Search CSNewbs
304 results found with an empty search
- 4.2 - Global Legislation | Unit 2 | OCR Cambridge Technicals | CSNewbs
Learn about legislation that covers a wider geographic area including the UNCRPD. Based on the 2016 OCR Cambridge Technicals Level 3 IT specification for Unit 2 (Global Information). 4.2 - Global Legislation Exam Board: OCR Specification: 2016 - Unit 2 Data Protection Outside of the UK Personal data should not be transferred outside of the UK unless the country receiving the data has adequate data protection laws that match the Data Protection Act (2018) / GDPR (General Data Protection Regulation ). GDPR was introduced in all European Union (EU ) countries in 2018. This set of regulations ensure that personal data is protected and can be sent between EU countries. However, many other countries only have partially adequate data protection laws (such as the USA and Canada) whilst many nations have inadequate or no laws regarding data protection. Click the map button to visit CNIL's website and see exactly which countries have adequate, inadequate and no data protection laws. UNCRPD UNCRPD stands for United Nations Convention on the Rights of Persons with Disabilities . This is a United Nations human right that states disabled people should be able to 'access information systems' (article 9) and 'use digital means to express their opinion' (article 21). Methods of complying with this convention include: Personal data can be sent between European countries (such as the UK) and the United States because of a protection scheme which was known as the 'Safe Harbour ' scheme (between 2000 and 2015) and the 'EU-US Privacy Shield ' (between 2015 and 2020). This provided protection to European data in the US and required both companies engaged in data transaction to sign up to the scheme before personal data could be transferred. The companies must have been assessed as responsible for the security of the data. The scheme was stopped in July 2020 because the European Court of Justice argued it did not adequately protect the personal data of Europeans from government access. Using < alt> text on images so that text-to-speech software can describe the image aloud, for the visually impaired . The tag can be added to the HTML code of an image on a website and will be audibly spoken by specialist reading software. This image contains alt text that can't be seen by a typical viewer but will be read aloud by screen reading software. Accessibility settings . Websites could allow users to change the font size and style or change the background colour to make text easier to read . Wikipedia presents some articles to be listened to if the user is unable to read them. Example Text Example Text Example Text Example Text Q uesto's Q uestions 4.2 - Global Legislation: 1a. What is the problem with transferring data outside of the UK ? [2 ] 1b. Why can personal data be transferred between European countries ? [2 ] 2. Open the CNIL map (use the link on this page and click on a specific country to see its name) and state: Four countries in the EU Two countries with partially adequate protection Two countries with an authority and law (dark purple) Two countries with laws only (light purple) Four countries with no data protection laws [7 ] 3a. What is UNCRPD and why is it important ? [3 ] 3b. Describe what alt text is used for. [2 ] 3c. State three accessibility settings that could affect how easy text is to read . [3 ] EU-US Privacy Shield 4.1 - UK Legislation Topic List 4.3 - Green IT
- Python | Extended Task 4 | CSNewbs
Test your ability to create a more complex program in Python based on a given scenario. Perfect for students learning GCSE Computer Science in UK schools. Extended Task 4 Hi, Jacob Mortimer here from Cats & Dogs Veterinary Surgery . There was a flood last week, and our computer systems were totally destroyed . I need you to create a program , using a file , that allows my receptionist to: Add new animals to the file . Search through the file and print the details of a specific animal . Allow a specific animal to be removed from the file . Vet Surgery For this task, you will need to create a document and include the following sections (with screenshots where appropriate): An introduction to explain the Purpose of your program . A List of Requirements for a successful program. Screenshots of your code (with comments in your code to show understanding). Testing – Create a plan to show how you will test your program and then explanations of any errors that you found and how they were fixed . An Evaluation of what worked, what didn’t, and how you met each of your requirements from your original list. Also, discuss further improvements that you could have made to improve your program. Reminders for this task: You will need to create a selection of options for the user to choose from. Subroutines and a while true loop may help. Section 10 will help you to open, write and read from files . Section 10c shows how to edit data in a file. You will need to adapt this code and not write the line that has been selected, instead of writing a modified version of it. There are multiple ways to approach this program, and your solution might look different from the example. Break the problem down and focus on one part at a time. Example solution: Entering 1 allows the user to enter the details of a new animal which is saved into the file . Entering 4 will stop the loop and ends the program. Entering 2 allows the user to enter the details of an animal to search for . If the animal is in the file, their details are printed clearly on a new line. Entering 3 allows the user to enter the details of an animal to remove from the file . If the animal is in the file, all lines are transferred into a temporary file except for the line to be removed . ⬅ Extended Task 3 (Blackjack) Extended Task 5 (Colour Collection) ➡
- Python | 6b - While Loops | CSNewbs
Learn how to create and use while loops in Python. Try practice tasks and learn through text and images. Perfect for students learning GCSE Computer Science in UK schools. top Python 6B - While Loops Types of Loop The third construct of programming (after Sequence and Selection) is Iteration . If you iterate something, then you repeat it. There are two key loops to use in Python: for loops and while loops . A for loop is count controlled – e.g. “For 10 seconds I will jump up and down”. The loop will continue until the count (e.g. 10 seconds) has finished . A while loop is condition controlled – e.g. “While I am not out of breath, I will jump up and down.” The loop will continue as long as the condition remains true . Simple While Loops A while loop keeps repeating as long as the starting condition is true . If the condition of the while loop becomes false , the loop ends . In this example, the number variable is increased by 1 inside of the loop until it is no longer less than or equal to 10 . number = 1 while number <= 10: print (number) number = number + 1 1 2 3 4 5 6 7 8 9 10 Comparison Operators == equal to != not equal to < less than <= less than or equal to > greater than >= greater than or equal to It is important to give the variable a value before you start the while loop . I have assigned number as 1. The last line increases the number by 1 otherwise the number would stay at 1 and the loop would repeat forever . While Loops Task 1 (Countdown from 100 ) Example solution (shortened): Create a simple while loop that starts at 100 and prints each number down to 1 . Think about the comparison operator you will need to check you have reached 1. 100 99 98 ... ... 3 2 1 Inputs Inside While Loops If you want the user to keep entering an input until they give a certain answer then you need to put the input inside the while loop : age = 0 while age < 18: print ( "Only adults allowed to the casino." ) age = int ( input ( "Enter your age: " )) print ( "Welcome and enjoy your visit." ) Only adults allowed to the casino. Enter your age: 14 Only adults allowed to the casino. Enter your age: 18 Welcome and enjoy your visit. month = " " while month != "July" : month = input ( "Guess the month I'm thinking of: " ) print ( "Correct! It was July!" ) Guess the month I'm thinking of: August Guess the month I'm thinking of: June Guess the month I'm thinking of: July Correct! It was July! Notice that the variable in the condition (age or month in these examples) has to be given a value first before it can be used in a while condition. The program will crash if the variable is not declared and assigned a value - for example, the age cannot be checked to see if it less than 18 if there is no age variable! For string variables like month in the example above then a blank default value like " " can be used. For integer variables often 0 will be used. While Loops Task 2 (Guess the Colour ) Example solution: Use a variable named colour and a while loop that allows the user to keep entering colours until a specific one (your choice) has been input. Guess the colour: blue Guess the colour: purple Guess the colour: yellow Correct! It was yellow! While Loops Task 3 (Integer Trivia ) Use a while loop to ask a question that has an integer (whole number) as an answer , such as "How many James Bond films did Daniel Craig appear in?" or "In which year did Wigan Athletic win the FA Cup?". Remember that integers do not use speech marks , e.g. year = 0 Example solution: Which year was the first Iron Man movie? 2010 Which year was the first Iron Man movie? 2009 Which year was the first Iron Man movie? 2008 Correct! It was 2008! While True Loops A while True loop will repeat indefinitely , only stopping when the break command is used to end the loop . While True loops are often preferred because you do not need to set default values for any variables before the loop begins. while True : password = input ( "Enter the password: " ) if password == "icecream21" : print ( "Correct Password!" ) break Enter the password: vanilla32 Enter the password: chocolate83 Enter the password: strawberry100 Enter the password: icecream21 Correct Password! The program below has been adapted to record the number of attempts made . The value is increased by 1 each time the loop restarts. guesses = 0 while True : guesses = guesses + 1 password = input ( "Enter the password: " ) if password == "goat7" : print ( "Correct Password! It took" ,guesses, "attempts!" ) break else : print ( "Incorrect. Try again!" ) Enter the password: sheep3 Incorrect. Try again! Enter the password: cow4 Incorrect. Try again! Enter the password: horse5 Incorrect. Try again! Enter the password: goat7 Correct Password! It took 4 attempts! The continue command will move to the next iteration (it can be considered as starting the loop again ). The program below allows numbers to be entered and keeps track of a running total. Entering 1 inputs a number, 2 displays the total and 3 stops the program. total = 0 while True : choice = input ( "\nType 1 to enter, 2 for a total and 3 to stop: " ) if choice == "1" : number = int ( input ( "Enter a number: " )) total = total + number continue elif choice == "2" : print ( "The total is" , total) continue elif choice == "3" : break print ( "\nProgram finished." ) Type 1 to enter, 2 for the total and 3 to stop: 1 Enter a number: 40 Type 1 to enter, 2 for the total and 3 to stop: 1 Enter a number: 35 Type 1 to enter, 2 for the total and 3 to stop: 2 The total is 75 Type 1 to enter, 2 for the total and 3 to stop: 3 Program finished. While Loops Task 4 (Guess the Planet ) Example solution: Use a while True loop to keep asking a user to input a planet . Keep track of the number of guesses that have been made and output the total when they input the correct planet. Use the second example in the 'While True Loops ' section above to help you. Enter a planet: Mars Incorrect guess, try again! Enter a planet: Mercury Incorrect guess, try again! Enter a planet: Neptune Correct it was Neptune! While Loops Task 5 (Up to 100 ) Create a while True loop that asks the user to enter a number . Add the number to a total variable and print it. When the total reaches 100 or more , stop the program. Don't forget to set the total variable to 0 at the start and to add the number entered by the user to the total. Example solution: Enter a number: 34 The current total is: 34 Enter a number: 29 The current total is: 63 Enter a number: 18 The current total is: 81 Enter a number: 22 The current total is: 103 Over 100! ⬅ 6a - F or Loops Section 6 Practice Tasks ➡
- Python | 12 - Error Handling | CSNewbs
Learn how to handle errors in Python. Try practice tasks and learn through text and images. Perfect for students learning GCSE Computer Science in UK schools. Python 12 - Error Handling Errors When an error occurs in Python, you may see a chunk of red text like this. This is very useful when creating programs as it tells us the exact line of the error (10), and its type (NameError). However, a completed program should have code in place for when an unexpected error occurs – we call this exception handling . General Exception In this example, Python will attempt to run the code indented beneath try . If there are no errors then the code will stop just before except . If an error does occur then the Exception code will be run . If we enter a correct value then the program will execute normally: But if an error occurs (such as writing a string when an integer is expected) then the Exception code will run : You can add the else command to your code that will execute only if there are no errors : If a valid number is entered then the else code will be printed: If a code generating an error is entered then the except code will be printed: Practice Task 1 Create a program that asks the user to input their age. Don't forget to use the int command. Use try and except to print a message if a number is not inputted. Example solution: Specific Exceptions The Exception command used in the section above is for any general error that occurs. You can also use specific except commands for a variety of errors. Below is a program with two different specific exception commands for one try statement: If a Value Error occurs, such as when the wrong data type is entered , then related code will be printed: Or if the user tries to divide by zero then a Zero Division Error will be triggered which prints a relevant response: Other types of exception can be found here . Practice Task 2 Create a program that asks the user to input a number and then divides this value by 999. Create a Value Error and Zero Division Error exception and include an appropriate message in both. Example solution for Zero Division: ⬅ 11 - Graphical User Interfac e Extended Task 1 (Pork Pies) ➡
- A-Level Key Terms | CSNewbs
A key term generator to display randomised or sequential terms from the OCR A-Level Computer Science (H446) course. Filter terms by topics and 'favourite' tricky terms to focus on later. Perfect for students learning A-Level Computer Science in UK schools. A-Level Key Terms Generator If you see this message, your school may be using a strict network filter which has blocked it. The tool uses basic JavaScript and should work fine on a home network. Use this tool to check your understanding of the OCR A-Level Computer Science H446 specification's key terms . OCR A-Level Homepage
- Motherboard | Key Stage 3 | CSNewbs
Learn about the motherboard and the components that are connected to this important piece of computer hardware. The Motherboard What is a motherboard? The motherboard is the main circuit board of a computer that links all other components together. Components can communicate by sending signals and data across pathways called buses . Some components, like the CPU and RAM , are directly installed in special sockets on the motherboard . There are expansion slots for further components like a graphics card . What is connected to the motherboard? Central Processing Unit Random Access Memory Graphics Processing Unit Read Only Memory Cache Memory Sound Card Hard Disk Drive Power Supply Unit What is a motherboard's form factor? Form factor relates to the motherboard's size , shape and how many components it can fit . The three most common form factors are compared below: ATX Micro ATX Mini ITX Standard Small Very Small 32 GB 64 GB 128 GB 7 4 1 Size Max RAM Expansion Card Slots GB stands for gigabytes What ports does a motherboard have? The motherboard contains several ports on the back panel , allowing cables to be connected to input or output data . Below are some of the common ports : USB (Type-A) Connects input devices like keyboards and mice or storage devices like a USB memory stick. USB (Type-C) A newer type of USB that is faster and commonly used to charge devices or transfer data. Ethernet Allows a device to connect to a wired network, most commonly to a router, for internet access. HDMI Connects to a monitor or TV to show the computer's audio and visual output. KS3 Home
- HTML Guide 6 - Organisation | CSNewbs
Learn about the tags that improve the layout of a web page, including how to centre content and add horizontal lines, bullet points and block quotes. 6. Organisation HTML Guide Watch on YouTube: This page explains the following tags which can be used to structure a simple page layout: Horizontal Line Centre Quote Bullet Points Numbered Points hr Horizontal Line You can add a horizontal line by simply adding to your document. There is no close tag. Add at least one horizontal line to your web page. center Centre Align This tag places the content within the tags on the centre of the page . Be careful - you need to use the American spelling - 'center ' - in your tags. Add tags to place your main heading in the centre of the page. blockquote Blockquote A blockquote is used to display a quote from another person or place. Text is indented further from the margin than the other content. It is not used very often, but can be found in some online articles and essays. Add at least one block quote to your web page. uo list Unordered List An unordered list is a set of bullet points . The tag is placed before the bullet points and afterwards. Each bullet point is placed within tags. That stands for list item . Add either an unordered or ordered list to your web page. Include at least three items in your list. o list Ordered List An ordered list will number each line . The tag is placed before the list and afterwards. Each list item is placed within tags. Add either an unordered or ordered list to your web page. Include at least three items in your list. Next it is time to add tags to the head, including a page title and metadata. 5. Images HTML Guide 7. Head Tags
- 6.2 - Utility Software - Eduqas GCSE (2020 Spec) | CSNewbs
Learn about utility software including antivirus, firewall, compression, disk partitioners, defragmenters, backup and file managers. Based on the 2020 Eduqas (WJEC) GCSE specification. 6.2: Utility Software Exam Board: Eduqas / WJEC Specification: 2020 + What is utility software? Utility software are dedicated programs used for the maintenance and organisation of a computer system. Antivirus Antivirus software is used to locate and delete viruses on a computer system. The antivirus scans each file on the computer and compares it against a database of known viruses . Files with similar features to viruses in the database are identified and deleted . Firewall A firewall manages incoming and outgoing network traffic . Each data packet is processed to check whether it should be given access to the network by examining the source and destination address . Unexpected data packets will be filtered out and not accepted to the network. Disk Defragmenter As files are edited over time they will become fragmented - this is when the file is split into parts that are stored in different locations on the hard disk drive . Files that are fragmented take longer to load and read because of the distance between the fragments of the file. Defragmentation software is used to rearrange the file on the hard disk drive so that all parts are together again in order. Defragmentation improves the speed of accessing data on the hard disk drive. Backup Software System backup copies data onto a separate storage device in case the original information is lost or corrupted . Backups should be saved regularly and stored in a different location to the rest of the data. Magnetic tape is a common backup medium. A typical backup policy is one known as 'grandfather - father - son' which uses three different backups at a time. Disk Compression Compression is the process of decreasing the size of a file . Disk compression is a utility tool that automatically compresses files when saved so that more data can be stored on the hard disk drive. When a file is to be opened, the program is automatically decompressed . Disk compression increases the amount of space on a hard disk drive but it takes longer to open and close files . Disk Checker This utility is used to scan a hard drive for any corrupted data . The corrupted data is deleted to speed up reading from and writing to the hard drive. More advanced disk checkers are used to scan for bad sectors . A bad sector is a permanently damaged section of the hard drive which can no longer be used and must be skipped over. Disk Formatter Disk Partition Editor This utility tool prepares a storage device such as the hard disk drive to be used by removing the current data and creating a file system . A file system manages how data is stored and accessed . Other devices like a USB stick may need to be formatted before they can be used for the first time . Within memory, partitions are segments of data that have been grouped together logically on the hard disk drive . A disk partition editor allows a user to view and modify these memory partitions . Options include creating, editing and deleting partitions. Clipboard Manager The clipboard is a temporary storage space for copied data. For example, a large amount of text can be copied and stored on the clipboard to be pasted into another document, even when the original file has been closed . The clipboard manager adds more functionality to the clipboard to allow multiple pieces of data to be copied, cut and pasted . System Profiles A system profiler displays detailed information about the applications on a computer system, as well as data about any attached hardware devices . Information is provided and updated in real-time about the performance of software and internal components such as the CPU . Data Recovery Data recovery tools allow deleted, corrupted or otherwise inaccessible data to be returned to a usable state . The data loss may have been caused by physical damage to a drive, corrupt memory partitions or accidental deletion . Most data is not permanently removed when it is deleted so data recovery software can often be used to reaccess files . Revision Control Revision control software manages previous versions of an application so that if an error occurs the program can be returned to a previous state . This is also called version control software and can be used to manage and monitor changes made to files over time. Archiver Archiving is the process of storing important data that is not currently required . It must not be deleted but it shouldn't take up valuable storage space either. An archiver compresses multiple files using lossless compression into one folder . This archived folder can be stored on a computer system or transferred to a storage device and won't take up much space . Cryptographic Utilities A cryptographic utility is used to encrypt data so that it cannot be understood if intercepted . Encryption is commonly for data in transit - being sent between devices . Cryptographic software can also encrypt data at rest - when stored on a hard disk drive for example - so that hackers would be unable to use the data . File Manager This utility tool provides an interface to the user for accessing, editing and moving files and folders on the system. Programs will be displayed in a hierarchical ( ordered ) structure with icons representing the application logo or file type. Files can be ordered in alphabetical, chronological or other orders and the manager provides an abstracted visualisation of where the data is stored. Q uesto's Q uestions 6.2 - Utility Software: 1. What is meant by utility software ? [1 ] 2. Describe each type of utility software : a. Antivirus b . Firewall c . Disk Defragmenter d . Backup Software e . Disk Compression f . Disk Checker g . Disk Formatter h . Disk Partition Editor i . Clipboard Manager j . System Profiles k . Data Recovery l . Revision Control m . Archiver n . Cryptographic Utilities o . File Manager [2 ] 6.1 - Operating Systems Theory Topics 7.1 - Language Levels
- OCR CTech IT | Unit 1 | 5.6 - Data Disposal | CSNewbs
Learn about laws regarding suitable data disposal of information and computer systems as well as methods including electromagnetic wipe and physical destruction. Based on the 2016 OCR Cambridge Technicals Level 3 IT specification. 5.6 - Data & System Disposal Exam Board: OCR Specification: 2016 - Unit 1 Computer components such as circuit boards, processors and monitors contain hazardous materials that cannot be disposed of in traditional ways such as rubbish collection and landfills. For security reasons, data must also be disposed of carefully so that it is not returned to a readable format by unauthorised viewers . Legislation In recent years, the government has introduced different laws that relate to the safe disposal of computer equipment to help reduce environmental impact . Waste Electronic and Electrical Equipment ( WEEE ) Directive : This provides guidance on how hazardous materials should be disposed of safely . This includes materials such as mercury (found in smartphones and newer monitors ) and toner cartridges in printers . These materials can damage the environment if not disposed of appropriately . Waste Acceptance Criteria ( WAC ): Equipment must meet these rules before it can be sent to a landfill . Hazardous materials, such as the elements in computer monitors , do not meet these criteria and should not be accepted . Hazardous Waste Directive : This ensures businesses safely store hazardous materials and use authorised businesses to dispose of the waste . Hazardous materials include mercury and hexavalent chromium . Data Protection Act ( DPA ): One principle of the DPA specifies that data should only be kept for a reasonable amount of time until it is securely deleted . Data stored on customers should be checked regularly and permanently deleted if no longer required . Methods of Data & System Disposal Overwriting is when new data is written to the hard disk drive to replace the current data - essentially resetting the data . Remember all data stored by a computer is in a binary format . Overwriting just once is usually not enough to remove all evidence of the data and the process may be repeated several times . Overwriting data causes no damage and means the drive can still be used for other purposes afterwards. Electromagnetic wiping uses a machine called a degausser , which has a very strong electromagnetic coil , to completely wipe the hard disk drive . Many large organisations use degaussers to be sure that their data is no longer on the devices they have used so it can’t be restored and accessed by unauthorised viewers . Degaussers are expensive to buy but it allows the device to be used again for other purposes afterwards as it is not physically damaged. A third option is the physical destruction of a computer system or storage device , like a hard disk drive , which guarantees the data is permanently inaccessible . However, physical destruction also renders the storage media unusable again for other purposes. Examples of physical destruction include shredding (e.g. a CD shredder ) or tools such as sledgehammers if no other option is available. Q uesto's Q uestions 5.6 - Data & System Disposal: 1. Describe the purpose of 4 different pieces of legislation relating to how data or computer systems should be disposed of safely . [8 ] 2a. State 3 methods of data and system disposal . [3 ] 2b. Describe 1 advantage and 1 disadvantage of using each method you stated in 2a. [6 ] 5.5 - Digital Security Topic List
- OCR CTech IT | Unit 1 | 4.1 - Communication Skills | CSNewbs
Learn about things to consider when trying to make a good impression at work, including written, verbal and physical considerations. Based on the 2016 OCR Cambridge Technicals Level 3 IT specification. 4.1 - Communication Skills Exam Board: OCR Specification: 2016 - Unit 1 Communication skills are vital for anybody working within the IT industry. Employees will need to communicate with other members of their team and with those who encounter issues with their computer systems. Interpersonal Skills Communication is not just through speaking to another person, behaviour is also important. Employees should sit up straight in their chairs to show interest and eye contact should be maintained when speaking to another person or listening in a meeting. It is important to speak clearly so that others can understand what you are trying to say. Verbal Communication Employees should know when to use informal and formal language appropriately. For example, formal language should be used in meetings as it is a work environment . Employees should think carefully about when to use technical terms . Technical terminology should be used when discussing issues with technicians but simplified explanations should be given to customers who may be inexperienced with their systems. Questioning Techniques Questioning is used to uncover problems in order to solve them . Closed questions will be direct and prompt a short, often one-word answer, such as "How many times have you tried to log in?". Open questions don't have an obvious answer and may elicit an opinion , such as "Why are you using Internet Explorer instead of Google Chrome?". Avoid leading questions - where you expect a certain response from the answerer, such as "Is the system always this slow?" Written Communication Again this form of communication can be formal - such as a letter to apply for a job - or informal - like sending a text or instant message to a team member. There are a number of considerations to take before deciding whether communication should be formal or informal. For example, if the communication is between peers or external agencies (such as other companies or customers), any policies the organisation has in place and whether the communication will be legally recorded (such as saving all email correspondence). Barriers to Communication There are several reasons why communication between people may be received or understood incorrectly . For example, noise in the room , language (this could be different spoken languages or the use of difficult technical terms ) and impairments (such as a hearing or visual impairment ). Another barrier is distraction - an email may be delayed because an employee is distracted by social media or other co-workers. Phones should also be turned off or silent during meetings. Q uesto's Q uestions 4.1 - Communication Skills: 1. Describe 3 interpersonal actions that an employee should follow when speaking or listening to other team members. [ 3 ] 2. Explain when an employee should use technical terms and when they should simplify their explanations . [ 4 ] 3. Describe the difference between closed , open and leading questions , giving an example of each. [6 ] 4. Describe 3 things that should be considered when deciding between formal or informal written communication . [3 ] 5. Describe 3 different barriers to successful communication . [3 ] 3.5 - Business Systems Topic List 4.2 - Communication Technology
- 4.1 - Boolean Logic - OCR GCSE (J277 Spec) | CSNewbs
Learn about the three logical operators - NOT, AND and OR - as well as truth tables. Based on the J277 OCR GCSE Computer Science specification (first taught from 2020 onwards). 4.1: Boolean Logic Exam Board: OCR Specification: J277 Watch on YouTube : Boolean Operators & Truth Tables Logic Gate Diagrams What is a logical operator? Inside of each computer system are millions of transistors . These are tiny switches that can either be turned on (represented in binary by the number 1 ) or turned off (represented by 0 ). Logical operators are symbols used to represent circuits of transistors within a computer. The three most common operators are: NOT AND OR What is a truth table? Truth tables are used to show all possible inputs and the associated output for each input . The input and output values in a truth table must be a Boolean value - usually 0 or 1 but occasionally True or False. NOT AND OR A NOT logical operator will produce an output which is the opposite of the input . NOT is also known as Negation . The symbol for NOT is ¬ An AND logical operator will output 1 only if both inputs are also 1 . AND is also known as Conjunction . The symbol for AND is ∧ An OR logical operator will output 1 if either input is 1 . OR is also known as Disjunction . The symbol for OR is ∨ NOT Logic Gate AND Logic Gate Symbol OR Logic Gate Symbol Truth Table Truth Table Truth Table Multiple Operators Exam questions could ask you complete truth tables that use more than one logical operator . Work out each column in turn from left to right and look carefully at which preceding column you need to use. NOT B A AND NOT B A OR (A AND NOT B) As binary is a base-2 number system , the number of rows required in a truth table will double with each new input in the expression in order to show the unique combinations of inputs. The examples above use just two inputs (A + B) so 4 rows are required. e.g. A = 2 rows / A + B = 4 rows / A, B + C = 8 rows / A, B, C + D = 16 rows Logic Diagrams You may be asked in an exam to d raw a logic diagram when given a logical expression . Draw any NOT symbols or expressions in brackets first. A logic diagram for C = ¬A ∧ B A logic diagram for D = C ∨ (A ∧ B) Q uesto's Q uestions 4.1 - Boolean Logic: 1. Copy and complete the following truth tables: 1b. Simplify the expression in the second truth table. 2a. A cinema uses a computer system to monitor how many seats have been allocated for upcoming movies. If both the premium seats and the standard seats are sold out then the system will display a message. State the type of logical operator in this example. 2b. For the more popular movies, the cinema's computer system will also display a message if either the premium seats or the standard seats have exclusively been sold out. However, it will not output a message when both have been sold out. State the type of logical operator in this example. 3. Draw a logic diagram for C = (¬B v A) ∧ A . 3.2 - Testing Theory Topics 5.1 - Languages & Translators
- Python | Setting up Python | CSNewbs
Learn how to create simple programs in Python. Try practice tasks and learn through text and images. Perfect for students learning GCSE Computer Science in UK schools. Setting up Python Downloading Python If you are using Python in Computer Science lessons, then your school should already have it downloaded and installed on the school computers. It is a good idea to download it on a home computer too so you can practice outside of lessons. Python is free and can be downloaded from the official website. You should download the most up-to-date version of Python 3. Save the file and then run it to start installing. Official Download Page Using Python When you run the Python application, it will open the shell. This window will display the outputs of any program you have created. Do not type into the shell . Click on the File tab then New File to open the editor. Python Shell - This displays the outputs of your program. Do not write directly into the shell . Python Editor - All code is written into the editor. When you want to test a program press the F5 key (or click the Run tab then Run Module ). The first time you test a program, it will prompt you to save the file. Make sure you save it somewhere you will remember - it is a good idea to create a folder named 'Python' where you can keep all your practice programs. The next page looks at actually creating a program but above shows how code has been typed into the editor and then displayed in the shell. You never need to save the shell window. Also, the editor saves automatically every time you run the program. Opening a Saved Program When you want to re-open and edit a file you have created previously double-clicking on it won't work . Right-click on the file and select Edit with IDLE : https://trinket.io/python/76b41b35c5 1 a - Printing ➡










