top of page

Search CSNewbs

286 items found for ""

  • 3.5 - Data Analysis Tools | Unit 2 | OCR Cambridge Technicals | CSNewbs

    3.5 - Data Analysis Tools Exam Board: OCR Specification: 2016 - Unit 2 The fifth stage of data analysis is to select the most appropriate tools to analyse the collected data. The method(s) selected will depend on the type of project and the established objectives. Data Tables Databases are often split into tables to be easier to update , view and manipulate . For example, a supermarket database may include a table of product information, another table of suppliers and another for actual stock levels. Separating the data into tables allows for simpler editing and also allows for the display of basic patterns . For example, looking at a table of stock levels in a supermarket can quickly show which products need to be ordered in as they are close to selling out. ​ Data tables allow for the most simple form of pattern discovery and are a good method of speedy, short-term data analysis . However they present data in its current format and cannot show change or trends over time - a product may have a high stock level because it is popular and has just been ordered in, rather than because no-one is buying it. A simplified data table for a supermarket. Visualisation of Data Visualising data (by producing a chart or graph of collected data for example) makes it easier for an audience to see trends and patterns . Visualising data, like the bar chart to the right of the supermarket table from the tool above, makes it easier to understand and quicker to interpret . In this example, It is easier to see using the chart that steak pies are low in stock and should be re-ordered soon. A bar chart of the supermarket data table. Trend & Pattern Identification This tool links heavily to visualisation of data in allowing trends and patterns to be viewed as a visual format - such as producing a line graph of last year’s stock sales. ​ Statistical analysis allows data analysts to examine numerical data and, if done correctly, can highlight relationships between different data elements - such as the price of a product and how many have been sold. Discovering links between variables is known as regression analysis . Data Cleaning Data cleaning ensures that any stored data is up-to-date and accurate , in accordance with the Data Protection Act ( 2018 ). Forms of data cleaning include removing customers who have not made a purchase in a certain amount of time (e.g. two years) and periodically checking that user addresses are up to date. ​ Data cleaning would reduce the size of any data table by removing redundant, incorrect or unnecessary data . This would make it easier to work with the data table and would improve the data quality by removing erroneous and irrelevant data. GIS / Location Mapping Geographic Information Systems (GIS ) can be used to add geographic data to any analysis. For example, an organisation can track the geographical location of items or staff e.g. tracking the movement of shipping containers around the world to see production flow. This also works for courier services to see delays and delivery times in real-time . Q uesto's Q uestions 3.5 - Data Analysis Tools: ​ 1. Describe how Fresh Food UK, from the question in 3.4 , could use each of the data analysis tools when trying to determine and present the most profitable stores across the country in the past year . ​ a. Data Tables [3 ] b. Visualisation of Data [3 ] c. Trend & Pattern Identification [3 ] d. Data Cleaning [3 ] e. GIS / Location Mapping [3 ] 3.4 - Stages of Data Analysis Topic List 3.6 - Information Systems

  • Python | 8a - Using Lists | CSNewbs

    top Python 8a - Using Lists Lists A list is a series of data in order . Data can be added to and removed from lists so they can change in size (unlike an array which is fixed and not used in Python). ​ It is important to note that each data element in a list has an index so that it can be specifically referenced (to delete it for example) and that indexes start at 0 . A list of the rainbow colours in order would start at 0 like this: Set Up & Add to a List To define a list and its contents, you need to declare the list name and use square brackets to hold its values. ​ An empty list could be defined as below: Now for a specific example for a geography app. ​ If you wanted to create a list with some data elements already inside, then you just need to add them within the square brackets and separate each one with a comma , such as: To add a new entry to the end of a list use the .append() command. Write .append() after the name of your list, with the new data in brackets . For example: To print the list use an asterisk - * - before the list name otherwise it will print it with brackets and apostrophes. Practice Task 1 Create a list named bands and include three of your favourite musicians. ​ Use the .append command to add two more bands to your list. ​ Print the list by writing print(bands) ​ ​ Example solution: Remove Data from a List There are two main ways of removing data from a list. ​ To delete data in a specific position in your list use the .pop() command, with the position in the brackets . For example: In the above example “Sao Paulo” would be removed from the list because it is second in the list (remember 0 is first, and 1 is second in Python). ​ Alternatively, if you want to delete data with a certain value use the .remove() command, with the value in brackets . For example: Practice Task 2 Create a list with five elements and print it. ​ Remove the first and last elements of the list and print it again. Example solution: Printing Lists Type the list name into a print command to output the complete list . Typing an asterisk * before the list name removes punctuation : To print a list line-by-line use a for loop to cycle through each item. 'city' is just a variable name and can be replaced by anything relevant to the context, such as 'colour' in a list of colours or 'names' in a list of people. To print the data elements on the same line then you can use the end command which prevents Python from creating a new line and instead states what should go after each entry. For example, end = “, “ adds a comma and space between each element : To print an element with a certain index , put the index in square brackets . But remember that the index starts at 0 not 1. Practice Task 3 Create a list of at least five breakfast cereals. ​ Print each cereal on a separate line. ​ Then print just the first cereal in a message underneath, using its index. Example solution: Finding the Length To find the length of a list use the len function. You must put the name of the list inside brackets after the len command and save the answer into a variable . For example: If you printed the length in the example above, by writing print(length) , then the program would output: 4 ​ If you wanted to print or delete the last value in a list, then you would need to change the value of the length variable by minus 1 (remember that if a list has 8 entries , then the last one will have the index 7 , not 8). For example, to pop the final entry of a list, you could write the following code: Practice Task 4 Ask the user to enter as many words as they can in 20 seconds. ​ Add each word to a list. ​ When the 20 seconds is up the user has to enter STOP. You do not need to count, the user should be trusted to type STOP . ​ Use the len function to print the first and last words entered - do not count STOP as an entered word. ​ Look back in 'Printing Lists' above at how to print an element using its index - remember to use square brackets, like cities[0]. ​ Extra Challenge: Also print the total number of words entered. Example solution: Sorting Lists The .sort() command will sort elements in a list into alphabetical order (if a string ) or numerical order (if a number ). The .sort() command can be used to sort values in descending order by including reverse = True in the brackets. Practice Task 5 Create a list of at least six names. ​ Sort the list. ​ Print each element on a separate line. Example solution: Searching Through Lists An if statement can be used to see if a certain word appears within a list. Practice Task 6 Use the Pokemon example above to help you. ​ Create a list of five of your friends. ​ Create an input line to ask a user to enter a name. ​ Use an if statement to check if their name is in the list. ​ Print appropriate responses if it is found and if it isn't. Example solution: Calculating the Sum of a List To calculate the sum of a list of numbers there are two methods. Using Python's built-in sum function : numbers = [1,4,2,3,4,5] print ( sum (numbers)) Both methods will result in the same output : 19 Using a for loop to cycle through each number in the list and add it to a total . numbers = [1,4,2,3,4,5] ​ total = 0 for number in numbers: total = total + number print (total) Practice Task 7 Example solution: Ask the user to input 5 numbers and append each to a list. ​ Use the sum command to output the total and the average. Enter a number: 6 Enter a number : 7 Enter a number : 6 Enter a number : 9 Enter a number : 4 The total is 32 The average is 6.4 Extending a List .extend() can be used in a similar way to .append() that adds iterable items to the end of a list . ​ This commands works well with the choice command (imported from the random library ) to create a list of characters that can be randomly selected. ​ The code below adds a lowercase alphabet to an empty list and then, depending on the choice of the user, adds an uppercase alphabet too. The choice command is used in a loop to randomly select 5 characters. Using .extend() to make a random 5-character code from random import choice list = [] list. extend ( "abcdefghijklmnopqrstuvwxyz" ) ​ upper = input ( "Include uppercase letters? " ) if upper == "yes" : list. extend ( "ABCDEFGHIJKLMNOPQRSTUVWXYZ" ) ​ code = "" for number in range (5): letter = choice (list) code = code + letter print ( "Your five character code is" , code) Possible outputs: Include uppercase letters? yes Your five character code is yPfRe Include uppercase letters? yes Your five character code is GJuQw = Include uppercase letters? no Your five character code is gberv Extend treats each character as an indidual item whereas append adds the whole string as a single entity . ​ Most of time append would be used, but extend is suitable for a password program as additional individual characters can be added to a list depending on the parameters (e.g. lowercase letters, uppercase letters, numbers and special characters). list = [] list. extend ( "ABCD" ) list. extend ("EFGH" ) print (list) list = [] list. append ( "ABCD" ) list. append ("EFGH" ) print (list) ['A','B','C','D','E','F','G','H'] ['ABCD' , 'EFGH'] = = Practice Task 8 Use the code above (for a 5-character code ) to help you make a password generator . ​ Ask the user if they want uppercase letters , numbers and special characters and use the extend command to add them to a list of characters if they type yes (you should extend lowercase characters into an empty list regardless, like in the code above). ​ Use a for loop and the choice command (imported from the random library) to randomly generate a 10-character password . Example solutions: Include uppercase letters? yes Include numbers? yes Include special characters? yes Your new password is RjWSbT&gW5 Include uppercase letters? no Include numbers? yes Include special characters? no Your new password is hdf8se9y2w ⬅ Section 7 Practice Tasks 8b - 2D Lists ➡

  • OCR CTech IT | Unit 1 | 1.5 - Communication Hardware | CSNewbs

    1.5: Communication Hardware Exam Board: OCR Specification: 2016 - Unit 1 The devices on this page are used to create or link together networks , allowing data to be sent between computer systems . Hub A hub receives data packets from a connected device and transfers a copy to all connected nodes . Switch A switch receives data packets , processes them and transfers them on to the device s pecifically listed in the destination address of the packet. Modem Modems are used to send data across the telephone network . The telephone lines can only transfer analog signals so a modem is used to convert a computer's digital data into an analog signal . Another modem converts the signal back to a digital format at the receiving end. Router Routers are used to transfer data packets between networks . Data is sent from network to network on the internet towards the destination address listed in the data packet. A router stores the address of each computer on the network and uses routing tables to calculate the quickest and shortest path . Wireless Access Point (WAP) Provides a link between wireless and wired networks . It creates a wireless local area network that allows WiFi enabled devices to connect to a wired network. Combined Device Also known as a hybrid device , this provides the functionality of multiple communication devices (e.g modem, router, switch and/or wireless access point) in a single device . They can be more expensive than a single device but are more adaptable - if the routing part of the device fails it might still be able to function as a switch / wireless access point etc. ​ However, you will see an increased performance from a standalone device rather than a combined one as standalone devices have more complex features (e.g. VPN support). Network Interface Card (Network Adapter) A Network Interface Card (often shorted to NIC ) is an internal piece of hardware that is required for the computer to connect to a network . It used to be a separate expansion card but now it is commonly built directly into the motherboard (and known as a network adapter ). Wireless network interface cards allow wireless network connection. Q uesto's Q uestions 1.5 - Communication Hardware: 1. What is the difference between a hub and a switch ? [2 ] 2. Explain how a modem works. [3 ] 3. Explain the purpose of a router . [2 ] 4. What is a Wireless Access Point (WAP )? [2 ] 5. Describe what is meant by a 'combined device '. Give one advantage and one disadvantage of using a combined device. [3 ] 1.4 - Connectivity 1.6 - Hardware Troubleshooting Topic List

  • Python | Section 9 Practice Tasks | CSNewbs

    top Python - Section 9 Practice Tasks Task One It is the national hockey championships and you need to write the program for the TV channel showing the live games. ​ Let the user enter the name of the first country that is playing. Then let the user enter the name of the second country . Shorten country 1 to the first two letters . Shorten country 2 to the first two letters . Bonus: Display the teams in uppercase . Example solution: Welcome to the National Hockey Championships!!! Enter the first country: Montenegro Enter the second country: Kazakhstan ​ Scoreboard: MO vs KA G Task Two In some places, the letter G is seen as an offensive letter. The government want you to create a program to count how many times the letter G appears in a sentence . ​ Let the user input any sentence that they like. You need to count how many g’s there are. Then print the number of g’s there are. Example solution: Enter your sentence: good day! great golly gosh, got a good feeling! There were 7 instances of that awful letter! Task Three A pet shop has just ordered in a batch of new dog collars with name tags. However, there was a mistake with the order and the tags are too small to display names longer than 6 characters . You need to create a program that checks the user’s dog name can fit. ​ Let the user enter their dog’s name . Calculate the length of their name. Use an if statement to see if it is greater than 6 characters . If it is then print – Sorry but our dog tags are too small to fit that. Otherwise print – Excellent, we will make this dog tag for you. Example solutions: Welcome to 'Dogs and Cats' Pet Shop! What is the name of your dog? Miles Excellent, we will make this dog tag for you! Welcome to 'Dogs and Cats' Pet Shop! What is the name of your dog? Sebastian Sorry, our dog tags are too small! Task Four It’s literacy week and the Head of English would like you to create a vowel checker program to ensure that year 7s are using plenty of vowels in their work. ​ Let the user enter any sentence they like. For each letter in the sentence that they have just entered you need to use if statements to check if it is a vowel . You will need to use the OR operator between each statement to separate them. After the for loop you need to print the number of vowels they have used. Example solution: Enter your sentence: Put that thing back where it came from, or so help me! You used 14 vowels in your sentence. Task Five Remember the national hockey championships? Well, the company that hired you just fired you… Never mind though, a rival scoreboard company want to hire you right away. ​ You need to let the user enter two countries like last time. But this time you don’t want to calculate the first two letters, you want to print the last three letters . Example solution: Welcome back to the National Hockey Championships!!! Enter the first country: Montenegro Enter the second country: Kazakhstan ​ Scoreboard: GRO vs TAN Task Six Too many people are using inappropriate names on Instagram so they have decided to scrap the username and will give you a code instead. The code is the 2nd and 3rd letters of your first name , your favourite colour and then the middle two numbers of the year you were born . ​ Let the user input their name, then their favourite colour and then the year they were born. Using their data, calculate their new Instagram name! Example solution: Welcome to Instagram What is your name? Matthew What is your favourite colour? red Which year were you born in? 1987 Your new profile name is: ATRED98 Task Seven Copy the text on the right and create a program that will split the text at each full stop. Count the number of names in the list. ​ Print the longest name. Example solution: The list contains 20 names The longest name is alexandria annabelle.clara.damien.sarah.chloe.jacques.mohammed.steven.rishi.raymond.freya.timothy.claire.steve.alexandria.alice.matthew.harriet.michael.taylor ⬅ 9b - Number Handling 10a - Open & Write To Files ➡

  • Python | Section 5 Practice Tasks | CSNewbs

    top Python - Section 5 Practice Tasks Task One: Random Numbers Ask the user to input 4 different numbers . ​ Put the four variables in a list with square brackets and use the choice command from section 5a to randomly select one. Example solutions: Enter number 1: 10 Enter number 2: 20 Enter number 3: 30 Enter number 4: 40 The computer has selected 30 Enter number 1: 2023 Enter number 2: 2024 Enter number 3: 2025 Enter number 4: 2026 The computer has selected 2026 Task Two: Logging In You will make a program for logging into a system. Print a greeting then ask the user for their name . Wait 2 seconds then print a simple login message with the user’s name . Then print the current time (current hour and minute ). Example solutions: Welcome to Missleton Bank Please enter your name: Steve Steveson Logging you in Steve Steveson The time is 08:02 Welcome to Missleton Bank Please enter your name: Gracie Jones Logging you in Gracie Jones The time is 15:53 Task Three: Random Wait Generate a random number between 3 and 10 to represent seconds . Print this number then print the current hour, minute and second . ​ Wait for the random number of seconds then print the current time again. Example solutions: The random wait will be 6 seconds. The time is 08:17:57 The time is 08:18:03 The random wait will be 3 seconds. The time is 08:21:39 The time is 08:21:42 Task Four: Independence Checker Create a program that displays how many days three specific countries have been independent for. The user will choose either Fiji , Samoa or Australia and the difference between today's date and the day they become independent will be displayed. ​ Fiji became independent on 10th October 1970 . Samoa became independent on 13th December 1962 . Australia became independent on 1st January 1901 . ​ Use the 'Today's Date ' and 'Between Dates ' parts of Section 5c to help you get today's date , make the other three dates and find the difference . Making Samoa's independence date would be samoadate = date(1962,12,13) for example. Example solutions: Enter FIJI, SAMOA or AUSTRALIA to check how long it has been independent for: AUSTRALIA Australia has been independent for 44822 days. Enter FIJI, SAMOA or AUSTRALIA to check how long it has been independent for: FIJI Fiji has been independent for 19338 days. Task Five: Square Root Create a program that asks the user to enter a whole number . Calculate the square root of the number. Round the answer down to the nearest whole number using the floor command. Example solutions: Enter a number: 156 The rounded down square root is 12 Enter a number: 156 The rounded down square root is 12 ⬅ 5e - More Librarie s 6a - For Loops ➡

  • 3.4 - Hardware & Routing - Eduqas GCSE (2020 spec) | CSNewbs

    3.4: Network Hardware & Routing Exam Board: Eduqas / WJEC Specification: 2020 + Network Devices Hub A hub receives data packets from a connected device and transfers a copy to all connected nodes . Switch A switch receives data packets , processes them and transfers them on to the device specifically listed in the destination address of the packet. Router Routers are used to transfer data packets between networks . Data is sent from network to network on the internet towards the destination address listed in the data packet. A router stores the address of each computer on the network and uses routing tables to calculate the quickest and shortest path . Bridge A bridge joins together two networks that use the same base protocols . For example, a bridge could link together a LAN to another LAN . Wireless Access Point (WAP) Provides a link between wireless and wired networks . It creates a wireless local area network that allows WiFi enabled devices to connect to a wired network. Network Interface Card (NIC) A Network Interface Card (often shortened to NIC ) is an internal piece of hardware that is required for the computer to connect to a network . It used to be a separate expansion card but now it is commonly built directly into the motherboard (and sometimes known as a network adapter ). Wireless network interface cards ( WNIC ) permit a wireless network connection. Routing A routing table is a list of the optimal routes for data packets to be sent from one device to another. ​ Routing tables should be kept accurate and up to date to ensure that packets are transferred as quickly as possible . ​ During routing the lowest cost route is calculated . This is the shortest path with the fastest nodes to transfer data. ​ Below is a simplified network and basic routing table showing the lowest cost (optimal) route using node A as the source address. Q uesto's Q uestions 3.4 - Network Hardware & Routing: 1a. Describe the difference between a hub and a switch . [ 2 ] 1b. Explain how a modem works. [ 2 ] 1c. Describe the purpose of a router . [ 2 ] 1d. Describe the difference between a gateway and a bridge . [ 2 ] 1e. State what WAP stands for and describe its purpose . [ 2 ] 1f. State what NIC stands for and why it is required . [ 2 ] ​ 2a. Describe what a routing table is and why they should be maintained . [ 2 ] 2b. In terms of routing, what does a low-cost route mean? [ 2 ] 2c. Copy and complete the routing table below using node J as the source address . [ 4 ] ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ 3.3 - Network Topology Theory Topics 3.5 - Protocols

  • Python | 10b - Read & Search Files | CSNewbs

    Python 10b - Read & Search Files Reading from a File To read and print from a file you must open it in read mode by typing "r" instead of "a". ​ If you are writing and reading in the same program, make sure you close the file in append mode before you open it in read mode . ​ The program below uses the Customers.txt file from the last section. ​ A simple for loop can be used to print each line of the file. ​ The end = "" code just prevents a space between each line. Practice Task 1 Open one of the files that you used in Section 10a and print each line. Example solution: Reading Specific Lines from a File Sometimes it is necessary only to print certain lines. ​ The following example uses a file where I have written a sentence of advice on each line. The user is asked to enter a number between 1 and 6. ​ If they enter 1, the first line of the file is printed. If they enter 2, the second line of the file is printed etc. ​ Remember Python starts counting everything at 0 so each line is a digit less than you would expect . ​ Square brackets must be used to denote the line to print: [1] not (1). ​ The end = "" code is not necessary but removes space after the line. Practice Task 2 Create a text file (saved in the same folder as your Python file) with a list of video games. ​ Ask the user to enter a number between 1 and 10. ​ Print the line for the number that they input. Example solution: Searching Through Files A for loop is used to search through a file , line by line . ​ First, an input line is used to allow the user to enter their search term . ​ If the term that is being searched for is found, then the whole line is printed. The example below uses a variable named found to state if there is a match when the file is searched. ​ If the search term is found, then the found variable is changed to true . ​ If the search term is not found , the found variable remains as false, so the 'no customers found' statement is printed . Practice Task 3 You should have completed Practice Task 2 from Section 10a (the A Level task). ​ Add extra code to that program so that you can search for specific students. Example solution: ⬅ 10a - Open & Write Files 10c - Remove & Edit Lines ➡

  • 11.1 - Impacts of Technology - Eduqas GCSE (2020 Spec) | CSNewbs

    11.1: Impacts of Technology Exam Board: Eduqas / WJEC Specification: 2020 + What are the issues created by technology? As the use of computers and technological devices continues to rise every year, this increase brings with it a range of different types of issues . Categories of issues described on this page include: ​ Cultural issues Environmental issues Ethical issues Legal & Privacy issues Cultural Issues Culture relates to society and how different parts of the world vary in terms of computer and internet usage . The Digital Divide This term relates to the gap between those people who have access to modern digital technology (such as computers and the internet) and those who have limited access . 'Limited access' could be devices at home or shared devices or having lower-performance (cheaper) computers and low-speed internet connections. ​ The digital divide can be seen in different ways , such as: People in cities vs. People in rural areas . Younger people vs. Elderly people. Developed countries vs. Developing countries. The digital divide is an important ethical issue because digital technologies have led to numerous international benefits including boosted growth , improved product delivery , enhanced communication and increased opportunities . However, this impact is uneven and these positive impacts are mostly occurring in technologically-advanced regions such as North America , Western Europe and Japan . Regions like some nations in Africa and Central Asia have limited digital infrastructure and government instability , leading to poor internet speeds , high costs and limited resources . ​ Discussion Points: What do you think can be done to bridge the digital divide? Whose job is it to bridge the gap? Who will pay for the technology? Changes to Work The internet , the development of new technologies such as cloud storage and increased video communication have transformed the way that many businesses operate across the world. Staff may be able to work from home or access documents collaboratively outside of the traditional workplace, such as cafes or on public transport. ​ Some jobs have moved abroad to save costs, such as help centres for online issues. Tasks can be outsourced to freelancers in other countries where people are content to be paid less for their time and services. For example, some companies will hire temporary web developers from countries such as India to work for them for a lower salary than local workers. ​ Another change to work that technology has brought is the loss of jobs , especially low-skilled jobs such as factory workers that have seen their roles replaced by technology and automation . However, technology has also created millions of new jobs , including installing and maintaining the machines that replace other roles. Environmental Issues Environmental issues concern the natural world and the negative effects of producing , using and discarding computer systems and devices. Energy and Material Consumption In the past 30 years, the number of technological devices has increased astronomically and thousands of new devices are manufactured each day . These devices need to be assembled using a range of materials , including plastics , metals and some rarer elements and need a considerable amount of electrical power to run. Certain systems like web servers and data centres must be powered on all day , every day, which uses a large amount of energy . Pollution and Waste Generating the electricity to power computers creates pollution - an average PC could require up to 50% more energy per year than a fridge. Computers are difficult to recycle and discarded components can lead to land, water and air pollution due to harmful materials , such as lead and mercury , leaking into the environment. ​ Smartphone trends are also negative for the environment as new devices are released yearly , with minor upgrades that people buy to appear fashionable and up-to-date. To lessen the environmental impact, people should reuse and recycle their devices. Ethical Issues Ethics relates to what is considered right or wrong . Often this is subjective - people may have differing opinions on the issue. Drones Uses of drones: Filming and photography for television, movies and special events. Monitoring pollution levels in the atmosphere. Tracking and monitoring wildlife , such as rhino populations in Africa. Disaster zone response , such as searching for survivors following an earthquake. Delivery companies are developing drones to quickly deliver goods across cities. Drones are used by the military to target sites in other countries, such as American soldiers deploying surveillance drones in Syria. ​ Discussion Points: Should you need a licence to buy and fly a drone? Should drones be used to monitor the public? Like flying CCTV? Should drones be used to deliver items? Like Amazon packages? If a drone hits a plane and it crashes, what should the punishment be? A drone is an unmanned aerial vehicle (UAV ) that is remotely operated and can be used for a wide range of purposes. Self-Driving Cars Self-driving cars (also known as autonomous vehicles ) are currently in the development and testing stage with companies like Tesla and Amazon. Benefits of self-driving cars include: In theory, driving will be safer because cars are less likely to make mistakes that humans do and they can’t become distracted or tired . Self-driving cars should be more fuel-efficient because they take the most direct route to destinations and do not get lost. ‘Drivers’ in the car can perform other tasks instead of driving, such as work or planning. Autonomous vehicles could include trucks and vans to automate the delivery and freight industries . Trucks could drive overnight to deliver goods whereas currently, human drivers must take breaks every few hours. Drawbacks of self-driving cars include: Cars could still crash as code and software processes may fail. The technology is still in development and will be very expensive for the first few years when self-driving cars are available to purchase. Jobs may be lost such as delivery and truck drivers whose vehicles are equipped with self-driving technology. Other industries like motorway services and hotels may also be affected. ​ Discussion Points: Would you trust a car to drive itself? Who is to blame if a self-driving car crashes? The car maker? The people in the car? The software writers? What should happen to the people whose jobs are taken by self-driving vehicles? Artificial Intelligence Artificial Intelligence (AI ) is the act of computers replacing humans to analyse data and make decisions . In recent years AI has become more common in the home and on devices like smartphones; assistants such as Siri and Alexa are prime examples of modern home AI. The weather today is cloudy. Benefits of AI include: Processes are sped up as computers can analyse large amounts of data much quicker than a human. AI can be used when a human is unavailable , such as using a symptom checker on the internet for a minor illness rather than booking and waiting for a doctor. Repetitive or time-consuming tasks can instead be completed by a computer , such as searching and sorting scientific data. Drawbacks of AI include: AI can store and process a lot of personal data , especially personal assistants like Alexa which are always listening for ‘wake words’. This data can be viewed by the company that develops it and could be hacked by attackers. AI is programmed by humans and mistakes in code could have disastrous consequences if the AI is used to make important decisions , such as military deployment. ​ Discussion Points: If a robot harms a human who is to blame? The robot? The programmer? The manufacturer? Us? Would you trust a walking, talking robot assistant in your home? Should AI make decisions for us? Legal & Privacy Issues Legal and privacy issues regard laws that have been introduced by the UK government to protect data, systems and networks from unauthorised access . See 11.2 for explanations about important computing legislation in the UK. Loss of Privacy & Hacking There has been a lot of criticism in the last few years about how internet companies and governments are using personal data to invade privacy and track civilians . Facebook was involved in a scandal with using personal data for reasons that were not the original intention. In reverse, WhatsApp and Apple have been criticised for encrypting messages sent by terrorists that police have been unable to track and read. Every week a new company seems to announce that its data has been hacked . Attackers are constantly using botnets and infected systems to crack poorly secured databases and attempting to phish individuals for usernames and passwords. In the past few years, major hacking breaches include Sony, Yahoo and TalkTalk. ​ Discussion Points: Should the UK government be able to see the websites you have visited in the last year? What should happen if a major company is hacked and bank details are stolen? Should they be fined? Pay customers? Prison? Should WhatsApp allow authorities to access encrypted messages? What if they know a terrorist is using it to communicate? Should the UK debate privacy laws before they go into place? Online Crime Unlawfully obtaining personal information and using it for identity theft or fraud . Harassment and threatening others on social media or private messages; blackmail . Cyber attacks are more common - see 3.8 for information about DOS attacks , IP spoofing , SQL injection and more. Sharing copyrighted material such as television programmes, music and video games. Distributing prohibited material such as drugs or weapons on the dark web. ​ See 11.2 for explanations about different laws that have been created to tackle online crime . The increased popularity of the internet and the rising number of users has led to a wave of online crime , taking many different forms, including:​ Q uesto's Q uestions 11.1 - Impacts of Technology: ​ Cultural Impacts 1a. What is the digital divide ? [ 2 ] 1b. Describe 2 examples of how the digital divide can be seen . [ 2 ] ​ 2. Describe in detail 3 ways that technology has changed the way people work . [9 ] ​ Environmental Impacts 1. Describe the different ways that the increasing use of technology negatively impacts the environment . [ 5 ] ​ Ethical Impacts 1a. What is a drone ? [1 ] 1b. Make a list of all of the positive impacts and the negative impacts of using drones . You should have at least 3 on each side. [ 6 ] ​ 2. Describe 2 benefits of using self-driving cars and 2 negative consequences . [4 ] ​ 3. Describe how artificial intelligence can be used for good . [ 2 ] ​ Legal & Privacy Impacts 1. A hack on a bank has occurred. Describe what you think the impacts would be on the following groups of people: a. The customers . b. The bank managers . c. The general public . [ 6 ] ​ 2. Describe 4 different types of online crime . [ 8 ] 10.3 - Programming Errors Theory Topics 11.2 - Legislation

  • 1.4 - Secondary Storage - Eduqas GCSE (2020 spec) | CSNewbs

    1.4: Secondary Storage & Data Units Exam Board: Eduqas / WJEC Specification: 2020 + Secondary storage (also known as backing storage ) is non-volatile storage used to save and store data that can be accessed repeatedly. ​ ​ Secondary storage is not directly embedded on the motherboard (and possibly even external ) and therefore further away from the CPU so it is slower to access then primary storage . Storage Characteristics: ​ CAPACITY : The maximum amount of data that can be stored. DURABILITY : The physical strength of the device, to withstand damage. PORTABILITY : How easy it is to carry the device around. ACCESS SPEED : How quickly data on the device can be read or edited . COST : The average price it costs to purchase a storage device. Magnetic Storage Optical Storage A magnetic hard disk drive (HDD ) is the most common form of secondary storage within desktop computers. A read/write head moves nanometres above the disk platter and uses the magnetic field of the platter to read or edit data. An obsolete (no longer used) type of magnetic storage is a floppy disk but these have been replaced by solid state devices such as USB sticks which are much faster and have a much higher capacity. Another type of magnetic storage that is still used is magnetic tape . Magnetic tape has a high storage capacity but data has to be accessed in order (serial access ) so it is generally only used by companies to back up or archive large amounts of data . Optical storage uses a laser to project beams of light onto a spinning disc, allowing it to read data from a CD , DVD or Blu-Ray . ​ This makes optical storage the slowest of the four types of secondary storage. ​ Disc drives are traditionally internal but external disc drives can be bought for devices like laptops. Magnetic Storage Characteristics: ​ ✓ - Large CAPACITY and cheaper COST per gigabyte than solid state . ​ X - Not DURABLE and not very PORTABLE when powered on because moving it can damage the device. ​ X - Slow ACCESS SPEED but faster than optical storage . ​ Optical Storage Characteristics: ​ X - Low CAPACITY : 700 MB (CD ), 4.7 GB (DVD ), 25 GB (Blu-ray ). X - Not DURABLE because discs are very fragile and can break or scratch easily. ✓ - Discs are thin and very PORTABLE . Also very cheap to buy in bulk. ​ X - Optical discs have the Slowest ACCESS SPEED . ​ ​ Magnetic Disks are spelled with a k and Optical Discs have a c. Solid State Storage Cloud Storage There are no moving parts in solid state storage. SSD s (Solid State Drives ) are replacing magnetic HDDs (Hard DIsk Drives) in modern computers and video game consoles because they are generally quieter , faster and use less power . ​ A USB flash drive ( USB stick ) is another type of solid state storage that is used to transport files easily because of its small size. ​ Memory cards , like the SD card in a digital camera or a Micro SD card in a smartphone , are another example of solid state storage. When you store data in 'the cloud', using services such as Google Drive or Dropbox, your data is stored on large servers owned by the hosting company . The hosting company (such as Google) is responsible for keeping the servers running and making your data accessible on the internet . ​ Cloud storage is very convenient as it allows people to work on a file at the same time and it can be accessed from different devices. However, if the internet connection fails , or the servers are attacked then the data could become inaccessible . Solid State Characteristics: ​ X - High CAPACITY but more expensive COST per gigabyte than magnetic . ​ ✓ - Usually DURABLE but cheap USB sticks can snap or break . ​ ✓ - The small size of USB sticks and memory cards mean they are very PORTABLE and can fit easily in a bag or pocket. ​ ✓ - Solid State storage has the fastest ACCESS SPEED because they contain no moving parts . Cloud Storage Characteristics: ​ ✓ - Huge CAPACITY and you can upgrade your subscription if you need more storage. ​ ✓ / X - Cloud storage is difficult to rank in terms of PORTABILITY , DURABILITY and ACCESS SPEED because it depends on your internet connection. A fast connection would mean that cloud storage is very portable (can be accessed on a smartphone or tablet) but a poor connection would make access difficult . ​ ✓ - Cloud storage is typically free for a certain amount of storage. Users can then buy a subscription to cover their needs - Dropbox allows 2 GB for free or 2 TB for £9.99 a month. Data Storage Units 0 / 1 All data in a computer system is made up of bits . ​ A single bit is a 0 or a 1 . 4 bits (such as 0101 or 1101) is called a nibble . 1,024 bytes is called a kilobyte . ​ A kilobyte can store a short email . A 8 bits is called a byte . A byte can store a single character . 1,024 kilobytes is called a megabyte . ​ A megabyte can store about a minute of music . 1,024 megabytes is called a gigabyte . ​ A gigabyte can store about 500 photos . 1,024 terabytes is called a petabyte . ​ A petabyte can store about 1.5 million CDs . 1,024 gigabytes is called a terabyte . ​ A terabyte can store about 500 hours of films . More data storage units: 1,024 petabytes is called a exabyte . 1,024 exabytes is called a zettabyte . 1,024 zettabytes is called a yottabyte . Q uesto's Q uestions 1.4 - Secondary Storage: ​ 1. Rank magnetic , optical and solid-state storage in terms of capacity , durability , portability , speed and cost . For example, magnetic has the highest capacity , then solid-state, then optical. This could be completed in a table . [15 ] ​ 2. Justify which secondary storage should be used in each scenario and why it is the most appropriate: a. Sending videos and pictures to family in Australia through the post . [ 2 ] b. Storing a presentation to take into school . [ 2 ] c. Storing project files with other members of a group to work on together . [ 2 ] d. Backing up an old computer with thousands of files to a storage device. [ 2 ] 3. Put the following data storage units in order from smallest to largest : a . kilobyte - gigabyte - byte - megabyte - nibble - bit [3 ] b. gigabyte - petabyte - kilobyte - exabyte - terabyte - megabyte [ 3 ] 1.3 - Primary Storage 1.5 - Performance Theory Topics

  • Python | 3a - Data Types | CSNewbs

    top Python 3a - Data Types Data Types in Python If you are a Computer Science student you need to know about the different data types that are used in programming. ​ ​String – A sequence of alphanumeric characters (e.g. “Hello!” or “Toy Story 4” or “Boeing 747” ) Integer – A whole number (e.g. 1470 or 0 or -34) Float (also called Real ) – A decimal number (e.g. -32.12 or 3.14) Boolean – A logical operation (True or False) Character – A single alphanumeric character (e.g. “a” or “6” or “?”) [ Not used in Python as it would just be a string with a length of 1] Converting to Another Data Type Converting a variable from one data type to another is called casting . Casting Commands ​ str (variable_name) converts a variable to a string . ​ int (variable_name) converts a variable to a integer . ​ float (variable_name) converts a variable to a float (decimal number). An integer (or float ) value may be cast into a string so that it can be used with + as part of a sentence to avoid spaces . total = 45 print ( "You owe £" , total , "in total." ) print ( "You owe £" + str (total) , "in total." ) = You owe £ 45 in total. You owe £45 in total. When dividing an integer the answer is automatically given as a decimal number (float ), even if it is .0 (e.g. 10 / 2 would give 5.0). ​ Casting a float (also known as real) number into an integer using int() will remove the decimal . total = 100/10 print ( "The answer is" , total ) print ( "The answer is" , int(total) ) The answer is 10.0 The answer is 10 = Data Types Task 1 ( Time) Write an input line with int to ask the current hour . Write another input line with int to ask the current minute . ​ Write a print line with str() that outputs this as a clock time. Example solution: What is the hour? 12 What is the minute? 44 The time is 12:44 Data Types Task 2 ( Decimal ) Write an input line with int to ask for any number . ​ Use float() in a print line to output number as a decimal. Example solution: Enter any number: 456 456.0 ⬅ Section 2 Practice Tasks 3b - Simple Calculations ➡

  • 2.3 - Software Development Methodologies | OCR A-Level | CSNewbs

    Exam Board: OCR 2.3: Software Development Methodologies Specification: A-Level 2015 An instruction set is a list of all the instructions that a CPU can process as part of the FDE cycle . ​ CPUs can have different sets of instructions that they can perform based on their function. The two most common instruction sets are the simpler RISC (Reduced Instruction Set Computer ) and more complicated CISC (Complex Instruction Set Computer ). Instruction Sets This page is still being updated. Graphical Processing Unit What is cache memory? ​ Cache memory is temporary storage for frequently accessed data . ​ Cache memory is very quick to access because it is closer to the CPU than other types of memory like RAM . Multicore & Parallel Systems What is cache memory? ​ Cache memory is temporary storage for frequently accessed data . ​ Cache memory is very quick to access because it is closer to the CPU than other types of memory like RAM . Multicore & Parallel Systems What is cache memory? ​ Cache memory is temporary storage for frequently accessed data . ​ Cache memory is very quick to access because it is closer to the CPU than other types of memory like RAM . Q uesto's Q uestions 2.3 - Software Development Methodologies: ​ 1. What is cache memory ? [ 2 ] ​ 2.2b - Translators & Compilation Theory Topics 2.4a - Programming & Pseudocode

  • OCR CTech IT | Unit 1 | 1.6 - Hardware Troubleshooting | CSNewbs

    1.6 - Hardware Troubleshooting Exam Board: OCR Specification: 2016 - Unit 1 What is troubleshooting? Troubleshooting means to analyse and solve a problem with a computer system. Hardware troubleshooting refers to fixing an issue with the physical parts of the computer or any connected devices. ​ Hardware issues might occur as a result of damage (intentional or accidental), power surges or malware . Steps to Take When an Error Occurs Try to identify the problem by looking for the simplest explanation first (e.g. checking the power supply) and ask the user questions about the issue. Create a theory about what the cause of the problem could be and prepare to test the theory using a series of troubleshooting tests . Create a troubleshooting plan and record the steps that are taken before moving on to the next test. Check the system works after each stage of the plan. Create a findings document that explains if and how the problem was fixed, for future reference if the problem occurs again. Documentation Technicians and help desk (see 3.5 ) staff should document , on a fault sheet , the following information regarding the issue: The fault itself (such as 'system not turning on'). The system in question. The user logged in at the time. Exact date & time the problem occurred. Symptoms of the issue (such as 'slow load times' or 'beeping'). Problem history - checking if it has happened to this system before. Back up documentation - Whether the data been backed up recently. Troubleshooting Tools The following tools can be used to identify an error so a technician has a greater understanding of the problem. Event Viewer Event Viewer is a type of utility software that lists detailed information about an error when one occurs. It can be used to work out how to fix the issue and will display both minor and major faults. Power On Self Test (POST) On start-up, a power on self test (POST) checks memory, power, hardware and cooling systems are all working properly. Beep codes signal if an error has been detected; 1 beep will sound for no error but if multiple beeps are heard then an error has been discovered. Ping Test This is a connectivity test between two computers. A message is sent to the destination computer and waits for a return message named the echo reply . This procedure can be repeated with other systems until the source of the problem is identified from a computer that does not reply . Q uesto's Q uestions 1.6 - Hardware Troubleshooting: ​ 1. Summarise the 'Steps to Take when an Error Occurs ' section into your own top three tips for what to do when a hardware error happens . [3 ] ​ 2. List 6 pieces of information that an IT technician should record when a hardware error has occurred . [6 ] ​ 3. Briefly explain the purpose of three troubleshooting tools . [6 ] 1.5 - Communication Hardware 1.7 - Units of Measurement Topic List

bottom of page