top of page

Search CSNewbs

304 results found with an empty search

  • 6.1b - Legislation - OCR GCSE (J277 Spec) | CSNewbs

    Learn about key computing laws including the Data Protection Act (2018), Computer Misuse Act (1990), Copyright, Designs and Patents Act (1988) and software licences. Based on the J277 OCR GCSE Computer Science specification (first taught from 2020 onwards). Exam Board: OCR 6.1b: Legislation Specification: J277 Watch on YouTube : Data Protection Act Computer Misuse Act Copyright, Designs & Patents Act Open Source Licence Proprietary Licence Data Protection Act (2018) In 2018 the European Union introduced GDPR (General Data Protection Regulation ) to protect the privacy of data for people in the EU. The UK matched this by updating the Data Protection Act introduced in 1998 to become the Data Protection Act (2018) . This act protects the data of individuals that is stored on computers and processed by organisations. How the Data Protection Act works: Each person who has their data stored is known as a data subject . An employee within an organisation must be appointed as a data controller and it is they who are responsible for registering with the Information Commissioner . The Information Commissioner is the person in the UK who is responsible for managing several laws , most significantly the Data Protection Act. When registering with the Information Commissioner, the organisation's data controller must be clear on exactly: What information they are collecting, Why it is being collected, What the data will be used for . The six principles of the Data Protection Act state that data must be: 1. Collected lawfully and processed fairly. 4. Data must be accurate and up-to-date. 2. Only used for the reasons specified. Principles of the Data Protection Act (2018) 5. Data must not be stored for longer than necessary, 3. Data must be relevant and not excessive. 6. Data must be stored and processed securely. Computer Misuse Act (1990) This act was introduced as computers became cheaper and more common at home and work . The act attempts to stop and punish those who use computers inappropriately . Breaking any of the three principles could result in fines and a jail sentence but only if it can be proved it was done on purpose and not by accident. The Computer Misuse Act (1990 ) includes three main principles : 1. No unauthorised access to data. Example: Hacking a computer system. 2. No unauthorised access to data that could be used for further illegal activities. Example: Accessing personal data to use as blackmail or identity theft. 3. No unauthorised modification of data. Example: Spreading a virus to change data. Copyright, Designs & Patents Act (1988) This act makes it a criminal offence to copy work that is not your own without the permission of the creator or the copyright holder. This can refer to text, images, music, videos or software. Owning the copyright of an image might not prevent others from copying and using it but this act means that the owner can bring legal proceedings in court to those who have stolen their work . However, it is difficult to trace who has stolen work once it has been uploaded to the internet and copies can easily spread, especially television shows and movies. This act specifically prohibits the following actions: Making copies of copyrighted material to sell to others . Importing and downloading illegally copied material (except for personal use). Distributing enough copyrighted material to have a noticeable effect on the copyright holder . Possessing equipment used to copy copyrighted material , as part of a business. Software Licences A software licence refers to how a user can legally use the software , there are two main types: Open Source Licence Source code is the software code written by programmers . If the software is open source it means that users can view and modify the source code . Linux, Python and Firefox are examples of open source software. Benefits Drawbacks Because the source code is available to edit , it can be customised to the organisation's needs . Often shared in the public domain so users can work together to modify, debug and improve a product. Unwanted features can be removed to make the software run faster . There are security risks - some editors may add malicious code to the program. Open source software is often low in price and sometimes free. It may be difficult to receive support as development is often distributed between people in different locations. The code may be prone to errors as it may not have been tested fully. It requires technical skills to be able to adapt source code efficiently and to maintain the code . Proprietary Licence Another term for a proprietary licence is closed source because the code is restricted - users are prevented from being able to view or modify the source code . You buy the right to use the software but you don't actually own it. Microsoft Office, Fortnite and Spotify are examples of closed source software. Benefits Drawbacks The code is well tested and has been professionally developed. Updates will generally be secure . Users must rely on the company to provide updates and fix issues. This might be infrequent or stop completely. The company can be held to account if it does not perform as listed in the terms and conditions upon purchase. Often not free and may be expensive. Most developers will provide some form of help/support . Users cannot modify, debug or improve the code for their own benefit. Q uesto's Q uestions 6.1b - Legislation: 1a. State the 6 principles of the Data Protection Act (2018) . [ 6 ] 1b. Explain how the Data Protection Act works . In your answer, you should include definitions of a data subject , the data controller and the Data Commissioner . [ 6 ] 2. Describe the 3 principles of the Computer Misuse Act (1990) . [3 ] 3a. What is the purpose of the Copyright, Designs & Patents Act (1988) ? [ 2 ] 3b. Describe 3 actions that CDPA (1988) prohibits . [ 3 ] 4a. Describe the difference between an open source and a proprietary licence . [ 2 ] 4b. State two benefits and two drawbacks of using software with a: Open source licence [ 4 ] Proprietary licence [ 4 ] 6.1a - Impacts of Technology Theory Topics

  • 4.1 - Security Threats - OCR GCSE (J277 Spec) | CSNewbs

    Learn about different forms of cyber attacks online including malware, SQL injection, DoS attacks and social engineering. Based on the J277 OCR GCSE Computer Science specification (first taught from 2020 onwards). 4.1: Security Threats Exam Board: OCR Specification: J277 Watch on YouTube : Malware Social Engineering, Brute-Force & DoS Interception & SQL Injection Types of Malware Malware is any type of harmful program that seeks to damage or gain unauthorised access to your computer system. Virus A virus can replicate itself and spread from system to system by attaching itself to infected files . A virus is only activated when opened by a human . Once activated, a virus can change data or corrupt a system so that it stops working . Worm A worm can replicate itself and spread from system to system by finding weaknesses in software . A worm does not need an infected file or human interaction to spread. A worm can spread very quickly across a network once it has infiltrated it. Trojan A trojan is a harmful program that looks like legitimate software so users are tricked into installing it . A trojan secretly gives the attacker backdoor access to the system . Trojans do not self replicate or infect other files. Spyware Spyware secretly records the activities of a user on a computer. The main aim of spyware is to record usernames, passwords and credit card information . All recorded information is secretly passed back to the attacker to use. Keylogger A keylogger secretly records the key presses of a user on a computer. Data is stored or sent back to the attacker. The main aim of a keylogger is to record usernames, passwords and credit card information . Keyloggers can be downloaded or plugged into the USB port . Ransomware Ransomware locks files on a computer system using encryption so that a user can no longer access them. The attacker demands money from the victim to decrypt (unlock) the data . ? ? ? ? Attackers usually use digital currencies like bitcoin which makes it hard to trace them. SQL Injection SQL ( Structured Query Language ) is a programming language used for manipulating data in databases . A SQL injection is when a malicious SQL query (command) is entered into a data input box on a website. If the website is insecure then the SQL query can trick the website into giving unauthorised access to the website’s database . An SQL injection can be used to view and edit the contents of a database or even gain administrator privileges . DoS Attack A DoS (Denial of Service ) attack is when a computer repeatedly sends requests to a server to overload the system . A server overload will slow the system and may take websites offline temporarily. A DDoS (Distributed Denial of Service ) attack is a coordinated attack using a botnet of infected systems to overload a server with requests . A botnet is a large group of devices controlled and used maliciously by an attacker. Brute-Force Attack Every possible combination is tested in order from start to finish . This is not a quick method but it should break the password eventually and can be sped up if multiple computer systems are used at the same time. Social Engineering Social engineering means to trick others into revealing their personal data by posing as a trusted source . For example, impersonating an IT technician of a school via email and asking for a student's username and password . Data Interception This is when data packets on a network are intercepted by a third party (e.g. a hacker) and copied to a different location than the intended destination. Software called packet sniffers are used to intercept and analyse data packets. Q uesto's Q uestions 4.1 - Security Threats: 1. What is malware ? [ 2 ] 2a. Describe three characteristics of a virus . [3 ] 2b. Describe three characteristics of a worm . [3 ] 2c. What is a trojan ? [ 3 ] 2d. Describe how spyware and keyloggers work. [ 4 ] 2e. Explain how ransomware works and why it is difficult to trace attackers . [ 3 ] 2f. In your opinion, which malware do you think is the most dangerous and why ? [ 2 ] 3. Describe what an SQL injection is and how an attacker would use it. [ 3 ] 4a. Describe what a DoS attack is and its impact . [2 ] 4b. Describe how a DDoS attack is different to a DoS attack . [2 ] 5a. Describe a brute-force attack. [ 2 ] 5b. Describe social engineering and give an example of when it might be used . [2 ] 5c. Describe interception . [2 ] 3.2b - Protocols & Layers Theory Topics 4.2 - Preventing Vulnerabilities

  • Greenfoot Guide #6 | Counter | CSNewbs

    Learn how to add a counter to Greenfoot to keep track of the score. Learn how to add and subtract points to the counter. Part 6 of the Greenfoot Tutorial for the Eduqas / WJEC GCSE 2016 specification. 6. The Counter Greenfoot Tutorial 1. Import the Counter The counter class can be imported into your Greenfoot world. Select Edit in the main Greenfoot window then ' Import Class... ' and choose Counter . Watch on YouTube: The Counter class will appear in the Actor classes list . Right-click on the Counter, choose the ' new Counter() ' option and drag it into the world. Now right-click on the background and select 'Save the World' once you have dragged the counter into the world. 2. Increase the Counter by 1 Two lines of code are required to increase the counter . Add this code when your main character is removing the collectible object . This code allows your main character to access the 'add' method from the Counter class . The method 'add ' just increases the value of the counter by the number in the brackets . To decrease the counter , type a negative value in the brackets, such as -1 . < Part 5 - Play Sounds 3. Compile and Run Click the Compile button at the top of the code editor . Then you can go back to the main Greenfoot window and click Run to test if your counter increases . Click on me if you've got an error that you're stuck with. Part 7 - Extension Ideas >

  • 3.2b - Protocols & Layers - OCR GCSE (J277 Spec) | CSNewbs

    Learn about the different protocols used on networks - HTTP, HTTPS, TCP, IP, FTP and SMTP. Also learn about protcol layers in the 4-layer TCP/IP model. Based on the J277 OCR GCSE Computer Science specification (first taught from 2020 onwards). 3.2b: Protocols & Layers Exam Board: OCR Specification: J277 Watch on YouTube : IP & MAC Addresses Protocols & Standards Common Protocols Protocol Layers Protocols A protocol is a set of rules that allow devices on a network to communicate with each other . TCP / IP (Transmission Control Protocol / Internet Protocol) TCP / IP is actually two separate protocols that combine together. TCP is a protocol that allows packets to be sent and received between computer systems. It breaks the data into packets and reorders them back into the original data at the destination. IP is a protocol in charge of routing and addressing data packets . This ensures data packets are sent across networks to the correct destination . It is also an addressing system - every device on a network is given a unique IP address so data packets can be sent to the correct computer system. HTTP is used to transfer web pages over the Internet so that users can view them in a web browser . All URLs start with either HTTP or HTTPS (e.g. https://www.csnewbs.com). HTTPS is a more secure version of HTTP that works with another protocol called SSL ( Secure Sockets Layer ) to transfer encrypted data . You should see a padlock symbol in the URL bar if your connection to that website is secure. HTTP/HTTPS (Hypertext Transfer Protocol) Transfer Protocols FTP ( File Transfer Protocol ) is used to transfer files across a network. It is commonly used to upload or download files to/from a web server . SMTP ( Simple Mail Transfer Protocol ) is a protocol used to send emails to a mail server and between mail servers . POP ( Post Office Protocol ) and IMAP (Internet Message Access Protocol ) are both protocols for receiving and storing emails from a mail server. POP will delete an email from the email server once it has been downloaded to a device . Pop! IMAP syncs the message with an email server so it can be accessed by different devices . IP Address & MAC Address There are two versions of IP addressing currently used - IPv4 and IPv6 . IPv4 is a 32-bit address , represented in denary , that allows for over 4 billion unique addresses . It has four 8-bit segments of denary values (from 0 to 255) separated by full stops . IPv4 example: 145.13.218.102 IPv6 is a 128-bit address , represented in hexadecimal , that allows for an undecillion unique addresses . It has eight 16-bit segments of four hexadecimal values (0000 - FFFF), separated by colons . IPv6 example: 736E:1029:A4B3:902D:77B2:72FF:AE62:0912 A MAC address is a unique hexadecimal number assigned to each network interface card/controller inside a networked device such as a router or laptop . A MAC address is a 48-bit address made up of six 8-bit pairs in hexadecimal , separated by dashes . While an IP address may change , the MAC address can’t be changed . MAC stands for Media Access Control . Network Interface Card (NIC) MAC example: 19-C2-D1-47-AA-38 Networking Standards Networking standards are rules that allow computer systems to communicate across networks . Standards have been created to ensure devices can exchange data and work together by interpreting signals in the same way , regardless of the manufacturer . TCP/IP Stack & Layers What is TCP/IP? TCP/IP (Transmission Control Protocol / Internet Protocol ) is a set of protocols that operate on different layers . These two protocols are used together to allow computers to communicate on a network . What is a protocol layer? A layer is a division of network functionality - each layer provides a specific function to assist the transmission of the data that is being sent. TCP/IP is split into four layers (named Application , Transport , Internet and Link ). Important Note: You do not need to know any layer names or the purpose of any specific layers in the OCR GCSE J277 specification , just what layers are and why they’re used . Why are protocol layers used? Layers are self-contained , so they allow different developers to concentrate on one aspect of the network at a time . A layer can be taken out and edited without affecting other layers . Protocol layers are used to visualise the different parts of a network , as each of the four layers of TCP/IP has a specific role and is associated with different protocols . Protocols are broken down into well-defined , specific layers to simplify design , making it easier to identify errors (known as troubleshooting ). Each layer uses specific protocols , so layering ensures these protocols are applied in a specific order . This process uses abstraction and layers only communicate with adjacent layers for easy compatibility . Q uesto's Q uestions 3.2b - Protocols & Layers: 1. Describe each of the following protocols . It might be helpful to also draw an icon or small diagram for each one: a. TCP [ 2 ] b. IP [ 2 ] c. HTTP & HTTPS [ 3 ] d. FTP [ 2 ] e. SMTP [ 2 ] f. POP3 & IMAP [ 2 ] 2. State which protocol would be used in the following scenarios : a. Transferring a music file to a friend over the internet. [ 1 ] b. Sending an email to a family member in America. [ 1 ] c. Using a webpage to enter a password securely. [ 1 ] d. Receiving an email from a bank. [ 1 ] 3a. What are networking standards ? [ 2 ] 3b. What is TCP/IP ? [ 2 ] 3c. What is a protocol layer ? [ 2 ] 3d. Give at least two reasons why protocols are split into layers . [ 4 ] 3.2a - Wired & Wireless Networks Theory Topics 4.1 - Security Threats

  • Memory | Key Stage 3 | CSNewbs

    Learn about the three main types of memory in a computer system - RAM (Random Access Memory), ROM (Read Only Memory) and Cache Memory. Memory What is memory? Memory is where a computer stores information , instructions and data so it can use them quickly when needed . There are three main types of memory : RAM Random Access Memory ROM Read Only Memory Cache Memory What is Random Access Memory? RAM is volatile (this means that when power is lost, the data is deleted ). Every program that is being run by the computer (such as Google Chrome, Spotify or Microsoft Word) is stored in RAM . RAM is made up of a large number of storage locations , and each is identified with a unique address . What is Read Only Memory? ROM is non-volatile (this means that data is saved, even when the power is off ). The start-up instructions (for when a computer is switched on ) are stored in ROM . ROM is read-only, which means that it cannot be edited or changed . What is Cache Memory? Cache memory is fast to access because it is built into the CPU (or very close to it) . Cache memory stores data that needs to be accessed very frequently . Cache memory is very expensive , so there is only a small amount in most computers. How can a computer run faster? There are many reasons why a computer may be running slowly . Here are some methods related to memory that can help speed up a system : Close unnecessary programs to free up RAM so it doesn't run out of memory space . Add more RAM so the computer can run more programs at once without slowing down . Increase the cache size so the CPU can access important data more quickly . KS3 Home Note: Only larger systems like desktop computers can have their components easily upgraded and replaced.

  • OCR CTech IT | Unit 1 | 2.2 - Applications Software | CSNewbs

    Learn about the different types of applications software including productivity programs, business tools and IDEs. Based on the 2016 OCR Cambridge Technicals Level 3 IT specification. 2.2: Applications Software Exam Board: OCR Specification: 2016 - Unit 1 What is applications software? Don't confuse applications software and apps . Apps generally have a single purpose , such as a game like Angry Birds or the torch tool on a phone. Applications software can be used for a number of different functions depending on the user's needs and their purpose. Productivity Software This is general use software for completing a range of tasks accurately and efficiently . Key examples include word processors (e.g. Microsoft Word or Google Docs), presentation software (e.g. Microsoft PowerPoint or Google Slides) and web browsers (e.g. Microsoft Edge or Google Chrome). Email applications (e.g. Microsoft Outlook or Gmail) are beneficial to organisations because staff can send information to many customers at once which is a simpler and less costly method of communication than something like sending letters or leaflets in the mail. Emails can also include attachments of important documents and include multimedia elements like images and videos to make communication more interesting . Databases and Spreadsheets Database tables and spreadsheets can store both numerical and textual data ready for analysis . Examples include simple database tables and financial spreadsheets of a company's profits each year. Microsoft Access is an example of database software that uses tables of records and Microsoft Excel is an example of spreadsheet software . Data can be sorted numerically or alphabetically for both software types but graphs can be created from spreadsheets to visualise data . When using spreadsheets (or databases) records can be locked ('record locking' ) so that only one person can make edits to a specific record at any one time. Edits will be saved before unlocking the file. This will stop data being incorrectly overwritten and will ensure that the data in the spreadsheet is up-to-date, accurate and fit for purpose. Development Tools These are tools for programmers who are creating or modifying software . An integrated development environment ( IDE ) is software used to create , edit and debug (fix) programs . An IDE features a number of tools , including: A source code editor to type program code into. It may contain features such as error highlighting and automatic formatting . Because IDEs use high-level languages like Python or Java , a translator is required to convert the source code into machine code ( binary ) so that it can be understood and processed by the CPU . A compiler is a type of translator that converts instructions into machine code (binary) in one go . An interpreter is a type of translator that converts instructions into machine code (binary) line by line . A debugger is used to test code and display errors . Other development tools aid programmers with developing and maintaining websites and apps for phones / tablets. An advantage of databases over spreadsheets is that data can be atomised - meaning it can be stored in separate tables (e.g. one for patients and one for doctors ) with records linked through relationships . This minimises data redundancy (duplication ), meaning there is a lower chance of making errors , and it is easier to search through the table as each record will only appear once . A search through a database is called a 'query '. Business Software This is specialist software for businesses , often made bespoke for an organisation based on their needs . Types of business software: Project management software allows teams of workers to collaborate and split large projects into manageable tasks with clear deadlines and assigned roles . A management information system (MIS ) processes a large amount of data and organises it for use in decision-making and general data analysis . See more about an MIS in section 3.5 . Multimedia programs such as video editors or animation suites can be used to create high-quality videos with images , audio and video clips . Collaboration tools for businesses allow employees to share ideas and resources in real-time . Publishing software allows users to implement text and images into eye-catching designs such as posters , leaflets or static adverts to include on a website. Expert systems use large databases for automatic decision-making , often making use of AI to quickly solve complex problems . A healthcare example of an expert system is a medical diagnosis program that may suggest possible illnesses when a patient's symptoms are input . CAD / CAM One example of business software used for the design and manufacture of a product is CAD / CAM (C omputer-A ided D esign / C omputer-A ided M anufacturing). CAD is used to create highly detailed digital designs and CAM translates these designs into instructions for manufacturing machines to make the product physically. These software packages use 3D modelling and image rendering along with exact measurements to create precise designs ready to be manufactured . Engineers use them to design and make mechanical parts and architects use them to create detailed building models and blueprints . Q uesto's Q uestions 2.2 - Applications Software: 1. State four different kinds of productivity software and briefly describe how each could be used . For example: "Word processors can be used to type up a letter in an office or write an essay for school." [8 ] 2. Describe two differences between database and spreadsheet software. [2 ] 3a. What is an Integrated Development Environment ? [1 ] 3b. Describe three tools used in an IDE. [6 ] 4. Giving brief examples of how they can be used, state four different types of business software . [8 ] 5. Suggest how a website design company could use each of the three types of applications software (Productivity Software , Development Tools and Business Software ). [ 6 ] 2.1 - Types of Software Topic List 2.3 - Utility Software

  • 1.6 - Additional Hardware - Eduqas GCSE (2020 spec) | CSNewbs

    Learn about the motherboard, graphics processing unit (GPU), sound card, embedded systems and input / output systems. Based on the 2020 Eduqas (WJEC) GCSE specification. 1.6: Additional Hardware Exam Board: Eduqas / WJEC Specification: 2020 + 1.6a - Internal Hardware Motherboard The motherboard is the main circuit board of a computer , unique for each device. It holds and connects the different components together , allowing data to be transferred between them. Components such as the CPU and ROM are directly attached to the motherboard. The motherboard has expansion slots for additional cards (i.e. sound cards) and ports (i.e. USB). Graphics Processing Unit (GPU) Sound Card A GPU is a microprocessor that performs complex calculations to generate graphical images to be displayed on a monitor . There are two types of GPU, integrated GPUs within the motherboard circuitry or dedicated GPUs on an additional card (known as a 'graphics card'). An integrated GPU is cheaper and generates less power because it uses the RAM of the computer . Integrated GPUs are used in tablets and laptops as they generate less heat and are optimal for general computing uses (e.g. web browsing or watching movies). A dedicated GPU is more expensive and generates more heat, often requiring a fan because it contains its own memory . Dedicated cards are used by animation professionals and professional gamers who require the best graphics. Sound cards convert analogue sound waves into digital data (binary) when inputting audio through a microphone. 0010 1011 0101 0101 0110 0111 0101 0001 0101 0010 1011 0101 0101 0110 0111 0101 0001 0101 Sound cards also convert digital data (binary) into analogue sound waves to output audio through speakers or headphones. 1.6b - Embedded Systems Example: A washing machine has a control chip that manages the different program cycles. An embedded system is a computer system built into a larger machine to provide a means of control . Embedded systems perform a specific pre-programmed task which is stored in ROM . An embedded system uses a combination of hardware and software . Example: A traffic light has a control chip that determines when to change to a green or red light. 1.6c - Input & Output Devices Input devices are used by humans to interact with a computer system , through methods such as text , voice or touch . Output devices show the result of computer processing , such as sound , printed text or a visual display on a monitor. Storage devices , such as a USB stick or an external hard drive, are neither input nor output devices - see 1.4 . Input Devices These are just some of the more common input devices . A mouse and a keyboard have been described in further detail. Are there any devices below you haven't heard of before? Mouse Benefits: Easy to navigate a graphical user interface. A wireless mouse takes up less space . Faster to select options (e.g. in a video game). Drawbacks: Difficult to use for people with restricted hand movement . Difficult to use on some surfaces . Other input devices: Scanner Controller Microphone Webcam Chip Reader OCR Scanner OMR Scanner Barcode Scanner Graphics Tablet Sensors (e.g. light or temperature) Touch Screen Remote Control Biometric Scanner (e.g. fingerprint or iris) Concept Keyboard Sip / Puff Switch Keyboard Benefits: Quick to input text . Easy to use with a familiar layout on most keyboards. Keys can be customised and shortcuts can be used . Drawbacks: Takes up a large amount of space on a desk. Difficult for people to use with restricted hand movement or poor eyesight . Output Devices Monitor These are just some of the more common output devices . A monitor and a printer have been described in further detail. Are there any devices below you haven't heard of before? Other output devices: Plotter Speakers Projector Alarm Light Headphones Touch Screen Braille Terminal What is it? A monitor is required to see the result of human input and computer processing . Monitors can be bought in different sizes and resolutions for a range of purposes such as video editing or playing games . Monitors settings can be changed to alter the brightness or contrast . Printer What is it? A printer uses ink or toner to print a document (such as text or images) onto paper . Inkjet printers use ink cartridges , are generally slower and print in a lower quality . Laser printers use toner cartridges and are generally quicker and print to a higher quality . Q uesto's Q uestions 1.6 - Additional Hardware: 1.6a - Internal Hardware 1. What is the purpose of the motherboard ? [2 ] 2a. What is the purpose of the GPU ? [ 2 ] 2b. Describe two differences between integrated and dedicated expansion cards . [ 4 ] 3. Explain how a sound card works. [ 4 ] 1.6b - Embedded Systems 1. What is an embedded system ? [3 ] 2a. Give two examples of an embedded system. [ 2 ] 2b. Research and describe another example of an embedded system. [ 2 ] 1.6c - Input & Out[ut Devices 1. Choose four input devices and describe at least two benefits and two drawbacks of using each one. [ 8 ] 2. Describe three output devices . [ 3 ] 3. Justify which input and output devices would be most suitable in the following scenarios: a. A teacher needs to take the class register . [ 4 ] b. A family want to communicate with their cousins in Australia. [ 4 ] c. The school movie club wants to play Star Wars in the assembly hall. [ 4 ] d. An e-sports player is taking part in an online multiplayer tournament . [ 4 ] e. A laboratory needs security so that only registered scientists can enter. [ 4 ] 1.5 - Performance 2.1 - Logical Operators Theory Topics

  • Unit 2 - Global Information - Cambridge Technicals IT Level 3 | CSNewbs

    Navigate between all Unit 2 (Global Information) topics in the OCR Cambridge Technicals Level 3 IT 2016 specification. OCR Cambridge Technicals IT Level 3 Unit 2: Global Information These pages are based on content from the OCR Cambridge Technicals 2016 Level 3 IT specification . This website is in no way affiliated with OCR . This qualification stopped in July 2025. The pages on the site will remain for at least two years. LO1 (Devices & The Internet ) 1.1 - Holders of Information 1.2 - Storage Media 1.3 - Access & Storage Devices 1.4 - Internet Connections 1.5 - WWW Technologies 1.6 - Information Formats 1.7 & 1.8 - Internet Pros & Cons LO2 (Information Styles & Quality ) 2.1 - Information Styles 2.2 - Information Classification 2.3 - Quality of Information 2.4 - Information Management LO3 (Categories & Analysis ) 3.1 - Data vs. Information 3.2 & 3.3 - Information Categories 3.4 - Stages of Data Analysis 3.5 - Data Analysis Tools 3.6 - Information Systems LO4 (Legislation ) 4.1 - UK Legislation 4.2 - Global Legislation 4.3 - Green IT LO5 (Flow of Information ) 5.1 - Data Types & Sources 5.2 - Data Flow Diagrams LO6 (Security & Protection ) 6.1 - Security Principles 6.2 - Risks 6.3 - Impacts 6.4 - Protection Measures 6.5 - Physical Protection 6.6 - Logical Protection

  • 4.3 - Green IT | Unit 2 | OCR Cambridge Technicals | CSNewbs

    Learn about the purpose of Green IT, the benefits for an organisation following its practice and methods of use. Based on the 2016 OCR Cambridge Technicals Level 3 IT specification for Unit 2 (Global Information). 4.3 - Green IT Exam Board: OCR Specification: 2016 - Unit 2 What is 'Green IT'? ‘Green IT ’ is to use computers and IT resources in an efficient and environmentally responsible way to reduce an organisation’s carbon footprint . To 'reduce carbon footprint ' means to decrease the amount of pollution (such as CO2 ) produced by an organisation and to engage in more eco-friendly practice. Examples of Green IT Practice Global Requirements of Green IT United Nations Climate Change conferences occur every year and are attended by leaders of each country in the United Nations. The conferences establish obligations for countries to work towards reducing their carbon footprints and emissions of greenhouse gases . Whilst Green IT is not specifically mentioned in these talks, IT is a hugely important sector with large annual emissions that need to be reduced to meet the climate change limitations, such as the Paris Agreement. In the UK, the Greening Government ICT Strategy (running between 2011 and 2015) was an annual report that investigated how IT use could become 'greener' within the government . Positive consequences of this strategy included: Using more cloud storage technology , enabling fewer individual storage devices to be purchased, reducing emissions . Using social media more widely to contact voters - saving money by posting fewer letters and leaflets. Increasing the use of teleconferencing and video calls - reducing the need for unnecessary travel to meetings and avoiding the generation of heavy pollution. Q uesto's Q uestions 4.3 - Green IT: 1. What is meant by the term 'Green IT '. [3 ] 2a. Explain four ways that an organisation can follow good green IT practice . [4 ] 2b. Describe two reasons why it is beneficial to a company of following Green IT . [4 ] 3a. Why are the United Nations Climate Change conferences important ? [2 ] 3b. Describe two ways that the UK government have used Green IT . [4 ] Turn off computers , monitors and other connected devices when not in use . Adjust power options to help minimise power consumption. Use cloud storage or virtualisation to reduce the number of physical devices being bought, powered and maintained. Repair older devices rather than throwing them away. Consider if it is necessary to print a document before doing so and print only what is required . Recycle ink cartridges and paper . Donate older equipment to charities or schools for reuse . Why use Green IT? It is in an organisation's best interests to use Green IT practices for the following reasons: To become more sustainable by reducing the company's carbon footprint and positively impacting the environment . Reducing energy costs (e.g. by turning equipment off when not in use) and saving money . Improving the public image of the organisation as people are increasingly environmentally conscious and will prefer to do business with a company that follows environmentally-friendly policies. 4.2 - Global Legislation Topic List 5.1 - Data Types & Sources

  • 5.2 - Data Flow Diagrams | Unit 2 | OCR Cambridge Technicals | CSNewbs

    Learn about the elements of a data flow diagram and factors that may disrupt them. Based on the 2016 OCR Cambridge Technicals Level 3 IT specification for Unit 2 (Global Information). 5.2 - Data Flow Diagrams Exam Board: OCR Specification: 2016 - Unit 2 A data flow diagram is a visual representation of how data is transferred within a system or organisation . Data flow diagrams are often abbreviated to just 'DFD '. You will need to recognise the symbols , understand the diagrams and explain how data flow can be affected . Data Flow Diagram Symbols The common symbols used in a DFD are shown below: External Entity (e.g. Employee, Customer) Alternative DFD symbols you may see on the exam paper (both sets of symbols have been accepted in previous exam papers): Process (e.g. Calculate Pay, Review Application) Data Store (e.g. Staff Database, Customer Database) Data Flow External Entity Process Data Store Level 0 data flow diagrams show the transfer of data in a simple manner . Processes may be generalised and not shown separately , for a more basic overview . Below is an example of a Level 0 DFD to show the process of an employee submitting an application to be promoted : Level 1 data flow diagrams show the transfer of data in a more detailed manner . Processes are shown separately , for a more complex and realistic overview . Below is an example of a Level 1 DFD to show the process of an employee submitting an application to be promoted . The individual processes have been expanded from the Level 0 DFD above to show how the application must first be signed off by an administrator before it is reviewed by management: Rules for Drawing a Level 1 DFD Data flows only in one direction . Every data flow is labelled (with the data itself , not the action). Every data flow connects to at least one process . At least one input or output for each external entity . Impacts Affecting the Flow of Information There are several reasons why the flow of information within an organisation may be delayed or inefficient , such as: Information characteristics e.g. information is entered incorrectly, causing delays. Human error e.g. information is lost or staff don't follow protocol. Hardware failure e.g. network connection breaking or system failure. Communication breakdown e.g. meetings postponed or emails unread. Q uesto's Q uestions 5.2 - Data Flow Diagrams: 1. Draw the symbols for the four parts of a data flow diagram . [4 ] 2. Look at the image of the Level 1 DFD . State one example of: An external entity A process A data flow A data store [1 each ] 3. Give one difference between a Level 0 and Level 1 DFD . [2 ] 4. State three rules for drawing a correct data flow diagram . [3 ] 5. After heavy snow, a school has decided to shut for the next two days. Many parents were not informed of this decision and are angry that they brought their children in. Give three reasons why the transfer of data (the data being a message about school closure) might not have flowed efficiently in this example. [6 ] 1 Level 0 Data Flow Diagram Level 1 Data Flow Diagram 5.1 - Data Types & Sources Topic List 6.1 - Security Principles

  • 2.1 - Systems Software | OCR A-Level | CSNewbs

    Learn about operating systems, memory management (segmentation and paging), scheduling, interrupts, the BIOS, device drivers and virtual machines Based on the OCR H446 Computer Science A-Level specification. Exam Board: OCR A-Level 2.1 - Systems Software Specification: Computer Science H446 Watch on YouTube : Operating systems functions Paging & segmentation Interrupts Scheduling algorithms Types of operating system BIOS Device drivers Virtual machines This topic looks at how the operating system manages the resources of a computer system . It also includes programs related to the operating system , such as the BIOS , device drivers and virtual machines . Operating Systems The operating system performs essential functions to keep a computer running efficiently . It provides a user interface , such as a command line or graphical user interface ( GUI ), and ensures system security by managing access rights and protecting files . The OS manages hardware , coordinating devices like the CPU , printers and hard drives and provides built-in utilities for tasks such as file management and disk defragmentation . It acts as a platform for software , allowing applications to be installed and run . The OS also schedules jobs , handles interrupts from devices, and manages memory , ensuring each process has the resources it needs without conflicts. Paging & Segmentation Paging is a memory management method that splits memory into equal-sized blocks called pages . This makes memory use more efficient as programs don’t need to be stored in one continuous block but unused space may be wasted inside a page . Segmentation divides memory into segments of different sizes based on program structure . This makes it easier to organise parts of a program , but because segments are different sizes , it can leave small unused gaps in memory that can’t be easily filled by other data. Interrupts An interrupt is a signal that tells the CPU to pause its current task and respond to something more urgent . Interrupts can come from hardware , such as a keyboard press , or from software , such as an error . When an interrupt occurs , the CPU saves its current state by placing current register values into a stack . The CPU runs an interrupt service routine ( ISR ) to handle the interrupt event . After the ISR finishes , the CPU restores its state by popping values from the stack and continues the original program . Scheduling Scheduling algorithms are used by the CPU to decide the order in which processes are executed . They aim to manage CPU time efficiently and ensure all programs get a fair share of resources . Common scheduling algorithms include: First-Come First-Served : Processes are executed in the order they arrive to the CPU . Round Robin : Each process gets a fixed time slice in turn , cycling through all processes. Shortest Job First / Shortest Time Remaining : These methods identify the process with the shortest estimated runtime to be executed first . Multi-Level Feedback Queue : Uses multiple queues with different priority levels . Processes can be moved between queues to avoid starvation . Types of OS Different types of operating systems exist depending on the computer system and purpose : Multitasking OS : Allows a single computer to run multiple programs at the same time by quickly switching between them. Multi-user OS : Lets multiple users access the computer and its resources simultaneously , often via a network . Distributed OS : Manages a group of networked computers as a single system , sharing resources and tasks . Embedded OS : Designed for devices with specific functions , like microwaves or smart TVs , often with limited resources . Real-time OS : Provides immediate processing and responses for time-critical tasks , used in systems like medical devices or industrial robots . The BIOS The BIOS (Basic Input/Output System ) is firmware stored in ROM that helps the computer start up and manage initial communication between hardware and the operating system . During the start-up sequence , the BIOS first checks that essential hardware (e.g. the CPU and RAM ) is present and working correctly by running a Power-On Self Test (POST ). Signals are transmitted to all connected components . The BIOS then runs the bootstrap program to locate and load the operating system from a connected storage device into RAM . Once the OS is loaded , control is handed over to it, allowing the computer to become fully operational . Device Drivers A device driver is software that allows the operating system to communicate with hardware devices such as printers , graphics cards or keyboards . Hardware and the OS speak different ' languages ', so the driver translates OS instructions into commands the device can understand and vice versa. They are needed because, without drivers , the OS wouldn’t know how to control the hardware or use its features properly. Drivers also allow devices to work with different versions of an operating system and enable updates that improve performance or fix bugs . Virtual Machines A virtual machine is a software-based computer that runs an operating system and applications like a real computer , using part of the host computer’s hardware . It is isolated from the main system , so it can operate safely without affecting the host . Virtual machines are commonly used for testing software , running multiple operating systems and safely handling untrusted files . They provide flexibility , efficient hardware use and a secure environment for experimentation . Q uesto's K ey T erms Operating Systems: user interface, file management, user management Memory Management: paging, segmentation, virtual memory Interrupts: interrupt, interrupt service routine, stack Scheduling Algorithms: first come first serve, round robin, shortest job first, shortest time remaining, multilevel feedback queue Types of Operating System: multitasking, multi-user, distributed, embedded, real-time BIOS: ROM - power-on self-test (POST) Device Drivers: device driver Virtual Machines: virtual machine, thin clients, servers D id Y ou K now? New versions of the Android operating system used to be named alphabetically after sweet treats , from Cupcake , Donut and Eclair to Nougat , Oreo and Pie - the final named update in 2019 . 1.3 - Input, Output & Storage A-Level Topics 2.2 - Applications Generation

  • OCR A-Level | CSNewbs

    Navigate between all topics in the OCR A-Level Computer Science H446 specification. Includes all topics from Component 1 (Computer Systems) and Component 2 (Algorithms and Programming). OCR Computer Science A-Level These pages are based on content from the OCR H446 Computer Science specification . This website is in no way affiliated with OCR . Component 1: Computer Systems Paper 1 Playlist on YouTube This content is under active development. Check here for the latest progress update. OCR A-Level Key Term Generator 1. Hardware 1.1 - Structure & Function of the Processor (The CPU) 1.2 - Types of Processor 1.3 - Input, Output & Storage 2. Software 2.1 - Systems Software 2.2 - Applications Generation 2.3 - Software Development 2.4 - Types of Programming Language 3. Networks & Databases 3.1 - Compression, Encryption & Hashing 3.2 - Databases 3.3 - Networks 3.4 - Web Technologies 4. Data & Logic 4.1 - Data Types 4.2 - Data Structures 4.3 - Boolean Algebra 5. Laws 5.1 - Computing-Related Legislation 5.2 - Moral & Ethical Issues Component 2: Algorithms & Programming 1. Computational Thinking 1.1 - 1.5 - Computational Thinking 2. Problem Solving & Programming 2.1 - Programming Techniques 2.2 - Computational Methods 3. Algorithms 3.1a - 3.1d - Algorithm Complexity 3.1e - Data Structure Algorithms 3.1f - Standard Algorithms

© CSNewbs 2026

The written, video and visual content of CSNewbs is protected by copyright. © 2026
bottom of page