1.1 SYSTEMS ARCHITECTURE

  1. ARCHITECTURE OF THE CPU VIDEO | GCSE QUESTIONS
  2. CPU PERFORMANCE VIDEO | GCSE QUESTIONS
  3. EMBEDDED SYSTEMS See above

 

1.2 MEMORY AND STORAGE

  1. PRIMARY STORAGE (MEMORY): RAM/ROM VIDEO & QUESTIONS  | VIRTUAL  VIDEO & QUESTIONS

1.2 DATA REPRESENTATION

  1. UNITS 
  2. BINARY NUMBERS VIDEO & QUESTIONS

UNIT 2:

 

************************IGNORE BELOW************************

 

  1. SECONDARY STORAGE VIDEOS: main 3 | flash  | choosing storage | data size | 5

1.2 DATA REPRESENTATION

  1. UNITS V: data representation
  2. BINARY NUMBERS V: 1  | Why binary? |
  3. HEXADECIMAL NUMBERS V: hex to denary 
  4. CHARACTERS V: 1 | .
  5. IMAGES V: images  | video for people who can not hear the other one
  1. SOUND V: sound  | sound(with sound)
  2. COMPRESSSION V: vid1  | compression  |

 

1.3 COMPUTER NETWORKS, CONNECTIONS AND PROTOCOLS

  1. NETWORKS AND TOPOLOGIES VIDEOS: LANWAN  | performance  | 3(me) |
  2. HARDWARE VIDEOS: hardware  | ethernet  | wifi  | 4(me) | 5(me) 
  3. CLIENT SERVER AND PEER TO PEER VIDEOS: VID1  | 2(basic with music) | 
  4. THE INTERNET VIDEOS: VID 1 | 
  5. TOPOLOGIES VIDEOS: VID1 
  6. WIRED & WIRELESS NETWORKS AND PROTOCOLS VIDEOS: 4 layer 6 layer | 4 layer | packet switching | more protocols | 
  7. CONNECTION TYPES ACTIVITY | ACTIVITY ANSWERS

1.4 NETWORK SECURITY

  1. THREATS TO COMPUTER SYSTEMS AND NETWORKS threats  | attack | prevent |  cncryption explained | Explain malware, worm, viruses, trojans, phishing, brute force, denial of service, data interception, sql injection, people as weak points, good network policy,
  2. IDENTIFYING AND PREVENTING VULNERABILITIES:  SEE ABOVE

    ASSESSMENT:

    SECURITY TEST 1

1.5 SYSTEMS SOFTWARE

  1. OPERATING SYSTEMS & SYSTEMS SOFTWAREVIDEOS: OPERATING SYSTEMS | OS FEATURES | OS FEATURES 2 | UTILITY SOFTWARE | DEFRAGMENTATION

1.6 ETHICAL, LEGAL, CULTURAL AND ENVIRONMENTAL IMPACTS OF DIGITAL TECHNOLOGY