1.4.2 - Identifying and Preventing Vulnerabilities
In the previous section, 1.4.1 - Threats to Computer Systems and Networks, we looked at a fairly comprehensive rundown of the most common and prevalent attacks that exist to compromise system security, steal data and gain access to computers. This section focuses more on preventative measures - how can we ensure that computer systems are […]
1.4.1 - Threats to Computer Systems and Networks
As the number of network connected devices increases, so does the proportion of poorly designed and insecure devices. Many people do not understand the significance of poor security, whether that is in devices they own or their own personal security such as selecting weak passwords that are easy to guess or compromise. Any device which […]
1.3.2 - Wired and Wireless Networks, Protocols and Layers
In the last section we focussed on what networks are, why they are used and covered a broad range of related topics such as how networks are categorised, topologies, performance factors, internet technologies and more. The second half of this part of the GCSE specification concentrates almost solely on how data is transmitted through a […]
1.3.1 - Networks and Topologies - Part 2 - Performance, Authority and The Cloud
In this section (click to jump): Performance Factors People that look after networks are odd people. I once convinced a student that every network had a guardian figure called the Server Room Urchin, a being that only existed in networking and server rooms. Their sole existence revolved around massaging data through the cables and overseeing […]
1.3.1 - Networks and Topologies - Part 1 - Types, Topologies and Hardware
Today, our world is connected in ways which were unimaginable a generation ago. We take for granted the ability to communicate in real time, across the world using both audio and video. In recent times it is possible for anyone to become a published author or to create their own TV channel with the click […]
1.2.5 - Compression
Compression is all about making things smaller and take up less space. The need to make things take up less space is certainly not unique to computing and there are countless examples in history of clever techniques and innovations designed to compress data. The goal of compression is to take a file, whether it is […]
1.2.4 - Data Storage - Encoding Sound
The final stop on our encoding journey is sound. In this section we learn how sound waves are translated into a digital, binary form and conversely, how a computer transforms digital data back in to analogue sound. If you have studied image encoding, you will have noticed that not everything in computing and encoding is […]
1.2.4 - Data Storage - Encoding Images
Nearly all computer systems from the simplest of smart TVs or a smartwatch to a fully featured PC make heavy use of graphics or images to display information. We take for granted the fact that a computer can create photo realistic graphics, yet it wasn't that long ago that computers simply didn't have the processing […]
1.2.4 - Data Storage - Encoding Text
In the 1980's "home computers" first became widely available and affordable from popular brands such as Sinclair, Commodore, Acorn and Atari. This isn't too different to today, if you want a computer you can buy one from Dell, Asus, Lenovo, Apple and so on, but with one huge difference - they can all communicate with […]
1.2.4 - Data Storage - Numbers
This section of the specification has the potential to be very large as it covers four distinct topics. I've split it up into those four sections, so this is 1.2.4 - Data Storage Part 1 - Numbers. That's nice and clear isn't it? In this section we focus solely on the three number systems we […]









