You are on page 1of 2

Easter Revision – Week 1 – Do this in week 1 of the Easter term – use

the videos to help you answer the questions.


Week 1 Monday Tuesday Wednesday Thursday Friday
Convert the Denary Number Give examples for the different What is the purpose of a trace table? Explain the similarities and Define the terms sequence,
45 to Hexadecimal. Show types of errors, including: https://www.youtube.com/watch?v=C5 differences between a function and selection and iteration.
your working. Logic, Syntax and Runtime. _UTE_Lyto&list=PL04uZ7242_M7105 a procedure.
https://www.youtube.com/watc https://www.youtube.com/watch? DQI8OfbqivqoRkhVYM&index=9 https://www.youtube.com/watch?v= Give examples of each.
Task 1
h?v=7LGgLi4vYsk&list=PL04u v=C5_UTE_Lyto&list=PL04uZ72 mScqZcfNJak&index=6&list=PL04u https://www.youtube.com/watch?v=
Z7242_M7105DQI8OfbqivqoR 42_M7105DQI8OfbqivqoRkhVY Z7242_M7105DQI8OfbqivqoRkhVY RG2hHC4OcL0
khVYM&index=11 M&index=9 M

Can you explain pixels, List the parts of the CPU and What is SMTP, POP & IMAP? What is social engineering? Explain what a 2D array is how they
resolution and colour depth their function - (Von Neumann) https://www.youtube.com/watch?v=0F can be used.
https://www.youtube.com/watc https://www.youtube.com/watch? 1JP78JAPE&list=PL04uZ7242_M710 https://www.youtube.com/watch?v=
h?v=a3Y_ZvOr0K0&list=PL04 v=SbqXqQ- 5DQI8OfbqivqoRkhVYM&index=39 QoVkbueINS8&list=PL04uZ7242_M https://www.youtube.com/watch?v=
uZ7242_M7105DQI8Ofbqivqo 2ixs&index=24&list=PL04uZ724 7105DQI8OfbqivqoRkhVYM&index= 6bKeE1A5-
Task 2
RkhVYM&index=18 2_M7105DQI8OfbqivqoRkhVYM 44 LY&list=PL04uZ7242_M7105DQI8O
fbqivqoRkhVYM&index=7
Make sure that you include the
registers, buses and their
direction.

Describe the importance of How is an analogue signal Convert the Hexadecimal 27 into What is Utility software? Give 3 Try Converting between bit, nibble,
network security and security represented in binary Denary. Show your working. examples of utility software and why bytes, Kilobytes, Megabytes and
threats https://www.youtube.com/watch? https://www.youtube.com/watch?v they are used. Gigabytes using the ladder example
https://www.youtube.com/watc v=HlOTuCFtuV8&index=19&list= =wjTDHBSwNyc&list=PL04uZ7242_ https://www.youtube.com/watch?v=
Task 3
h?v=QoVkbueINS8&list=PL04 PL04uZ7242_M7105DQI8Ofbqiv M7105DQI8OfbqivqoRkhVYM&inde https://www.youtube.com/watch?v= Ol3PxSpEeT4&t=1s&list=PL04uZ72
uZ7242_M7105DQI8Ofbqivqo qoRkhVYM x=12&pbjreload=10 Z0uVNcNKags&t=6s&list=PL04uZ7 42_M7105DQI8OfbqivqoRkhVYM&i
RkhVYM&index=44 242_M7105DQI8OfbqivqoRkhVYM ndex=11
&index=33
Easter Revision – Week 2 – Do this in week 2 of the Easter term – use
the videos to help you answer the questions.
Week 2 Monday Tuesday Wednesday Thursday Friday
List the Environmental concerns What is a binary arithmetic shift? List the Principles of: What are the benefits of Explain what is
often associated with the impact https://www.youtube.com/watch?v= Data Protection Act. simulation software Penetration testing, ethical
of computing on: health, energy, nm_laES9rKk&list=PL04uZ7242_M Copyright Designs and Patent https://www.youtube.com/watch? hacking, commercial analysis
resources 7105DQI8OfbqivqoRkhVYM&index Act and the Computer Misuse Act v=Z0uVNcNKags&list=PL04uZ72 tool software & user policies
Task 1 https://www.youtube.com/watch? =17&t=3s https://www.youtube.com/watch? 42_M7105DQI8OfbqivqoRkhVY https://www.youtube.com/watch
v=_uEvWNdvSwA&t=351s&list= v=_uEvWNdvSwA&list=PL04uZ7 M&t=8s&index=33 ?v=KO9PPmCxEKQ&index=45
PL04uZ7242_M7105DQI8Ofbqiv 242_M7105DQI8OfbqivqoRkhVY &list=PL04uZ7242_M7105DQI8
qoRkhVYM&index=49 M&t=353s&index=49 OfbqivqoRkhVYM&pbjreload=10

Give the uses of the following What is the 4 layer model/ Practise creating truth tables and Write the benefits high level and What is Lossy Compression?
Protocols: https://www.youtube.com/watch?v= drawing diagrams using the OR, low level programming and how
TCP MVihcigDlbA&list=PL04uZ7242_M NOT & AND symbols they are suited to different What is Lossless
IP 7105DQI8OfbqivqoRkhVYM&index https://www.youtube.com/watch? scenarios Compression?
HTTP =37&t=0s v=gFXW92O5vFg&list=PL04uZ7 https://www.youtube.com/watch?
Task 2 HTTPS 242_M7105DQI8OfbqivqoRkhVY v=HtUQzhTt3gE&list=PL04uZ724 https://www.youtube.com/watch
FTP M&index=31&t=392s 2_M7105DQI8OfbqivqoRkhVYM ?v=v1u-
https://www.youtube.com/watch? &t=38s&index=34 vY6NEmM&list=PL04uZ7242_M
v=7LfTWbOp5vU&t=0s&list=PL0 7105DQI8OfbqivqoRkhVYM&ind
4uZ7242_M7105DQI8OfbqivqoR ex=21&t=6s
khVYM&index=39

What are the good programming Create your own scenario where List 3 things that an operating List the advantages and Explain the following terms
practices for network security? you need to create 3 tables with a system does disadvantages of an assembler, using examples:
https://www.youtube.com/watch? primary key and foreign key & draw https://www.youtube.com/watch? a compiler and an interpreter Variable
v=S9iaUndb53g&list=PL04uZ72 the diagram v=7vbRGDgHukA&list=PL04uZ7 https://www.youtube.com/watch? Constant
Task 3 42_M7105DQI8OfbqivqoRkhVY https://www.youtube.com/watch?v= 242_M7105DQI8OfbqivqoRkhVY v=eXu0c5vZnhU&list=PL04uZ72 https://www.youtube.com/watch
M&index=47&t=0s 98ppOH7Rxsg&list=PL04uZ7242_ M&index=32&t=13s 42_M7105DQI8OfbqivqoRkhVY ?v=9QIFXyBYJQY&list=PL04uZ
M7105DQI8OfbqivqoRkhVYM&t=6 M&t=0s&index=35 7242_M7105DQI8OfbqivqoRkh
3s&index=23 VYM&index=5

You might also like