1.4 - Network Security
1.4.2 - Identifying and Preventing Vulnerabilities

In the previous section, 1.4.1 - Threats to Computer Systems and Networks, we looked at a fairly comprehensive rundown of the most common and prevalent attacks that exist to compromise system security, steal data and gain access to computers. This section focuses more on preventative measures - how can we ensure that computer systems are […]

Read more
1.4 - Network Security
1.4.1 - Threats to Computer Systems and Networks

As the number of network connected devices increases, so does the proportion of poorly designed and insecure devices. Many people do not understand the significance of poor security, whether that is in devices they own or their own personal security such as selecting weak passwords that are easy to guess or compromise. Any device which […]

Read more
1.3 - Networks and Protocols
1.3.2 - Wired and Wireless Networks, Protocols and Layers

In the last section we focussed on what networks are, why they are used and covered a broad range of related topics such as how networks are categorised, topologies, performance factors, internet technologies and more. The second half of this part of the GCSE specification concentrates almost solely on how data is transmitted through a […]

Read more
1.3 - Networks and Protocols
1.3.1 - Networks and Topologies - Part 2 - Performance, Authority and The Cloud

In this section (click to jump): Performance Factors People that look after networks are odd people. I once convinced a student that every network had a guardian figure called the Server Room Urchin, a being that only existed in networking and server rooms. Their sole existence revolved around massaging data through the cables and overseeing […]

Read more
1.3 - Networks and Protocols
1.3.1 - Networks and Topologies - Part 1 - Types, Topologies and Hardware

Today, our world is connected in ways which were unimaginable a generation ago. We take for granted the ability to communicate in real time, across the world using both audio and video. In recent times it is possible for anyone to become a published author or to create their own TV channel with the click […]

Read more
1.2 - Memory and Storage
1.2.5 - Compression

Compression is all about making things smaller and take up less space. The need to make things take up less space is certainly not unique to computing and there are countless examples in history of clever techniques and innovations designed to compress data. The goal of compression is to take a file, whether it is […]

Read more
1.2 - Memory and Storage
1.2.4 - Data Storage - Encoding Sound

The final stop on our encoding journey is sound. In this section we learn how sound waves are translated into a digital, binary form and conversely, how a computer transforms digital data back in to analogue sound. If you have studied image encoding, you will have noticed that not everything in computing and encoding is […]

Read more
1.2 - Memory and Storage
1.2.4 - Data Storage - Encoding Images

Nearly all computer systems from the simplest of smart TVs or a smartwatch to a fully featured PC make heavy use of graphics or images to display information. We take for granted the fact that a computer can create photo realistic graphics, yet it wasn't that long ago that computers simply didn't have the processing […]

Read more
1.2 - Memory and Storage
1.2.4 - Data Storage - Encoding Text

In the 1980's "home computers" first became widely available and affordable from popular brands such as Sinclair, Commodore, Acorn and Atari. This isn't too different to today, if you want a computer you can buy one from Dell, Asus, Lenovo, Apple and so on, but with one huge difference - they can all communicate with […]

Read more
1.2 - Memory and Storage
1.2.4 - Data Storage - Numbers

This section of the specification has the potential to be very large as it covers four distinct topics. I've split it up into those four sections, so this is 1.2.4 - Data Storage Part 1 - Numbers. That's nice and clear isn't it? In this section we focus solely on the three number systems we […]

Read more