KS3 Computer Science

11-14 Years Old

48 modules covering EVERY Computer Science topic needed for KS3 level.

GCSE Computer Science

14-16 Years Old

45 modules covering EVERY Computer Science topic needed for GCSE level.

A-Level Computer Science

16-18 Years Old

66 modules covering EVERY Computer Science topic needed for A-Level.

Client-Server Architecture

In order to establish strategic alliances or to acquire and exchange information between machines, networking is described as the act of making communication and data exchanging with other individuals, agencies, groups and organizations. Experts use networking to expand their networks of friends, to figure out career openings, to digitalize the businesses, marketing of products, and …

Read moreClient-Server Architecture

Peer to Peer Network

Computer networking is a prevalent technique and a great application of information technology used for various purposes. Computer networking aims to connect multiple computers or devices to share resources and data. Employing networking helps to use a reduced number of hardware like printers, scanners, etc., for multiple systems. Moreover, computer networking helps create and process …

Read morePeer to Peer Network


The evolution of technology brought individuals and industries on a unique link. Anybody can visit and proceed with transactions using networks. The internet is one of the key sources to link all the agencies on a single platform. Clients using networking facilities have a great belief that their private information and transactions are secure. This …

Read moreEncryption

Web Proxy

An intermediate level between the web client and the online resource is known as a web proxy. When a client requests to open a website using a browser, it gives its information to the server or the device where it is requesting the page. The information of the client involves system knowledge, location, browser, IP …

Read moreWeb Proxy


For specific organizations, Internet access is no longer a choice. Although internet connectivity allows an entity with advantages, it helps the exterior community to enter and communicate with local network infrastructure. This establishes the organization’s hazard. While any device and server may be fitted with robust, secure functionalities like intrusion prevention on the premises network, …

Read moreFirewall

Packet and Circuit Switching

Network Switching Switching is one of the most significant parameters of networking. At the same time, connection with the internet or with a network for sending the messages or transferring data files a medium is used for connection of systems. It is a process for sharing data among various systems, networks, and segments.  Network switching …

Read morePacket and Circuit Switching

Protocol Layers

Protocol Layers A set of rules defined for communication among the devices using a network is known as a protocol. The rules contain guidelines that are used to regulate specific attributes in a network. These attributes include access method, the permission of physical topologies, kind of cables, and data transfer rate. Open Systems Interconnection (OSI) …

Read moreProtocol Layers

Domain Name Server (DNS)

Domain Name Server (DNS) The DNS is a fundamental term of the internet. Mostly all the internet users are getting benefits from this application daily, but not each user is familiar with this terminology. DNS is a kind of digital directory that holds the names of and matches those names with numbers. Here we consider …

Read moreDomain Name Server (DNS)

Structure of the Internet

Internet The internet is one of humanity’s most impressive inventions. What started as a small network of local knowledge-sharing data repositories has become a worldwide phenomenon that has changed our lifestyle. The internet often referred to only as “Net,” is an interconnection of worldwide computers in the form of a network. The term is also …

Read moreStructure of the Internet

Transaction Processing

What is transaction Processing: A sort of PC preparing in which the PC behaves rapidly to customer request. Each adjuration is observed as an interchanged. Programmed teller machines for banks are a case of exchange handling. Something contrary to exchange handling is cluster preparing, in which a cluster of adjuration is put away and afterward …

Read moreTransaction Processing


What is SQL On the most fundamental level, SQL is a programming language intended for overseeing and questioning social information bases, which were designed during the 1970s and advocated by Oracle. Simply put, social information bases sort out information into lines and segments (like Excel!); in the event that you need to truly know a …


Referential Integrity

What is Referential Integrity: A part given by social database organisation structures (RDBMS) that shields customers or appeals from entering clashing data. Most RDBMSs have distinctive appropriate uprightness and conclude that you can apply when you make an association between two relations. For example, expect Relation B has a new key that concentrations to a …

Read moreReferential Integrity

Normalization to 3NF

What is Normalization? Standardization is a database arrangement procedure that lessens data redundancy and gets rid of unpleasant attributes like Insertion, Update and Deletion Anomalies. Normalization rules isolate greater relations into more unobtrusive relations and associations them utilising associations. The explanation behind Normalization in SQL is to get rid of overabundance (excess) data and assurance …

Read moreNormalization to 3NF


What is ACID In digital engineering, in terms of blunders, control disappointments, and multiple injuries, ACID (atomicity, accuracy, seclusion, toughness) is a number of properties of knowledge base exchanges required to guarantee data legitimacy. A sequence of data set operations satisfying the ACID properties (which can be used as a solitary coherent information procedure) is …

Read moreACID

Run Length Encoding

Introduction Compression algorithms are an important aspect of computer science. Compaction is the method of minimizing the quantity of data required for a given piece of information to be stored or transmitted, usually by the use of encoding techniques. Today, when 20 megabytes may be needed for an uncompressed digital image, data compression is critical …

Read moreRun Length Encoding


What is Polymorphism The term polymorphism is independently characterised in four logical orders: science, hereditary qualities, natural chemistry, and software engineering. In the organic setting, polymorphism alludes to the possibility that individuals from a similar populace or state can take on various visual qualities. In hereditary qualities, polymorphism reflects variety in the hereditary coding of …

Read morePolymorphism

Object Oriented Programming

Introduction Object- orientated programming (oop) reflects an effort the way we all think and interact with the real world more closely with programs. In the previous programming types, a programme writer was presented with a computational activity to solve the problem. software design then consists of finding a set of instructions that will perform the …

Read moreObject Oriented Programming

Lossy vs Lossless

What is Lossy Compression The lossy compression algorithm is a technology that reduces the file size by deleting unnecessary information. Nobody hates to lose records, but certain types of files are too large to have enough capacity to carry all the original data, so in the first place, we don’t need all that stuff. In …

Read moreLossy vs Lossless