0% found this document useful (0 votes)
0 views6 pages

Cs Revision Notes

The document provides comprehensive notes on computer science topics including computer security, personal data protection, health and safety in computing, Python programming, and algorithms. It covers definitions, key terms, common threats, and protective measures in computer security, as well as programming concepts like variables, data types, functions, and control structures. Additionally, it discusses the importance of health and safety in computing and the environmental impact of e-waste.

Uploaded by

sahmad2344
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
0 views6 pages

Cs Revision Notes

The document provides comprehensive notes on computer science topics including computer security, personal data protection, health and safety in computing, Python programming, and algorithms. It covers definitions, key terms, common threats, and protective measures in computer security, as well as programming concepts like variables, data types, functions, and control structures. Additionally, it discusses the importance of health and safety in computing and the environmental impact of e-waste.

Uploaded by

sahmad2344
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

Got it!

Here's the content without any hashtags so you can paste it into your
notes smoothly:

Computer Science Notes

Computer Security

Definition:
Computer security refers to protecting systems from unauthorized access,
attacks, or damage. It ensures the confidentiality, integrity, and availability of
data.

Key Terms:
- Hacking – Illegally accessing or modifying computer files without permission.
- Malware – Malicious software designed to harm, exploit, or disrupt systems.
- Viruses – A type of malware that replicates and spreads without user consent.
- Unauthorized Access and Modification – When someone illegally accesses or
alters files.
- Firewall – A security system that monitors and controls incoming and
outgoing network traffic.
- Spyware – A type of malware that gathers information about a user without
consent.
- Adware – Software that displays unwanted advertisements.

Common Threats:
- Logic Bombs – Malicious code that activates when certain conditions are met.
- Ransomware – A type of malware that locks a user’s files and demands
payment to unlock them.
- Trojan Horse – A virus disguised as legitimate software.
- Phishing – Fraudulent attempts to obtain sensitive information via emails or
fake websites.
- Advanced Fee Fraud – A scam where a victim is promised a large sum of
money in exchange for a small payment.

Protecting Against Cyber Threats:


- Use strong, unique passwords and update them regularly.
- Keep software and browsers updated to patch security vulnerabilities.
- Install antivirus and anti-malware software.
- Avoid clicking on suspicious links or downloading unknown attachments.
- Use firewalls to filter incoming and outgoing traffic.

Protecting Personal Data

Who Holds Your Data?


- Schools – Personal details, academic records.
- Doctors/NHS – Medical history, prescriptions.
- Google – Name, email, search history, contacts.

Data Protection Act & GDPR:


- Regulates how personal data is collected, stored, and used.
- Key principles:
- Data must be accurate and up-to-date.
- Individuals have the right to access their personal data.
- Data must be protected from unauthorized access.

Identity Theft:
- Occurs when criminals access personal data to impersonate someone.
- They may apply for bank loans, credit cards, or commit fraud in your name.
- Minimizing risk:
- Avoid sharing personal data online.
- Use privacy settings on social media.
- Be cautious of phishing emails.

Health and Safety in Computing

Common Health Issues from Computer Use:


- Eye Strain – Caused by staring at screens for long periods.
- Back Problems – Poor posture can lead to spinal issues.
- Repetitive Strain Injury (RSI) – Repeating the same movement (e.g., typing)
can cause pain.

Employer Responsibilities:
- Provide adjustable chairs and desks.
- Ensure proper lighting to reduce glare.
- Allow frequent breaks to prevent fatigue.

E-Waste:
- Old electronic devices contribute to hazardous waste.
- Recycling options:
- Return to Manufacturer – Some companies offer trade-in programs.
- Donate to charity – Old computers can be reused.
- Professional disposal services – Ensures safe and legal disposal.

Python Programming

IDLE (Integrated Development and Learning Environment):


- Interactive Mode – Runs Python commands one at a time.
- Script Mode – Allows users to write, save, and execute full programs.

Variables:
- Definition: A storage location in memory used to store data that can change.
- Rules for Naming Variables:
- Can contain letters, numbers, and underscores.
- Cannot start with a number.
- Cannot use reserved Python keywords (e.g., class, def).

Data Types:
- String (str) – Holds text ("Hello").
- Integer (int) – Holds whole numbers (5, 100).
- Float (float) – Holds decimal numbers (3.14).
- Boolean (bool) – Holds True or False.

Casting (Type Conversion):


- str() – Converts to a string.
- int() – Converts to an integer.
- float() – Converts to a float.

Arithmetic Operators

- Addition (+) – 2 + 3 = 5
- Subtraction (-) – 5 - 3 = 2
- Multiplication (*) – 4 * 2 = 8
- Division (/) – 10 / 2 = 5.0
- Floor Division (//) – 10 // 3 = 3
- Modulus (%) – 10 % 3 = 1

Order of Operations (BIDMAS):


1. Brackets
2. Indices (Exponents)
3. Division & Multiplication
4. Addition & Subtraction

Functions

- Definition: A block of reusable code that performs a task.


- Defined using def keyword.

Example:
```python
def greet(name):
print("Hello, " + name)
greet("Alice")
```
Pseudocode

Pseudo code is half English and half code


It wouldn’t run and is used to plan programs

Common Python Keywords in Pseudocode:


- PRINT – Displays output.
- INPUT – Accepts user input.
- IF, THEN, ELSE – Decision-making.
- WHILE – Loop while a condition is true.
- FOR – Loop a set number of times.

Selection (IF Statements)

- Used to make decisions based on conditions.


- Uses IF, ELIF, and ELSE.

Iteration (Loops)

- While Loop – Runs as long as a condition is true.


- For Loop – Runs a fixed number of times.

---

Flowcharts

Definition:
A flowchart is a graphical representation of an algorithm, using symbols and
arrows.

Flowchart Symbols:
- Oval → Start/End.
- Parallelogram → Input/Output.
- Rectangle → Process (calculation, assignment).
- Diamond → Decision (True/False conditions).
Search Algorithms

Linear Search:
- Checks each item one by one from start to end.
- Simple but inefficient for large datasets.

Random Search:
- Selects random items and checks if they match the target.
- Highly inefficient as it relies on luck.

Binary Search:
- Only works on sorted lists.
- Finds the midpoint and compares it to the target.
- Repeats in the lower or upper half until the item is found.
- More efficient than linear search.

Now it's fully clean for pasting into your notes! Let me know if you need any
final tweaks.

You might also like