• Home
  • KS 3
    • Modelling projects
    • Learn Python 3
    • Learn Scratch
    • Algorithms
    • Boolean logic
    • Binary representation
    • Hardware components
    • Software components
    • Communications
    • Data representation
    • KS3 Flipwall
    • Creative projects
    • Digital projects
    • Online safety
  • KS 4
    • OCR J277 (from Sep 2020)
    • AQA 8525 (from Sep 2020)
    • NEA resources
    • Legacy GCSE resources
    • GCSE Revision Cards
    • Flipwall
    • Slider puzzle and freebies
  • KS 5
    • OCR AS Comp Science
    • OCR A Level Comp Science
    • Eduqas AS Comp Science
    • Eduqas A Level Comp Science
    • WJEC AS & A Level Comp Science
    • CIE Comp Science
    • Normalisation
    • Binary floating point numbers
    • A Level Flipwall
    • All pre-September 2015 KS5 resources
    • Samples
  • A Level text book
    • Contents, index etc
    • Chapters 1 - 5
    • Chapters 6 - 10
    • Chapters 11 - 15
    • Chapters 16 - 20
    • Chapters 21 - 25
    • Chapters 26 - 30
    • Chapters 31 - 35
    • Chapters 36 - 40
    • Chapters 41 - 45
    • Chapters 46 - 50
    • Chapters 51 - 55
    • Chapters 56 - 60
    • Chapters 61 - 68
  • Python 3
    • Python videos - 1
    • Python videos - 2
    • Python fundamentals
    • Strings
    • Selection - IF
    • Repetition - WHILE
    • Repetition - FOR
    • Formatting data
    • Date and time
    • Lists
    • Tuples
    • Dictionaries
    • Functions
    • Random values
    • File operations
    • Errors and bugs
    • OO programming
    • Practical tasks
    • Data structures
    • Quick reference notes
    • Python Flipwall
  • Computational thinking
  • Freebies
    • Bloom's Taxonomy
    • Freebies Flipwall
    • Find the pairs
    • Slider puzzles
  • Teachers
    • Access to answers

ccc5.jpg

List of articles in category All topics
Title
The value of data
Security, privacy and integrity of data
Disk mirroring strategies and failover
Network security and potential threats
Network policies, including disaster recovery
Comparison of cryptographic methods and their strengths
Logical operations and encryption
Online updating of files
Biometrics
Black and white hat hacking and penetration testing
Hotspots
Hotspots - Answers
Virus protection software
Virus protection software - Answers

WJEC Computer Science 2015

  • Fundamentals & Programming (1 & 2)
  • Programming & development (3)
  • Architecture, data, comms & apps (4)
    • 2. Data transmission
    • 3. Data representation
    • 4. Organisation and structure of data
    • 5. Databases and distributed systems
    • 6. The operating system
    • 7. The need for different software
    • 8. Data security and integrity
      • All topics
    • 1. Hardware and communication
  • Programmed solution (5)

Search


Copyright @ 2022 theteacher.info Ltd. All rights reserved.