Listing all results (1387)

Producing Robust Programs

The first video is about defensive design considerations.  Data is not always entered in ways that a program might expect.  If this can be easily rectified without asking the user to re-input the data, it is known as input sanitation.  In addition, to prevent invalid data crashing a program, validation techniques...

Programming Techniques

The basics of programming are explored through a “beat that dice” game.  It is assumed that students already have some knowledge and experience of programming before watching the first video, and the purpose of this video is to marry the theory of programming to the established practical experience in preparation...

Algorithms

Abstraction is the representation of essential features without including unnecessary details.  It is used to reduce the complexity of systems for users, hiding how things actually work, applying algorithms to different contexts and producing suitable user interfaces.  The first video explains the concept at a...

Ethical, Legal, Cultural and Environmental Concerns

The first video introduces a range of concerns surrounding computing technologies.  The idea that new technologies bring with them new social and ethical issues, and that the law is often slow to catch-up to guard people against these issues.  Some of the benefits of new technologies are briefly introduced,...

Systems Software

The first video outlines the purpose of systems software: the operating system and utilities.  It consider the role of systems software in providing a user interface and abstraction to the physical hardware.  A variety of different types of user interface are explained in more detail.

The second video...

System Security

The first video introduces the variety of threats to system security.  Malware, phishing, brute force attacks, denial of service, data interception/theft and SQL injection are all considered and explained.  Simple notes on each of these are presented toward the end of the video.

The second video explores...

Network Topologies – Protocols and Layers

The first video examines the topology of modern networks – how the computers are arranged and connected together.  The history of network topologies is outlined briefly, before considering star networks in more detail.  The need for, and the advantages of a central switch, together with the concept of mesh and...

Wired and Wireless Networks

The first video explores the two main types of networks: local area networks (LAN) and wide area networks (WAN).  The reasons for networking stand-alone computers are outlined, and the potential disadvantages too.  The connection options for devices on a network are briefly mentioned and covered in more detail in...

Storage

The first video explains why a computer needs secondary storage, and explains what is meant by primary and tertiary storage.

The second video explains what is meant by the term “capacity” of storage devices.  The relative size of different types of files is introduced.  (More detailed explanations of this...

Systems Architecture

The first video explores the first computers that had stored programs in the same memory space as the data required for them.  This is known as the von Neumann architecture and is still the foundation principle on which most computers are still built today.  We take the lid off a central processing unit and explain...

Pages