• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

AS and A Level: Computer Science

Browse by

Currently browsing by:

Rating:
4 star+ (2)
3 star+ (3)

Meet our team of inspirational teachers

find out about the team

Get help from 80+ teachers and hundreds of thousands of student written documents

  • Marked by Teachers essays 11
  • Peer Reviewed essays 10
  1. 1
  2. 2
  3. 3
  4. 4
  1. Marked by a teacher

    Compilers and Interpreters

    5 star(s)

    Once the compilation process has been completed, the object code will run much faster than the same interpreted code. And the program only has to compile the code once. * Object code does not need the compiler to actually run it, only to convert it from source code to object code. Therefore, the object code produced by a compiler can be distributed to other computers without the compiler. One could write a program and then sell the object code on CD to anyone who wants to run the application. * Object code is difficult to 'read' so that it can be distributed without actually revealing the code.

    • Word count: 3673
  2. Peer reviewed

    information systems assignment 2

    4 star(s)

    The ICO maintains guidance relating to the Act. The Act defines eight principles of information-handling practice. The UK Data Protection Act is a large Act that has a reputation for complexity While the basic principles are honoured for protecting privacy, interpreting the act is not always simple. Many companies, organisations and individuals seem very unsure of the aims, content and principles of the DPA. Some hide behind the Act and refuse to provide even very basic, publicly available material quoting the Act as a restriction The act also impacts on the way in which organisations conduct business in terms of who can be contacted for marketing purposes, not only by telephone and direct mail, but also electronically and has led to the development of permission based marketing strategies.

    • Word count: 4456
  3. Peer reviewed

    Principles of Computer Networks

    3 star(s)

    Infrared technology has been extended to allow more than two computers to be connected semi permanent networks. The advantage of a LAN is that the same physical communication path can be shared by multiple devices. For example it there is a printer, a computer and the internet connection the LAN will allow connections to the printer and it will also allow connections to the internet. If a software is loaded onto the file server that all the computers on the network can use it. There are quite a few drawbacks of a LAN network. For example security measures need to be taken so that users cannot access unauthorised areas. It is quite hard to setup the network.

    • Word count: 4762
  4. Computer systems assignment 1

    The more memory there is the more applications can be ran on the computer at the same time. There are many forms of Memory. Nowadays most computers use DDR2 or DDR3 * Graphics Card- Graphics Card is needed to display an images on a monitor. There are AGP, PCI, PCI-E graphics. It just depends on what slot on a motherboard the card will be connected to. New graphics cards are usually made with 512MB or 1024MB of video memory which can generate graphics for all of new games. * Sound Card- sound card basically generates sound for what is ran on a computer, whether it is games, music or films.

    • Word count: 3011
  5. EULA

    You may reproduce and share files or scripts created with the Editor with friends or family on a non-commercial basis only. Microsoft does not grant you the right to sell or otherwise distribute files from the SOFTWARE PRODUCT in exchange for value. * Storage/Network Use. If not prevented by copy protection technology, you may also store or install a copy of the SOFTWARE PRODUCT on a storage device, such as a network server, used only to RUN the SOFTWARE PRODUCT on your other COMPUTERS over an internal network; however, you must acquire and dedicate a license for each separate COMPUTER on which the SOFTWARE PRODUCT is RUN from the storage device.

    • Word count: 3136
  6. AS ICT Corsework - Mr Brookes K-Fit Ltd

    After that he decided to invest the money in where he thought there was a hole in the market. As trade has declined recently for Mr Brookes though he has been forced to take a new approach to work figuring out a way to develop on his business and increase his revenue. Which is why nearly all of his money is tied up in this factory development, he's hoping the company will use a range of CAD and CAM machinery.

    • Word count: 4362
  7. Explain the different techniques of gathering information to answer an IT Technical problem or request. Remember all computers at Cranks Ltd are networked together and they do not have any standalone computers.

    They are all catalogued meaning put in order therefore would not be hard to find because usually the old manuals would be taken out and replaced with the up to date one, once the IT technical support has obtained the required manual they would then extract the necessary information and answer the problem. To obtain information from fault logs, either the help desk or a technician would have access to this; even if others have access it would only be for viewing and not editing.

    • Word count: 4312
  8. ICT Sample Work Welcome Centre Requirements

    PROBLEM IDENTIFICATION As the business is growing, the staff are getting increasingly busier. One of the key problems is that a manual booking system is used. A customer will call or email with a request for a conference. The staff will write down some basic details about the event such as the contact's name, event name and date and time of the conference. They will also ask the customer for the number of delegates, and therefore determine the number and size of rooms required.

    • Word count: 4704
  9. ICT Sample Work India Red

    They are looking to expand the restaurant to allocate more people and also taking into consideration to open another restaurant around Oxford Street in London. PROBLEM IDENTIFICATION The business has been running for good few years now. Their main problem is that when orders are taken over the phone or in the restaurant they are written down on an order form which is taken than handed to the chef. This is where the problem begins. This is because the orders are hand written and the chefs will tend to read them slightly wrong, maybe the person who is taking the

    • Word count: 5076
  10. Implementing New Technology In To A Business

    Organisations can monitor or log sales using specialist software. This will allow them to get a much greater understanding of the impact of products on consumers. They will be able to adapt their product range on demands of customers. They will be able to do this by looking at feedback through the ordering system. Adapting New Purchasing Opportunities The developments in IT have helped organisations to have quicker and easier automated ordering systems. Some organisations use EDI to monitor stock, this helps them to track sales and when they are running low on a product, it will automatically order new stock.

    • Word count: 3617
  11. Computing Project

    In a day the instructor ends up wasting around 2 hours after the lesson updating his books. I wish to change the way this works and I want to make the whole system work around the computer to decrease the time wasted, I want to programme the computer to do half the jobs that the instructor currently has to do, I wish to change the 15 minutes to 5 minutes and also provide the instructor with useful information such as pass rates, average lessons needs, average cost for student and how many lesson each student has had.

    • Word count: 6150
  12. Signal Theory

    Hubs operate on the physical layer of the OSI model and they are protocol transparent. This means that they do have the ability to set upper layer protocols such as IP, IPX or a MAC addresses. Hubs just extend them do not control the broadcast or collision domains. Bridges - Used to increase the performance of a network by dividing it into separate collision domains. Even though they are more intelligent than hubs due to the fact that they operate at the Data Link layer of the OSI model, they still are not able to control the upper layer protocols.

    • Word count: 6197
  13. Analysis of Johnson Music

    Initial ideas about the problem In my experience, the way the shop handles sales of products is very inefficient. One major problem is the way the shop handles stock control. All of the shop's stock control is paper-based, meaning every time a product is sold at the shop, paperwork has to be filled in to keep control of the stock. A customer can go to the counter and say they want to purchase a guitar, or any other Ibanez products.

    • Word count: 9304
  14. Security Issues of E-Commerce

    With this in mind the businesses have to be a lot more careful. So how are these precautions taken? Below is a list of the most common issues that both consumer and businesses may face. Below that is an explanation (only briefly) of what the actual implications mean. * Disruption or denial of service attacks * Defacing web sites * Unauthorized use of credit cards * Invasion of privacy-especially related to minors * Unauthorized changes to database records * Fraud * Spreading viruses * Employee misuse of the Net * Employee privacy * Email harassment Disruption or denial of service attacks A denial-of-service attack (DoS attack)

    • Word count: 3103
  15. Free essay

    Incentives and Barriers to E-commerce

    All of the above are time consuming tasks and are going to cost the business. Is it really worth undertaking all of these processes if the revenue to be made is minimal? These are all questions that need to be considered. As far as the consumer is concerned we have a completely different type of situation. The consumer is to be possibly sat at their home and can only get a small picture of the item they want to buy, also, if it is clothing that they are to buy then the size of the item may not be exactly to their liking.

    • Word count: 5845
  16. Free essay

    Setting up and E-Commerce Site

    We have to now consider the naming of the brand or business, this is important as there are many problems that could arise at this stage. Fir example, if a person wished to call their brand or business Vista, then we could have a problem with patent laws from Microsoft as they have an operating system called this. This is why it's important to consider our business name before we go any further. 3. Once the above has been considered and we have drawn up our proposals and deemed there is a gap in the market then we can continue to the next stage.

    • Word count: 4752
  17. AQA Computing CPT3

    Such languages often abstract away CPU operations such as memory access models and management of scope. Below shows a list of a number of different high level programming languages. * Visual Basic (VB) * Java * Action Script * ASP * VB.net * C++ As the school were limited on the applications that we could use to produce a program for Peter's Petrol Pump and due to the applications available on the school network we only had Action Script 3.0 (via.

    • Word count: 5404
  18. Hardware and Software

    These cards can shift millions of pixel for high quality view of the images. Hard Drives I think backing up data is very important. This could be done on Hard Disks. For Example a self employed designer may back up work files onto external hard disk, CD, DVD, or Removable disk drive but as organisation are larger, therefore they might back up using automated backup software. Because organisations have to transfer the data onto external drives for their clients, it could be transferred to CD format, DVD and Zip Disks.

    • Word count: 4388
  19. overview of GPS

    The receiver can be classed as one of GPS's three segments, with this the user can perform various tasks. The receiver can find its distance from the satellite by measuring the time for a signal to reach the receiver from the satellite, and can find its exact three-dimensional position using triangulation. The other segments of GPS are satellite constellation and ground/monitoring network, or can be known as space segment and control segments. The satellite constellation/space segment is 24 satellites in space and were launched 27 years ago in 1978 with the 24th hitting space in 1994.

    • Word count: 4271
  20. You have been asked to create a database to handle various account combinations of customers in a bank of your choice. Your database must consist of at leas three tables (maximum of 7) to store information about customers, accounts, investments, mortgages

    Project models are produced at many different stages of a project life cycle for various purposes. This includes: * physical models showing the system as it is currently exists, with implementation details - who does what and where * logical models showing the essence of the system - what the system actually does, without any implementation details * models used during the systems analysis stage of the project * models used during the design stages of a project * models giving a general overview of a system, putting all the relevant parts of the problem into perspective * highly detailed models for one small part of a system * models that show different perspectives of a system, for example dynamic, functional or static.

    • Word count: 3486
  21. ict implementation

    6 Click the command button "HELP" To check the help button /Vba opens The help button should open with a message box The help button opens showing a message box Screen shots of Testing : Test number 1 The user clicks on the stock list button and the stock list worksheet opens: As you can see below the worksheet "stock list " opens and works Test number 2 The user clicks on the stock list button and the "customer details" worksheet opens: As you can see below the worksheet "customer details " opens and works Test number 3 The user

    • Word count: 3164
  22. Program Code Program DVD_Program; Uses Menuunit, CRT, dos; {Declaration of constants in program}

    then valid:= j; End; validateaddress:= valid; if ( valid<> 0) then Begin textcolor(red); gotoxy(12,19); Write( 'SORRY INVALID ADDRESS '); delay(800); gotoxy(12,19); Write (' '); textcolor(blue); gotoxy(37,13); For j:= 1 to 1+1 Do Write (' '); End; End; {--------------------------------------------------------------------} {Ensures that the phone # entered by the user is valid i.e. contains only numbers, spaces or dashes.} Function validatephone (phone: string): integer; VAR j, l: integer; c: char; valid: integer; Begin l:= length (phone); valid:= 0; FOR j:= 1 to 1 DO Begin If not (phone[j] in['0'..'9','-'])

    • Word count: 4761
  23. Smart Card System

    The Database Server executes each SQL statement and passes the results back to the client. Open Database Connectivity (ODBC) is often used by a client to send SQL requests to the server to process. ODBC provides a standard SQL interface for sending requests to the server. The Remote Procedure Call (RPC) is an extension of the traditional client/server model suited to transaction processing environments. It allows for the creation of a Transaction Server. Clients call a remote procedure and pass parameters to it. A single message allows the Transaction Server to execute stored (compiled) database statements and return the results to the client.

    • Word count: 24944
  24. Flexible Architectures in Communication Security Application

    Cryptography provides the mechanisms necessary to implement accountability, accuracy, and confidentiality in communication. This trend will be further underscored with the widespread adoption of secure protocols such as secure IP (IPSEC) and virtual private networks (VPNs). Efficient cryptographic processing, therefore, will become increasingly vital to good system performance. In this thesis, we explore hardware/software-design techniques to improve the performance of secretkey cipher algorithms. We introduce new instructions that improve the efficiency of the analyzed algorithms, and further introduce the CryptoManiac processor, a fast and flexible co-processor for cryptographic workloads.

    • Word count: 16220
  25. Investigating Visual Programs

    A second difference is in the way the programs are and can be made. VB is preloaded with all kinds of buttons and boxes, however mostly it is limited to these as forms of input and output. Qbasic is not preloaded with any user interface at all, let alone one with preset functionality, but can be programmed to take input anywhere and anyhow, if you can figure out a way to put it into code. But while VB can use many colours, Qbasic can only handle 16 of them. The third and most important difference is in the way the languages run.

    • Word count: 4294
"

As an industry IT is a significant employer worldwide and Computing is a key foundation in pursuing a related career. At A level Computing involves the study of a range of topics, from memory and storage to how microprocessors work, from systems architecture to programming and logic. There is a distinctive practical programming element to the course and you may be creating apps, websites or other types of creative coding solutions.

Whilst part of the course will be practically examined the majority will be assessed in examinations. You can gain valuable skills by accessing the Marked by Teachers Computing section which contains a wide variety of essay examples to help you master the essay skills required.

Computing does tend to sit well with Maths and Further Maths as other A level optionsbut Economics and Physics are also favoured subject combinations. As a successful Computing Alevel student you'll find your qualification highly favoured by Computer Science departments at University.

"

Conclusion analysis

Good conclusions usually refer back to the question or title and address it directly - for example by using key words from the title.
How well do you think these conclusions address the title or question? Answering these questions should help you find out.

  1. Do they use key words from the title or question?
  2. Do they answer the question directly?
  3. Can you work out the question or title just by reading the conclusion?
  • Neurophysiology - Discuss the roles of development learning and evolution in the construction of the nervous system

    "Conclusions The roles played by each factor described here each have their own specific effect on the construction of the nervous system. The evolutionary aspect controls the "blueprints" of the nervous systems that are hard coded into the DNA of the animal. However it is not specifically the genetic makeup of the nervous system that natural selection acts against, rather the phenotype of the nervous system, which is the combination of the developmental and the learning factors. The evolutionary factors alter the genotype, the only source of variation that can be passed down to their offspring. The development can only attempt to recreate the layout as specified by the different alleles; it cannot exceed them in terms of functionality. The true source of variation depends on the extrinsic information obtained and stored in memory, but that us not able to cross generations (with the exception of tradition) and so could be an explanation for the high evolutionary conservation of the nervous system."

  • Discuss the roles of development learning and evolution in the construction of the nervous system

    "Conclusions The roles played by each factor described here each have their own specific effect on the construction of the nervous system. The evolutionary aspect controls the "blueprints" of the nervous systems that are hard coded into the DNA of the animal. However it is not specifically the genetic makeup of the nervous system that natural selection acts against, rather the phenotype of the nervous system, which is the combination of the developmental and the learning factors. The evolutionary factors alter the genotype, the only source of variation that can be passed down to their offspring. The development can only attempt to recreate the layout as specified by the different alleles; it cannot exceed them in terms of functionality. The true source of variation depends on the extrinsic information obtained and stored in memory, but that us not able to cross generations (with the exception of tradition) and so could be an explanation for the high evolutionary conservation of the nervous system."

  • Discuss the relationship that exists in the UK between the legal rules that govern directors' duties and principles of corporate governance.

    "The UK's approach to governance is a self regulatory approach unlike the US legislative approach. Brussels have looked into creating a European corporate governance code however they came to the conclusion it was not necessary and agreed that the European Union should create a common approach which would coordinate national corporate governance codes. If legislation is brought in it would defeat the point of corporate governance as it would cause restrictions on a company rather than the flexibility provided by The Combined Code. It is said that companies who follow a code of corporate governance have a more stable price/earnings ratio this is due to the management of their financial assets, the code helps them manage their assets more efficiently and so they are seen as more stable companies in which to invest. This in turn creates a confidence in investors who are willing to support the development of their company as they have faith in their investment due to the guidelines the company follows set by The Combined Code."

Marked by a teacher

This document has been marked by one of our great teachers. You can read the full teachers notes when you download the document.

Peer reviewed

This document has been reviewed by one of our specialist student essay reviewing squad. Read the full review on the document page.

Peer reviewed

This document has been reviewed by one of our specialist student document reviewing squad. Read the full review under the document preview on this page.