KS3 Computer Science

11-14 Years Old

48 modules covering EVERY Computer Science topic needed for KS3 level.

GCSE Computer Science

14-16 Years Old

45 modules covering EVERY Computer Science topic needed for GCSE level.

A-Level Computer Science

16-18 Years Old

66 modules covering EVERY Computer Science topic needed for A-Level.

Testing and Test Data

Testing Testing is the name given to the process of discovering if something works and if so if it works well.  Testing is used in computer hardware and software development to determine whether objectives are being met.  It is done at significant checkpoints in the development process. Purposes of Testing To be able to assess …

Read more

What is a Database?

Database Management System (DBMS) A database is any collection of information that has been systematised for quick searching and retrieval via the use of a computer.  Databases are intended to provide the means for the modification, deletion, storage, and retrieval of data in connection with different operations.  A database management system (DBMS) utilises queries to pull out information from the …

Read more

Secure Sockets Layer (SSL)

Secure Sockets Layer (SSL) Secure Sockets Layer (SSL) is a computer networking procedure for safeguarding connections between network application clients and servers over a vulnerable network, like the internet.  Because of several procedures and execution defects and weaknesses, SSL was disapproved for use on the internet by the Internet Engineering Task Force (IETF) in 2015 and has since been replaced …

Read more

Sensors

Sensors are advanced devices that are used to sense and react to signals, either electrical or optical.  A sensor translates the physical characteristic of the input into a signal which can be calculated electrically.  For example, the mercury in a glass thermometer expands and compresses the liquid in order to represent the calculated temperature, which can be viewed …

Read more

Data Verification

Data Entry Errors There are a few kinds of standard errors that are often experienced when doing data entry. Two of the most common of these are transcription errors and transposition errors. Transcription Errors Every time data is manually entered into the system, there’s a possibility that an error will be committed. Human errors do …

Read more

IP and MAC Addresses

IP and Mac Addresses: IP Address An Internet Protocol (IP) address is a rational numerical address that is allocated to every single computer and computing device that is a member of a given Transmission Control Protocol / Internet Protocol (TCP/IP)-based network. The IP address is the main element on which the networking architecture is made—no …

Read more

High and Low Level Languages

High and Low Level Languages: High-level Language A high-level language is a programming language intended to streamline computer programming.  It is called high-level because it is quite a few steps away from the original code running on a computer’s central processing unit (CPU).  High-level source code consists of easy-to-read structures that are later translated into …

Read more

Database Query

Database Query A database query is a way of requesting information from the database. A database query can be either a select query or an action query. A select query is a query for retrieving data, while an action query requests additional actions to be performed on the data, like deletion, insertion, and updating. For …

Read more

Database Fields

Database A database is a set of data arranged in a way that a computer program can immediately choose required portions of data.  It is often called a DB. A common database can be compared to a filing system which is arranged by fields, records, and files.  A field is a specific piece of data, …

Read more

Data Compression

What is Data Compression? Data compression is used everywhere. Many different file types use compressed data. Without data compression, a 3-minute song would be over 100Mb in size, while a 10-minute video would be over 1Gb in size. Data compression shrinks big files into much smaller ones. It does this by getting rid of unnecessary …

Read more

Memory and Storage

Memory and Storage Primary memory or temporary storage is called RAM.  RAM stands for Random Access Memory.  RAM is stored on the motherboard, in modules that are called DIMMs (Dual Inline Memory Module).  A DIMM is called a dual inline module because it has two independent rows of pins, one on each side.   A DIMM …

Read more

Free Software, Freeware, Shareware

Free Software Free software is software that gives the user freedom to execute, reproduce, distribute, study, modify and enhance the software.  To be specific, free software is a matter of freedom, and not of price. It means a user can freely utilise, change, and distribute a program, with one condition. The condition is that any …

Read more

HTML Structure and Presentation

HTML Structure HTML (Hypertext Markup Language) is the recognised markup language utilised in forming web pages.  It defines the composition of web pages by using markup.  HTML elements are the primary units of HTML pages and are denoted by tags.  HTML tags label parts of content like headings, paragraphs, and tables.  Browsers do not show …

Read more

Copyright and Plagiarism

Copyright Infringement Copyright infringement only occurs when the elemental work in question is copyrighted.  While copyright is automatic, it doesn’t apply to every single thing we make.  There are a number of things that you cannot copyright.  Things like lists, useful items, choreographic works (unless they have been recorded), fashion and ideas are all examples …

Read more

Database Table

A relational database is made up of different components. The most important of these is the table. All the data in the database is stored in the database table.  Without tables, there would not be much needed for relational databases at all. Information on a single subject is placed in order as rows and columns in …

Read more

DOS (denial-of-service) Attack

A DOS attack (denial-of-service) transpires when an attacker does something that prevents valid users from making use of computer systems, devices, or other network resources. DOS attacks naturally deluge servers, systems, or networks with traffic in order to overpower the victim resources and make it tough (or even impossible) for valid users to use them.  Often …

Read more

Data Transmission

Data transmission is a means of transmitting digital or analogue data over a communication medium to one or more devices.  It allows the transmission and communication of devices in different environments: point-to-point, point-to-multipoint, or multipoint-to-multipoint. Data transmission can either be analogue or digital, but is mostly earmarked for sending and receiving digital data.  As such, …

Read more

Logic Circuits

A logic circuit is a circuit that executes a processing or controlling function in a computer.  This circuit implements logical operations on information to process it. Logic circuits utilise two values for a given physical quantity (voltage, for example) to denote the Boolean values true and false or 1 and 0 respectively.  Logic circuits have inputs, as well as …

Read more

Asymmetric Encryption

Encryption is the process of taking a message and scrambling its contents so that only certain people can look at what’s inside. In this article, we’re going to focus on asymmetric encryption. Two Types of Encryption Symmetric encryption Asymmetric encryption Asymmetric encryption was created to solve the problem brought about by Symmetric encryption.  Let’s look …

Read more

Computer Misuse Act 1990

The Computer Misuse Act 1990 (CMA) The Computer Misuse Act (CMA) is a law that was passed in the UK in 1990.  The CMA was intended to craft regulations and exercise authority over computer misconduct and internet deception. The law was enacted in order to: Criminalise unofficial access to computer systems Dissuade dangerous criminals from …

Read more

Hypertext Transfer Protocol (HTTP)

Hypertext Transfer Protocol (HTTP) is a group of guidelines that authorise users of the World Wide Web to exchange information found on web pages. When accessing any web page, inputting http:// in front of the address informs the browser to communicate over HTTP. Nowadays, HTTP is no longer required to be entered at the beginning …

Read more