1.1 SYSTEMS ARCHITECTURE
- ARCHITECTURE OF THE CPU VIDEO
| GCSE QUESTIONS
- CPU PERFORMANCE VIDEO
| GCSE QUESTIONS
- EMBEDDED SYSTEMS See above
1.2 MEMORY AND STORAGE
- PRIMARY STORAGE (MEMORY): RAM/ROM VIDEO
& QUESTIONS | VIRTUAL VIDEO & QUESTIONS
1.2 DATA REPRESENTATION
- UNITS
- BINARY NUMBERS VIDEO &
QUESTIONS
UNIT 2:
************************IGNORE BELOW************************
- SECONDARY STORAGE VIDEOS: main
3 | flash
| choosing
storage | data
size | 5
1.2 DATA REPRESENTATION
- UNITS V:
data representation
- BINARY NUMBERS V: 1
| Why
binary? |
- HEXADECIMAL NUMBERS V: hex
to denary
- CHARACTERS V:
1 | .
- IMAGES V: images
| video for people who can not
hear the other one
- SOUND V: sound
| sound(with sound)
- ACTIVITY 1 - Watch the video and complete your notes
- ACTIVITY 2 - Draw out the sound graph the teacher gives you
- ACTIVITY 3 in back
of book (arabic)
- ACTIVITY 3
ANSWERS
- COMPRESSSION V: vid1
| compression
|
1.3 COMPUTER NETWORKS, CONNECTIONS AND PROTOCOLS
- NETWORKS AND TOPOLOGIES VIDEOS: LANWAN
| performance
| 3(me) |
- HARDWARE VIDEOS: hardware
| ethernet
| wifi
| 4(me) | 5(me)
- POWERPOINT - see above
- ACTIVITY 1 - see above
- ACTIVITY 1 ANSWERS - see above
- CLIENT SERVER AND PEER TO PEER VIDEOS: VID1
| 2(basic
with music) |
- POWERPOINT AND ACTIVITY - see above
- THE INTERNET VIDEOS: VID
1 |
- TOPOLOGIES VIDEOS: VID1
- POWERPOINT - see above
- ACTIVITY 1 - see above
- ACTIVITY 1 ANSWERS - see above
- WIRED & WIRELESS NETWORKS AND PROTOCOLS VIDEOS: 4
layer 6
layer | 4
layer | packet
switching | more
protocols |
- CONNECTION TYPES ACTIVITY | ACTIVITY ANSWERS
1.4 NETWORK SECURITY
- THREATS TO COMPUTER SYSTEMS AND NETWORKS threats
| attack | prevent
| cncryption
explained | Explain malware, worm, viruses, trojans, phishing, brute force,
denial of service, data interception, sql injection, people as weak points, good
network policy,
- IDENTIFYING AND PREVENTING VULNERABILITIES:
SEE ABOVE
ASSESSMENT:
SECURITY
TEST 1
1.5 SYSTEMS SOFTWARE
- OPERATING SYSTEMS & SYSTEMS SOFTWAREVIDEOS: OPERATING
SYSTEMS | OS
FEATURES | OS
FEATURES 2 | UTILITY
SOFTWARE | DEFRAGMENTATION
1.6 ETHICAL, LEGAL, CULTURAL AND ENVIRONMENTAL IMPACTS OF DIGITAL TECHNOLOGY