top of page

Search CSNewbs

286 items found for ""

  • Python | Extended Task 5 | CSNewbs

    Extended Task 5 Collection of Colours A new paint company , 'Sparkle and Shine Paint Schemes ' needs a program that can manage the different colours they sell to customers. They currently have a file with many different colours and want a program made with features to add, remove and list the different colours . For this task, you will need to create a document and include the following sections (with screenshots where appropriate): ​ An introduction to explain the Purpose of your program . A List of Requirements for a successful program. Screenshots of your code (with comments in your code to show understanding). Testing – Create a plan to show how you will test your program and then explanations of any errors that you found and how they were fixed . An Evaluation of what worked, what didn’t, and how you met each of your requirements from your original list. Also, discuss further improvements that you could have made to improve your program. Reminders for this task: You will need to create a selection of options for the user to choose from. Subroutines and a while true loop may help. Section 10 will help you to open, write and read from files . Section 10c shows how to remove lines from a file. There are multiple ways to approach this program, and your solution might look different from the example. Break the problem down and focus on one part at a time. Example solution: Use a menu to select the different options using a command word. Download the colours file: Selecting Total will list the number of colours in the file. This should change whenever a new colour is added or one is removed . Selecting Add will allow the user to enter the name of a new colour to be added to the file . Selecting Letter will allow the user to enter a letter . ​ All colours beginning with that letter should be displayed . Selecting Remove will allow the user to enter a colour to be removed from the file . Selecting Random will display a random colour from the file. Selecting End will stop the program. ⬅ Extended Task 4 (Vet Surgery) Extended Task 6 (Word Game) ➡

  • 6.1a - Impacts of Technology - OCR GCSE (J277 Spec) | CSNewbs

    6.1a: Impacts of Technology Exam Board: OCR Specification: J277 What are the issues created by technology? As the use of computers and technological devices continues to rise every year, this increase brings with it a range of different types of issues . Categories of issues described on this page include: ​ Cultural issues Environmental issues Ethical issues Legal & Privacy issues Cultural Issues Culture relates to society and how different parts of the world vary in terms of computer and internet usage . The Digital Divide This term relates to the gap between those people who have access to modern digital technology (such as computers and the internet) and those who have limited access . 'Limited access' could be devices at home or shared devices or having lower-performance (cheaper) computers and low-speed internet connections. ​ The digital divide can be seen in different ways , such as: People in cities vs. People in rural areas . Younger people vs. Elderly people. Developed countries vs. Developing countries. The digital divide is an important ethical issue because digital technologies have led to numerous international benefits including boosted growth , improved product delivery , enhanced communication and increased opportunities . However, this impact is uneven and these positive impacts are mostly occurring in technologically-advanced regions such as North America , Western Europe and Japan . Regions like some nations in Africa and Central Asia have limited digital infrastructure and government instability , leading to poor internet speeds , high costs and limited resources . ​ Discussion Points: What do you think can be done to bridge the digital divide? Whose job is it to bridge the gap? Who will pay for the technology? Changes to Work The internet , the development of new technologies such as cloud storage and increased video communication have transformed the way that many businesses operate across the world. Staff may be able to work from home or access documents collaboratively outside of the traditional workplace, such as cafes or on public transport. ​ Some jobs have moved abroad to save costs, such as help centres for online issues. Tasks can be outsourced to freelancers in other countries where people are content to be paid less for their time and services. For example, some companies will hire temporary web developers from countries such as India to work for them for a lower salary than local workers. ​ Another change to work that technology has brought is the loss of jobs , especially low-skilled jobs such as factory workers that have seen their roles replaced by technology and automation . However, technology has also created millions of new jobs , including installing and maintaining the machines that replace other roles. Environmental Issues Environmental issues concern the natural world and the negative effects of producing , using and discarding computer systems and devices. Energy and Material Consumption In the past 30 years, the number of technological devices has increased astronomically and thousands of new devices are manufactured each day . These devices need to be assembled using a range of materials , including plastics , metals and some rarer elements and need a considerable amount of electrical power to run. Certain systems like web servers and data centres must be powered on all day , every day, which uses a large amount of energy . Pollution and Waste Generating the electricity to power computers creates pollution - an average PC could require up to 50% more energy per year than a fridge. Computers are difficult to recycle and discarded components can lead to land, water and air pollution due to harmful materials , such as lead and mercury , leaking into the environment. ​ Smartphone trends are also negative for the environment as new devices are released yearly , with minor upgrades that people buy to appear fashionable and up-to-date. To lessen the environmental impact, people should reuse and recycle their devices. Ethical Issues Ethics relates to what is considered right or wrong . Often this is subjective - people may have differing opinions on the issue. Drones Uses of drones: Filming and photography for television, movies and special events. Monitoring pollution levels in the atmosphere. Tracking and monitoring wildlife , such as rhino populations in Africa. Disaster zone response , such as searching for survivors following an earthquake. Delivery companies are developing drones to quickly deliver goods across cities. Drones are used by the military to target sites in other countries, such as American soldiers deploying surveillance drones in Syria. ​ Discussion Points: Should you need a licence to buy and fly a drone? Should drones be used to monitor the public? Like flying CCTV? Should drones be used to deliver items? Like Amazon packages? If a drone hits a plane and it crashes, what should the punishment be? A drone is an unmanned aerial vehicle (UAV ) that is remotely operated and can be used for a wide range of purposes. Self-Driving Cars Self-driving cars (also known as autonomous vehicles ) are currently in the development and testing stage with companies like Tesla and Amazon. Benefits of self-driving cars include: In theory, driving will be safer because cars are less likely to make mistakes that humans do and they can’t become distracted or tired . Self-driving cars should be more fuel-efficient because they take the most direct route to destinations and do not get lost. ‘Drivers’ in the car can perform other tasks instead of driving, such as work or planning. Autonomous vehicles could include trucks and vans to automate the delivery and freight industries . Trucks could drive overnight to deliver goods whereas currently, human drivers must take breaks every few hours. Drawbacks of self-driving cars include: Cars could still crash as code and software processes may fail. The technology is still in development and will be very expensive for the first few years when self-driving cars are available to purchase. Jobs may be lost such as delivery and truck drivers whose vehicles are equipped with self-driving technology. Other industries like motorway services and hotels may also be affected. ​ Discussion Points: Would you trust a car to drive itself? Who is to blame if a self-driving car crashes? The car maker? The people in the car? The software writers? What should happen to the people whose jobs are taken by self-driving vehicles? Artificial Intelligence Artificial Intelligence (AI ) is the act of computers replacing humans to analyse data and make decisions . In recent years AI has become more common in the home and on devices like smartphones; assistants such as Siri and Alexa are prime examples of modern home AI. AI Chatbots like ChatGPT have become more popular in recent years but have lead to issues such as plagiarism , misinformation and breaking copyright laws . The weather today is cloudy. Benefits of AI include: Processes are sped up as computers can analyse large amounts of data much quicker than a human. AI can be used when a human is unavailable , such as using a symptom checker on the internet for a minor illness rather than booking and waiting for a doctor. Repetitive or time-consuming tasks can instead be completed by a computer , such as searching and sorting scientific data or generating ideas , images or audio from a prompt . Drawbacks of AI include: AI can store and process a lot of personal data , especially personal assistants like Alexa which are always listening for ‘wake words’. This data can be viewed by the company that develops it and could be hacked by attackers. AI is programmed by humans and mistakes in code could have disastrous consequences if the AI is used to make important decisions , such as military deployment. AI GPT tools like ChatGPT can give incorrect results , may use copyrighted material in their response and students may use it to submit work that is not their own . ​ Discussion Points: If a robot harms a human who is to blame? The robot? The programmer? The manufacturer? Us? Would you trust a walking, talking robot assistant in your home? Should ChatGPT be banned in schools or can it be helpful? Should AI make decisions for us? Legal & Privacy Issues Legal and privacy issues regard laws that have been introduced by the UK government to protect data, systems and networks from unauthorised access . See 11.2 for explanations about important computing legislation in the UK. Loss of Privacy & Hacking There has been a lot of criticism in the last few years about how internet companies and governments are using personal data to invade privacy and track civilians . Facebook was involved in a scandal with using personal data for reasons that were not the original intention. In reverse, WhatsApp and Apple have been criticised for encrypting messages sent by terrorists that police have been unable to track and read. Every week a new company seems to announce that its data has been hacked . Attackers are constantly using botnets and infected systems to crack poorly secured databases and attempting to phish individuals for usernames and passwords. In the past few years, major hacking breaches include Sony, Yahoo and TalkTalk. ​ Discussion Points: Should the UK government be able to see the websites you have visited in the last year? What should happen if a major company is hacked and bank details are stolen? Should they be fined? Pay customers? Prison? Should WhatsApp allow authorities to access encrypted messages? What if they know a terrorist is using it to communicate? Should the UK debate privacy laws before they go into place? Online Crime Unlawfully obtaining personal information and using it for identity theft or fraud . Harassment and threatening others on social media or private messages; blackmail . Cyber attacks are more common - see 3.8 for information about DOS attacks , IP spoofing , SQL injection and more. Sharing copyrighted material such as television programmes, music and video games. Distributing prohibited material such as drugs or weapons on the dark web. ​ See 6.1b for explanations about different laws that have been created to tackle online crime . The increased popularity of the internet and the rising number of users has led to a wave of online crime , taking many different forms, including:​ Q uesto's Q uestions 6.1a - Impacts of Technology: ​ Cultural Impacts 1a. What is the digital divide ? [ 2 ] 1b. Describe 2 examples of how the digital divide can be seen . [ 2 ] ​ 2. Describe in detail 3 ways that technology has changed the way people work . [9 ] ​ Environmental Impacts 1. Describe the different ways that the increasing use of technology negatively impacts the environment . [ 5 ] ​ Ethical Impacts 1a. What is a drone ? [1 ] 1b. Make a list of all of the positive impacts and the negative impacts of using drones . You should have at least 3 on each side. [ 6 ] ​ 2. Describe 2 benefits of using self-driving cars and 2 negative consequences . [4 ] ​ 3. Describe how artificial intelligence can be used for good . [ 4 ] ​ Legal & Privacy Impacts 1. A hack on a bank has occurred. Describe what you think the impacts would be on the following groups of people: a. The customers . b. The bank managers . c. The general public . [ 6 ] ​ 2. Describe 4 different types of online crime . [ 8 ] 5.2 - Utility Software Theory Topics 6.1b - Legislation

  • 3.1 - Network Characteristics - Eduqas GCSE (2020 spec) | CSNewbs

    3.1: Network Characteristics Exam Board: Eduqas / WJEC Specification: 2020 + What is a network? A network is more than one computer system connected together allowing for communication and sharing of resources . There are many benefits but also some drawbacks to using a network compared to having an unconnected ('standalone' ) computer: Advantages of Networks Easily share files , software and hardware between computers. Disadvantages of Networks There is an initial cost because network devices like routers are required . Larger companies will need to buy and maintain a server . Log in from any connected computer and access your data and files. A network manager / administrator might need to be employed to maintain the network . An administrator can monitor network activity and control security settings. Data from computers on the network can be automatically backed up on central storage. Security breaches are more likely and malware , such as worms, can spread quickly across the network. If the web server fails , all connected computers won't be able to access files or log on . Network Types Networks can be split into different types , usually categorised by their geographical distance apart and the area that they serve. Local Area Network A local area network (LAN ) has computer systems situated geographically close together , usually within the same building or small site , like a school or office . Wide Area Network A wide area network (WAN ) has computer systems situated geographically distant to each other, possibly across a country or even across the world . The internet is an example of a WAN that spans the globe. Personal Area Network A PAN is a personal network for an individual , such as a photographer connecting a smartphone, desktop computer and printer together. Metropolitan Area Network A MAN is larger than a LAN but smaller than a WAN and typically covers a relatively large area like a university campus, town or city . Virtual Private Network A VPN allows for a secure and encrypted connection to a public network like the internet. It is often used to protect an individual's privacy by concealing their real location. Wired & Wireless Networks Wired Connections Wireless Connections Wireless connections, such as WiFi or Bluetooth , use no cables but require a wireless network interface card (WNIC ). Wireless connections generally have a slower speed and can be affected by the computer's distance from the wireless router as well as obstacles like walls or bad weather. Wired connections use physical cables , such as copper or fibre optic wires , and require a network interface card (NIC ) to connect to a network. These wired connections use a wired connection protocol - most commonly Ethernet . Restricted Movement Faster More Secure NIC Required Freedom of Movement Slower Less Secure WNIC Required Q uesto's Q uestions 3.1 - Network Characteristics: ​ 1. A retirement home for the elderly is considering installing a LAN , give 3 benefits and 3 drawbacks they might find of using a network . [6 ] ​ 2a. Describe the difference between a LAN and WAN . [2 ] 2b. Give an example of how a LAN and a WAN could each be used . [ 2 ] ​ 3 . Explain the differences between a PAN , MAN and VPN . [ 3 ] ​ 4. For each of the scenarios below, state which network type would be most suitable : a. The IT rooms of a secondary school . [ 1 ] b. A study in a house with a desktop and printer. [ 1 ] c. Using online banking when abroad on a holiday to stay secure . [ 1 ] d. A large technology company with offices across Europe . [ 1 ] e. Council offices with several locations across Manchester . [ 1 ] ​ 5. Briefly compare wired and wireless networks . [ 8 ] 2.2 - Boolean Algebra 3.2 - Data Packets & Switching Theory Topics

  • 2.2b - Translators & Compilation | OCR A-Level | CSNewbs

    Exam Board: OCR 2.2b: Translators & Compilation Specification: A-Level 2015 An instruction set is a list of all the instructions that a CPU can process as part of the FDE cycle . ​ CPUs can have different sets of instructions that they can perform based on their function. The two most common instruction sets are the simpler RISC (Reduced Instruction Set Computer ) and more complicated CISC (Complex Instruction Set Computer ). Instruction Sets This page is still being updated. Graphical Processing Unit What is cache memory? ​ Cache memory is temporary storage for frequently accessed data . ​ Cache memory is very quick to access because it is closer to the CPU than other types of memory like RAM . Multicore & Parallel Systems What is cache memory? ​ Cache memory is temporary storage for frequently accessed data . ​ Cache memory is very quick to access because it is closer to the CPU than other types of memory like RAM . Multicore & Parallel Systems What is cache memory? ​ Cache memory is temporary storage for frequently accessed data . ​ Cache memory is very quick to access because it is closer to the CPU than other types of memory like RAM . Q uesto's Q uestions 2.2b - Translators & Compilation: ​ 1. What is cache memory ? [ 2 ] ​ 2.2a - Applications & Utilities Theory Topics 2.3 - Software Development

  • 6.4 - Protection Measures | Unit 2 | OCR Cambridge Technicals | CSNewbs

    6.4 - Protection Measures Exam Board: OCR Specification: 2016 - Unit 2 Staff Responsibilities It is the staff of an organisation that will spend the most time handling and amending data so the company must have sufficient and effective protection measures in place so that staff are confident in their role and know their responsibilities of information security. Certain staff members may be responsible for types of data within an organisation, such as personal and confidential data. Clearly assigning specific people to roles ensures that they know what their job is and that they are responsible if data is lost. ​ Organisations also need to carefully consider which members of staff have access rights to certain information. If data is sensitive or confidential then the more people that have access to that data , the higher the risk of it being lost or tampered with (accidentally or on purpose). Sensitive data should only be handled and accessed by those who need to use it as part of their job role to limit the chance of data loss. Staff should be trained so that they know how to adequately handle information including basic data security techniques and how to protect data from unauthorised access and loss. Disaster & Recovery Planning With important data often stored on a computer network, it is absolutely vital that a detailed and effective disaster recovery policy is in place in the event of data being lost due to an unexpected disaster. ​ Disasters include natural disasters (e.g. fire, flood, lightning), hardware failure (e.g. power supply unit failing), software failure (e.g. virus damage) and malicious damage (e.g. hacking). ​ ​ There are three clear parts to a disaster recovery policy: ​ ​ ​ Before the disaster: All of the possible risks should be analysed to spot if there are any weaknesses in preparation. Preventative measures should be taken after the analysis, such as making rooms flood-proof or storing important data at a different location . Staff training should take place to inform employees what should happen in the event of a disaster. During the disaster: The staff response is very important – employees should follow their training and ensure that data is protected and appropriate measures are put in place. Contingency plans should be implemented while the disaster is taking place, such as uploading recent data to cloud storage or securing backups in a safe room and using alternative equipment until the disaster is over. After the disaster: Recovery measures should be followed, such as using backups to repopulate computer systems. Replacement hardware needs to be purchased for equipment that is corrupted or destroyed. Software needs to be reinstalled on the new hardware. Disaster recovery policies should also be updated and improved . Assessment and Effectiveness Organisations should conduct information security risk assessments periodically to ensure that their physical and logical measures are up-to-date and that they provide the most effective methods of protection. There may be training drills of what should happen if a disaster or substantial data loss occurs so that the company is prepared . By testing the security measures in place, they can identify any weak-points and fix those highlighted vulnerabilities to minimise the possibility of external and internal data intrusion. ​ As part of an organisation's security assessment, they may identify specific cost impacts . These are necessary financial expenditures to ensure the security of data and systems, such as: ​ Software - e.g. security software such as firewalls may be purchased to protect networked systems. Hardware - e.g. buying secure storage devices and new computer systems. Training - e.g. hiring industry experts to train staff on how to keep data secure. Security - e.g. hiring staff to protect server rooms. Q uesto's Q uestions 6.4 - Protection Measures: ​ 1. Describe why staff are so important when it comes to data protection . [3 ] ​ 2. Explain the steps an organisation should take as part of a disaster recovery plan . Split your answer into before, during and after the disaster. [12 ] ​ 3. Why is it important to conduct information security risk assessments ? [2 ] ​ 4. Describe two cost impacts to a bank of keeping customer data secure. [4 ] 6.3 - Impacts Topic List 6.5 - Physical Protection

  • 1.2 - Designing Algorithms - OCR GCSE (J277 Spec) | CSNewbs

    1.2: Designing Algorithms Exam Board: OCR Specification: J277 What is an algorithm? An algorithm is a set of instructions , presented in a logical sequence . ​ In an exam you may be asked to read and understand an algorithm that has been written. To prove your understanding you may be asked to respond by actions such as listing the outputs of the algorithm, correcting errors or identifying an error within it. ​ Programmers create algorithm designs as a method of planning a program before writing any code. This helps them to consider the potential problems of the program and makes it easier to start creating source code. There are two main methods of defining algorithms are pseudocode and flowcharts . In exams , OCR will display algorithms in their own 'OCR Exam Reference Language '. Visit the Python section of CSNewbs ---> OCR Exam Reference Language T he OCR exams require specific questions to be written either in OCR Exam Reference Language (shown below) or a high-level programming language such as Python . Basic Commands Annotation // Comments are written using two slashes Assignment name = "Harold" age = 49 ​ Constants and Global Variables constant tax = 15 global name = "Admin" ​ Input / Output name = input ( "Enter your name") print ("Transaction Complete") ​ Casting str (29) int ("102") float (30) bool ("False") ​ Random Number number = random (1,100) Selection Selection (if - then - else) if firstname == "Steven" then​ print("Hello" + firstname) elif firstname == "Steve" then print("Please use full name") else print("Who are you?") end if ​ Selection (case select) switch day: case “Sat”: print(“It is Saturday”) case “Sun”: print(“It is Sunday”) default : print(“It is a Weekday”) endswitch Iteration Iteration (for loop) for i = 1 to 10 step 1 input item next i ​ Iteration (while loop) while firstname ! = "Steven" firstname = input("Try again:") endwhile ​ Iteration (do while loop) do firstname = input("Guess name:") until firstname == "Steven" String Handling Length of a String word = "dictionary" print(word.length ) outputs 10 ​ Substrings word = "dinosaurs" print(word.substring (2,3)) outputs nos print(word.left (3)) outputs din print(word.right (4)) outputs aurs ​ Concatenation name = "Penelope" surname = "Sunflower" print(name + surname) ​ String Cases phrase = "The Cat Sat On The Mat" print(phrase .lower ) print(phrase .upper ) ​ ASCII Conversion ASC ("C") returns 67 CHR (100) r eturns "d" File Handling File Handling - Reading Lines file1 = open ("Customers.txt") while NOT file1.endOfFile() print(file1.readLine() ) endwhile file1.close() ​ File Handling - Writing to a (New) File newFile ("paint.txt") file2 = open ("paint.txt") paint = input("Enter a paint colour:") file.writeLine (paint) file2.close() Arrays Declare Array array names[3] ​ array names = "Ella", "Sam", "Ali" ​ Declare 2D Array array grid[4,5] ​ Assign Values names[2] = "Samantha" grid[1,3] = "X" More Programming Keywords Connecting strings together using the + symbol is called concatenation . ​ Extracting certain parts of a string (e.g. using .substring() ) is called slicing . ​ An if statement within an if statement or a loop within a loop is called nesting . Flowcharts A flowchart can be used to visually represent an algorithm. ​ It is more likely you will need to be able to interpret a flowchart rather than draw one. ​ The flowchart symbols are: The terminator symbol is also known as a terminal . Algorithm Examples Below are two different methods for representing the same algorithm - a program to encourage people to buy items cheaply at a supermarket. The program allows the price of items in a supermarket to be entered until the total reaches 100. The total price and the number of items entered are tracked as the program loops. Once the total reaches 100 or more, an if statement checks how many items have been entered and a different message is printed if there are 20 or more items, 30 or more items or less than 20 items. Pseudocode // This is a program to see how many items you can buy in a supermarket before you spend over £100} ​ total = 0 itemsentered = 0 ​ while total < 100 itemprice = input ("enter the price of the next item") total = total + itemprice itemsentered = itemsentered + 1 endwhile ​ if itemsentered >= 20 then print ("You are on your way to saving money.") elif itemsentered => 30 then print ("You're a real money saver.") else print ("Look for better deals next time.") endif Flowchart Reading Algorithms In an exam you may be asked to read an algorithm and prove your understanding , most commonly by listing the outputs . ​ Start from the first line and follow the program line by line , recording the value of variables as you go . ​ When you encounter a for loop , repeat the indented code as many times as stated in the range . Example Algorithm: procedure NewProgram() ​ maxvalue = input() ​ for i = 1 to maxvalue output (i * i) ??????? ​ print("program finished") ​ endprocedure Example Questions: 1. List the outputs produced by the algorithm if the 'maxvalue' input is 5 . ​ 2. State the code that has been replaced by '???????' and what the code's purpose is. Example Answers: 1. Outputs: 1 4 9 16 25 program finished 2. Missing Code: next i Purpose: Moves the loop to the next iteration. Watch on YouTube Structure Diagrams Structure diagrams display the organisation (structure ) of a problem in a visual format , showing the subsections to a problem and how they link to other subsections . The noughts and crosses structure diagram below has subsections in light yellow. Each subsection could be coded by a different person . Structure diagrams are different to flowcharts (those show how data is input, processed and output within a program or system). ​ You may be asked in an exam to draw or fill in a simple structure diagram . Trace Tables Trace tables are used to track the value of variables as a program is run . ​ They can be used to manually track the values in order to investigate why the program isn't working as intended . ​ Each row in the trace table represents another iteration . Each column stores the value of a variable as it changes. See below how the trace table is updated for the simple algorithm on the left. num1 = 2 num2 = 5 ​ for i = 1 to 3 output (num1 + num2) num2 = num2 - 1 next i ​ print("complete") For most algorithms, not every variable will be updated in each iteration . ​ Values may not be entered in the order of the trace table either. For example, each iteration outputs num1 + num2 and then decreases the value of num2 by 1. Q uesto's Q uestions 1.2 - Designing Algorithms: ​ 1. What is the definition of an algorithm ? Name two ways an algorithm can be designed . [ 3 ] ​ 2. Using a high-level programming language such as Python , or the OCR Exam Reference Language , write an algorithm that inputs 6 decimal numbers and outputs the total , largest , smallest and average values. [ 8 ] ​ For example, entering 3.1 , 5.3 , 2.3 , 5.4 , 2.9 and 4.4 would output 23.3 (total), 5.4 (largest), 2.3 (smallest) and 3.9 (average). ​ 3. Draw and label the flowchart symbols . [ 6 ] ​ 4. What is the purpose of a structure diagram ? [ 2 ] ​ 5. Create a trace table for the NewProgram() algorithm in the Reading Algorithms section on this page. [ 7 ] 1.1 - Computational Thinking Theory Topics 1.3 - Searching & Sorting

  • Key Stage 3 Python | Selection | CSNewbs

    Python - #5 - Selection 1. Using if Statements Using if enables your program to make a choice . ​ There are a few things you need to remember : if is lowercase - it should turn orange. You must use double equals == You need a colon : at the end of your if line. The line below your if line must be indented . ​ Task 1 - Create a new Python program and save the file as 5-Selection.py ​ Use the picture to help you ask what your favourite food is . Run the program and test it works. To indent a line press the tab key on your keyboard. ​ Indentation is important as it tells Python what is within the if statement and what isn't. 2. Using elif elif stands for 'else if '. It is used to respond in a different way depending on the input. ​ elif works exactly the same as an if line so if you make a mistake look up at task 1 to help you. Task 2 - Write an elif line that responds differently to your favourite food question from task 1. e.g. "Yum!" if someone enters "pasta". 3. Using else It is impractical to have hundreds of elif lines to respond to different inputs. ​ else is used to respond to anything else that has been entered in a general way. ​ The else line works a bit differently, so look carefully at the picture . Task 3 - Write an else line that responds to anything else the user enters for your favourite food question. 4. Multiple elifs Despite what you did in task 3, programs can be expanded with more than one elif line. ​ Underneath your first elif line but before your else line, add at least two more elif sections that respond differently depending on what is entered. ​ Use the elif line from the task 2 picture to help you. Task 4 - Read the description above and use task 2 to help you. Challenge Programs Use everything that you have learned on this page to help you create these programs... ​ Challenge Task 1 - Spanish Translation Create a new Python program. Save it as ' 5-Translator.py ' Add a comment at the top with your name and the date. Create a program that asks for a number between 1 and 4. Use if and elif statements to see what the user has entered and print a statement that displays the chosen number in Spanish - use the image to help you understand. ​ BONUS : Add an else line for any numbers higher than 4. ​ ​ When you run it, it could look something like this: Challenge Task 2 - Able to Vote Create a new Python program. Save it as ' 5-Vote.py ' Add a comment at the top with your name and the date. Create a program that asks for their age. Use an if statement to see if the age is more than 17 (use > instead of ==). If the age is over 17, then print "You are old enough to vote!" Use an else statement to print a different message for everyone else. ​ ​ When you run it, it could look something like this: Challenge Task 3 - Totals Create a new Python program. Save it as ' 5-Totals.py ' Add a comment at the top with your name and the date. Use an int input line to ask the user for number 1. Use an int input line to a sk the user for number 2. Multiply the two numbers together and save it into a variable called total. If the total is over 9000, then print "It's over 9,000!!!" Use an else statement to print the total if it is less than 9000. ​ ​ When you run it, it could look something like this: <<< #4 Calculations #6 Turtle >>>

  • OCR CTech IT | Unit 1 | 2.2 - Applications Software | CSNewbs

    2.2: Applications Software Exam Board: OCR Specification: 2016 - Unit 1 What is applications software? Don't confuse applications software and apps . Apps generally have a single use, such as Angry Birds or the flashlight tool on a phone. ​ Applications Software can be used for a number of different functions depending on the user's needs and their purpose. Productivity Software This is general use software for completing tasks accurately and efficiently . Key examples include word processors (e.g. Microsoft Word or Google Docs), presentation software (e.g. Microsoft PowerPoint or Google Slides) and web browsers (e.g. Microsoft Edge or Google Chrome). ​ Email applications (e.g. Microsoft Outlook or Gmail) are beneficial to organisations because staff can send information to many customers at once which is a simpler and less costly method of communication than something like sending letters or leaflets in the mail. Emails can also include attachments of important documents and include multimedia elements like images and videos to make communication more interesting . Databases and Spreadsheets ​ Database tables and spreadsheets can store both numerical and textual data ready for analysis. Examples include simple database tables and financial spreadsheets of a company's profits this year. Microsoft Access is an example of database software that uses tables and Microsoft Excel is an example of spreadsheet software. Data can be sorted numerically or alphabetically for both software types but graphs can be created from spreadsheets to visualise data . ​ When using spreadsheets (or databases) records can be locked ('record locking' ) so that only one person can make edits at any one time. Edits will be saved before unlocking the file. This will stop data being incorrectly overwritten and will ensure that the data in the spreadsheet is up-to-date, accurate and fit for purpose. ​ An advantage of databases over spreadsheets is that data can be atomised - stored in separate tables but linked through relationships. Development Tools These are tools for programmers who are creating or modifying software . An integrated development environment ( IDE ) is software used to create and edit programs. An IDE features a number of tools including: ​ A translator is a program that converts one type of language into another. A compiler is a type of translator that converts instructions into machine code (binary). A debugger is used to test code and display errors . ​ Other development tools aid programmers with developing and maintaining websites and apps for phones / tablets. Wix.com has been used to create and update this website. Business Software This is specialist software for businesses , often made bespoke for an organisation. One example of business software is design packages such as CAD / CAM (C omputer-A ided D esign / C omputer-A ided M anufacturing). This is the use of software to design and construct products . Workers such as manufacturers and dentists use this type of software. ​ Another type of business software is project management software that allows teams of workers to collaborate and divide projects into manageable tasks. Expert systems use large databases for automatic decision making , such as medical diagnosis programs . Further examples of business software, such as Management Information Systems (MIS), can be found in 3.5 . Q uesto's Q uestions 2.2 - Applications Software: ​ 1. State four different kinds of productivity software and briefly describe how each could be used . For example: "Word processors can be used to type up a letter in an office or write an essay for school." [8 ] ​ 2. Describe two differences between database and spreadsheet software. [2 ] ​ 3a. What is an Integrated Development Environment ? [1 ] 3b. Describe three tools used in an IDE. [6 ] 4. Giving brief examples of how they can be used, state four different types of business software . [8 ] 5. Suggest how a website design company could use each of the three types of applications software (Productivity Software , Development Tools and Business Software ). [ 6 ] 2.1 - Types of Software Topic List 2.3 - Utility Software

  • 2.4b - Character Storage - OCR GCSE (J277 Spec) | CSNewbs

    2.4b: Character Storage Exam Board: OCR Specification: J277 What is a Character Set? A character set is a table that matches together a character and a binary value . Each character in a character set has a unique binary number matched with it . Character sets are necessary as they allow computers to exchange data and humans to input characters . ​ Two common character sets are ASCII and Unicode : H = 01001000 ASCII Unicode ASCII (American Standard Code for Information Interchange ) is a common character set which does not take up much memory space . It is important to understand that the number of characters that can be stored is limited by the bits available - ASCII uses 1 byte (8 bits ) which only gives 256 possible characters . This is enough for the English language but it can’t be used for other languages or all punctuation symbols. Unicode is a more popular character set because it uses 2 bytes (16 bits ) that allow for 65,536 possible characters . The extra byte allows many different languages to be represented , as well as thousands of symbols and emojis . However Unicode requires more memory to store each character than ASCII as it uses an extra byte . Character sets are logically ordered . For example, the binary code for A is 01000001 , B is 01000010 and C is 01000011 as the code increases by 1 with each character. The file size of a text file is calculated as shown below: bits per character x number of characters Example: A small text file uses the ASCII character set (which uses 8 bits per character ). There are 300 characters in the file . ​ 300 x 8 = 2,400 bits ​ This could be simplified as 300 bytes or 0.3 kilobytes . Q uesto's Q uestions 2.4b - Character Storage: 1. What is a character set and why are they needed ? [ 2 ] ​ 2. Describe 3 differences between ASCII and Unicode . [6 ] ​ 3. The binary code for the character P in ASCII is 01010000 . State what the binary code for the character S would be. [1 ] ​ 4a. A text file uses the ASCII character set and contains 400 characters . What would the file size be in kilobytes ? [ 2 ] 4b. A text file uses the Unicode character set and contains 150 characters . What would the file size be in kilobytes ? [ 2 ] File Size of Text Files 01101010 = 256 possible characters 8 bits (1 byte) 1000101101001111 = 65,536 possible characters 16 bits (2 bytes) 2.4a - Number Storage Theory Topics 2.4c - Image Storage

  • HTML Guide 8 - Videos | CSNewbs

    8. Videos HTML Guide Watch on YouTube: Embedding a video from YouTube into your web page is very easy. YouTube Videos Find an appropriate video on YouTube and click the Share button underneath the video. Next, click the Embed option. Embed a video onto your web page. Copy the HTML code that is displayed on your screen and paste it directly into your HTML document. Next you can customise your web page with a background colour and different font styles. 7. Head Tags HTML Guide 9. Colours & Fonts

  • 5.2 - Integrated Development Environment - OCR GCSE (J277 Spec) | CSNewbs

    Exam Board: OCR Specification: J277 5.2: Integrated Development Environment An IDE (Integrated Development Environment ) provides programmers with the following facilities (tools ) to help create programs : Editor The editor is software that allows a programmer to enter and edit source code . ​ Editor features may include: ​ Automatic formatting (e.g. automatic indentation). Automatic line numbering (this helps to identify exactly where an error has occurred). Automatic colour coding (e.g. Python IDLE turns loop commands orange and print commands purple). Statement completion (e.g. offering to auto-complete a command as the user is typing.) Error Diagnostics & Debugger Break point The programmer selects a specific line and the program displays the variable values at that point . The code can then be executed one line at a time to find exactly where the error occurs. This process is called single-stepping . Variable Watch / Watch Window cost Displays the current value of a selected variable . ​ A variable can be watched line-by-line to see how the value changes . Trace Logs the values of variables and outputs of the program a s the code is executed line by line . Both tools are used to display information about an error when it occurs, such as the line it occurred on and the error type (e.g. syntax ). These tools may also suggest solutions to help the programmer to find and fix the error . Compilers & Interpreters Both tools convert the source code written by a programmer into machine code to be executed by the CPU. A compiler converts the entire source code into executable machine code at once . After compilation, the program can be run again without having to recompile each time. ​ An interpreter converts source code into machine code line by line . An interpreter must reinterpret the code each time the program is required to run . See 5.1 for both types of translators. A runtime environment allows a program to run on a computer system. It checks for runtime errors and allows users to test the program . ​ A runtime error occurs as the program is being executed , such as dividing a number by zero . ​ A commonly used example is the Java Runtime Environment . This allows programmers to design a program on one platform ( using the programming language Java ) which allows the finished program to then be run on many others systems . ​ A runtime environment enables the tools above such as a trace and breakpoint to be used. Run Time Environment Q uesto's Q uestions 5.2 - Integrated Development Environment: ​ 1. Describe the purpose of each type of IDE tool : a. Editor b. Interpreter c. Compiler d. Error Diagnostics / Debugger e. Break point f. Variable Watch / Watch Window g. Trace h. Runtime Environment [ 2 each ] 5.1 - Languages & Translators Theory Topics

  • Malware | Key Stage 3 | CSNewbs

    Malware Malware is any type of harmful program that seeks to damage or gain unauthorised access to your computer system. Part 1: SiX Types of Malware Virus A virus can replicate itself and spread from system to system by attaching itself to infected files . A virus is only activated when opened by a human . Once activated, a virus can change data or corrupt a system so that it stops working . Trojan A trojan is a harmful program that looks like legitimate software so users are tricked into installing it . A trojan secretly gives the attacker backdoor access to the system . Trojans do not self replicate or infect other files. Ransomware Ransomware locks files on a computer system using encryption so that a user can no longer access them. The attacker demands money from the victim to decrypt (unlock) the data . ? ? Attackers usually use digital currencies like bitcoin which makes it hard to trace them. Spyware Spyware secretly records the activities of a user on a computer. The main aim of spyware is to record usernames, passwords and credit card information . All recorded information is secretly passed back to the attacker to use. Keylogger A keylogger secretly records the key presses of a user on a computer. Data is stored or sent back to the attacker. The main aim of a keylogger is to record usernames, passwords and credit card information . Keyloggers can be downloaded or plugged into the USB port . Worm A worm can replicate itself and spread from system to system by finding weaknesses in software . A worm does not need an infected file or human interaction to spread. A worm can spread very quickly across a network once it has infiltrated it. Part 2: Four ways malware cAN infect your system 1. A ccidentally downloading an infected file from an insecure website . 2. Phishing emails - clicking on attachments or links in spam emails . 3. Installing malware from a physical device, e.g. USB stick . 4. Self-replicating malware , such as worms , spreading across a network . Phishing & Staying Safe

bottom of page