KS3 Computer Science

11-14 Years Old

48 modules covering EVERY Computer Science topic needed for KS3 level.

GCSE Computer Science

14-16 Years Old

45 modules covering EVERY Computer Science topic needed for GCSE level.

A-Level Computer Science

16-18 Years Old

66 modules covering EVERY Computer Science topic needed for A-Level.

Referential Integrity

What is Referential Integrity: A part given by social database organisation structures (RDBMS) that shields customers or appeals from entering clashing data. Most RDBMSs have distinctive appropriate uprightness and conclude that you can apply when you make an association between two relations. For example, expect Relation B has a new key that concentrations to a …

Read more

Normalization to 3NF

What is Normalization? Standardization is a database arrangement procedure that lessens data redundancy and gets rid of unpleasant attributes like Insertion, Update and Deletion Anomalies. Normalization rules isolate greater relations into more unobtrusive relations and associations them utilising associations. The explanation behind Normalization in SQL is to get rid of overabundance (excess) data and assurance …

Read more

ACID

What is ACID In digital engineering, in terms of blunders, control disappointments, and multiple injuries, ACID (atomicity, accuracy, seclusion, toughness) is a number of properties of knowledge base exchanges required to guarantee data legitimacy. A sequence of data set operations satisfying the ACID properties (which can be used as a solitary coherent information procedure) is …

Read more

Run Length Encoding

Introduction Compression algorithms are an important aspect of computer science. Compaction is the method of minimizing the quantity of data required for a given piece of information to be stored or transmitted, usually by the use of encoding techniques. Today, when 20 megabytes may be needed for an uncompressed digital image, data compression is critical …

Read more

Polymorphism

What is Polymorphism The term polymorphism is independently characterised in four logical orders: science, hereditary qualities, natural chemistry, and software engineering. In the organic setting, polymorphism alludes to the possibility that individuals from a similar populace or state can take on various visual qualities. In hereditary qualities, polymorphism reflects variety in the hereditary coding of …

Read more

Object Oriented Programming

Introduction Object- orientated programming (oop) reflects an effort the way we all think and interact with the real world more closely with programs. In the previous programming types, a programme writer was presented with a computational activity to solve the problem. software design then consists of finding a set of instructions that will perform the …

Read more

Methods of capturing, selecting, managing and exchanging data

Methods of Capturing Data What is data capturing: Data is the road to isolating information from a text and translating it into data that can be detected by a PC. In addition, perhaps more overall, the data collected which indicate that the acquisition of significant material, whether sourced from paper or electronic chronicle, may be …

Read more

Lossy vs Lossless

What is Lossy Compression The lossy compression algorithm is a technology that reduces the file size by deleting unnecessary information. Nobody hates to lose records, but certain types of files are too large to have enough capacity to carry all the original data, so in the first place, we don’t need all that stuff. In …

Read more

Entity relationship modelling

Introduction An E-R model is regularly the outcome of exact rating to explain and depict what is main to measures in a domain of work. It doesn’t draw the work measures; it just presents a work data design in geometrical shape an ER model can beside be imparted in an abuse structure, for example: one …

Read more

Application of Hashing

What is Hashing Hashing is the practice of taking clear text. and converting it into a dissolve of clear text data in such a manner that it is not meant to be decrypted. Hashing ‘s output is defined as a digest of a hash, hash price, or text. Hashing is an interesting field of alphanumeric …

Read more

Symmetric and Asymmetric Encryption

Overview There is an ever current chance of inappropriate access to all kinds of data in today’s cyber globe. Financial and payment system information that tin show consumers’ and customers ‘ personal identification information (pii) or payment card data is most at risk. encryption is important for securing pii and reducing the threats faced every …

Read more

Memory Address Modes

What is Memory Address Mode? The addressing mode is the method by which an instruction operand is specified. The data stored in the operation code is the operand value or the result. A microprocessor’s role is to execute a series of memory-saved instructions to perform a particular task. The following are needed for operations:  The …

Read more

Encapsulation

What is Encapsulation One of the basics of OOP is encapsulation. This applies to the packaging of information with the tools that function on the information. Encapsulation is worn to mask the values or status of a standardised data thing within a folder, avoiding straight entry to them by unauthorised gathering. The idea of encapsulation …

Read more

Assembly Language

What is Assembly Language In registering programming, low level computing construct (or building specialist language), routinely abbreviated ASM, is any of the low level programming languages where there is a very strong correspondence between the rules in the language and the designing’s machine code bearings. Since get together depends upon the machine code headings, each …

Read more

How to write Computer Algorithm for beginners?

What is Algorithm? An algorithm indicates a progression of steps that play out a specific calculation or errand. Algorithms were initially conceived as a component of arithmetic – “algorithm” originates from the Arabic essayist Muhammad ibn Mūsā al-Khwarizmi, – yet presently the word is emphatically connected with software engineering. Algorithm (articulated from AL to runtime) …

Read more

Procedural Languages

What is Procedural Languages: A procedural programming language is a PC programming tongue that obeys, all together, a great deal of requests. Here we see the examples of PC procedural languages are BASIC, C, FORTRAN and java. Procedural programming language tongues are a segment of the ordinary sorts of programming lingos used by substance and …

Read more

Programming Paradigm

What is the programming paradigm? Similarly, the world view can be defined as a technique for solving certain problems or for some trade-offs. The programming perspective is a way for a director to use different programming languages ​​to solve work problems directly. It can be said that this is a way to control anger by …

Read more

Lexical Analysis

Introduction             In computer science, lexical investigation, lexing or tokenization is the way toward changing over a grouping of characters (as in a software engineer or a page) into an arrangement of tokens (strings with an appointed significance and thus distinguished). a developer that performs lexical investigation might be known as a lexer, tokenizer, …

Read more

Virtual Machines

Overview of virtual machines The virtual machine gives a deliberation of the hidden physical framework to the visitor working framework running on it. You can classify virtual machines into different types based on the level of abstraction provided by VMM and whether the host and guest systems use the same ISA. There are two main …

Read more

The four stages of compilation

Overview Compilation is the way toward changing over source code into object code. This is finished with the assistance of the compiler. The compiler checks the source code for linguistic or basic mistakes, and if there are no blunders in the source code, it creates the objective code. The c gathering measure changes over the …

Read more

Syntax Analysis

Overview of syntax analyzer: A data planning system inputs character string data including kanji characters and identifying with phonetic data by entering phonetic data. A data device successively inputs phonetic data and sentence end data. A change section joins a change processor, a syntactic analyzer, and a need demand alternator The change processor progressively changes …

Read more