Listing all results (1393)

Data Representation

The first video explains why computers use binary to store data.  The difference between a bit, nibble, byte, kilobyte, megabyte, gigabyte, terabyte and petabyte is explained.  These are known as measurements of capacity, or how much data can be stored either in memory or on secondary storage devices.

The...

Translators and Facilities of Languages

The first video takes a brief look at the history of programming.  It examines the differences between low level languages such as Assembly, and high level languages such as Python.  It considers the uses of each of these different types of languages.

The second video we explain the purpose of translators...

Computational Logic

The first video explains why data is represented in binary using examples of RAM, a hard disk, optical disks and solid state memory.

The second video illustrates simple circuits built using components to create AND, OR and NOT logic gates.  GCSE students need to be able to combine gates to create more...

Producing Robust Programs

The first video is about defensive design considerations.  Data is not always entered in ways that a program might expect.  If this can be easily rectified without asking the user to re-input the data, it is known as input sanitation.  In addition, to prevent invalid data crashing a program, validation techniques...

Programming Techniques

The basics of programming are explored through a “beat that dice” game.  It is assumed that students already have some knowledge and experience of programming before watching the first video, and the purpose of this video is to marry the theory of programming to the established practical experience in preparation...

Algorithms

Abstraction is the representation of essential features without including unnecessary details.  It is used to reduce the complexity of systems for users, hiding how things actually work, applying algorithms to different contexts and producing suitable user interfaces.  The first video explains the concept at a...

Ethical, Legal, Cultural and Environmental Concerns

The first video introduces a range of concerns surrounding computing technologies.  The idea that new technologies bring with them new social and ethical issues, and that the law is often slow to catch-up to guard people against these issues.  Some of the benefits of new technologies are briefly introduced,...

Systems Software

The first video outlines the purpose of systems software: the operating system and utilities.  It consider the role of systems software in providing a user interface and abstraction to the physical hardware.  A variety of different types of user interface are explained in more detail.

The second video...

System Security

The first video introduces the variety of threats to system security.  Malware, phishing, brute force attacks, denial of service, data interception/theft and SQL injection are all considered and explained.  Simple notes on each of these are presented toward the end of the video.

The second video explores...

Network Topologies – Protocols and Layers

The first video examines the topology of modern networks – how the computers are arranged and connected together.  The history of network topologies is outlined briefly, before considering star networks in more detail.  The need for, and the advantages of a central switch, together with the concept of mesh and...

Pages

View all publishers