OCR Video Series - Paper 2

These videos were created by Craig & Dave. You can access this material via YouTube

  1. 01 1.1 The von Neumann architecture
  2. 02 1.1 How common characteristics of CPUs affect their performance
  3. 03 1.1 Embedded systems
  4. 04 1.2 RAM and ROM
  5. 05 1.2 The need for virtual memory
  6. 06 1.2 Flash memory
  7. 07 1.3 The need for secondary storage
  8. 08 1.3 Data capacity and calculation of data capacity requirements
  9. 09 1.3 Common types of storage
  10. 10 1.3 Suitable storage devices and storage media for a given application
  11. 11 1.4 Types of networks
  12. 12 1.4 Factors that affect the performance of networks
  13. 13 1.4 Client server and peer to peer networks
  14. 14 1.4 Hardware to connect to a LAN
  15. 15 1.4 The Internet
  16. 16 1.4 Virtual networks
  17. 17 1.5 Star and mesh network topologies
  18. 18 1.5 WiFi
  19. 19 1.5 Ethernet
  20. 20 1.5 The uses of IP, MAC addressing and protocols
  21. 21 1.5 The concept of layers
  22. 22 1.5 Packet switching
  23. 23 1.6 Forms of attack
  24. 24 1.6 Threats posed to networks
  25. 25 1.6 Identifying and preventing vulnerabilities
  26. 26 1.7 The purpose and functionality of systems software
  27. 27 1.7 Operating systems part 1
  28. 28 1.7 Operating systems part 2
  29. 29 1.7 Utility system software
  30. 30 1.8 Privacy issues
  31. 31 1.8 Legislation relevant to Computer Science
  32. 32 1.8 Cultural implications of Computer Science
  33. 33 1.8 Environmental impact of Computer Science
  34. 34 1.8 How to investigate and discuss Computer Science technologies, considering ethical, legal
  35. 35 1.8 How key stakeholders are affected by technologies
  36. 36 1.8 Open source vs proprietary software
  37. 37 2.1 Abstraction
  38. 38 2.1 Decomposition
  39. 39 2.1 Algorithmic thinking
  40. 40 2.1 Linear search
  41. 41 2.1 Binary search
  42. 42 2.1 Bubble sort
  43. 43 2.1 Merge sort
  44. 44 2.1 Insertion sort
  45. 45 2.1 How to produce algorithms using pseudocode and flow diagrams
  46. 46 2.2 The use of variables, constants, operators, inputs, outputs and assignments
  47. 47 2.2 The use of the three basic programming constructs
  48. 48 2.2 The use of basic string manipulation
  49. 49 2.2 The use of basic file handling operations
  50. 50 2.2 The use of records to store data
  51. 51 2.2 The use of SQL to search for data
  52. 52 2.2 The use of arrays
  53. 53 2.2 How to use sub programs
  54. 54 2.2 The use of data types and casting
  55. 55 2.2 The common arithmetic operators
  56. 56 2.2 The common Boolean operators
  57. 57 2.4 Why data is represented in binary
  58. 58 2.4 Simple logic diagrams
  59. 59 2.4 Truth tables
  60. 60 2.4 Computing related mathematics
  61. 61 2.3 Defensive design considerations part 1
  62. 62 2.3 Defensive design considerations part 2
  63. 63 2.3 Maintainability
  64. 64 2.3 The purpose and types of testing
  65. 65 2.3 How to identify syntax and logic errors
  66. 66 2.3 Suitable test data
  67. 67 2.5 Characteristics and purpose of different levels of programming language
  68. 68 2.5 The purpose of translators
  69. 69 2.5 Assemblers, compilers and interpreters
  70. 70 2.5 IDEs
  71. 71 2.6 Units
  72. 72 2.6 Converting between denary and 8 bit binary
  73. 73 2.6 Adding two 8 bit binary integers
  74. 74 2.6 Binary shifts
  75. 75 2.6 Converting between denary and 2 digit hexadecimal
  76. 76 2.6 Check digits
  77. 77 2.6 Characters
  78. 78 2.6 Images
  79. 79 2.6 Sound
  80. 80 2.6 Compression