Filter:
📘 YEAR 7 DIAGRAMS
🔢
Year 7 · Binary

Binary Place Values Table

Each bit position in an 8-bit binary number represents a power of 2. The place values double from right to left: 1, 2, 4, 8, 16, 32, 64, 128. To convert binary to denary, add only the values where you see a 1.
8-BIT BINARY PLACE VALUES 2⁷ 2⁶ 2⁵ 2⁴ 2⁰ 128 64 32 16 8 4 2 1 Example: 1 0 1 1 0 0 1 1 → 128 + 32 + 16 + 2 + 1 = 179 1 0 1 1 0 0 1 1 128 + 0 + 32 + 16 + 0 + 0 + 2 + 1 = 179 ✓
Green digits (1s) are the active bits — their place values get added together. Grey zeros are ignored.
🔄
Year 7 · Binary

Denary ↔ Binary Conversion Steps

Two conversion methods side by side: Binary → Denary (read place values) and Denary → Binary (divide by 2, read remainders upward).
Binary → Denary: 01001101 Step 1: Write place values above each bit 128 64 32 16 8 4 2 1 0 1 0 0 1 1 0 1 Step 2: Add active place values (1s only) 64 + 8 + 4 + 1 = 77 01001101 in binary = 77 in denary Denary → Binary: 45 Divide by 2 repeatedly, note remainder: 45 ÷ 2 = 22 r 1 ← LSB 22 ÷ 2 = 11 r 0 11 ÷ 2 = 5 r 1 5 ÷ 2 = 2 r 1 2 ÷ 2 = 1 r 0 1 ÷ 2 = 0 r 1 ← MSB Read remainders UPWARD ↑ 45 in denary = 00101101 in binary
LSB = Least Significant Bit (rightmost). MSB = Most Significant Bit (leftmost). Always use 8 digits, pad with leading zeros.
📦
Year 7 · Networks

Structure of a Data Packet

When data travels across the Internet it is broken into small chunks called packets. Every packet contains three sections — Header, Payload (data), and Footer.
📋 HEADER Source IP address Destination IP address Packet number / sequence 📦 PAYLOAD The actual data (chunk of the full message) ✅ FOOTER End-of-packet marker Error-checking (checksum) ← One complete packet travels together across the network →
The checksum in the footer lets the receiver detect if the packet was corrupted during transit. If so, it requests a retransmission.
🌐
Year 7 · Networks

Wired vs Wireless Network Comparison

Networks can be connected using physical cables (wired) or radio waves (wireless). Each has advantages and disadvantages in speed, reliability and mobility.
🔌 Wired (Ethernet) 📡 Wireless (Wi-Fi) ✅ Very fast speeds (up to 10 Gbps) ✅ Highly reliable — no interference ✅ More secure — hard to intercept ❌ Device must stay physically connected ❌ Cable clutter — expensive to install ✅ Move freely within range ✅ Easy to add new devices ❌ Slower — affected by walls/distance ❌ Less secure — signal can be intercepted ❌ Interference from other devices
Schools typically use wired connections for desktops (reliability) and wireless for laptops and tablets (mobility).
🔷
Year 7 · Flowcharts

Flowchart: Password Strength Check

Standard flowchart symbols: Oval = Start/End · Rectangle = Process · Diamond = Decision. Arrows show the direction of flow. Dashed arrows = loop back.
START Input password from user Length ≥ 8 characters? NO Print "Too short" Ask again YES Contains a number? NO Print "Weak" YES Print "Strong" password accepted ✅ END KEY: Terminal Process Decision Loop
Every flowchart must have exactly one START and one END. Dashed arrows show loops back to earlier steps.
🔒
Year 7 · Flowcharts

Flowchart: Login with 3-Attempt Limit

A flowchart with a counter variable — a common exam question. The user gets 3 attempts. If they fail all 3, the account is locked. This combines a loop and a counter.
START attempts = 0 Input username and password attempts = attempts + 1 Credentials correct? YES Access Granted ✅ NO attempts < 3? YES loop NO Account LOCKED ❌ END
The counter "attempts" is set to 0 before the loop starts. After each wrong try it increments. When it reaches 3 the loop exits and the account is locked.
🌐
Year 7 · Connectivity

Internet vs World Wide Web

The Internet is the global physical infrastructure of connected computers. The World Wide Web (WWW) is a service that runs ON TOP of the Internet — just one of many services, alongside email, file transfer (FTP) and video calls.
THE INTERNET Physical infrastructure: cables, routers, servers, wireless signals 🌍 WWW Web pages & sites HTTP / HTTPS Browsers 📧 Email SMTP / IMAP ▶ Streaming Video / Audio Key: The WWW is a service that uses the Internet — not the same thing!
Tim Berners-Lee invented the World Wide Web in 1989. The Internet existed before the WWW. You access the WWW through a web browser using HTTP/HTTPS protocols.
🔐
Year 7 · Safe Practice

Encryption — How Data is Protected

Encryption scrambles data so only the intended recipient can read it. The original data is called plaintext. Encrypted data is called ciphertext. A key is needed to decrypt it.
📄 PLAINTEXT Hello! Sender ENCRYPT + encryption key 🔒 CIPHERTEXT Xr#9$kQ!p2 Travels over the network DECRYPT + decryption key 📄 PLAINTEXT Hello! Receiver ⚠️ Even if intercepted mid-transit, the ciphertext is unreadable without the key
HTTPS uses encryption so your passwords and card details are protected. The padlock icon in your browser means the connection is encrypted using TLS (Transport Layer Security).
Year 7 · Binary · ● Interactive

Binary ↔ Denary Converter

Click each bit to toggle it on (1) or off (0). Watch the denary value update instantly. Try to make specific numbers — great for practising binary conversion before exams!
128
64
32
16
8
4
2
1
Denary Value
0
Binary
00000000
Hex
0x00
Try:
Binary uses base 2 — only 0s and 1s. Each bit position doubles in value from right to left (1, 2, 4, 8 … 128). To convert to denary: add up the place values where the bit is 1.
📗 YEAR 8 DIAGRAMS
🖼️
Year 8 · Graphics

Bitmap Pixel Grid — Letter "A" in 1-bit colour

A bitmap image is a grid of pixels. Each pixel stores a colour as a binary number. In 1-bit colour: 1 = black, 0 = white. This grid shows how the letter "A" is stored as rows of binary.
Pixel Grid (8×8, 1-bit) Binary rows Row 0: 0 0 0 1 1 0 0 0 Row 1: 0 0 1 1 1 1 0 0 Row 2: 0 1 1 0 0 1 1 0 Row 3: 1 1 1 1 1 1 1 0 Row 4: 1 1 0 0 0 1 1 0 Row 5: 1 1 0 0 0 1 1 0 File size = 8×6×1 = 48 bits = 6 bytes
Blue = 1 (black pixel). Dark = 0 (white pixel). Formula: width × height × colour depth = file size in bits.
🎨
Year 8 · Graphics

Colour Depth — Bits per Pixel

Colour depth is the number of bits used to store each pixel's colour. More bits = more colours available, but larger file size. Formula: number of colours = 2^(colour depth).
Depth Bits/pixel Formula Colours Use / Format 1-bit 1 2 Black & white only 2-bit 2 4 Greyscale — 4 shades 8-bit 8 2⁸ 256 GIF images 16-bit 16 2¹⁶ 65,536 Web graphics 24-bit ★ 24 2²⁴ 16,777,216 True colour photos ★
★ 24-bit "true colour" is the standard for digital photography. The human eye cannot distinguish more than ~10 million colours.
📉
Year 8 · Compression

Run Length Encoding (RLE)

RLE replaces runs of repeated values with a count+value pair. It is lossless — no data is lost. Works best on images with large blocks of solid colour. Poor for photographs.
ORIGINAL: 16 values (16 bytes to store) W W W W B B B W W W W W B B W W RLE encode ↓ RLE ENCODED: 5 pairs = 10 values (saves 37.5%) 4W 3B 5W 2B 2W Lossless: 4W 3B 5W 2B 2W → original ⚠️ RLE makes files LARGER if there are few/no repeated values (e.g. photos)
RLE is lossless — you can perfectly reconstruct the original. It is used inside PNG and TIFF file formats.
📐
Year 8 · Graphics & Binary

Image File Size Calculation

File size depends on three things: image width (pixels), image height (pixels), and colour depth (bits per pixel). Multiply them together and divide by 8 to get bytes.
FILE SIZE FORMULA Width (px) × Height (px) × Colour Depth (bits) ÷ 8 = Bytes Example 1 — Small thumbnail Width: 100 px Height: 100 px Colour depth: 24 bits 100 × 100 × 24 ÷ 8 = 30,000 bytes ≈ 29.3 KB Example 2 — HD photo Width: 1920 px Height: 1080 px Colour depth: 24 bits 1920 × 1080 × 24 ÷ 8 = 6,220,800 bytes ≈ 5.9 MB Units: 1 KB = 1,024 bytes · 1 MB = 1,024 KB · 1 GB = 1,024 MB (binary units)
This gives the UNCOMPRESSED file size. Formats like JPEG use lossy compression; PNG uses lossless compression. Both reduce the actual file size significantly below the raw calculation.
📊
Year 8 · Spreadsheets

Spreadsheet Layout, Cell References & Formulas

A spreadsheet grid — columns are lettered (A, B, C…), rows are numbered (1, 2, 3…). A cell reference combines them: B3 = column B, row 3. Formulas start with = and can use functions like SUM, AVERAGE, MAX, MIN, IF.
A B C D (formula) 1 Name Test 1 Test 2 Average 2 Alice 85 90 =AVERAGE(B2:C2) 3 Bob 72 68 =AVERAGE(B3:C3) 4 Charlie 95 88 =AVERAGE(B4:C4) 5 Class Stats =MAX(B2:B4) =MIN(C2:C4) =AVERAGE(D2:D4) Common Functions: =SUM(A1:A10) — total =AVERAGE(B2:B8) — mean =COUNT(C1:C5) — count numbers =MAX(A1:A10) — highest =MIN(A1:A10) — lowest =IF(B2>50,"Pass","Fail") — conditional
Green cells contain formulas (starting with =). Blue cells show summary/stats row. Cell references are relative by default — they update when copied.
🔐
Year 8 · Cyber Security

Types of Malware & Defences

Malware is malicious software designed to damage, disrupt or gain unauthorised access to computer systems. Different types work in different ways.
🦠 Virus Attaches to files. Spreads when files are shared. Corrupts / deletes data 🐛 Worm Self-replicates across networks without needing a host file. Clogs bandwidth 💰 Ransomware Encrypts all your files. Demands payment to unlock. Very destructive 🕵️ Spyware Secretly monitors your activity. Sends data to attacker. Steals passwords & data 🛡️ DEFENCES AGAINST MALWARE Anti-malware software Firewalls Encryption Strong passwords + 2FA Keep SW updated ⚠️ Phishing = fake emails/sites that trick you into giving login details — NOT malware, but equally dangerous!
Most malware enters via email attachments, downloads, or infected USB drives. Never open attachments from unknown senders.
🔗
Year 8 · Networks

Network Topologies — Star vs Bus vs Ring

A topology is the layout pattern of how devices are connected in a network. Each has different advantages for reliability, cost, and speed.
⭐ STAR SWITCH ✓ If one device fails, others work ✗ If switch fails, all fail 🚌 BUS backbone cable ✓ Cheap, easy to set up ✗ Cable breaks = whole network fails 💍 RING ✓ Orderly data flow, no collisions ✗ One break disrupts the whole ring
Most modern schools and offices use Star topology because it is reliable — a single device failure doesn't take down the rest of the network. Bus was common in early Ethernet networks.
🖼️
Year 8 · Graphics & Binary

How Images are Encoded — Colour Depth

Every pixel's colour is stored as a binary number. Colour depth is the number of bits used per pixel. More bits = more possible colours = better quality but larger file size.
1-bit colour 2¹ = 2 colours 0 1 Black & White only File size = tiny Quality = very low 8-bit colour 2⁸ = 256 colours 256 possible colours per pixel File size = medium Quality = moderate 24-bit colour 2²⁴ = 16.7 million colours R=8bit G=8bit B=8bit True colour — photographic quality File size = large Quality = photographic
File size formula: Width × Height × Colour depth (bits) ÷ 8 = bytes. A 100×100 pixel 24-bit image = 100 × 100 × 24 ÷ 8 = 30,000 bytes = ~29KB before compression.
📕 YEAR 9 DIAGRAMS
Year 9 · CPU

Fetch-Decode-Execute (FDE) Cycle

The CPU continuously repeats the FDE cycle — millions of times per second. Every program instruction goes through all three stages. Clock speed (GHz) = how many cycles per second.
1. FETCH CPU reads the next instruction from RAM at the address in PC (Program Counter +1) 2. DECODE Control Unit (CU) interprets the binary instruction — works out what to do 3. EXECUTE ALU performs the operation (maths, comparison, memory read/write) ← Cycle repeats billions of times per second (GHz clock speed) →
A 3 GHz CPU performs 3,000,000,000 FDE cycles every second. PC = Program Counter (stores address of next instruction).
🔬
Year 9 · CPU

CPU Internal Components

The CPU contains specialist components. The Control Unit (CU) manages the FDE cycle. The ALU performs calculations. Registers are ultra-fast temporary storage inside the CPU itself.
CPU (Central Processing Unit) Control Unit (CU) Manages FDE cycle Coordinates all parts ALU Arithmetic Logic Unit Maths + comparisons Registers (ultra-fast temporary storage) PC (Program Counter) Address of next instruction ACC (Accumulator) Stores results MAR / MDR Memory addressing RAM Fast volatile memory. Holds running programs and current data. Storage (HDD/SSD) Permanent, non-volatile. Slower than RAM. bus
RAM is volatile (data lost when power off). Storage is non-volatile (permanent). The CPU communicates with both via data, address and control buses.
🔊
Year 9 · Sound

Sound Sampling — Analogue to Digital

Sound is an analogue (continuous) wave. To store it digitally, the wave is sampled at regular intervals. The sample rate determines how often (Hz). Bit depth determines how precisely each sample is recorded.
Analogue sound wave (continuous) ← Sampling interval (determined by sample rate) → 🌊 Sample Rate: How many samples per second (Hz). CD quality = 44,100 Hz. Higher = better quality, larger file. 📏 Bit Depth: How many bits store each sample. CD = 16-bit = 65,536 possible amplitude levels. 📐 File Size (bits): Sample Rate × Bit Depth × Duration(s) × Channels
Stereo audio has 2 channels (left + right). CD: 44,100 × 16 × 60 × 2 = 84,672,000 bits ≈ 10.6 MiB per minute.
🔃
Year 9 · Algorithms

Bubble Sort — Full Trace Table

Bubble sort compares adjacent pairs and swaps them if they are in the wrong order. After each full pass, the largest unsorted value "bubbles" to its final position at the end.
Pass Array State Swaps Start [ 64, 25, 12, 22, 11 ] Pass 1 [ 25, 12, 22, 11, 64 ] 4 swaps Pass 2 [ 12, 22, 11, 25, 64 ] 3 swaps Pass 3 [ 12, 11, 22, 25, 64 ] 2 swaps Pass 4 [ 11, 12, 22, 25, 64 ] 1 swap Sorted ✅ [ 11, 12, 22, 25, 64 ] 0 swaps Green numbers = already in their final sorted position after that pass. Optimisation: if a pass has 0 swaps, the list is sorted — stop early!
Bubble sort requires at most n−1 passes for n items. Maximum comparisons = n(n−1)/2. It is simple but inefficient for large lists.
🔍
Year 9 · Algorithms

Linear Search — Step-by-Step Trace

Linear search checks each element one by one from the start. It works on any list — sorted or unsorted. Best case: 1 comparison (target is first). Worst case: n comparisons (last or not found).
Searching for 32 in: [ 34, 7, 23, 32, 5, 62 ] 34 idx 0 7 idx 1 23 idx 2 32 idx 3 ✅ 5 idx 4 62 idx 5 Check idx 0: 34 == 32? ❌ No Check idx 1: 7 == 32? ❌ No Check idx 2: 23 == 32? ❌ No Check idx 3: 32 == 32? ✅ FOUND! Return 3 Efficiency Best case: 1 comparison Average: n ÷ 2 Worst case: n comparisons Works on unsorted lists ✅
Red boxes = checked but not target. Green box = found. Grey boxes = never checked (search stopped when found).
🗄️
Year 9 · Databases

Database Tables — Primary & Foreign Keys

A relational database stores data in linked tables. A Primary Key (PK) uniquely identifies each record. A Foreign Key (FK) in one table links to the PK in another table, creating a relationship.
📋 Students 🔑 StudentID (PK) FirstName LastName DateOfBirth 🔗 ClassID (FK) Example records: 001 | Alice | Osei | C1 📋 Classes 🔑 ClassID (PK) ClassName TeacherName Room Example records: C1 | Year 9A | Mr Smith | R12 FK links to PK Many students → one class 🔑 Primary Key: unique, never null, identifies each record 🔗 Foreign Key: links to another table's Primary Key
StudentID = "001", "002" — unique for each student. ClassID in Students matches ClassID in Classes — this is a one-to-many relationship.
🌍
Year 9 · Networks

PAN / LAN / WAN — Network Types

Networks are classified by their geographic range. PAN covers a few metres, LAN covers a single building or campus, and WAN spans large distances using third-party infrastructure.
WAN Countries / global e.g. The Internet LAN Building / campus e.g. School network PAN ~metres 📱 💻 Type Range Infrastructure Example PAN Few metres Bluetooth / personal Smartwatch ↔ phone LAN One building Owned by organisation School Wi-Fi WAN Countries / global Third-party telecoms The Internet
The Internet is the world's largest WAN. A school LAN might be connected to the Internet (WAN) via a router provided by an ISP.
🌐
Year 9 · Web

HTML Document Structure — DOM Tree

An HTML document has a tree-like structure called the DOM (Document Object Model). Every element is a node. Parent elements contain child elements. The root is always <html>.
<html> <head> <body> <meta> <title> <link> <h1> <nav> <main> <a> <a> Self-closing tags (no closing tag needed): <meta> <link> <br> <hr> <img> <input>
Every HTML element is a node in the tree. <html> is the root. <head> and <body> are its two direct children. Indentation in code mirrors this tree structure.
🔷
Year 9 · Flowcharts

Flowchart: Bubble Sort Algorithm

The bubble sort algorithm as a formal flowchart — the type you need to be able to draw and interpret in the exam. Shows nested loops (inner loop inside outer loop) and the swap operation.
START Set n = length of list pass = 0 pass < n − 1? NO END YES i = 0 i < n−pass−1? NO pass += 1 YES list[i] > list[i+1]? YES SWAP list[i], list[i+1] NO i = i + 1
This is the complete bubble sort flowchart showing two nested loops. The outer loop counts passes; the inner loop does the comparisons and swaps within each pass.
💾
Year 9 · Sound & Storage

Storage Devices vs Storage Media

A storage device is the hardware that reads and writes data (e.g. the hard drive unit). Storage media is the physical material that actually holds the data (e.g. the magnetic disk inside). Some devices and media are the same object (USB stick), others are separate (DVD drive + DVD disc).
💾 STORAGE DEVICE (hardware unit) 📀 STORAGE MEDIA (holds the data) Hard Disk Drive (HDD) unit Spinning magnetic platters inside DVD / Blu-ray Drive DVD / Blu-ray disc Tape Drive Magnetic tape cassette 🔄 SSD / USB stick / SD card — device AND media are the same object (flash chips) Volatile: RAM (loses data when power off) | Non-volatile: HDD, SSD, USB Magnetic: HDD, tape | Optical: CD/DVD | Flash: SSD, USB, SD
SSDs (Solid State Drives) have no moving parts — they're faster, quieter, and more durable than HDDs. HDDs are cheaper per GB and better for large backups. RAM is volatile primary storage — it loses everything when power is cut.
🖥️
Year 9 · Input, Process, Output

High-Level vs Low-Level Languages

Programming languages range from high-level (human-readable, like Python) to low-level (machine-level, like Assembly and Machine Code). Translators convert high-level code to machine code so the CPU can execute it.
HIGH-LEVEL LANGUAGE print("Hello") for i in range(10): if score > 50: Compiler / Interpreter ASSEMBLY LANGUAGE MOV AX, 5 ADD AX, BX JMP loop Assembler MACHINE CODE 01001000 01100101 11001010 00110101 CPU executes Comparison Readable by humans ✓ High Readable by humans ✗ Low Execution speed Slow → Fast Portability High → Low Memory control Low → High Translator needed Yes → No Compiler: translates whole program at once Interpreter: translates one line at a time Python uses an interpreter
Python is an interpreted high-level language — easy to read and write but slower than compiled languages like C++. Machine code runs directly on the CPU with no translation needed.
🔃
Year 9 · Algorithms · ● Interactive

Bubble Sort — Step Through

Step through a bubble sort pass-by-pass. Watch the algorithm compare adjacent pairs and swap them when out of order. The largest values "bubble" to the end each pass.
Comparing Sorted Swapped
Bubble sort has O(n²) time complexity — slow for large lists. Best case: O(n) if already sorted. It is simple to understand and implement, making it ideal for learning algorithm concepts.
🔎
Year 9 · Algorithms · ● Interactive

Linear vs Binary Search — Side by Side

Enter a target value and see both algorithms search simultaneously. Linear search checks one-by-one from the start. Binary search halves the list each time — much faster on sorted data.
Target must be in 1–99 range
Linear Search
Binary Search
Binary search requires a sorted list. For a list of 1000 items: linear search needs up to 1000 checks, binary search needs at most 10 (log₂1000 ≈ 10). This is why sorting data first pays off.