• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

AS and A Level: Computer Science

Browse by

Currently browsing by:

Rating:
3 star+ (4)
Submitted within:
last month (2)
last 3 months (2)
last 6 months (2)
last 12 months (2)

Meet our team of inspirational teachers

find out about the team

Get help from 80+ teachers and hundreds of thousands of student written documents

  • Marked by Teachers essays 11
  • Peer Reviewed essays 10
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  1. Marked by a teacher

    Business & IT Department BTEC. Organisational System Security - Describe the various types of threats to organisations, systems and data

    3 star(s)

    Such as: 1. Natural Disasters: This refers to what happens when data is lost as a result of natural disasters such as earth-quakes, floods, tsunami's, terrorists, fires and such. 2. Malicious Damage: This covers data that is lost, damaged, or stolen as a result of a hacker of some sort. A hacker can implant a virus onto a system in order to damage the system or simply steal data such as credit card data. 3. Technical Failure: Technical Failure covers when devices fail abruptly such a servers going down, power supply failing, hard-drives crashing ect.

    • Word count: 1389
  2. Marked by a teacher

    Memory Managment Operating Systems

    3 star(s)

    1. Relocation of memory 2. Allocation of memory 3. Protection of memory 4. Sharing of memory 5. Logical organisation of memory 6. Physical organisation of memory Address Binding Address binding is the process in which the memory management can link two different types of storage of data so a programme can be compiled or executed. To start, an item can have two differing forms of location storage. Firstly a physical address, this is the direct location on which a file is stored on to a hard disk drive or a external storage device, this is also known as a root directory. Secondly, the logical address is the sector/location in which partial files are stored in the memory.

    • Word count: 1301
  3. Marked by a teacher

    Open Source Software and its benefits for a country like Nepal.

    That is how I got involved into it. In the seminar within, I was conned about the importance of Open Software to poor people like we Nepalese. I then knew that it was a kind of lottery like to us because we shouldn't have to pay even a single coin for the softwares which were so designed that they could be used to do any kind of works as the closed softwares like Windows and others do. Open Software have very big benefit especially in a country like Nepal.

    • Word count: 1071
  4. Marked by a teacher

    Case Study. LEGAL ISSUES-: Data Protection Act. Whiteman Leisure must ensure that the information that they are dealing with, must be fully protected from unauthorized access

    organization Another factor in which WLC should take into consideration is to query the property of the specific data that they?re going to handle, (such as the customer?s personal details). This is important as the customer may grant WLC to transfer their information to any other third party organizations, however if the member does not allow the go ahead, WLC have to keep the data safely stored, therefore the querying with the customers carry a great importance. Thirdly, if there is a situation in which a hacker should wish to break into WLC?s Network to try and attempt to obtain data unlawfully, WLC will need to be trained and fully prepared if such unexpected crisis occurs within their organization.

    • Word count: 1139
  5. Peer reviewed

    Operating systems. In this article, we are going to make a comparison between Mac and the Windows operating systems. First, lets us see that how a common user can differentiate these two operating systems.

    3 star(s)

    No business edition, no premium edition. � Costs less in the long run. Most of Mac upgrades cost less than those of Windows OS Disadvantages of Mac over Windows: � Smaller software library � Low user familiarity with the interface � Cost can rise if not used for a larger amount of time. Now let us peep into the technical details about these operating systems. Describing MAC Operating System: Mac uses an open-source kernel called XNU. This XNU kernel is in fact a conglomeration of the BSD and Mach Kernel's that use POSIX system calls.

    • Word count: 1048
  6. Peer reviewed

    Organisational system security - The possible security issues which exist within the FilmPoster.com system

    3 star(s)

    Phishing attackers; will attack filmposters.com website to acquire sensitive information such as customer's usernames, passwords and credit card details, they would attack the website by using techniques such as Link manipulations method a form of a technical deception designed to make a link in an email and the spoofed websites that leads to the phisher. The link may appear to belong to film posters but leads t the phishers site. The other technique is phone phishing. Attackers that call customers claiming to be from film posters, for example an attacker can call a customer claiming to be calling from film

    • Word count: 1291
  7. Explain sequence, selection and iteration as used in computer programming; outline the benefits of having a variety of data types available to the programmer.

    The lines of code are number from 1 to 9 to show that each line is executed in order: Example of a Sequence Control Structure in Visual Basic 1. Dim Num(2) As Integer 2. Console.WriteLine("Hello user, welcome to the program.") 3. Console.WriteLine("Enter your first number: ") 4. Num(0) = Console.ReadLine() 5. Console.WriteLine("Enter your second number: ") 6. Num(1) = Console.ReadLine() 7. Num(2) = Num(0) + Num(1) 8. Console.WriteLine("These two numbers equal: " & Num(2)) 9. Console.ReadLine() In this example, the program does the following: * Three integer variables called Num(0), Num(1)

    • Word count: 1572
  8. Explain sequence, selection and iteration as used in computer programming; outline the benefits of having a variety of data types available to the programmer.

    Whole numbers we use when we don't require calculations to be too precise, such as scientific equations, so we need to make sure of this before we publish the program. Depending on how large we want our integers to go up to, or how efficient we want to be with our program's RAM use, we can choose to use bytes, integers, or longs (otherwise called long integers). Bytes have a range of 256 units, whereas long integers have a range of 4,294,967,296 units.

    • Word count: 1697
  9. Influential Factors in Choosing a Programming Language

    for that one language. (M Fishpool, 2007, p.156) To deviate to using another language may in that instance not make sense to the hierarchy of the organisation. This may ring particularly true if the organisation has established a relationship with a particular vendor, such as Microsoft. Maintaining a link with this company may be rewarded with better support and discounts. (Anderson, 2010, p.166) On the other hand, maintaining the use of a particular piece of software (such as Microsoft's IDE Visual Studio) would limit language choice to those that suit that company's interests.

    • Word count: 1497
  10. Computer Maintainance - anti-virus, cookie deletion, drive scanning

    The user can control exactly which software is allowed to pass data in and out of the system. For example automatic updates might be allowed to connect to the internet, while third party software may not be allowed access to internet and popup displayed asking for permission. 3. Anti-spyware: Anti-spyware is a type of computer software that is typically designed to detect and remove malicious programs from a computer. These programs are often called malware, which collect and send personal information from a venerable system to a third party without the users consent.

    • Word count: 1755
  11. Principles of Software Design & Development - A system needs to be created which is used on a hand-held device or a small computer which will be used by a waiter or waitress to take a customers order. It is important that the program works correctly becau

    This is because when taking orders a waiter wants to be able to get the job done as quickly as possible to keep the customer happy. Inputs: * There will be a choice of buttons with Preset values behind them. * A set of tick boxes are included * A Text box Outputs: * A calculation of all of the values of the pizzas should display as a bill total * A Listbox of each item should be displayed. Processing: * Establish each individual Pizza size and Toppings included for each.

    • Word count: 1261
  12. Operating systems assignment 1

    There are office environment software packages which allow user to perform tasks needed in office. Basically software is there to expand the abilities of the computer. When installing an operating system or a software package in it there are certain requirements that need to be met, otherwise they won't work and might damage the system. The computer must be prepared when considering a software upgrade. The preparation could be for example checking if there is enough space on the hard disk or if the computer meets the requirements as well as making sure that the software will work properly and is compatible with the system and if it's really needed and necessary.

    • Word count: 1205
  13. For this report I will be research about the different virtualization technologies available and how they are used. I chose this because I would like to know gain a better understanding of how this technology is implemented and how it benefits users. I wi

    This often leaves the hardware underutilised and an expensive infrastructure. Fig.2 Shows how the virtualisation layer is implemented in-between the host OS and the application software of the system Fig.1 Native system without virtualisation Fig.2 Virtualised system Operating system virtualisation (container) In OS virtualisation the virtualised system is implemented on top of a host operating system. Each of the virtualised containers has their own file system which operates like a normal operating system. According to shield (2007) if a file is changed on a host operating system it is usually changed in each virtual machine.

    • Word count: 1426
  14. Explanation as to why projects fail

    If there are not enough details and the product is made, the client may not be satisfied and therefore the project has failed as well as the project manager. There are projects out there that do not give enough requirements which have led to cases where the developers of the project having no input from the client, and create a project that they believe is needed without them knowing anything about the business itself. When the project has then been given to the client, business users will then say that it does not do what is needed to be done.

    • Word count: 1065
  15. How to minimise the chance of project failing

    project manager will have to work harder over the time that they are paid; they may be then awarded a bonus if the project succeeds. To minimise this there are software's that can be used such as Microsoft Office Project to keep track on the budget so that it can be easier to avoid going over the budget. Insufficient details from client or Poor or No Requirements If there is simply not enough details from the client, then as a result the project would most likely be unsatisfactory for the client, in order to avoid this it would be very

    • Word count: 1152
  16. Evalutation of a Spreadsheet

    By using the pie chart the manager is able to see the weekly profit percentages displayed on the pie chart as percentages. An "IF statement" can also be used to make the spreadsheet easier to use. This is because you can use one of these to show either positive or negative results. For example, if certain phones are selling under 5 a week by using an "IF statement" you could get these to show up as red. If certain phones are selling over 5 a week then you could make these show up as green.

    • Word count: 1565
  17. Unit 2 computer systems

    The reason data validation is so useful is the fact it validates your input immediately, so you don't have to waste time by waiting for the server to validate it. Detecting a Users OS or Browser Many people use JavaScript to detect a user's operating system or browser, if this feature is used properly then it can help you control your website much easier. When the script discovers your browser it can then load files that have been fine tuned for that specific browser, eliminating/reducing problems that page may have had.

    • Word count: 1366
  18. Describe the following networking technologies:TCP/IP addresses Ports Protocols Domain name. The estate agency will be adding ICT to their company, which will create a network. in network there are lots of assets which gradually builds a network. I am

    Computers use it to find one another computer and connect which each other. Domain name- the domain name identifies the IP address; domain names are used in URL to identify that specific website. For example can be, www.Facebook.com, the domain name of this is facebook.com. Server jobs File sharing is when have data stored in a network where other people can also access it. Internet server- Web host- a web host provides space for the person who can upload their personal site on to it.

    • Word count: 1139
  19. Computer Addiction

    In many occasion, individuals with computer addiction may seek help for another condition such as depression, phobias or other addictions. Psychological symptoms of computer addiction are when you have a sense of well-being or excitement while at the computer, powerless to stop the activity, desperately seeking more and more time at the computer, ignoring family and friends, having problems with school or work. Also lying to employers and family about your activities, feeling empty, depressed, and irritable when not at the computer.

    • Word count: 1211
  20. Social Networking

    This research along with class discussions and handouts will construct this research project. As I mentioned before SNS user's has to consider boundaries regarding their occupation, if they are going to ignore this point they will not produce beneficial results, such as employees at work place use the SNS to communicate to their families or friends they cannot put as much effort as they spouse to towards their job which will be result for company in loss of productivity. An estimate shows that British industry loss �6.5 billion per annum productivity and uncertain bandwidth usage.

    • Word count: 1243
  21. Future needs of Computer

    Through E-Mail you can communicate with a person sitting thousands of miles away in seconds. There is chat software that enables one to chat with another person on a real-time basis. Video conferencing tools are becoming readily available to the common man. With desktop publishing, you can create page layouts for entire books on your personal computer. With computer, You can diagnose diseases. You can learn the cures. Software is used in magnetic resonance imaging to examine the internal organs of the human body. Software is used for performing surgery. Computers are used to store patient data.

    • Word count: 1234
  22. Application of the CIPP model

    The inner circle repre?ent? the c?re v?lue? th?t pr?vide the f?und?ti?n f?r ?ne'? ev?lu?ti?n?. The wheel ?urr?unding the v?lue? i? divided int? f?ur ev?lu?tive f?ci ????ci?ted with ?ny pr?gr?m ?r ?ther ende?v?r: g??l?, pl?n?, ?cti?n?, ?nd ?utc?me?. The ?uter wheel den?te? the type ?f ev?lu?ti?n th?t ?erve? e?ch ?f the f?ur ev?lu?tive f?ci. The?e ?re c?ntext, input, pr?ce??, ?nd pr?duct ev?lu?ti?n. E?ch d?uble ?rr?w den?te? ? tw?-w?y rel?ti?n?hip between ? p?rticul?r ev?lu?tive f?cu? ?nd ? type ?f ev?lu?ti?n. The t??k ?f ?etting g??l? r?i?e? que?ti?n? f?r ? c?ntext ev?lu?ti?n, which in turn pr?vide? inf?rm?ti?n f?r v?lid?ting ?r impr?ving g??l?. Pl?nning impr?vement eff?rt? gener?te? que?ti?n? f?r ?n input ev?lu?ti?n, which c?rre?p?ndingly pr?vide? judgment? ?f pl?n?

    • Word count: 1434
  23. Justify a particular installation or upgrade. I have installed a Microsoft Visio because the user needed software that will allow him to design the layout of rooms,

    Webshield- Provides you to safe social networking, chatting and downloading. It protects your computer when you download or exchange files from the risk of virus infection. Anti-Spam- Provides you safe and clear emails. AVG Anti-Spam often updates its database for detecting all forms of spam. Anti-Virus and Anti-Spyware- protects you from getting or spreading a virus, worm, or Trojan horse. It also prevents the unauthorized access of information from both spyware and adware. Enhanced Firewall- Helps you block the hackers.

    • Word count: 1336
  24. IT-based solutions, embracing the newest IT developments throughout the whole organisation

    Software Systems: * Application Software This is a single program that can only do a specific task. It is put into two classes' general purpose and bespoke. General purpose application software is software that can be used for many different tasks, and because it is general anyone can get this software. Bespoke application software is software that is custom made and meets a single use. It is a one off piece of software. When a peripheral is connected to a computer a driver may need to be installed to run the peripheral, this driver is a piece of software and can be either an application or an operating piece of software.

    • Word count: 1464
  25. Logic and Logic Gates

    P5 describe the key components of a computer architecture and how they interact P6 describe the features of a processor P7 describe the operation of logic gates using truth tables P8 create, document and test low-level Programs BTEC National Unit 9 Computer Architecture Assignment 2: Computer Components and Features Criterion covered P7, M2, M4, D1 For these tasks you are required to produce a report using drawings or diagrams and appropriate technical language. Make sure you use appropriate headings and subheadings to identify separate tasks and requirements 1)

    • Word count: 1185
"

As an industry IT is a significant employer worldwide and Computing is a key foundation in pursuing a related career. At A level Computing involves the study of a range of topics, from memory and storage to how microprocessors work, from systems architecture to programming and logic. There is a distinctive practical programming element to the course and you may be creating apps, websites or other types of creative coding solutions.

Whilst part of the course will be practically examined the majority will be assessed in examinations. You can gain valuable skills by accessing the Marked by Teachers Computing section which contains a wide variety of essay examples to help you master the essay skills required.

Computing does tend to sit well with Maths and Further Maths as other A level optionsbut Economics and Physics are also favoured subject combinations. As a successful Computing Alevel student you'll find your qualification highly favoured by Computer Science departments at University.

"

Conclusion analysis

Good conclusions usually refer back to the question or title and address it directly - for example by using key words from the title.
How well do you think these conclusions address the title or question? Answering these questions should help you find out.

  1. Do they use key words from the title or question?
  2. Do they answer the question directly?
  3. Can you work out the question or title just by reading the conclusion?
  • Neurophysiology - Discuss the roles of development learning and evolution in the construction of the nervous system

    "Conclusions The roles played by each factor described here each have their own specific effect on the construction of the nervous system. The evolutionary aspect controls the "blueprints" of the nervous systems that are hard coded into the DNA of the animal. However it is not specifically the genetic makeup of the nervous system that natural selection acts against, rather the phenotype of the nervous system, which is the combination of the developmental and the learning factors. The evolutionary factors alter the genotype, the only source of variation that can be passed down to their offspring. The development can only attempt to recreate the layout as specified by the different alleles; it cannot exceed them in terms of functionality. The true source of variation depends on the extrinsic information obtained and stored in memory, but that us not able to cross generations (with the exception of tradition) and so could be an explanation for the high evolutionary conservation of the nervous system."

  • Discuss the roles of development learning and evolution in the construction of the nervous system

    "Conclusions The roles played by each factor described here each have their own specific effect on the construction of the nervous system. The evolutionary aspect controls the "blueprints" of the nervous systems that are hard coded into the DNA of the animal. However it is not specifically the genetic makeup of the nervous system that natural selection acts against, rather the phenotype of the nervous system, which is the combination of the developmental and the learning factors. The evolutionary factors alter the genotype, the only source of variation that can be passed down to their offspring. The development can only attempt to recreate the layout as specified by the different alleles; it cannot exceed them in terms of functionality. The true source of variation depends on the extrinsic information obtained and stored in memory, but that us not able to cross generations (with the exception of tradition) and so could be an explanation for the high evolutionary conservation of the nervous system."

  • Discuss the relationship that exists in the UK between the legal rules that govern directors' duties and principles of corporate governance.

    "The UK's approach to governance is a self regulatory approach unlike the US legislative approach. Brussels have looked into creating a European corporate governance code however they came to the conclusion it was not necessary and agreed that the European Union should create a common approach which would coordinate national corporate governance codes. If legislation is brought in it would defeat the point of corporate governance as it would cause restrictions on a company rather than the flexibility provided by The Combined Code. It is said that companies who follow a code of corporate governance have a more stable price/earnings ratio this is due to the management of their financial assets, the code helps them manage their assets more efficiently and so they are seen as more stable companies in which to invest. This in turn creates a confidence in investors who are willing to support the development of their company as they have faith in their investment due to the guidelines the company follows set by The Combined Code."

Marked by a teacher

This document has been marked by one of our great teachers. You can read the full teachers notes when you download the document.

Peer reviewed

This document has been reviewed by one of our specialist student essay reviewing squad. Read the full review on the document page.

Peer reviewed

This document has been reviewed by one of our specialist student document reviewing squad. Read the full review under the document preview on this page.