Friday, April 13, 2007
Internet security
Include:
- Passwords (reasons for, rules to create etc.)
- Hackers (ethos, history, legislation - link to Computer Misuse Act page)
- Virus (types of)
- Examples of recent hacking / viruses
Click HERE for student revision notes
- Passwords (reasons for, rules to create etc.)
- Hackers (ethos, history, legislation - link to Computer Misuse Act page)
- Virus (types of)
- Examples of recent hacking / viruses
Click HERE for student revision notes
User Interfaces
Include:
- CLI
- GUI
- Menu
For each:
- Advantages / disadvantages
- Examples of application
Click HERE for student revision notes
- CLI
- GUI
- Menu
For each:
- Advantages / disadvantages
- Examples of application
Click HERE for student revision notes
Storage Devices
Include:
- types of storage device
- images of the device
- examples of their use
- limitations
- costs?
- types of storage device
- images of the device
- examples of their use
- limitations
- costs?
Output Devices
Include:
- types of output device
- images of the device
- examples of their use
- limitations
- costs?
- types of output device
- images of the device
- examples of their use
- limitations
- costs?
Input Devices
Include:
- types of input device
- images of the device
- examples of their use
- limitations
- costs?
- types of input device
- images of the device
- examples of their use
- limitations
- costs?
Images - Bitmap v Vector
Include:
- What is a Bitmap?
- What is a Vector?
- Advantages and disadvantages of each
- Who uses them?
- Examples of their use
- Useful / interesting websites about them
- What is a Bitmap?
- What is a Vector?
- Advantages and disadvantages of each
- Who uses them?
- Examples of their use
- Useful / interesting websites about them
Databases part 2 - Checks
Explain using an example:
- Validation / verification
- Range / presence checks
Click HERE for student revision notes
- Validation / verification
- Range / presence checks
Click HERE for student revision notes
Databases part 1
Include:
- Definition of a database
- Examples of databases in use
- Using an example, define:
- a record
- a field
- key field
- Four main data types
Click HERE for student revision notes
- Definition of a database
- Examples of databases in use
- Using an example, define:
- a record
- a field
- key field
- Four main data types
Click HERE for student revision notes
The Central Processing Unit (CPU) and friends
Include:
CPU components
- Control Unit
- ALU
- IAS
- Input / Output / Processing diagram
Friends
- ROM (eg. BIOS)
- RAM
- Motherboard
- Ribbon cable
- PSU
- Link to input / output / storage devices
Click HERE for student revision notes
CPU components
- Control Unit
- ALU
- IAS
- Input / Output / Processing diagram
Friends
- ROM (eg. BIOS)
- RAM
- Motherboard
- Ribbon cable
- PSU
- Link to input / output / storage devices
Click HERE for student revision notes
Internet and eMail
Internet include:
- Classic "Connecting to Internet" diagram
- Main components needed
- Main software used (Browsers, email clients etc.)
- ISPs
- Routers
- Current narrowband / broadband speeds available
- Link to Internet security page
eMail include:
- How to send an email (list or diagram)
- Advantages / Disadvantages
Harder research - if you are good enough! ;)
- What are the protocols used (IP, HTTP, FTP, HTML)
- Web 2.0?
Click HERE for student revision notes
- Classic "Connecting to Internet" diagram
- Main components needed
- Main software used (Browsers, email clients etc.)
- ISPs
- Routers
- Current narrowband / broadband speeds available
- Link to Internet security page
eMail include:
- How to send an email (list or diagram)
- Advantages / Disadvantages
Harder research - if you are good enough! ;)
- What are the protocols used (IP, HTTP, FTP, HTML)
- Web 2.0?
Click HERE for student revision notes
Subscribe to:
Comments (Atom)