Building on the Python programming skills and knowledge from the previous year, this unit introduces learners to how data can be represented and processed in sequences, such as lists and strings. The lessons cover a spectrum of operations on sequences of data, that range from accessing an individual element to manipulating the entire sequence.
Breaking down a complex problem or system into smaller parts that are more manageable and easier to understand.
Looking for similarities or differences to help solve a problem more efficiently.
Removing unnecessary detail to help simplify a problem.
A set of step-by-step instructions to solve a problem.
A sequence of instructions to perform tasks with computer.
The rules governing how to write statements in a programming language.
An error in a programming language caused by not using the correct syntax. These are normally spelling errors or small grammatical mistakes.
A fault in the logic or structure of the problem.
The format in which a variable or constant holds data, such as ‘integer’ or ‘string’.
To run a computer program.
A sequence of characters often stored as a variable in a computer program. These characters can include numbers, letters and symbols.
A data type in computing which only has two possible values, true or false.
A memory location within a computer program where values are stored.
A set of data values of the same type, stored in a sequence in a computer program. Also known as an array.
The way that data is stored in a database or program. Any facility that hold more than one item of data is known as a data structure.
An individual component of a list or array.
This unit takes learners on a journey of discovery of techniques that cybercriminals use to steal data, disrupt systems, and infiltrate networks. The learners will start by considering the value their data holds and what organisations might use it for. They will then learn about social engineering and other common cybercrimes, and finally look at methods to protect against these attacks.
Anti-virus software scans all forms of storage devices for viruses (programs harmful to computers) and, if found, attempts to remove them.
The act of inventing a story or scenario to gain a targeted victim's interest. This may encourage them to give away confidential information, or even send money.
Completely automated public Turing test to tell computers and humans apart. This is a way of working out if a user is a human or robot by asking them to identify image features.
Units of information. In computing there can be different data types, including integers, characters and Boolean. Data is often acted on by instructions.
Domain name system (or server) - an internet service that translates IP addresses into website domain names. All websites have equivalent IP addresses.
A person who tries to gain unauthorised access to a computer.
Gaining unauthorised access to a computer.
A unique address for each computer device on a network.
A software program or hardware device that records all keystrokes on a computer keyboard.
Malicious code is software written to harm or cause issues with a computer.
Software that is designed to cause harm or damage to a computer. This includes viruses that might damage files, adware that causes pop-ups, and spyware that collects and shares login details.
A group of interconnected computers/devices.
An update to a piece of software, usually to fix bugs or improve the software in some way.
A cyberattack that redirects a user from a genuine website to a fake one.
An attempt to gain personal information about someone by way of deception, eg sending an email pretending to be from their bank asking them for their bank details.
Malware which encrypts a user's files, then demands a ransom payment to decrypt them.
A computer that holds data to be shared with other computers. Servers require server software.
The programs, applications and data in a computer system. Any parts of a computer system that aren't physical.
A program secretly installed on a computer to automatically collect information about the user over a period of time.
Malware that appears legitimate, but performs some malicious activity when it is run.
Any computer program designed to replicate and damage other computer systems and software.
In this unit, learners will focus on making digital media such as images and sounds, and discover how media is stored as binary code.
Continuous data which can have a range of values.
A number system that contains two symbols, 0 and 1. Also known as base 2.
The smallest unit of data in computing represented by a 1 in binary.
The amount of bits available for colours in an image.
A method of reducing file sizes, particularly in digital media such as photos, audio and video.
Units of information. In computing there can be different data types, including integers, characters and Boolean. Data is often acted on by instructions.
Information stored as discrete values usually represented as numbers. This contrasts with analogue data which is represented by continuous data, usually in waves.
Joint Photographic Experts Group - a digital image format which uses lossy compression.
Data about data, eg photo image files have data about where the photo was taken and which camera took the picture.
A standard audio file format which uses lossy compression. Compatible with most media players. Designed by the Moving picture experts group - layer 3.
Picture element - a single dot of colour in a digital bitmap image or on a computer screen.
The fineness of detail that can be seen in an image - the higher the resolution of an image, the more detail it holds. In computing terms, resolution is measured in dots per inch (dpi).
How many samples of data are taken per second. This is normally measured in hertz, eg an audio file usually uses samples of 44.1 kHz (44,100 audio samples per second).
To add data to a server on the internet, eg you can upload videos to social media websites.
A file format that takes an existing file or files and compresses them into a single file of a smaller size.