Systems Software 2.2 - Applications Generation 2.3 - Software Development 2.4 - Types of Programming Language 3. Networks & Databases 3.1 - Compression, Encryption & Hashing 3.2 - Databases 3.3 - Networks 3.4 - Web Technologies 4. Data & Logic 4.1 - Data Types 4.2 - Data Structures 4.3 - Boolean Algebra 5. Laws 5.1 - Computing-Related Legislation 5.2 - Moral & Ethical Issues Component 2: Algorithms & Programming 1. Computational Thinking 1.1 - 1.5 - Computational Thinking 2. Problem Solving & Programming 2.1 - Programming Techniques 2.2 - Computational Methods 3. Algorithms 3.1a - 3.1d - Algorithm Complexity 3.1e - Data Structure Algorithms 3.1f - Standard Algorithms

  • 5.3 - HCI Designs, Documents, Diagrams | F160 | Cambridge Advanced National in Computing AAQ

    Learn about designs, documents and diagrams related to human-computer interaction including processing and data handling, data flow diagrams (level 0 and level 1), flowcharts and user interface designs (visualisation and wireframe diagrams). Based on Unit F160 (Fundamentals of Application Development) for the OCR Cambridge Advanced National in Computing (H029 / H129) (AAQ - Alternative Academic Qualification). Qualification: Cambridge Advanced National in Computing (AAQ) Unit: F160: Fundamentals of Application Development Certificate: Computing: Application Development (H029 / H129) 5.3 - Human Computer Interface Designs, Documents and Diagrams Watch on YouTube : Data flow diagrams Flowcharts Visualisation diagrams Wireframe diagrams There are four types of documents / diagrams you need to know that can be used to design human-computer interfaces : data flow diagrams (DFDs ), flowcharts , visualisation diagrams and wireframe designs . For each type of diagram , you need to know its components and conventions , when it is appropriate for use , and how to create it . Each diagram is also effective for different uses and you must be able to consider how specific diagrams can be made more effective . Human-Computer Interface Diagrams Data Flow Diagrams A data flow diagram (DFD ) is a visual representation of how data is transferred within a system or organisation . They do not show decision logic or sequencing , but focus on where data comes from , where it goes and how it is processed . DFDs are typically categorised into Level 0 and Level 1 formats, which differ based on complexity . Flowcharts A flowchart is a diagram that shows the sequence of steps in a process using specific symbols . Flowcharts can be used as a project planning tool (section 3.2 ) to visualise workflows , task order and decision-making paths . It is also useful as a human-computer interface diagram to show the steps and decisions users may take as they interact with the application . The video says ' 3.2d ' because flowcharts also appear in section 3.2 as a project planning tool . Visualisation Diagrams Visualisation diagrams are graphical representations used to show the layout , structure and appearance of a software application's interface . They're often used for planning , design and feedback purposes. Traditionally, they would be drawn on paper in pencil and annotated , but modern diagrams are mocked up on a computer so they can be easily shared with team members and clients . Wireframe Diagrams Wireframe diagrams are basic visual guides used to represent the structure and layout of a user interface (UI ) without any design styling . They focus on function , layout and interaction , not aesthetics . Wireframe diagrams are used in the early design stages to plan the UI layout before visual design begins. Q uesto's Q uestions 5.3 - Human Computer Interface Designs, Documents & Diagrams: 1. Explain what the purpose of data flow diagrams are, the difference between Level 0 and Level 1 and what makes them effective . [6 ] 2. Draw a wireframe diagram for the YouTube homepage . [3 ] 3. Explain how visualisation diagrams are created and how they can be made more effective . [ 5 ] The first type of flowchart , the ' flow process chart ', was developed by engineers Frank and Lillian Gilbreth in 1921 . The book (and original movie ) ' Cheaper by the Dozen ' is about this couple . D id Y ou K now? 5.2 - Visual Design Considerations Topic List 6.1 - Job Roles

  • Memory | Key Stage 3 | CSNewbs

    Learn about the three main types of memory in a computer system - RAM (Random Access Memory), ROM (Read Only Memory) and Cache Memory. Memory What is memory? Memory is where a computer stores information , instructions and data so it can use them quickly when needed . There are three main types of memory : RAM Random Access Memory ROM Read Only Memory Cache Memory What is Random Access Memory? RAM is volatile (this means that when power is lost, the data is deleted ). Every program that is being run by the computer (such as Google Chrome, Spotify or Microsoft Word) is stored in RAM . RAM is made up of a large number of storage locations , and each is identified with a unique address . What is Read Only Memory? ROM is non-volatile (this means that data is saved, even when the power is off ). The start-up instructions (for when a computer is switched on ) are stored in ROM . ROM is read-only, which means that it cannot be edited or changed . What is Cache Memory? Cache memory is fast to access because it is built into the CPU (or very close to it) . Cache memory stores data that needs to be accessed very frequently . Cache memory is very expensive , so there is only a small amount in most computers. How can a computer run faster? There are many reasons why a computer may be running slowly . Here are some methods related to memory that can help speed up a system : Close unnecessary programs to free up RAM so it doesn't run out of memory space . Add more RAM so the computer can run more programs at once without slowing down . Increase the cache size so the CPU can access important data more quickly . KS3 Home Note: Only larger systems like desktop computers can have their components easily upgraded and replaced.

  • 1.6 - Additional Hardware - Eduqas GCSE (2020 spec) | CSNewbs

    Learn about the motherboard, graphics processing unit (GPU), sound card, embedded systems and input / output systems. Based on the 2020 Eduqas (WJEC) GCSE specification. 1.6: Additional Hardware Exam Board: Eduqas / WJEC Specification: 2020 + 1.6a - Internal Hardware Motherboard The motherboard is the main circuit board of a computer , unique for each device. It holds and connects the different components together , allowing data to be transferred between them. Components such as the CPU and ROM are directly attached to the motherboard. The motherboard has expansion slots for additional cards (i.e. sound cards) and ports (i.e. USB). Graphics Processing Unit (GPU) Sound Card A GPU is a microprocessor that performs complex calculations to generate graphical images to be displayed on a monitor . There are two types of GPU, integrated GPUs within the motherboard circuitry or dedicated GPUs on an additional card (known as a 'graphics card'). An integrated GPU is cheaper and generates less power because it uses the RAM of the computer . Integrated GPUs are used in tablets and laptops as they generate less heat and are optimal for general computing uses (e.g. web browsing or watching movies). A dedicated GPU is more expensive and generates more heat, often requiring a fan because it contains its own memory . Dedicated cards are used by animation professionals and professional gamers who require the best graphics. Sound cards convert analogue sound waves into digital data (binary) when inputting audio through a microphone. 0010 1011 0101 0101 0110 0111 0101 0001 0101 0010 1011 0101 0101 0110 0111 0101 0001 0101 Sound cards also convert digital data (binary) into analogue sound waves to output audio through speakers or headphones. 1.6b - Embedded Systems Example: A washing machine has a control chip that manages the different program cycles. An embedded system is a computer system built into a larger machine to provide a means of control . Embedded systems perform a specific pre-programmed task which is stored in ROM . An embedded system uses a combination of hardware and software . Example: A traffic light has a control chip that determines when to change to a green or red light. 1.6c - Input & Output Devices Input devices are used by humans to interact with a computer system , through methods such as text , voice or touch . Output devices show the result of computer processing , such as sound , printed text or a visual display on a monitor. Storage devices , such as a USB stick or an external hard drive, are neither input nor output devices - see 1.4 . Input Devices These are just some of the more common input devices . A mouse and a keyboard have been described in further detail. Are there any devices below you haven't heard of before? Mouse Benefits: Easy to navigate a graphical user interface. A wireless mouse takes up less space . Faster to select options (e.g. in a video game). Drawbacks: Difficult to use for people with restricted hand movement . Difficult to use on some surfaces . Other input devices: Scanner Controller Microphone Webcam Chip Reader OCR Scanner OMR Scanner Barcode Scanner Graphics Tablet Sensors (e.g. light or temperature) Touch Screen Remote Control Biometric Scanner (e.g. fingerprint or iris) Concept Keyboard Sip / Puff Switch Keyboard Benefits: Quick to input text . Easy to use with a familiar layout on most keyboards. Keys can be customised and shortcuts can be used . Drawbacks: Takes up a large amount of space on a desk. Difficult for people to use with restricted hand movement or poor eyesight . Output Devices Monitor These are just some of the more common output devices . A monitor and a printer have been described in further detail. Are there any devices below you haven't heard of before? Other output devices: Plotter Speakers Projector Alarm Light Headphones Touch Screen Braille Terminal What is it? A monitor is required to see the result of human input and computer processing . Monitors can be bought in different sizes and resolutions for a range of purposes such as video editing or playing games . Monitors settings can be changed to alter the brightness or contrast . Printer What is it? A printer uses ink or toner to print a document (such as text or images) onto paper . Inkjet printers use ink cartridges , are generally slower and print in a lower quality . Laser printers use toner cartridges and are generally quicker and print to a higher quality . Q uesto's Q uestions 1.6 - Additional Hardware: 1.6a - Internal Hardware 1. What is the purpose of the motherboard ? [2 ] 2a. What is the purpose of the GPU ? [ 2 ] 2b. Describe two differences between integrated and dedicated expansion cards . [ 4 ] 3. Explain how a sound card works. [ 4 ] 1.6b - Embedded Systems 1. What is an embedded system ? [3 ] 2a. Give two examples of an embedded system. [ 2 ] 2b. Research and describe another example of an embedded system. [ 2 ] 1.6c - Input & Out[ut Devices 1. Choose four input devices and describe at least two benefits and two drawbacks of using each one. [ 8 ] 2. Describe three output devices . [ 3 ] 3. Justify which input and output devices would be most suitable in the following scenarios: a. A teacher needs to take the class register . [ 4 ] b. A family want to communicate with their cousins in Australia. [ 4 ] c. The school movie club wants to play Star Wars in the assembly hall. [ 4 ] d. An e-sports player is taking part in an online multiplayer tournament . [ 4 ] e. A laboratory needs security so that only registered scientists can enter. [ 4 ] 1.5 - Performance 2.1 - Logical Operators Theory Topics

  • 10.3 - Programming Errors - Eduqas (2020 Spec) | CSNewbs

    Learn about the six programming errors - syntax, runtime (execution), linking, logical, rounding and truncation. Based on the 2020 Eduqas (WJEC) GCSE specification. 10.3: Programming Errors Exam Board: Eduqas / WJEC Specification: 2020 + Syntax Error A syntax error is a mistake in the grammar or spelling of the program. A syntax error will prevent the program from being compiled . Examples: Incorrect Spelling: pront ( "hello" ) Incorrect punctuation: print ( "hello" ( Execution (Runtime) Error An execution error is when the program unexpectedly stops as a result of an operation during execution . Examples: Dividing by zero: 400 / 0 Reading too far in a file: #There are 50 lines in the file line = file.readlines( ) print ( line [100] ) Logical Error Linking Error A logical error is a mistake made by the programmer - the program still works but displays the wrong output . Examples: Truncation Error Rounding Error A linking error occurs when a compiler can’t find a sub procedure (e.g. the random library in Python) that has been used. The programmer might have declared it incorrectly or forgotten to link (import) it . Examples: Spelling an import command incorrectly: import ramdon number = random.randint(1,10) Requesting a function without linking: number = random.randint(1,10) Incorrect calculation: total = num1 - num2 print (total) Incorrect variable printed: age = 16 name = "Steve" print ( "Nice to meet you" , age) A rounding error is when the program rounds a real number to a fixed number of decimal places. This results in losing some value as the number becomes less accurate . Examples: Rounding up: 80.87 = 80.9 (Inaccurate by 0.03) Rounding down: 63.4 = 63 (Inaccurate by 0.4) A truncation error is when the program truncates a real number to a fixed number of decimal places . This results in losing some value as the number becomes less accurate . Examples: Truncation to 2 decimal places: 92.13787 = 92.13 (Inaccurate by 0.00787) Truncation to 1 decimal place: 25.199876 = 25.1 (Inaccurate by 0.099876) Q uesto's Q uestions 10.3 - Programming Errors: 1. Describe and give an example of each type of error: a. Syntax Error [ 3 ] b. Execution (Runtime) Error [ 3 ] c. Logical Error [ 3 ] d. Linking Error [ 3 ] e. Rounding Error [ 3 ] f. Truncation Error [ 3 ] 2. State the error that will occur for each scenario: [1 each ] a. A command word (such as for or print) has been misspelt. b. The average speed is 120.3856 but only 120.3 is displayed. c. The cost of a meal is £47 but £40 is displayed. d. A program uses a subroutine that has not been imported. e. The height of a dog is 33.38cm but 33.4cm is displayed. f. The user wants to read line 9 of a file that only has 6 lines. g. The user's age is printed instead of their name. h. The programmer has typed print("hello"( i. A number is divided by 0. j. The program is asked to generate a random number but 'import random' has not be written. 10.2 - Stages of Compilation Theory Topics 11.1 - Impacts of Technology

  • 5.2 - Integrated Development Environment - OCR GCSE (J277 Spec) | CSNewbs

    Learn about the tools of an integrated development environment (IDE) including the editor, error diagnostics and run-time environment. Based on the J277 OCR GCSE Computer Science specification (first taught from 2020 onwards). Exam Board: OCR Specification: J277 5.2: Integrated Development Environment Watch on YouTube : IDE Tools An IDE (Integrated Development Environment ) provides programmers with the following facilities (tools ) to help create programs : Editor The editor is software that allows a programmer to enter and edit source code . Editor features may include: Automatic formatting (e.g. automatic indentation). Automatic line numbering (this helps to identify exactly where an error has occurred). Automatic colour coding (e.g. Python IDLE turns loop commands orange and print commands purple). Statement completion (e.g. offering to auto-complete a command as the user is typing.) Error Diagnostics & Debugger Break point The programmer selects a specific line and the program displays the variable values at that point . The code can then be executed one line at a time to find exactly where the error occurs. This process is called single-stepping . Variable Watch / Watch Window cost Displays the current value of a selected variable . A variable can be watched line-by-line to see how the value changes . Trace Logs the values of variables and outputs of the program a s the code is executed line by line . Both tools are used to display information about an error when it occurs, such as the line it occurred on and the error type (e.g. syntax ). These tools may also suggest solutions to help the programmer to find and fix the error . Compilers & Interpreters Both tools convert the source code written by a programmer into machine code to be executed by the CPU. A compiler converts the entire source code into executable machine code at once . After compilation, the program can be run again without having to recompile each time. An interpreter converts source code into machine code line by line . An interpreter must reinterpret the code each time the program is required to run . See 5.1 for both types of translators. A runtime environment allows a program to run on a computer system. It checks for runtime errors and allows users to test the program . A runtime error occurs as the program is being executed , such as dividing a number by zero . A commonly used example is the Java Runtime Environment . This allows programmers to design a program on one platform ( using the programming language Java ) which allows the finished program to then be run on many others systems . A runtime environment enables the tools above such as a trace and breakpoint to be used. Run Time Environment Q uesto's Q uestions 5.2 - Integrated Development Environment: 1. Describe the purpose of each type of IDE tool : a. Editor b. Interpreter c. Compiler d. Error Diagnostics / Debugger e. Break point f. Variable Watch / Watch Window g. Trace h. Runtime Environment [ 2 each ] 5.1 - Languages & Translators Theory Topics

  • 4.1 - Number Systems - Eduqas GCSE (2020 Spec) | CSNewbs

    Learn about how to convert between the denary (decimal), binary and hexadecimal number systems. Based on the 2020 Eduqas (WJEC) GCSE specification. 4.1: Number Systems Exam Board: Eduqas / WJEC Specification: 2020 + What is binary? By now you should know that computer systems process data and communicate entirely in binary . Topic 1.4 explained different binary storage units such as bits (a single 0 or 1), nibbles (4 bits) and bytes (8 bits). Binary is a base 2 number system. This means that it only has 2 possible values - 0 or 1 . Because binary is a base 2 number system, binary numbers should be written out with a 2 after them, like this: 10101002 What is denary? Denary (also known as decimal ) is the number system that you've been using since primary school. Denary is a base 10 number system. This means that it has 10 possible values - 0, 1, 2, 3, 4, 5, 6, 7, 8, and 9 . Because denary is a base 10 number system, denary numbers should be written out with a 10 after them, like this: 165 10 How to convert from binary to denary: How to convert from denary to binary: What is hexadecimal? Hexadecimal is a base 16 number system. This means that it has 16 possible values - 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E and F . Because hexadecimal is a base 16 number system, hexadecimal numbers should be written out with a 16 after them, like this: 6E16 Hexadecimal is used as a shorthand for binary because it uses fewer characters to write the same value . This makes hexadecimal less prone to errors when reading or writing it , compared to binary. For example, 1001111010112 is 9EB16 . Hexadecimal only uses single-character values. Double-digit numbers are converted into letters - use the table on the right to help you understand. How to convert from binary to hexadecimal: How to convert from hexadecimal to binary: Converting from denary to hexadecimal / hexadecimal to denary To convert from denary to hexadecimal or the other way round you must convert to binary first . Denary > Binary > Hexadecimal Hexadecimal > Binary > Denary Use the videos on this page if you need help converting to or from binary. The most common number systems question in exams are from denary to hexadecimal or from hexadecimal to denary so make sure that you practice these conversions. Q uesto's Q uestions 4.1 - Number Systems: 1. Explain why hexadecimal numbers are used as an alternative to binary . Use an example . [ 3 ] 2. Convert the following values from binary to denary : a. 00101010 2 b. 11011011 2 c. 01011101 2 d. 11101110 2 e. 01011111 2 [1 each ] 3. Convert the following values from denary to binary : a. 35 10 b. 79 10 c. 101 10 d. 203 10 e. 250 10 [1 each ] 4. Convert the following values from binary to hexadecimal : a. 11110101 2 b. 01100111 2 c. 10111010 2 d. 10010000 2 e. 11101001 2 [1 each ] 5. Convert the following values from hexadecimal to binary : a. C2 16 b. 8A 16 c. DE 16 d. 54 16 e. F7 16 [1 each ] 6. Convert the following values from denary to hexadecimal : a. 134 10 b. 201 10 c. 57 10 d. 224 10 e. 101 10 [1 each ] 7. Convert the following values from hexadecimal to denary : a. 32 16 b. A5 16 c. 88 16 d. C0 16 e. BE 16 [1 each ] Watch on YouTube Watch on YouTube Watch on YouTube Watch on YouTube Click the banners above to try self-marking quizzes (Google Form) on these topics. Denary to Binary: Binary to Denary: Binary to Hexadecimal: Hexadecimal to Binary: 3.9 Protection Against Threats Theory Topics 4.2 - Signed Binary

  • Python | 10c - Remove & Edit Lines | CSNewbs

    Learn how to split, edit and removes lines using files in Python. Try practice tasks and learn through text and images. Perfect for students learning GCSE Computer Science in UK schools. Python 10c - REMOVE & Edit LINES Splitting a File The split command is used to split up a line of a file into different parts . The character or string in brackets after the split command is the value that will denote each split . In the example below I have split the file at each comma . Remember that Python numbering starts at 0 so the first section is 0, not 1. 0 1 2 3 The program below splits each line of the file at each forward-slash ( / ). The printed statement is the employee's first name, surname and job position. 0 1 2 3 4 Practice Task 1 Create a file (new txt document in Notepad) called movies. Type in the movie name, main actor, genre (e.g. horror), year it was released and your rating out of 10. Print just the movie name and year it released. Example solution: Deleting Lines in a File Exact Line Name The code below shows how to remove a line from a file using the exact name of the line , which will only work for short or simple files . First open the file in read move to save each line in a variable I've named lines. Then ask the user to input the exact line they want to remove (e.g. 'plum' in my example). Then open the file in write mode and use a for loop to read each line and only write it back into the file if it isn't equal to the line the user entered - such as 'plum'. The line.rstrip() command is important as it removes any spaces or empty lines that may interfere with matching the line to the input. Deleting Lines in a File Word in the Line The code below shows how to remove a line from a file if a certain word appears in that line , although this could be dangerous with large files. In my example I have written apple which has also removed pineapple! The difference from the previous program is to change the for loop so that it checks if the inputted word appears in the line . If it does appear then nothing happens (except a print statement to acknowledge it's been found). If the word doesn't appear then that line can be safely rewritten to the file . Practice Task 2 Download the trees text file. Give the user a choice of removing a specific tree or a type of tree. If they choose a specific tree then remove the line if it is an exact match (e.g. Field Maple). If they choose to remove a type of tree remove all lines that contain the name of that tree (e.g. willow) Make sure you actually check the file to see if the lines have been removed correctly! Example solution: Download the trees file: Sorting a File Sorting a file into alphabetical (or numerical ) order is a simple process. Open the file in read mode and save the lines into a list . The sort c ommand will automatically order the list of lines. If necessary, in the brackets type reverse = True to sort the list in reverse. Practice Task 3 Expand on your tree program from the previous practice task. As well as SPECIFIC or TYPE, allow the user to enter SORT to sort the tree file either in alphabetical order or reverse alphabetical order. Check the text file to see if it has been sorted correctly. You may make this a separate program from task 2 if you wish. Example solution: Editing Lines in a File Overwriting data in a file is a tricky process. The program below uses the same Employees.txt file as above but allows the user to change the address of an employee . A temporary file is created to store the lines of the employee file, but the line with the changes is replaced specifically with the new address. I have explained each line of the program to the right: When I executed the program below I entered Thomas Wynne's details and changed his address. When I opened the employees file the address had been updated : 1: Importing os allows me to rename and remove files later in the program. 3: Opens the employee file in read mode . 5 - 8: Input lines allow the user to enter the first name, surname and the person's new address. 10: A found flag is set up and set to False . 12: The for loop cycles through each line in the file. 13: Each line is split into separate parts from each / . 15: An if statement checks if the first name and surname match an employee in the file. 16: A replacement line is created by putting the original line together but with the new address. 18: The found flag is changed to True because the employee first name and surname matched . 19: A temporary file is created and opened in write mode . 20: The seek command restarts the file at line 0 . 22: The for loop cycles through each line of the employee file from the beginning. If the first name and surname match it will write the new line to the file, otherwise it will rewrite the original line . 28 & 29: Both files are closed . 31 & 32: If the names didn't match , an appropriate message is printed. 34 - 37: If the address was changed, the original file is renamed and deleted and the temp file is renamed as the original file. Practice Task 4 Use the movie file you created for practice task 1. Ask the user to enter the name of a movie. Ask them to enter an updated rating out of 10. Update the file to change the rating to the new value. Example solution: ⬅ 10b - Read & Search Files Section 10 Practice Tasks ➡

  • OCR CTech IT | Unit 1 | 1.8 & 1.9 - Number Systems | CSNewbs

    Learn about the denary, binary and hexadecimal number systems and how to convert between them. Based on the 2016 OCR Cambridge Technicals Level 3 IT specification. 1.8 & 1.9 - Number Systems & Conversion Exam Board: OCR Specification: 2016 - Unit 1 What is binary? What is denary? Denary (also known as decimal ) is the number system that you've been using since primary school. Denary is a base 10 number system. This means that it has 10 possible values - 0, 1, 2, 3, 4, 5, 6, 7, 8, and 9 . How to convert from binary to denary: How to convert from denary to binary: What is hexadecimal? Hexadecimal is a base 16 number system. This means that it has 16 possible values - 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E and F . Hexadecimal is used as a shorthand for binary because it uses fewer characters to write the same value . This makes hexadecimal less prone to errors when reading or writing it , compared to binary. For example, 100111101011 is 9EB. Hexadecimal only uses single-character values. Double-digit numbers are converted into letters - use the table on the right to help you understand. How to convert from binary to hexadecimal: How to convert from hexadecimal to binary: Converting from denary to hexadecimal / hexadecimal to denary To convert from denary to hexadecimal or the other way round you must convert to binary first . Denary > Binary > Hexadecimal Hexadecimal > Binary > Denary Use the videos on this page if you need help converting to or from binary. The most common number systems question in exams are from denary to hexadecimal or from hexadecimal to denary so make sure that you practice these conversions. Q uesto's Q uestions 1.8 & 1.9 - Number Systems: 1. Explain why hexadecimal numbers are used as an alternative to binary . [ 2 ] 2. Convert the following values from binary to denary : a. 00101010 b. 11011011 c. 01011101 d. 11101110 e. 01011111 [1 each ] 3. Convert the following values from denary to binary : a. 35 b. 79 c. 101 d. 203 e. 250 [1 each ] 4. Convert the following values from binary to hexadecimal : a. 11110101 b. 01100111 c. 10111010 d. 10010000 e. 11101001 [1 each ] 5. Convert the following values from hexadecimal to binary : a. C2 b. 8A c. DE d. 54 e. F7 [1 each ] 6. Convert the following values from denary to hexadecimal : a. 134 b. 201 c. 57 d. 224 e. 101 [1 each ] 7. Convert the following values from hexadecimal to denary : a. 32 b. A5 c. 88 d. C0 e. BE [1 each ] Watch on YouTube Watch on YouTube Watch on YouTube Watch on YouTube By now you should know that computer systems process data and communicate entirely in binary . Section 1.7 explained different binary storage units such as bits (a single 0 or 1), nibbles (4 bits) and bytes (8 bits). Binary is a base 2 number system. This means that it only has 2 possible values - 0 or 1 . Click the banners above to try self-marking quizzes (Google Form) on these topics. Denary to Binary: Binary to Denary: Binary to Hexadecimal: Hexadecimal to Binary: 1.7 - Units of Measurement Topic List 2.1 Software Types

© CSNewbs 2026

The written, video and visual content of CSNewbs is protected by copyright. © 2026
bottom of page