Search CSNewbs
268 results found with an empty search
- Computer Science Newbies
Homepage for learning about computer science in school. Discover topics across GCSE and Level 3 IT subjects, plus programming languages including Python, HTML and Greenfoot. C omputer S cience Newb ie s Popular topics: Python Programming Application Development OCR Cambridge Advanced National in Computing (AAQ) You are viewing the mobile version of CSNewbs. The site will appear better on a desktop or laptop . OCR A-Level (H446) OCR GCSE (J277) A-Level Computer Science GCSE Computer Science OCR A-Level content now underway! < Click the picture for more information. Statistics Links & Information Over half a million visits a year! Latest Blog Post About CSNewbs YouTube CSNewbs last updated: Tuesday 16th September 2025
- 1.1 - The CPU | OCR A-Level | CSNewbs
Explains the components of the CPU, the different registers, buses, how the FDE cycle works, CPU performance factors, pipelining, Von Neumann architecture and Harvard architecture. Based on the OCR H446 Computer Science A-Level specification. Exam Board: OCR A-Level 1.1 - Structure and Function of the Processor Specification: Computer Science H446 Watch on YouTube : CPU components Registers Buses The FDE cycle CPU performance Pipelining Von Neumann vs Harvard Contemporary architecture YouTube video uploading soon The Central Processing Unit ( CPU ) is the most important component in every computer system. The purpose of the CPU is to process data and instructions by constantly repeating the fetch-decode-execute cycle . In this cycle, instructions are fetched from RAM and transferred into the registers of the CPU to be decoded and executed . CPU Components The CPU has three key components : The control unit directs the flow of data and instructions inside the CPU and manages the FDE cycle , especially decoding instructions . The arithmetic logic unit ( ALU ) performs all arithmetic calculations and logical operations inside the CPU . Registers are small , ultra-fast storage locations that temporarily hold data , instructions or addresses during processing . The CPU also contains cache memory , which is temporary storage space for frequently accessed data . This page is under active development. Check here for more information. Registers A register is a small storage space for temporary data , instructions or addresses in the CPU . Each register has a specific role in the FDE cycle : The Program Counter ( PC ) stores the memory address of the next instruction to be fetched from RAM . The Memory Address Register ( MAR ) stores the memory address currently being accessed , which may be an instruction or data . The Memory Data Register ( MDR ) stores the data that is transferred from RAM to the CPU . The Current Instruction Register ( CIR ) stores the instruction that has been fetched from RAM . The Accumulator ( ACC ) stores data currently being processed and the result of calculations or logical operations made by the ALU . Buses Data and signals are transmitted between components across internal connections called buses . There are three types of computer bus : The data bus transmits data and instructions between the CPU , memory and other components such as input/output devices . It is bidirectional (data is sent both ways ). The address bus transmits the location in memory that the CPU is accessing . It is unidirectional (one-way ) from the CPU to RAM . The control bus transmits control signals (e.g. 'read ' or 'write ') from the CPU to coordinate other components . It is bidirectional . The FDE Cycle In the Fetch Decode Execute (FDE ) cycle , instructions are fetched from RAM , then decoded (understood) and executed (processed) in the CPU . This cycle is performed by the CPU millions of times every second using the registers and buses explained above. This cycle is how the CPU processes data and instructions for each program or service that requires its attention . CPU Performance The performance of the CPU is affected by three main factors : Clock speed is t he number of cycles per second , so a higher clock speed means more instructions can be executed per second . The number of cores is important as more cores allow a CPU to carry out multiple instructions simultaneously , improving multitasking and parallel processing . Cache memory is small and very fast memory inside the CPU that stores frequently used instructions , reducing the time needed to access RAM . Pipelining Pipelining is the concurrent processing of multiple instructions . An instruction can be fetched while another is decoded and another is executed . This overlapping of instructions increases the overall speed of program execution . Computer Architecture Computer architecture refers to the design and organisation of a system’s components and how they interact . There are two types of architecture to know: Von Neumann architecture uses a single main memory (RAM ) that stores both program instructions and data . Harvard architecture separates the storage of program instructions and data into two different memory locations . You also need to know about c ontemporary (modern) architecture features, which include onboard graphics , performance boosting mode and virtual cores . Q uesto's K ey T erms Components of the CPU: Control Unit - ALU - Registers Registers: PC - MAR - MDR - CIR - ACC Buses: Data bus - Address bus - Control bus FDE Cycle: Fetch stage - Decode stage - Execute stage CPU Performance: Clock speed - Number of cores - Cache memory Pipelining: Pipelining Computer architecture: Von Neumann - Harvard - Contemporary D id Y ou K now? The Apollo Guidance Computer ( AGC ) for NASA's Apollo 11 mission , when humans first set foot on the moon , had a CPU clock speed of about 1 megahertz - slower than many GCSE-level calculators used today. A-Level Topics 1.2 - Types of Processor
- Python | 3b - Simple Calculations | CSNewbs
Learn how to make simple calculations in Python. Try practice tasks and learn through text and images. Perfect for students learning GCSE Computer Science in UK schools. top Python 3b - Simple Calculations Simple Calculations in Python You can perform calculations on numbers in Python using the four main operators : print ( 89 + 47) print ( 89 - 47) print ( 89 * 47) print ( 89 / 47) = 136 42 4183 1.8936170212765957 For addition , use the plus sign + To subtract numbers, use the dash symbol – (but not an underscore _ ) For multiplication , use an asterisk * which can be made by pressing Shift and 8 on a typical keyboard. To divide numbers, use a forward slash / (but not a backslash \ ) Use a string and the calculation to make the output user friendly . print ( "53 x 7 =" , 53 * 7) = 53 x 7 = 371 Simple Calculations Task 1 ( + - * /) Print four different simple calculations, using a different operator ( + - * / ) for each. Make the output user friendly by also showing the calculation (not just the answer). Copy the divide symbol here using Ctrl and C : ÷ Example solution: 18 + 35 = 53 18 - 35 = -17 18 x 35 = 630 18 ÷ 35 = 0.5142857142857142 Using Variables in Calculations You can also perform calculations on variables . The example below has the values of the variables pre-written. You need to store the result in a variable . The total variable has been used to store the result of the multiplication. num1 = 12 num2 = 20 total = num1 * num2 print ( "The total is" , total) = The total is 240 The example below allows the user to input values . num1 = int ( input ( "Enter number one: " )) num2 = int ( input ( "Enter number two: " )) total = num1 + num2 print ( "The to ta l is" , total) Enter number one: 21 Enter number two: 82 The total is 103 = Don't leave the user in the dark, better user interfaces are clear and explain what outputted values mean: num1 = int ( input ( "Enter number one: " )) num2 = int ( input ( "Enter number two: " )) answer = nu m1 - num2 print (num1 , "-" , n um2 , "=" , answer) Enter number one: 83 Enter number two: 29 83 - 29 = 54 = Simple Calculations Task 2 ( Divide by 3) Use an input line with int to ask the user to enter a number . Divide the number by 3 and output the result . Example solution: Enter a number: 11 11 divided by 3 is 3.6666666666666665 Simple Calculations Task 3 ( Add 3 Numbers ) Make three input lines using int to ask the user to enter three numbers . Add the numbers together and output the total . Example solution: Enter the first number: 45 Enter the second number: 32 Enter the third number: 19 The total is 96 ⬅ 3a - Data Types Section 3 Practice Tasks ➡
- 2.4a - Number Systems - OCR GCSE (J277 Spec) | CSNewbs
Learn about how to convert between the denary (decimal), binary and hexadecimal number systems. Based on the J277 OCR GCSE Computer Science specification (first taught from 2020 onwards). Exam Board: OCR 2.4a: Number Systems Specification: J277 Watch on YouTube : Binary and Denary Hexadecimal Number System Ranges Binary to Denary Denary to Binary Binary to Hexadecimal Hexadecimal to Binary Denary to Hexadecimal Hexadecimal to Denary What is binary? By now you should know that computer systems process data and communicate entirely in binary . Topic 2.3 explained different binary storage units such as bits (a single 0 or 1), nibbles (4 bits) and bytes (8 bits). Binary is a base 2 number system. This means that it only has 2 possible values - 0 or 1 . What is denary? Denary (also known as decimal ) is the number system that you've been using since primary school. Denary is a base 10 number system. This means that it has 10 possible values - 0, 1, 2, 3, 4, 5, 6, 7, 8, and 9 . Binary & Denary Convert from binary to denary: Convert from denary to binary: Hexadecimal What is hexadecimal? Hexadecimal is a base 16 number system. This means that it has 16 possible values - 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E and F . Hexadecimal is used as a shorthand for binary because it uses fewer characters to write the same value . This makes hexadecimal less prone to errors when reading or writing it , compared to binary. For example, 100111101011 in binary is 9EB in hexadecimal. Hexadecimal only uses single-character values. Double-digit numbers are converted into letters - use the table on the right to help you understand. Binary to hexadecimal: Hexadecimal to binary: Converting from denary to hexadecimal / hexadecimal to denary To convert from denary to hexadecimal or from hexadecimal to denary , it is easiest to convert to binary first . However, it is possible to convert directly from denary to hexadecimal or directly from hexadecimal to denary . The videos below explain both methods . Denary to hexadecimal: Hexadecimal to denary: Watch on YouTube Watch on YouTube Watch on YouTube Watch on YouTube Watch on YouTube Watch on YouTube Q uesto's Q uestions 2.4a - Number Systems: 1. Explain why hexadecimal numbers are used as an alternative to binary . Use an example . [ 3 ] 2. Convert the following values from binary to denary : a. 00101010 b. 11011011 c. 01011101 d. 11101110 e. 01011111 [1 each ] 3. Convert the following values from denary to binary : a. 35 b. 79 c. 101 d. 203 e. 250 [1 each ] 4. Convert the following values from binary to hexadecimal : a. 11110101 b. 01100111 c. 10111010 d. 10010000 e. 11101001 [1 each ] 5. Convert the following values from hexadecimal to binary : a. C2 b. 8A c. DE d. 54 e. F7 [1 each ] 6. Convert the following values from denary to hexadecimal : a. 134 b. 201 c. 57 d. 224 e. 101 [1 each ] 7. Convert the following values from hexadecimal to denary : a. 32 b. A5 c. 88 d. C0 e. BE [1 each ] Click the banners below to try self-marking quizzes (Google Forms) on these topics. Binary to Denary: Denary to Binary: Binary to Hexadecimal: Hexadecimal to Binary: 2.3 - Data Units Theory Topics 2.4b - Binary Addition & Shifts
- OCR CTech IT | Unit 1 | 3.2 - Virtualisation | CSNewbs
Learn about the benefits and drawbacks of virtualization, as well as about cloud storage and virtual clients. Based on the 2016 OCR Cambridge Technicals Level 3 IT specification. 3.2 - Virtualisation Exam Board: OCR Specification: 2016 - Unit 1 What is virtualisation? Virtualisation is the creation of a virtual version of a device , software , operating system or server . These virtual versions can then be run on a different physical computer system , such as a powerful server . There are many different types of virtualisation . Storage virtualisation combines multiple separate storage devices into acting and appearing like a single , central storage system . Using storage virtualisation improves scalability as further devices can join the storage system if more space is required . It also simplifies the management of storage across the network. Server virtualisation allows one physical server to be divided into and host multiple virtual servers , each running separately . Each virtual server operates independently , handling its own operating system and applications . This allows for resources to be used more effectively and improves the scalability and versatility of the physical server . Client Virtualisation (Virtual Clients) Client virtualisation is when several virtual desktops are run on a single server - think back to the hypervisor from 3.1 . A virtual client is a full desktop environment where the processing happens remotely . For example, where an operating system is managed and hosted centrally but displayed locally on a different computer. These are often known as 'dumb clients ' because the server does the processing for it , meaning it can have minimal resources like a slow processor and little memory / storage . General Benefits & Drawbacks of Virtualisation Benefits of virtualisation: Costs are cheaper in the long-term because money is saved by not purchasing multiple physical devices . Money is also saved due to less cabling and lower power consumption . If set up efficiently, it can be used for higher performance at a lower cost - "Do more with less" . Programs can be tested in a secure environment before main-system deployment. Simplified response to recover after a disaster because only the server needs to be fixed. Drawbacks of virtualisation: If not set up efficiently, users could face serious performance issues , as fewer servers do more work. If a single physical system fails , the impact will be greater . Initial set up is complex , requires technical knowledge and can cost a lot. Easier for hackers to take more information at once as the data is stored in the same place. Benefits of client virtualisation: All data is stored in one central location , making backup and disaster planning easier to manage . The whole system can be managed , secured and updated from the server , rather than from each individual system. Hardware costs will be reduced because the virtual clients do not store or process their own data , meaning they can be of a low spec . Users can have multiple virtual machines and log in remotely (from anywhere with internet access ). Drawbacks of client virtualisation: Users will be unable to work if network connectivity is lost . There is a high strain on the server as the virtual clients do not store or process data themselves . An increased load on the server might result in poor performance for each client, especially with multiple connections . As the data is stored in one location , there are security risks of unauthorised access if the server is not adequately protected . Server Virtual Clients Cloud Technology 'The cloud ' is storage that is accessed through a network , primarily the internet. A cloud server is an example of storage virtualisation as data may be stored across multiple physical devices . There are three different types of cloud storage: Private cloud is where a business will have its own data centre that employees can access. This allows for flexible and convenient data storage and gives the business control over data management and security . Users of the private cloud will not usually have to pay individually for access - but the company will need to spend a lot of money on set up and maintenance . Public cloud uses third-party service providers such as Google Drive or DropBox to provide storage over the internet . Public cloud is usually a pay-for-use service , where businesses will pay for specific amounts that they need. Data management and data security is maintained by the cloud provider and the business is dependent on them providing constant access and deploying effective security measures. Hybrid cloud uses a mix of on-site storage (private cloud) and third-party (public cloud) services . Organisations can move workloads between private and public clouds as their specific needs and costs change . A benefit of hybrid cloud is that it gives an organisation greater flexibility and data storage options. As an example, a company could use on-site or private cloud storage to hold sensitive information and third-party, public cloud services to hold less important data . Q uesto's Q uestions 3.2 - Virtualisation: 1. What is the difference between server and storage virtualisation ? [ 2 ] 2a. What is a virtual client ? [ 1 ] 2b. What are the advantages and disadvantages of client virtualisation ? [ 8 ] 3. Explain any further general advantages and disadvantages of using virtualisation , not covered in your answer to 2b. [4 ] 4. Describe the differences between private , public and hybrid cloud storage. [6 ] 3.1 - Server Types Topic List 3.3 - Network Characteristics
- 2.1 - Logical Operators - Eduqas GCSE (2020 spec) | CSNewbs
Learn about the four logical operators - NOT, AND, OR and XOR - and truth tables. Based on the 2020 Eduqas (WJEC) GCSE specification. 2.1: Logical Operators & Truth Tables Exam Board: Eduqas / WJEC Specification: 2020 + What is a logical operator? Inside of each computer system are millions of transistors . These are tiny switches that can either be turned on (represented in binary by the number 1 ) or turned off (represented by 0 ). Logical operators are symbols used to represent circuits of transistors within a computer. The four most common operators are: NOT AND OR XOR What is a truth table? A truth table is a visual way of displaying all possible outcomes of a logical operator. The input and output values in a truth table must be a Boolean value - usually 0 or 1 but occasionally True or False. NOT A NOT logical operator will produce an output which is the opposite of the input . NOT is represented by a horizontal line . Boolean Algebra Notation written as NOT A A Truth Table AND An AND logical operator will output 1 only if both inputs are also 1 . AND is represented by a full stop. Boolean Algebra Notation written as A AND B A.B Truth Table OR An OR logical operator will output 1 if either input is 1 . OR is represented by a plus. Boolean Algebra Notation written as A OR B A+B Truth Table XOR An XOR (exclusive OR) logical operator will output 1 if the inputs are different and output 0 if the inputs are the same . XOR is represented by a circled plus. Boolean Algebra Notation written as A XOR B A B Truth Table Multiple Operations Exam questions will ask you complete truth tables that use more than one logical operator . Work out each column in turn from left to right and look carefully at which column you need to use. Simplification You may be asked to use a truth table to simplify an expression . This is actually really easy. Once you've completed the truth table see if any columns match the final expression . A+B and A+(A+B) both result in the same values , therefore: A+(A+B) can be simplified as just A+B. Q uesto's Q uestions 2.1 - Logical Operators: 1. Copy and complete the following truth tables: 1b. Simplify the expression in the second truth table. 2a. A cinema uses a computer system to monitor how many seats have been allocated for upcoming movies. If both the premium seats and the standard seats are sold out then the system will display a message. State the type of logical operator in this example. 2b. For the more popular movies, the cinema's computer system will also display a message if either the premium seats or the standard seats have exclusively been sold out. However, it will not output a message when both have been sold out. State the type of logical operator in this example. 1.6 - Additional Hardware 2.2 - Boolean Algebra Theory Topics
- Key Stage 3 | CSNewbs
The homepage for all content aimed at Key Stage 3 students studying Computer Science / IT including computer hardware, Python, App Inventor 2 and Cyber Security. Key Stage 3 Topics These topics are aimed at Year 7 - 9 students (11 - 14 year olds) studying computing. Hardware The Motherboard The CPU Memory Expansion Cards Python Basics 1. The Basics 2. Variables 3. Inputs 4. Calculations 5. Selection 6. Turtle 7. Link to GCSE Python Cyber Security Malware Phishing & Staying Safe Other Topics Desktop Publishing
- 3.8 - Cyber Threats - Eduqas GCSE (2020 Spec) | CSNewbs
Learn about malware such as viruses, worms, trojans, spyware, keyloggers and ransomware. Also, learn about phishing, data theft, interception and cyber attacks including SQL injection, IP address spoofing, DDoS attacks and brute force. Based on the 2020 Eduqas (WJEC) GCSE specification. 3.8: Cyber Threats Exam Board: Eduqas / WJEC Specification: 2020 + 3.8a: Malware What is malware? Malware is any type of harmful program that seeks to damage or gain unauthorised access to your computer system. Virus A virus can replicate itself and spread from system to system by attaching itself to infected files . A virus is only activated when opened by a human . Once activated, a virus can change data or corrupt a system so that it stops working . Worm A worm can replicate itself and spread from system to system by finding weaknesses in software . A worm does not need an infected file or human interaction to spread. A worm can spread very quickly across a network once it has infiltrated it. Trojan A trojan is a harmful program that looks like legitimate software so users are tricked into installing it . A trojan secretly gives the attacker backdoor access to the system . Trojans do not self replicate or infect other files. Spyware Spyware secretly records the activities of a user on a computer. The main aim of spyware is to record usernames, passwords and credit card information . All recorded information is secretly passed back to the attacker to use. Keylogger A keylogger secretly records the key presses of a user on a computer. Data is stored or sent back to the attacker. The main aim of a keylogger is to record usernames, passwords and credit card information . Keyloggers can be downloaded or plugged into the USB port . Ransomware Ransomware locks files on a computer system using encryption so that a user can no longer access them. The attacker demands money from the victim to decrypt (unlock) the data . ? ? ? ? Attackers usually use digital currencies like bitcoin which makes it hard to trace them. 3.8b: Data Theft Phishing Phishing is the method of misleading individuals or organisations into sharing sensitive information (such as passwords or bank details ), often through the use of emails . Phishers may pose as a trusted company like Amazon or YouTube to direct users to open malicious attachments or encourage them to follow fraudulent links to steal their data . Social Engineering Social engineering means to trick others into revealing their personal data by posing as a trusted source . For example, impersonating an IT technician of a school via email and asking for a student's username and password . Interception This is when data packets on a network are intercepted by a third party (e.g. a hacker) and copied to a different location than the intended destination. Software called packet sniffers are used to intercept and analyse data packets. Physical Theft Computer systems (e.g. laptops) or storage devices (e.g. USB stick) may be stolen in public or from offices. Unwanted systems and storage media should be disposed of securely as data could be stolen from discarded information , such as old CDs or even printed paper. 3.8c: Online Threats & Attacks Hacking Hacking is the method of exploiting weaknesses in a system or network to create, view, modify or delete files without permission. A hacker is anyone who gains access to data or systems that they do not have authority to access. DoS Attack A DoS (Denial of Service ) attack is when a computer repeatedly sends requests to a server to overload the system . A server overload will slow the system and may take websites offline temporarily. A DDoS (Distributed Denial of Service ) attack is a coordinated attack using a botnet of infected systems to overload a server with requests . A botnet is a large group of devices controlled and used maliciously by an attacker. SQL Injection SQL ( Structured Query Language ) is a programming language used for manipulating data in databases . A SQL injection is when a malicious SQL query (command) is entered into a data input box on a website. If the website is insecure then the SQL query can trick the website into giving unauthorised access to the website’s database . An SQL injection can be used to view and edit the contents of a database or even gain administrator privileges . ' or 1 = 1 Brute Force Attack In order to break a password , every possible combination is tested in order from start to finish . This is not a quick method but it should break the password eventually and can be sped up if multiple computer systems are used at the same time. IP Address Spoofing An attacker changes the IP address of a legitimate host so any visitors to the URL are instead taken to a spoofed ( fake ) web page . This web page is used to record any inputted data (such as usernames and passwords) and send it back to the attacker . The spoofed web page can also be used to install malware . Q uesto's Q uestions 3.8 - Cyber Threats: 3.8a - Malware: 1. What is malware ? [ 2 ] 2a. Describe three characteristics of a virus . [3 ] 2b. Describe three characteristics of a worm . [3 ] 2c. What is a trojan ? [ 3 ] 2d. Describe how spyware and keyloggers work. [ 4 ] 2e. Explain how ransomware works and why it is difficult to trace attackers . [ 3 ] 2f. In your opinion, which malware do you think is the most dangerous and why ? [ 2 ] 3.8b - Data Theft: 1. Describe what is meant by ' phishing ' . [ 2 ] 2. Give an example of social engineering . [ 2 ] 3. What is interception ? What software is used to intercept data packets? [ 2 ] 4. Describe why systems and storage media should be disposed of securely . [ 1 ] 3.8c - Online Threats & Attacks: 1. Describe what is meant by ' hacking ' . [ 2 ] 2a. Describe what a DoS attack is and its impact . [2 ] 2b. Describe how a DDoS attack is different to a DoS attack . [2 ] 3. Describe what an SQL injection is and how an attacker would use it. [ 4 ] 4. Describe what is meant by a brute force attack . [ 2 ] 5. Describe IP address spoofing and its purpose . [ 3 ] 3.7 - The Internet Theory Topics 3.9 - Protection Against Threats
- 6.6 - Logical Protection | Unit 2 | OCR Cambridge Technicals | CSNewbs
Learn about the methods of digital protection including antimalware, firewalls and obfuscation. Based on the 2016 OCR Cambridge Technicals Level 3 IT specification for Unit 2 (Global Information). 6.6 - Logical Protection Exam Board: OCR Specification: 2016 - Unit 2 Logical protection refers to using digital methods of security to protect computer systems and data. Usernames & Passwords ****** Anti-Malware Usernames must be matched with a secure password to minimise the chances of unauthorised users accessing a system. Passwords should contain a mix of uppercase and lowercase letters , punctuation and numbers . Passwords should be of a substantial length (at least 8 characters) and should be regularly changed . Anti-virus software scans a system and removes viruses . If left to infect a system a virus could delete data or permit access to unauthorised users . Anti-spyware software removes spyware on an infected system so hackers cannot view personal data or monitor users. Organisations should install and regularly update anti-virus and anti-spyware programs. Firewall Encryption Firewalls prevent unauthorised access to or from a network . Firewalls filter data packets and block anything that is identified as harmful to the computer system or network. Firewalls can also be used to block access to specific websites and programs. A firewall can be in the form of a physical device which is connected to the network, or software installed on a computer system. Encryption is the conversion of data ( plaintext ) into an unreadable format ( ciphertext ) so it cannot be understood if intercepted . Encrypted data can only be understood by an authorised system with a decryption key . There are two types of encryption . Encryption at rest is when data is encrypted while it is being stored on a system or storage drive. Encryption in transit is to secure the data as it being transferred between systems on a network. Tiered Levels of Access Obfuscation ?????? The purpose of tiered levels of access is to grant different types of permission to certain users. Managing levels of file access ensures that only authorised people can access and change certain files . There are different levels of file access : No access Read-only - Allows a user to view but not edit. Read/write - Allows a user to view and edit. Obfuscation is when data is deliberately changed to be unreadable to humans but still understandable by computers . Program code might be obfuscated to stop rival programmers from viewing and stealing it if they were able to access it. Specialist software can be used to obfuscate data and convert it back into a human-readable format. Q uesto's Q uestions 6.6 - Logical Protection: 1a. Describe why usernames and strong passwords are necessary. [2 ] 1b. State 3 rules for choosing a strong password . [3 ] 2. Describe the purpose of anti-virus and anti-spyware software. [4 ] 3. Describe the roles of a firewall . [4 ] 4. Explain what encryption is. What are the two types? [4 ] 5. Why would an organisation use tiered levels of access ? What are the 3 levels of file access ? [5 ] 6. What is obfuscation ? State a scenario in which it would be used. [3 ] 6.5 - Physical Protection Topic List
- 3.4 - Stages of Data Analysis | Unit 2 | OCR Cambridge Technicals | CSNewbs
Learn about each of the 8 stages of data analysis including exactly what should occur at every stage. Based on the 2016 OCR Cambridge Technicals Level 3 IT specification for Unit 2 (Global Information). 3.4 - Stages of Data Analysis Exam Board: OCR Specification: 2016 - Unit 2 Data analysis is the process of identifying and collecting data to be viewed and modelled, in the aim of discovering patterns or trends that can be used for conclusions and decision-making. 1. Identify the need Before anything else can take place, objectives are set for what the data analysis will hope to achieve. Aims must be clear and well defined . For example, an organisation should define what information will be needed and what exactly they want to find out by the end of the process (the purpose of the data analysis). Not clearly defining the required information or purpose could lead to worthless results and a waste of the entire data analysis process. 2. Define the scope In this stage the restrictions of the project are defined. Scope includes factors such as budget , content , detail , timescales (deadlines) and any further constraints . 3. Identify potential sources Project planners must identify a wide range of sources for the potential information, ensuring that it is unbiased and covers the objectives . The specific data will depend on the project but it could include sales figures or customer surveys for example. 4. Source and select information Information is gathered from the identified sources in stage three. Any unsuitable data is excluded so that results are not unreliable as poor quality information can lead to numerous negative consequences . Planners will have to determine the accuracy and reliability of any identified sources and select the best . 5. Select the most appropriate tools There are many different data analysis tools that can be used as part of this sequence; in this stage the most appropriate tool for the project is selected. Examples include methods of presentation such as charts and graphs for a visual representation of data . Regression analysis can also be used - regression is the determining of relationships e.g. if the amount spent on advertising bottled water increases, will consumption increase too or are other factors involved? If there is a link, a business can continue to spend more on advertising if consumption and profit also rises. Trend analysis is another option - this shows patterns over time , for example, bottled water consumption each year over the past decade. 6. Process and analyse data Data has now been collected and can be inputted into software such as spreadsheets or databases to further analyse. Putting collected data into a spreadsheet for example allows for analysis to begin as graphs can be created from the data and any patterns or trends discovered. 7. Record and store information The data has been collected and analysed and now any findings are written into a report . Any patterns, trends or findings can be described with statistical evidence generated from the analysis. 8. Share results A report is worthless if not shared with the stakeholders . Sharing can take different forms such as a typed document posted out to stakeholders, an email with major findings summarised or as a post on a website . Q uesto's Q uestions 3.4 - Stages of Data Analysis: 1. List the 8 stages of data analysis in order. [8 ] 2. A supermarket chain called 'Fresh Food UK' wants to complete data analysis to see which stores across the country have been most profitable in the last year . Explain how Fresh Food UK would use each of the 8 stages of data analysis . [16 ] 3.2 & 3.3 - Information Categories Topic List 3.5 - Data Analysis Tools
- OCR CTech IT | Unit 1 | 5.4 - Physical Security | CSNewbs
Learn about methods of physically protecting data such as biometric devices, RFID and tokens, privacy screens and shredding. Based on the 2016 OCR Cambridge Technicals Level 3 IT specification. 5.4 - Physical Security Exam Board: OCR Specification: 2016 - Unit 1 RFID & Tokens Radio-frequency identification (RFID) uses electromagnetic fields to attach tags to physical objects . RFID tags can be embedded within 'dumb' objects such as clothing, packages and even animals. RFID is used with security tokens (such as an ID keycard ) to permit the access of authorised people to certain areas. RFID can be used by IT companies to track equipment and manage access . Shredding This is the cutting up of documents (paper or CDs ) into small pieces so that they cannot be reassembled and read. Sensitive data on paper or optical disc should be shredded when no longer required. Locks A lock can be used to prevent access to server rooms or sensitive data stores . Only authorised personnel with the right key will have access. Physical Security Measures Biometrics Biometric devices require the input of a human characteristic (such a fingerprint , iris or voice scan ). The biometric data is checked against previously inputted data in a database . A match will allow access to the user. See more in section 1.1 . Privacy Screens These plastic screens are placed over a monitor to obscure the screen to anyone except the person sitting directly in front of them. This prevents shoulder surfing and prevents data from being read by unauthorised people nearby. Q uesto's Q uestions 5.4 - Physical Security: 1. Explain how locks can be used as a physical security method within an organisation. [2 ] 2. Explain what RFID is and how it can be used with tokens as a physical security method. [3 ] 3. Explain how biometric devices can be used as a physical security method. [3 ] 4. Explain how privacy screens are used to protect data. [2 ] 5. What is the purpose of shredding ? [2 ] 5.3 - Threats Topic List 5.5 - Digital Security
- OCR CTech IT | Unit 1 | 3.1 - Server Types | CSNewbs
Learn about the role of different server types including file, application, print, email, mail servers and the hypervisor. Based on the 2016 OCR Cambridge Technicals Level 3 IT specification. 3.1 - Server Types Exam Board: OCR Specification: 2016 - Unit 1 What is a server? A server is a powerful dedicated system on a network . It requires increased memory , storage and processing power than traditional computer systems to fulfill its role across the network. Servers need to be scalable - this means they must be adaptable and able to efficiently manage the needs of connected systems if more are added or some are removed . Servers have different roles so a company may use multiple , separate server types within their organisation, each with a specific purpose . Having separate servers is costly but beneficial as if one loses connection , others may still be usable . Also a server will be more efficient if it is only managing one resource (e.g. printers) at a time . File Server A file server centrally stores and manages files so that other systems on the network can access them. The server provides access security , ensuring that only users of the appropriate access level can access files. File servers can be used to automatically backup files , as per the organisation's disaster recovery policy. Using a file server frees up physical storage space within a business and can provide printing services too. Printer Server These servers control any printers on a network and manage printing requests by sending the document to an appropriate printer. Print servers use spooling to queue print jobs so that they are printed when the printer is ready. If a fault occurs with a certain printer, work can be automatically diverted to another available printer. Application Server These servers allow users to access shared applications on a network. All users will be able to access common applications like email software or word processing, but the server will also restrict certain applications to those with invalid access levels (such as hiding financial databases from employees outside of the finance department). Application updates can be simply deployed to the application server only , avoiding individual updates for each system and saving a lot of time . Installers can be hosted on an application server, allowing the software to be easily installed on other connected machines . Database Server These servers manage database software that users on the network can access and use to manipulate data . Data held on the server will be stored in a database accessible from multiple connected computers . The data can be modified using query languages such as SQL. Storing data on a database server, rather than individual computers, is more reliable . A database server for a business also allows for scaling - for example, the database can be increased in size if the customer base grows. Web Server A web server manages HTTP requests from connected devices to display web pages on web browsers . A request (e.g. csnewbs.com) is sent to the web server. The server contains a list of known URLs and their matching IP addresses . The server contacts the server where the web page is held and delivers the web page to the client . Mail Server These servers send and receive emails using email protocols (SMTP & POP) allowing email communication between other mail servers on other networks. The server makes sure emails are delivered to the correct user on the network. Email servers can store company address books making internal communication easier for organisations. The server may have anti-spam functions to reduce junk mail. Hypervisor A hypervisor allows a host machine to operate virtual machines as guest systems. The virtual machines share the resources of the host , including its memory, processing power and storage space. This type of technology is called virtualisation . The guest machines are isolated so if one failed, the other guests and the hosts are not affected - demonstrating good security . The hypervisor optimises the hardware of the host server to allow the virtual machines to run as efficiently as possible. Q uesto's Q uestions 3.1 - Server Types: 1a. What is a server ? Why does it need to be scalable ? [2 ] 1b. Give two reasons why a company may use multiple , separate servers . [2 ] 1c. State the 7 types of server . [1 each ] 2. A medium-sized animation company working on a movie are considering buying a server. Describe each type of server and the different roles they have. a. File Server b. Printer Server c. Application Server d. Database Server e. Web Server f. Mail Server g. Hypervisor [4 each ] 3. What type of technology does a hypervisor use to control multiple virtual machines? [1 ] 2.7 - Protocols Topic List 3.2 - Virtualisation