• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

AS and A Level: Computer Science

Browse by

Currently browsing by:

Rating:
4 star+ (1)
3 star+ (4)
Submitted within:
last month (1)
last 3 months (1)
last 6 months (1)
last 12 months (1)

Meet our team of inspirational teachers

find out about the team

Get help from 80+ teachers and hundreds of thousands of student written documents

  • Marked by Teachers essays 11
  • Peer Reviewed essays 10
  1. 1
  2. 2
  3. 3
  4. 4
  1. Marked by a teacher

    An introduction to Identity Theft

    4 star(s)

    * Business and commercial identity theft - used for obtaining financial services, charges against assets and obtaining goods. * Criminal Fraud - Using another's identity when held responsible for a crime. * Offences against the government e.g. benefit fraud and tax evasion. Prevalence & Statistics I.T. availability and understanding grows amongst the world's population as does the increase of Identity Theft. Those who perpetrate this crime constantly invent new ways of obtaining the victims personal and private information. In June 2005 http://www.identitytheftspy.com reported that its study returned that 13% of all internet users had stated that they or a member of their household had been the victim of identity theft.

    • Word count: 2563
  2. Marked by a teacher

    Designing a data system for a vintage clothes business.

    3 star(s)

    Luki currently offers these designs off her Facebook, Tumblr, twitter and website page. Luki runs a team consisting of a photographer, two male models and two female models who all are her closest friends. She?s named this group ?The House of Sharps? and has plans to expand in the near future. Luki works alone doing the designing, printing and general creation of her products but she sells the clothes through her friends. Luki would like a new system, as her current system is unorganised and is recorded simply through writing. Her business is not very big so she would like a system for when she expands she can stay organised.

    • Word count: 2398
  3. Marked by a teacher

    LAN & Topologies & Data Flow

    3 star(s)

    The computer need to be switched on as well, this will allow the computer to send broadcast message to the computer. Gateway - It is a network point which allows you to enter another network. Gateway also allows you to connect LAN or a WLAN to the internet or another WAN. The main role of a gateway is to convert protocols among communications networks. This means that if a computer receives a packet from Apple Talk the gateway will then convert to any format which it needs to send it to whether it is a TCP/IP, OSI or other.

    • Word count: 2405
  4. Peer reviewed

    Networking Diagrams and Case Study

    3 star(s)

    Star Network ? One of the most common network topologies. A star network has one central switch/hub/computer, which sends messages to all the other connected nodes. 9. VPN ? A Virtual Private Network is a secure network that can be accessed from anywhere. E.g. LJBC school portal network can be directly accessed from school and then if you enter your school username/password from home on the portal page you can also access it. B) OSI layers: 1. Work Station ? N/A 2. IP Address ? Layer 3 Network Layer 3.

    • Word count: 2009
  5. System Analysis The aim of the Jewellery store system is to make the work easier to the jewellery store staff and to allow the customers and staff to explore the store quickly and easily. To manage the stock To figure out the total s

    If a customer orders for an item the order should be sent to the store. If the item is not available at the moment a notification should be sent to the manager. Since the Web site is working all the time 24/7. People can read the marketing materials, test drive your products and buy them outside of normal business hours. The Internet is not only the salesperson and the cashier, but the delivery guy as well. Fact finding methods I used the following methods to analysis the system's requirements.

    • Word count: 2300
  6. Video Rental System

    � And Customer rental history table also resolves the many to many relationships between the Customer and Rental item. � A customer may or may not have one or more rental items. � A rental item may or may not have one or more customers. ER Diagram: Data Dictionary: Table Name Attribute Name Contents Type Length Format Range Req'd Key Referenced Table CUSTOMER CUS_ID Customer ID Autonumber Long Int 1-99999999 Y PK CUS_FNAME Customer first name Text 255 X(255) Y CUS_LNAME Customer Last Name Text 255 X(255) Y CUS_ADDRESS1 Customer Address Text 255 X(255) Y CUS_ADDRESS2 Customer Address Text 255 X(255)

    • Word count: 2284
  7. Unit 10 Server-side scripting of web pages part 2

    A motherboard provides the electrical circuit connections, these circuits are used by other components of the system to communicate. The central processing unit and other subsystems such as real time clock, and various peripheral interfaces are also located on the motherboard. This is motherboard doesn't use active heat sinks on its bridges instead it uses a complex passive heat sink. Power Supply - A power supply unit (PSU) is the component that supplies power to a computer. In a PC the power supply is the metal box usually found in a corner of the case. The power supply has many various power leads all for different things such as: * 20+4pin power connector o Powers the motherboard, depending on what motherboard you have it will either require a 20pin or a 24pin connector.

    • Word count: 2205
  8. The impact of the availability of electric information on individuals and society

    All those things had a huge impact on me and my family. For example, when I want to meet my friend first of all I text him to find out if he's at home and is not busy, while not so long ago when I didn't even have a mobile phone I had to come to his home and find out if my friend was at home and can go out. It's not very time efficient, because if he lives far it takes loads of time to get to his house and then to come back.

    • Word count: 2388
  9. Introduction of Communication

    Email was originally only intended to send text, but that has evolved, today many people around the world can get flyers from businesses, many people especially businesses prefer to send out flyers like this as they only need to produce one copy of the flyer. Advantages Email has a lot of advantages, Fast communication Saves trees Saves fuel Businesses enjoy low cost communication Free Email is easier to filter; the subject line lets people prioritize their mail, unlike regular mail that needs to be opened first.

    • Word count: 2063
  10. Computer Architecture

    If the sound was sampled every half second, there would be half as much information lost from the original source, but file size would be doubled. This is the trade off that has to be made between file size and quality. Bit depth is the number of bits of information recorded per second .The higher the bit depth means, the higher the sample rate and this results in higher quality sound file. A good example of bit depth is in CD quality audio which has a bit depth of 16 bits and a sample rate of 44.1 kHz.

    • Word count: 2226
  11. Purposes and Features of a Relational Database

    Businesses, Websites and Companies need to store data in an easy to use and quick to access manor. For example, at a sports centre, if a new membership was started. Instead of writing down the data onto a bit of paper and finding it when needs be, a database can be used to add and find the membership almost instantaneously by a member of staff. This saves many 'man hours' as well as keeping the businesses data organised. It also allows much time to be saved by the establishment simply because a member can use their card at the gate to get in (this also accesses the database)

    • Word count: 2067
  12. LAN & WAN Protocols

    Ethernet - Commonly used cable when creating LAN networks. It is also the common standard when creating LAN networks. IEEE 802.11 - This is the set protocol used for WLAN. The IEEE stands for Institute for Electrical & Electronic Engineers. You could also have IEEE 802.12 which is completely a different standard used for WiMAX. Token Ring - A computer sending data needs to hold a token, when all the computers are sending the data then it does not need to hold the token. Layer 3 (Network) - Responsible for end to end packet delivery.

    • Word count: 2387
  13. Betting Shop computer investigation

    ACPO state there are 4 principles that should be adhered to at all times, so when reading this must be took into consideration. The four principles are as follows:- Principle 1: No action taken by law enforcement agencies or their agents should change data held on a computer or storage media which may subsequently be relied upon in court. Principle 2: In exceptional circumstances, where a person finds it necessary to access original data held on a computer or on storage media, that person must be competent to do so and be able to give evidence explaining the relevance and the implications of their actions.

    • Word count: 2277
  14. AQA Computing CPT3 June 08 Peter's Petrol Pumps

    customers that have used the pump in the day 11 - Password String Stores the password required to unlock the console password123 Presence USER INTERFACE MAIN FORM This form will be shown first when the program is run. It will be split in 2, with the pump on 1 side and the console on the other side. For security reasons, the console will not be shown without a password being entered to unlock it. Most of the functions will be carried out from this form, such as filling the car with petrol and Peter using the console functions.

    • Word count: 2151
  15. Evaluation of a computerised system

    * Data must be backed up to minimise loss of data and to reduce the amount of work if data does get lost A sufficient back-up plan has been constructed which included at least two ways of backing up records at regular intervals. * To find information about an item quickly The 'Find product' query is a good way of finding information about an item quickly. It allows the user to search for an item using its name or in a separate query a product ID can be used.

    • Word count: 2333
  16. Subnetting and IPs IP addresses are an extremely important part of sending and receiving data across the Internet or across multiple networks. The IP address is the address assigned to each device and computer.

    only 126 Class A networks can exist across the entire Internet. However, each of these networks can have 16 million hosts. Because of the rarity of these addresses, only 40 companies across the world actually have these addresses and they are all extremely big companies (examples include General Electric Company, IBM, and Apple as well as a few social security companies) and the rest are reserved used by the companies that manage IPs in various geographical regions. Class B addresses are almost split down the middle - theoretically half of the digits are for the network ID and the other 8 are for hosts.

    • Word count: 2124
  17. What is E-Commerce?

    It's far more global than this, if someone was to mention e-commerce instantly now we think of E-Bay. E-Bay has a huge number of users, some 250,000,000+ and this will be a constantly growing figure. It's the same with bank transactions, this can all be done online and this is a form of e-commerce also. But why has this become such a huge part of the modern day life, when 10 years ago it was almost unheard of? The reason for this is the demand to make our lives easier. Making the most of our time provides the efficiency needed to maximise returns in other areas.

    • Word count: 2069
  18. Free essay

    Hardware and Functions of a Micro Processor

    Below is an example of the structure of a microprocessor. The CPU has four main functions, fetch, decode, execute and write back, these processes will be outlined in greater depth in the latter part of this assignment. Let's now have a look at some of the microprocessors components. Logic Gates Logic gates aid the computer in receiving results dictated by a set of components and rules. The logic gate has several inputs but only one output dependant on the various inputs.

    • Word count: 2170
  19. Basic Database Building

    The database normalisation was done to second form and this left me with the following tables. Here we can see the differing tables that I have adopted; the tables contain all the necessary information to carry out the tasks needed in the bullet point list at the top of this document. However, the programme could be expanded upon greatly but at the current moment this wasn't needed. Database Relationships The database relationships were the trickiest bit, with the need for accurate lining playing an important part. The linking of the database was minimal but appropriate and this is what helped me in creating a working database, below is the screenshot of the relationships.

    • Word count: 2594
  20. The seven layer osi model

    Application is considered very basic and is something which is visible to the user. So as the user is using their machine they send information through the web based e-mail account or outlook express by clicking the send button, this could be any type of media or text based document. Presentation The purpose of the 6th layer, called presentation is to transform the data from the application layer and or the session layer (which will be described next) in to a useable format. It can do this is numerous ways, namely mime encoding. Mime encoding is multipurpose internet mail extension.

    • Word count: 2295
  21. supermarket database-computer coursework

    Many workers are needed to check the store Solution of the problem To solve the problem in the old supermarket system,setup up a database system that would control local store inventory, and cover the ordering of stock from the customers. Advantages of the new system Digital record is used. Millions of information are stored in a 6-inch hard-dish. The records can be backed up inside a DVD or a hard dish drive. the payments are calculated by computer, which decreases the human error In order to search the data of the customers and supplier, you simply need to type the name, or tel.

    • Word count: 2320
  22. Computing Module 3 Writeup

    Range Check Between 100000 and 999999 NuberOfCandidatesEntered Presence Check Required = Yes Examiner Table: Validation Rules: Field Validation Check Validation Rule ExaminerNumber (Primary Key) Range Check Between 100000 and 999999 Uniqueness Check It is the Primary Key Input Mask 000000 ( must have 6 digits) Presence Check Required = Yes Forename Presence Check Required = Yes Surname Presence Check Required = Yes Address Presence Check Required = Yes Postcode Input Mask >LL00\ 0LL;O;_ (Must be in this form) Presence Check Required = Yes SubjectReferenceCode Presence Check Required = Yes Input Mask Options from drop-down box (20094, 28181, 64773)

    • Word count: 2941
  23. Ict Analysis

    Project Input Processing Output Restaurant Customer Details (name and address) Booking Details (date, time, number in party, table number) Table details (table number, maximum number of people) Look up customer details. Add, Edit and delete booking details. Look up booking details. Search for available tables on a particular time. Search for bookings on a particular date. Booking details on screen. Lists of daily bookings. Letters to customers advertising special promotions and events. Consulting the users of the current system Questionnaire 1.

    • Word count: 2738
  24. importance of data security and data safety

    3. Be accurate and be kept up to date. There is a duty to keep it up to date, for example to change an address when people move. 4. Not be kept longer than necessary. For example it is alright to keep information for certain length of time but it would be wrong to keep information about past customers longer than a few years at most 5. Be obtained and processed for limited purposes. For example the organization must use the data only in the way it is described and it must not use it for any other purpose.

    • Word count: 2217
  25. Internal Operations

    ASCII Code Binary Value Hexadecimal Value SOH 000 0001 01 / 010 1111 2F 3 011 0011 33 SP (Space) 010 0000 20 Horizontal tab 000 1001 09 Shift In 000 1111 0F 2) Covert the decimal numbers 8, 27 and 187 into 8-bit binary and two digit hexadecimal numbers. Show your working and explain any special techniques. * 8 - because this is fairly simple, I have just added a 1 in the 8 column: 00001000 ( 8-bit binary), 08 ( hexadecimal)

    • Word count: 2308
"

As an industry IT is a significant employer worldwide and Computing is a key foundation in pursuing a related career. At A level Computing involves the study of a range of topics, from memory and storage to how microprocessors work, from systems architecture to programming and logic. There is a distinctive practical programming element to the course and you may be creating apps, websites or other types of creative coding solutions.

Whilst part of the course will be practically examined the majority will be assessed in examinations. You can gain valuable skills by accessing the Marked by Teachers Computing section which contains a wide variety of essay examples to help you master the essay skills required.

Computing does tend to sit well with Maths and Further Maths as other A level optionsbut Economics and Physics are also favoured subject combinations. As a successful Computing Alevel student you'll find your qualification highly favoured by Computer Science departments at University.

"

Conclusion analysis

Good conclusions usually refer back to the question or title and address it directly - for example by using key words from the title.
How well do you think these conclusions address the title or question? Answering these questions should help you find out.

  1. Do they use key words from the title or question?
  2. Do they answer the question directly?
  3. Can you work out the question or title just by reading the conclusion?
  • Neurophysiology - Discuss the roles of development learning and evolution in the construction of the nervous system

    "Conclusions The roles played by each factor described here each have their own specific effect on the construction of the nervous system. The evolutionary aspect controls the "blueprints" of the nervous systems that are hard coded into the DNA of the animal. However it is not specifically the genetic makeup of the nervous system that natural selection acts against, rather the phenotype of the nervous system, which is the combination of the developmental and the learning factors. The evolutionary factors alter the genotype, the only source of variation that can be passed down to their offspring. The development can only attempt to recreate the layout as specified by the different alleles; it cannot exceed them in terms of functionality. The true source of variation depends on the extrinsic information obtained and stored in memory, but that us not able to cross generations (with the exception of tradition) and so could be an explanation for the high evolutionary conservation of the nervous system."

  • Discuss the roles of development learning and evolution in the construction of the nervous system

    "Conclusions The roles played by each factor described here each have their own specific effect on the construction of the nervous system. The evolutionary aspect controls the "blueprints" of the nervous systems that are hard coded into the DNA of the animal. However it is not specifically the genetic makeup of the nervous system that natural selection acts against, rather the phenotype of the nervous system, which is the combination of the developmental and the learning factors. The evolutionary factors alter the genotype, the only source of variation that can be passed down to their offspring. The development can only attempt to recreate the layout as specified by the different alleles; it cannot exceed them in terms of functionality. The true source of variation depends on the extrinsic information obtained and stored in memory, but that us not able to cross generations (with the exception of tradition) and so could be an explanation for the high evolutionary conservation of the nervous system."

  • Discuss the relationship that exists in the UK between the legal rules that govern directors' duties and principles of corporate governance.

    "The UK's approach to governance is a self regulatory approach unlike the US legislative approach. Brussels have looked into creating a European corporate governance code however they came to the conclusion it was not necessary and agreed that the European Union should create a common approach which would coordinate national corporate governance codes. If legislation is brought in it would defeat the point of corporate governance as it would cause restrictions on a company rather than the flexibility provided by The Combined Code. It is said that companies who follow a code of corporate governance have a more stable price/earnings ratio this is due to the management of their financial assets, the code helps them manage their assets more efficiently and so they are seen as more stable companies in which to invest. This in turn creates a confidence in investors who are willing to support the development of their company as they have faith in their investment due to the guidelines the company follows set by The Combined Code."

Marked by a teacher

This document has been marked by one of our great teachers. You can read the full teachers notes when you download the document.

Peer reviewed

This document has been reviewed by one of our specialist student essay reviewing squad. Read the full review on the document page.

Peer reviewed

This document has been reviewed by one of our specialist student document reviewing squad. Read the full review under the document preview on this page.