Professional Documents
Culture Documents
- Subtraction - Why hex? 3.2.2 understand how bitmap images are represented in binary (pixels, resolution,
colour depth)
- Logical Shifts - hex to denary 3.2.3 understand how sound, an analogue signal, is represented in binary
- Arithmetic Shifts - hex to binary 3.2.4 understand the limitations of binary representation of data (sampling frequency,
resolution) when constrained by the number of available bits
3.3.1 understand how to convert between the terms ‘bit, nibble, byte, kilobyte (KB),
megabyte (MB), gigabyte (GB), terabyte (TB)’
3.3.2 understand the need for data compression and methods of compressing data
Instructions (lossless, lossy) and that JPEG and MP3 are examples of lossy algorithms
Quizlet
- Op-code 3.3.3 understand how a lossless, run-length encoding (RLE) algorithm works
Use Quizlet app or website with study sets "03…"
- Operand to learn the definitions associated with this topic.
3.3.4 understand that file storage is measured in bytes and be able to calculate file
sizes
- Accumulator 3.4.1 understand the need for data encryption
3.4.2 understand how a Caesar cipher algorithm works
3.5.1 understand the characteristics of structured and unstructured data
FAQ’s
Should I show my working for binary / hex conversions?
Yes, always show your working. It helps you spot easy errors that may mean you miss out on a mark.
Sometimes there are marks in the question for working out too.
Encryption and Decryption
When encrypted data is decoded, this is called decryption, not unencryption!
Is there one type of encryption?
There are many types of encryption, public key encryption is used to send data securely across the Internet,
usually for online bank transaction and payments. But you need to be able to explain, describe and use a
Caesar cipher.
Misconceptions
Binary place values double each time (they don’t follow the 2 times table)
The Caesar cipher is not just a wheel that moves, but you need to be able to describe what happens.
Encryption isn’t just used to stop people from seeing information. It is used to only allow people with
access to the key to decrypt it to view it, thus stopping unauthorised users from seeing it.
representatio
n 3.2.3 understand how sound, an analogue signal, is represented in binary
understand the limitations of binary representation of data (sampling
3.2.4
frequency, resolution) when constrained by the number of available bits
understand how to convert between the terms ‘bit, nibble, byte, kilobyte (KB),
3.3.1
megabyte (MB), gigabyte (GB), terabyte (TB)’
Data storage understand the need for data compression and methods of compressing data
3.3.2
3.3 and (lossless, lossy) and that JPEG and MP3 are examples of lossy algorithms
compression 3.3.3 understand how a lossless, run-length encoding (RLE) algorithm works
understand that file storage is measured in bytes and be able to calculate file
3.3.4
sizes
3.4.1 understand the need for data encryption
3.4 Encryption
3.4.2 understand how a Caesar cipher algorithm works
3.5.1 understand the characteristics of structured and unstructured data
3.5 Databases understand that data can be decomposed, organised and managed in a
3.5.2
structured database (tables, records, fields, relationships, keys)