AS and A Level: Computer Science
Currently browsing by:
- Remove1000-1999 words
- Rating:
- 3 star+ (4)
- Submitted within:
- last month (2)
- last 3 months (2)
- last 6 months (2)
- last 12 months (2)
- Marked by Teachers essays 11
- Peer Reviewed essays 10
-
Business & IT Department BTEC. Organisational System Security - Describe the various types of threats to organisations, systems and data
3 star(s)Such as: 1. Natural Disasters: This refers to what happens when data is lost as a result of natural disasters such as earth-quakes, floods, tsunami's, terrorists, fires and such. 2. Malicious Damage: This covers data that is lost, damaged, or stolen as a result of a hacker of some sort. A hacker can implant a virus onto a system in order to damage the system or simply steal data such as credit card data. 3. Technical Failure: Technical Failure covers when devices fail abruptly such a servers going down, power supply failing, hard-drives crashing ect.
- Word count: 1389
-
Memory Managment Operating Systems
3 star(s)1. Relocation of memory 2. Allocation of memory 3. Protection of memory 4. Sharing of memory 5. Logical organisation of memory 6. Physical organisation of memory Address Binding Address binding is the process in which the memory management can link two different types of storage of data so a programme can be compiled or executed. To start, an item can have two differing forms of location storage. Firstly a physical address, this is the direct location on which a file is stored on to a hard disk drive or a external storage device, this is also known as a root directory. Secondly, the logical address is the sector/location in which partial files are stored in the memory.
- Word count: 1301
-
Open Source Software and its benefits for a country like Nepal.
That is how I got involved into it. In the seminar within, I was conned about the importance of Open Software to poor people like we Nepalese. I then knew that it was a kind of lottery like to us because we shouldn't have to pay even a single coin for the softwares which were so designed that they could be used to do any kind of works as the closed softwares like Windows and others do. Open Software have very big benefit especially in a country like Nepal.
- Word count: 1071
-
Case Study. LEGAL ISSUES-: Data Protection Act. Whiteman Leisure must ensure that the information that they are dealing with, must be fully protected from unauthorized access
organization Another factor in which WLC should take into consideration is to query the property of the specific data that they?re going to handle, (such as the customer?s personal details). This is important as the customer may grant WLC to transfer their information to any other third party organizations, however if the member does not allow the go ahead, WLC have to keep the data safely stored, therefore the querying with the customers carry a great importance. Thirdly, if there is a situation in which a hacker should wish to break into WLC?s Network to try and attempt to obtain data unlawfully, WLC will need to be trained and fully prepared if such unexpected crisis occurs within their organization.
- Word count: 1139
-
Operating systems. In this article, we are going to make a comparison between Mac and the Windows operating systems. First, lets us see that how a common user can differentiate these two operating systems.
3 star(s)No business edition, no premium edition. � Costs less in the long run. Most of Mac upgrades cost less than those of Windows OS Disadvantages of Mac over Windows: � Smaller software library � Low user familiarity with the interface � Cost can rise if not used for a larger amount of time. Now let us peep into the technical details about these operating systems. Describing MAC Operating System: Mac uses an open-source kernel called XNU. This XNU kernel is in fact a conglomeration of the BSD and Mach Kernel's that use POSIX system calls.
- Word count: 1048
-
Organisational system security - The possible security issues which exist within the FilmPoster.com system
3 star(s)Phishing attackers; will attack filmposters.com website to acquire sensitive information such as customer's usernames, passwords and credit card details, they would attack the website by using techniques such as Link manipulations method a form of a technical deception designed to make a link in an email and the spoofed websites that leads to the phisher. The link may appear to belong to film posters but leads t the phishers site. The other technique is phone phishing. Attackers that call customers claiming to be from film posters, for example an attacker can call a customer claiming to be calling from film
- Word count: 1291
-
Explain sequence, selection and iteration as used in computer programming; outline the benefits of having a variety of data types available to the programmer.
The lines of code are number from 1 to 9 to show that each line is executed in order: Example of a Sequence Control Structure in Visual Basic 1. Dim Num(2) As Integer 2. Console.WriteLine("Hello user, welcome to the program.") 3. Console.WriteLine("Enter your first number: ") 4. Num(0) = Console.ReadLine() 5. Console.WriteLine("Enter your second number: ") 6. Num(1) = Console.ReadLine() 7. Num(2) = Num(0) + Num(1) 8. Console.WriteLine("These two numbers equal: " & Num(2)) 9. Console.ReadLine() In this example, the program does the following: * Three integer variables called Num(0), Num(1)
- Word count: 1572
-
Explain sequence, selection and iteration as used in computer programming; outline the benefits of having a variety of data types available to the programmer.
Whole numbers we use when we don't require calculations to be too precise, such as scientific equations, so we need to make sure of this before we publish the program. Depending on how large we want our integers to go up to, or how efficient we want to be with our program's RAM use, we can choose to use bytes, integers, or longs (otherwise called long integers). Bytes have a range of 256 units, whereas long integers have a range of 4,294,967,296 units.
- Word count: 1697
-
Influential Factors in Choosing a Programming Language
for that one language. (M Fishpool, 2007, p.156) To deviate to using another language may in that instance not make sense to the hierarchy of the organisation. This may ring particularly true if the organisation has established a relationship with a particular vendor, such as Microsoft. Maintaining a link with this company may be rewarded with better support and discounts. (Anderson, 2010, p.166) On the other hand, maintaining the use of a particular piece of software (such as Microsoft's IDE Visual Studio) would limit language choice to those that suit that company's interests.
- Word count: 1497
-
Computer Maintainance - anti-virus, cookie deletion, drive scanning
The user can control exactly which software is allowed to pass data in and out of the system. For example automatic updates might be allowed to connect to the internet, while third party software may not be allowed access to internet and popup displayed asking for permission. 3. Anti-spyware: Anti-spyware is a type of computer software that is typically designed to detect and remove malicious programs from a computer. These programs are often called malware, which collect and send personal information from a venerable system to a third party without the users consent.
- Word count: 1755
-
Principles of Software Design & Development - A system needs to be created which is used on a hand-held device or a small computer which will be used by a waiter or waitress to take a customers order. It is important that the program works correctly becau
This is because when taking orders a waiter wants to be able to get the job done as quickly as possible to keep the customer happy. Inputs: * There will be a choice of buttons with Preset values behind them. * A set of tick boxes are included * A Text box Outputs: * A calculation of all of the values of the pizzas should display as a bill total * A Listbox of each item should be displayed. Processing: * Establish each individual Pizza size and Toppings included for each.
- Word count: 1261
-
Operating systems assignment 1
There are office environment software packages which allow user to perform tasks needed in office. Basically software is there to expand the abilities of the computer. When installing an operating system or a software package in it there are certain requirements that need to be met, otherwise they won't work and might damage the system. The computer must be prepared when considering a software upgrade. The preparation could be for example checking if there is enough space on the hard disk or if the computer meets the requirements as well as making sure that the software will work properly and is compatible with the system and if it's really needed and necessary.
- Word count: 1205
-
For this report I will be research about the different virtualization technologies available and how they are used. I chose this because I would like to know gain a better understanding of how this technology is implemented and how it benefits users. I wi
This often leaves the hardware underutilised and an expensive infrastructure. Fig.2 Shows how the virtualisation layer is implemented in-between the host OS and the application software of the system Fig.1 Native system without virtualisation Fig.2 Virtualised system Operating system virtualisation (container) In OS virtualisation the virtualised system is implemented on top of a host operating system. Each of the virtualised containers has their own file system which operates like a normal operating system. According to shield (2007) if a file is changed on a host operating system it is usually changed in each virtual machine.
- Word count: 1426
-
Explanation as to why projects fail
If there are not enough details and the product is made, the client may not be satisfied and therefore the project has failed as well as the project manager. There are projects out there that do not give enough requirements which have led to cases where the developers of the project having no input from the client, and create a project that they believe is needed without them knowing anything about the business itself. When the project has then been given to the client, business users will then say that it does not do what is needed to be done.
- Word count: 1065
-
How to minimise the chance of project failing
project manager will have to work harder over the time that they are paid; they may be then awarded a bonus if the project succeeds. To minimise this there are software's that can be used such as Microsoft Office Project to keep track on the budget so that it can be easier to avoid going over the budget. Insufficient details from client or Poor or No Requirements If there is simply not enough details from the client, then as a result the project would most likely be unsatisfactory for the client, in order to avoid this it would be very
- Word count: 1152
-
Evalutation of a Spreadsheet
By using the pie chart the manager is able to see the weekly profit percentages displayed on the pie chart as percentages. An "IF statement" can also be used to make the spreadsheet easier to use. This is because you can use one of these to show either positive or negative results. For example, if certain phones are selling under 5 a week by using an "IF statement" you could get these to show up as red. If certain phones are selling over 5 a week then you could make these show up as green.
- Word count: 1565
-
Unit 2 computer systems
The reason data validation is so useful is the fact it validates your input immediately, so you don't have to waste time by waiting for the server to validate it. Detecting a Users OS or Browser Many people use JavaScript to detect a user's operating system or browser, if this feature is used properly then it can help you control your website much easier. When the script discovers your browser it can then load files that have been fine tuned for that specific browser, eliminating/reducing problems that page may have had.
- Word count: 1366
-
Describe the following networking technologies:TCP/IP addresses Ports Protocols Domain name. The estate agency will be adding ICT to their company, which will create a network. in network there are lots of assets which gradually builds a network. I am
Computers use it to find one another computer and connect which each other. Domain name- the domain name identifies the IP address; domain names are used in URL to identify that specific website. For example can be, www.Facebook.com, the domain name of this is facebook.com. Server jobs File sharing is when have data stored in a network where other people can also access it. Internet server- Web host- a web host provides space for the person who can upload their personal site on to it.
- Word count: 1139
-
Computer Addiction
In many occasion, individuals with computer addiction may seek help for another condition such as depression, phobias or other addictions. Psychological symptoms of computer addiction are when you have a sense of well-being or excitement while at the computer, powerless to stop the activity, desperately seeking more and more time at the computer, ignoring family and friends, having problems with school or work. Also lying to employers and family about your activities, feeling empty, depressed, and irritable when not at the computer.
- Word count: 1211
-
Social Networking
This research along with class discussions and handouts will construct this research project. As I mentioned before SNS user's has to consider boundaries regarding their occupation, if they are going to ignore this point they will not produce beneficial results, such as employees at work place use the SNS to communicate to their families or friends they cannot put as much effort as they spouse to towards their job which will be result for company in loss of productivity. An estimate shows that British industry loss �6.5 billion per annum productivity and uncertain bandwidth usage.
- Word count: 1243
-
Future needs of Computer
Through E-Mail you can communicate with a person sitting thousands of miles away in seconds. There is chat software that enables one to chat with another person on a real-time basis. Video conferencing tools are becoming readily available to the common man. With desktop publishing, you can create page layouts for entire books on your personal computer. With computer, You can diagnose diseases. You can learn the cures. Software is used in magnetic resonance imaging to examine the internal organs of the human body. Software is used for performing surgery. Computers are used to store patient data.
- Word count: 1234
-
Application of the CIPP model
The inner circle repre?ent? the c?re v?lue? th?t pr?vide the f?und?ti?n f?r ?ne'? ev?lu?ti?n?. The wheel ?urr?unding the v?lue? i? divided int? f?ur ev?lu?tive f?ci ????ci?ted with ?ny pr?gr?m ?r ?ther ende?v?r: g??l?, pl?n?, ?cti?n?, ?nd ?utc?me?. The ?uter wheel den?te? the type ?f ev?lu?ti?n th?t ?erve? e?ch ?f the f?ur ev?lu?tive f?ci. The?e ?re c?ntext, input, pr?ce??, ?nd pr?duct ev?lu?ti?n. E?ch d?uble ?rr?w den?te? ? tw?-w?y rel?ti?n?hip between ? p?rticul?r ev?lu?tive f?cu? ?nd ? type ?f ev?lu?ti?n. The t??k ?f ?etting g??l? r?i?e? que?ti?n? f?r ? c?ntext ev?lu?ti?n, which in turn pr?vide? inf?rm?ti?n f?r v?lid?ting ?r impr?ving g??l?. Pl?nning impr?vement eff?rt? gener?te? que?ti?n? f?r ?n input ev?lu?ti?n, which c?rre?p?ndingly pr?vide? judgment? ?f pl?n?
- Word count: 1434
-
Justify a particular installation or upgrade. I have installed a Microsoft Visio because the user needed software that will allow him to design the layout of rooms,
Webshield- Provides you to safe social networking, chatting and downloading. It protects your computer when you download or exchange files from the risk of virus infection. Anti-Spam- Provides you safe and clear emails. AVG Anti-Spam often updates its database for detecting all forms of spam. Anti-Virus and Anti-Spyware- protects you from getting or spreading a virus, worm, or Trojan horse. It also prevents the unauthorized access of information from both spyware and adware. Enhanced Firewall- Helps you block the hackers.
- Word count: 1336
-
IT-based solutions, embracing the newest IT developments throughout the whole organisation
Software Systems: * Application Software This is a single program that can only do a specific task. It is put into two classes' general purpose and bespoke. General purpose application software is software that can be used for many different tasks, and because it is general anyone can get this software. Bespoke application software is software that is custom made and meets a single use. It is a one off piece of software. When a peripheral is connected to a computer a driver may need to be installed to run the peripheral, this driver is a piece of software and can be either an application or an operating piece of software.
- Word count: 1464
-
Logic and Logic Gates
P5 describe the key components of a computer architecture and how they interact P6 describe the features of a processor P7 describe the operation of logic gates using truth tables P8 create, document and test low-level Programs BTEC National Unit 9 Computer Architecture Assignment 2: Computer Components and Features Criterion covered P7, M2, M4, D1 For these tasks you are required to produce a report using drawings or diagrams and appropriate technical language. Make sure you use appropriate headings and subheadings to identify separate tasks and requirements 1)
- Word count: 1185