Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Cover Title Page Copyright Get the most from this book My revision planner Introduction
Using this book How to revise Examination technique Finally…
Unit 1
1 Hardware
The Von Neumann model Central processing unit The fetch-decode-execute cycle Factors affecting processor performance Input and output Data capacity and storage requirements
2 Logical Operations
Logical operators Truth tables Boolean logic Simplifying Boolean expressions using Boolean identities and rules
3 Communication
Networks Servers Wired and wireless networks Network hardware Protocols Layers Routing IP addresses
4 Organisation and structure of data
Representation of numbers Arithmetic shift functions Overflow Adding binary numbers Representation of graphics and sound Metadata Storage of characters Data types Data structures Data validation and verification Algorithms
5 System Software
The operating system Utility software
6 Principles of programming
Computer languages
7 Software engineering 8 Program construction
Assembler Compiler Interpreter The process of compilation Programming errors
9 Security and data management
Data Security Data management Compression Network security Policies Cybersecurity Protecting software during production Internet cookies
10 Ethical, legal and environmental impacts
Computer crime E-commerce Social Impact of digital technology Standards Legislation Environmental issues
Worked examples
Unit 2
1 Problem solving
Decomposition Abstraction
2 Algorithms and programming constructs
Algorithms Flowcharts Pseudocode Programming constructs Sequence, selection, repetition Counting Object-orientated programs Input, processing and output Variables Identifiers String handling Mathematical operations Logical operations Sorting Searching Testing and evaluation
3 Programming languages
Hypertext Markup Language (HTML) Assembly language Object-oriented programming
4 Data structures and data types
Variables and constants
5 Security and authentication
Security techniques Validation algorithms
Glossary of programming terms
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion