Course Content
Class Test (MLIS)
0/1
Chapter-1. Computational Modelling
We will discuss Machines and Computational modeling, the Input-process-output model, input-process-output-storage model.
0/3
Chapter-2. Computer Hardware
We will discuss Von Neumann Computational Model, Hardware components of a computer system, cache memory, Fetch-Decode-Execute Model, Fetch-Decode-Execute Cycle, Secondary Storage (Magnetic, Optical, Solid State Drive SSD), Magnetic secondary storage - hard disks, Optical secondary storage – CD, DVDs, Electrical secondary storage - flash drives, Cloud Storage, Embedded systems
0/5
Chapter-3. Computer Logic
We will discuss Logic, logic gates (AND, OR, NOT gates), truth tables, conditional statements.
0/5
Chapter-4. Software
We will discuss software (System software, application software, utility software), Operating system, features of the operating system, File management tool, security tools, Computer Simulation, and modeling.
0/4
Chapter-5. Programing language
we will discuss definitions of Programing language, types of Programing language, Low-Level Programming Language, High-Level Programing Language, machine code or machine language, Assembly language, Advantage & Disadvantages of assembly language, Compiler & Interpreter, Advantage & Disadvantages of Compiler & Interpreter.
0/3
Chapter-6. Networks
We will learn the definition of network, the purpose of using the network, different types of network (LAN, WLAN, WAN, Computer Network Models, The processes of accessing a server for getting services, Network Topologies (BUS, RING, Star, Mesh Topology) Communication media, Advantage and disadvantages of wired, wireless communication media, Network data speed, Definition of protocol and features of the protocol, different types of protocol, email protocols (SMTP, POP3, IMAP), TCP protocol, TCP/IP Protocol, HTTP/ HTTPS Internet protocol. Network security, The Importance of Network Security, Firewall, The use of Firewall, The security and advantages of cloud storage, The Security and disadvantages of cloud storage, NAS (network-attached storage), Cyber-attack (Phishing, Shoulder Surfing, Unpatched software, USB devices, Eavesdropping), Protecting against security weaknesses, Security measures to protect from cyber-attacks, Reviews of network and user policies.
0/14
Chapter-7. The internet and the world wide web
We will Learn Internet, How the internet works, WWW (World Wide Web), Accessing the World Wide Web, How the World Wide Web works
0/3
Chapter-8. Computing and the environment
We will learn Computing and the environment, Advantage & Disadvantage of Computing to the environment, Manufacture, Raw material extraction, Production Most hazardous materials used in the manufacture of computing technology, Usages of Computing technology, Disposal of Computing technology, How computing technology preserving the environment.
0/3
Chapter-9. Computer Privacy
We will learn Privacy, Personal Data, UK Data Protection Act (1998) Big data, How Big Data Works, The Uses of Big Data Surveillance, Advantages of surveillance technology location-based service (LBS), how do location-based services work, Uses of location-based services Privacy Enhancing Technologies (PET), Privacy-enhancing tools Cyber Security, The computer misuse act 1990
0/4
Chapter-10. Digital Inclusion
We will learn about Digital Inclusion, Challenges for Digital Inclusion, Solutions, Impact and Advantage of Digital Inclusion, Moving Toward Digital Inclusion,
0/3
Chapter-11. Professionalism
We will learn about Professionalism, Importance of Professionalism, the professional standards by the British Computer Society (BCS).
0/3
Chapter-12. the Legal Impacts
We will learn about, Intellectual property, Copyright and patents, The Copyright, Designs, and Patents Act (1988), Licensing, The terms of a Software license, Creative Commons license, Open-source and proprietary software Advantage and disadvantages of open-source software
0/4
Chapter-13. Algorithm
We will learn about the definition of Algorithm, Criteria for a successful algorithm, Relationship between algorithm & Program, Flowcharts, The algorithm, for making a cup of coffee, Pseudo-code, Algorithm for adding two numbers, Arithmetic Operators, Variables, Constants, Selection, Iteration, Representation of selection & iteration in a flowchart, Representation of selection & iteration in Pseudo-code, Relational operator is an operator that compares two values, Nested Selection, Nested Selection pseudo-code, Indefinite iteration, Definite iteration, Logical Operators (AND, OR, NOT), NESTED LOOPS, Random Number
0/14
Chapter-18. Programming
0/35
Test Yourself
You can test your current situation on this course.
0/5
Edexcel OLevel Computer Science revision notes
About Lesson

In the world of technology, computer science is like the wizard behind the curtain, making everything happen. Let’s take a simple stroll through the ABCs of this magical realm, exploring the cool stuff that makes our devices tick.

Computer 1 1

 

 

 

1. Magic Recipes: Algorithms and Data Tricks

Think of algorithms like magic recipes that tell computers what to do. Data structures are like containers that hold info in a neat and organized way. Together, they create the magic that brings our favorite apps and games to life.

2. Talking to Computers: Learning Computer Languages

Just like we use words to talk to friends, programmers use computer languages to talk to computers. There are many languages, like C++ or Python. Learning one is like learning a secret code to make things happen on your computer.

3. Blueprint of the Machine: Computer Architecture

Imagine a computer as a big LEGO creation. Computer architects are like master builders who design how all the pieces fit together—central processing units (CPUs), memory, and how they talk to each other.

4. Computer Boss: Operating Systems

Operating systems, like bosses of computers, make sure everything runs smoothly. Windows, Mac, and Linux are like the managers of our devices, helping apps and hardware work together without chaos.

5. Internet Connections: Digital Friendships

Networking is like the internet’s way of making friends. Computers talk to each other using protocols, just like friends have rules to communicate. Routers act like the traffic controllers, making sure information finds its way.

6. Digital Librarians: Databases Organizing Info

Databases are like super organized librarians. They store and manage tons of info, from your favorite apps’ settings to your social media posts. They make finding and using data super easy.

7. Smart Machines: AI and Machine Learning

Artificial Intelligence (AI) and Machine Learning (ML) are like the brains of smart machines. They learn from info and get better at tasks, like recognizing faces or suggesting what to watch next.