01001 Binary
🐍 Python
🌐 Internet
YEAR 7

Computing

Master the digital world. From staying safe online to writing your first lines of code.

🛡️ E-Safety
🔢 Binary
💻 Coding
Start Learning
About this book

This comprehensive textbook guides you through the fundamentals of computing. Learn how computers work with binary, how to stay safe and legal online, and take your first steps into programming with Python. Designed for curious minds ready to explore the digital future.

📖 Table of Contents

01
🛡️

Safe Practice

Learning how to use technology respectfully and stay safe in the digital world

🎯 Learning Objectives

  • Understand how to use technology respectfully and stay safe online
  • Know how to protect your online identity and privacy
  • Recognise inappropriate content, contact and conduct
  • Know how to report concerns
  • Understand what is meant by the Internet
  • Understand what is meant by the World Wide Web (WWW)

1.1 Staying Safe Online

The internet is an amazing tool for learning, communicating, and having fun. However, just like in the real world, there are risks you need to be aware of. Staying safe online is one of the most important digital skills you will ever learn.

Your Digital Footprint

Everything you do online leaves a trail called your digital footprint. This includes:

Your digital footprint can be seen by others — including future employers and universities. Always think before you post!

⚠️ Important Rule

Once something is posted online, it can be very difficult — or even impossible — to completely remove it. Even if you delete a post, someone may have already taken a screenshot or saved it.

Protecting Your Online Identity

Your online identity is how you appear to others on the internet. Here are essential tips for protecting it:

🔑 Strong Passwords

Use a mix of uppercase letters, lowercase letters, numbers and symbols. Make passwords at least 8 characters long. Never use your name, birthday or "password123"!

🔒 Privacy Settings

Check privacy settings on all your social media accounts. Set your profiles to private so only people you know can see your posts and personal information.

🤐 Personal Information

Never share your full name, address, phone number, school name or location with strangers online. This information could be used to find you in the real world.

👤 Think Before You Share

Before posting anything, ask yourself: "Would I be happy for my teacher, parents or future employer to see this?" If not, don't post it!

📝 Activity 1.1 — Password Strength Challenge

Create three passwords and rate them as Weak, Medium or Strong:

  1. Create a password using only lowercase letters
  2. Create a password using letters and numbers
  3. Create a password using uppercase, lowercase, numbers and symbols

Discuss: Which password would be hardest to guess? Why?

1.2 The Three C's of Online Risk

Online risks can be grouped into three categories, known as the Three C's:

📄 Content

Inappropriate content refers to material that is harmful, offensive or not suitable for your age. This could include violent images, hate speech or misleading information (fake news).

📞 Contact

Inappropriate contact is when someone you don't know tries to communicate with you online. They might pretend to be someone they're not (this is called catfishing).

💬 Conduct

Inappropriate conduct is behaving in a harmful way online. This includes cyberbullying, trolling (posting to deliberately upset people) and sharing embarrassing photos of others.

How to Report Concerns

If you ever feel unsafe online, it's important to know what to do:

Tell a trusted adult — Talk to a parent, carer or teacher about what happened.
Use the report button — Most websites and apps have a way to report inappropriate content, contact or behaviour.
Block the person — If someone is making you uncomfortable, block them immediately.
Save the evidence — Take screenshots of any harmful messages or content before reporting.
Contact CEOP — The Child Exploitation and Online Protection command (ceop.police.uk) can help if you feel in danger.

1.3 The Internet vs The World Wide Web

Many people use the words "Internet" and "World Wide Web" to mean the same thing — but they are actually different things!

📘 Key Term: The Internet

The Internet is a massive global network of interconnected computers and other devices. It is the physical infrastructure — the cables, routers, servers and satellites — that allows devices around the world to communicate with each other.

📘 Key Term: The World Wide Web (WWW)

The World Wide Web is a collection of websites and web pages that you access through the Internet using a web browser. It was invented by Tim Berners-Lee in 1989. The Web is just one of many services that use the Internet.

The Internet vs The World Wide Web

🌐 The Internet
The physical network
(cables, routers, servers)
contains
🕸️ The World Wide Web
Websites & pages
(runs ON the Internet)

The World Wide Web runs on top of the Internet. Other services like email, online gaming and video calls also use the Internet.

💡 Did You Know?

The Internet started as a US military project called ARPANET in 1969, connecting just four computers. Today, there are over 5 billion Internet users worldwide!

1.4 Creating Presentations

Presentation software (like Microsoft PowerPoint or Google Slides) lets you share information with an audience using slides. Good presentations use a combination of text, images, and multimedia.

Key Presentation Skills

Feature What It Does
Hyperlinks Clickable links that take you to a website or another slide
Buttons Interactive elements that perform actions when clicked
Animation effects Make objects appear, move or disappear on a slide
Transition effects Visual effects when moving from one slide to the next
Embedded content Videos or content from other websites placed into your slides
House style A consistent design (colours, fonts, layout) used across all slides

📝 Activity 1.2 — Online Safety Presentation

Create a presentation about staying safe online. Your presentation must include:

  • At least 6 slides with a consistent house style
  • A hyperlink to an online safety website
  • At least one animation effect and one transition effect
  • An embedded video about online safety
  • Appropriate images with correct referencing

Extension: Repurpose your presentation for a different audience (e.g., for Year 4 students). How would you change it?

📋 Chapter 1 Summary

  • Your digital footprint is the trail you leave online — it's permanent
  • Protect your identity with strong passwords and privacy settings
  • Be aware of the Three C's: Content, Contact and Conduct
  • Always report concerns to a trusted adult
  • The Internet is the physical network; the World Wide Web is the collection of websites that runs on it
  • Good presentations use hyperlinks, animations, transitions and a house style

✅ Check Your Understanding

1. What is a digital footprint?

2. Name three things that make a strong password.

3. What are the Three C's of online risk?

4. Explain the difference between the Internet and the World Wide Web.

5. Who invented the World Wide Web, and in what year?

02
⚖️

Responsible Practice

Understanding digital laws, creating professional documents and using cloud technology

🎯 Learning Objectives

  • Understand digital piracy, copyright and plagiarism
  • Use page layout features effectively
  • Integrate different assets into a single document
  • Understand and use cloud-based strategies

2.1 The Legal Impact of Using Technology

When you use technology, there are laws you must follow. Breaking these laws can result in serious consequences, including fines or even imprisonment.

Digital Piracy

📘 Key Term: Digital Piracy

Digital piracy is the illegal copying, distribution or downloading of copyrighted material without permission. This includes downloading music, films, games or software without paying for them.

Examples of digital piracy include:

Copyright

📘 Key Term: Copyright

Copyright is the legal right that protects the creators of original work. It gives the creator control over how their work is used, copied and distributed. Copyright applies automatically — you don't need to register it.

Copyright protects many types of work:

📚 Literary Works

Books, articles, blog posts, poems, song lyrics

🎵 Music & Sound

Songs, compositions, podcasts, sound effects

🎬 Visual & Film

Films, TV shows, YouTube videos, photographs

💻 Software & Code

Computer programs, apps, video games, websites

Plagiarism

📘 Key Term: Plagiarism

Plagiarism is presenting someone else's work or ideas as your own without giving them credit. This is a form of cheating and is taken very seriously in schools and workplaces.

How to avoid plagiarism:

⚠️ Remember

Just because something is available on the Internet does NOT mean it's free to use. Most images, text and media you find online are protected by copyright.

2.2 Document Layout Skills

Creating professional-looking documents is an important skill. Whether you're writing a report, creating a newsletter or designing a poster, understanding page layout features will make your work look polished.

Essential Page Layout Features

Feature Description When to Use It
Headings & Subheadings Titles that organise content into sections Reports, essays, articles
Headers & Footers Text that appears at the top/bottom of every page Page numbers, document titles, dates
Bullet/Numbered Lists Organised lists of items or steps Instructions, key points, ingredients
Page Orientation Portrait (tall) or Landscape (wide) Landscape for certificates, posters
Page Breaks Forces content to start on a new page Starting new chapters or sections
Columns Divides text into multiple columns Newsletters, magazines
Text Boxes Containers for text that can be positioned freely Callouts, labels, pull quotes
Templates Pre-designed document layouts Letters, reports, CVs

Integrating Assets

A professional document often combines many different types of content, called assets:

When you place objects on top of each other, you can layer them using "Bring to Front" or "Send to Back". You can also group multiple objects together so they move as one.

2.3 Cloud-Based Technologies

📘 Key Term: Cloud Computing

Cloud computing means storing and accessing files and software over the Internet instead of on your computer's hard drive. Examples include Google Drive, Microsoft OneDrive and Dropbox.

Key Cloud Skills

📂 Sharing Files & Folders

Share your work with others by sending them a link. No need to email large attachments!

🔐 Setting Permissions

Control what others can do with your files: View (read only), Comment (add feedback) or Edit (make changes).

📦 Compressing Files

Zipping makes files smaller for easier sharing. Unzipping extracts the files back to their original size.

📧 Email Attachments

Attach files to emails to share with specific people. Remember to compress large files before attaching!

✅ Advantages of Cloud Storage

  • Access files from any device, anywhere
  • Easy to share and collaborate
  • Automatic backups
  • No need for USB drives
  • Files won't be lost if your computer breaks

❌ Disadvantages of Cloud Storage

  • Requires Internet connection
  • Security risks if password is weak
  • Limited free storage space
  • Dependent on the service provider
  • Privacy concerns about who can access data

📝 Activity 2.1 — Create a Professional Newsletter

Create a one-page newsletter about responsible technology use. Include:

  • A headline and subheadings
  • Two columns of text
  • At least one image with a caption
  • A text box with a "Top Tip"
  • A header with the newsletter name and a footer with the date and page number
  • Correct references for any images or quotes used

Extension: Save your newsletter to a cloud service and share it with a classmate using "Comment" permissions.

📋 Chapter 2 Summary

  • Digital piracy is illegally copying or distributing copyrighted material
  • Copyright automatically protects creators' original work
  • Plagiarism is presenting someone else's work as your own
  • Professional documents use headings, headers/footers, page breaks and integrated assets
  • Cloud computing lets you store, share and access files over the Internet
  • Cloud permissions include View, Comment and Edit

✅ Check Your Understanding

1. What is digital piracy? Give two examples.

2. How can you avoid plagiarism in your schoolwork?

3. What is the difference between portrait and landscape orientation?

4. Name three advantages of using cloud storage.

5. What are the three permission levels you can set when sharing a cloud document?

03
🌐

Connectivity & the Internet

How devices connect, communicate and access information across the world

🎯 Learning Objectives

  • Understand wired and wireless connectivity
  • Know that data can be transmitted using Wi-Fi and mobile networks
  • Understand satellite communication
  • Compare wired and wireless connectivity
  • Know the roles of search engines, web browsers and filter software

3.1 Wired Connectivity

Wired connectivity means devices are physically connected using cables. There are two main types of cable used in networks:

🔌 Copper Cable (Ethernet)

The most common type of wired connection. Copper cables carry electrical signals between devices. They are reliable and affordable but slower over long distances.

💡 Fibre Optic Cable

Uses pulses of light to transmit data through thin glass fibres. Much faster than copper cable and can carry data over very long distances without losing signal quality.

3.2 Wireless Connectivity

Wireless connectivity uses radio waves to transmit data without physical cables. The two main types you'll use are:

📶 Wi-Fi

Connects devices to the Internet via a wireless router. Works over short distances (typically within a building). The router is connected to the Internet via a cable.

📱 Mobile Data Network

Uses mobile phone masts (cell towers) to transmit data over longer distances. This is what your phone uses for Internet when you're not connected to Wi-Fi (3G, 4G, 5G).

💡 Did You Know?

Wi-Fi and mobile data are NOT the same thing! Wi-Fi connects you to a local router, while mobile data connects you to a phone network's cell tower. Both give you Internet access, but they use different technologies.

Satellite Communication

Some digital devices communicate using satellite broadcast. Satellites orbit the Earth in space and can send and receive signals across huge distances.

Common uses of satellite communication include:

3.3 Wired vs Wireless — The Comparison

Factor Wired 🔌 Wireless 📶
Speed Generally faster (higher bandwidth) Can be slower, depends on signal
Reliability Very reliable, consistent connection Can be affected by walls, distance, interference
Latency Lower latency (less delay) Higher latency
Portability Devices are "tethered" — can't move freely Freedom to move around
Setup Cost Can be expensive (running cables) Generally cheaper to set up
Security More secure (physical connection needed) Can be intercepted if not encrypted

📘 Key Terms

Bandwidth — The maximum amount of data that can be transmitted in a given time. Higher bandwidth = faster speeds.

Latency — The delay between sending and receiving data. Lower latency = faster response.

3.4 Web Browsers, Search Engines & Filter Software

These three tools are essential for using the Internet, but many people confuse them. Let's clear up these common misconceptions!

🌍 Web Browser

A web browser is software that allows you to view and interact with websites. It reads the code (HTML, CSS, JavaScript) that makes up web pages and displays them on your screen.

Examples: Google Chrome, Mozilla Firefox, Safari, Microsoft Edge

🔍 Search Engine

A search engine is a website that helps you find other websites by searching the Web based on keywords you type in. It uses special programs called "crawlers" to index billions of web pages.

Examples: Google, Bing, Yahoo, DuckDuckGo

⚠️ Common Misconception

Google is NOT a web browser — it is a search engine (a website). Google Chrome is the web browser made by Google. You use Chrome (browser) to visit Google.com (search engine).

📘 Key Term: Filter Software

Filter software is a program that blocks access to certain websites and content. Schools use filter software to prevent students from accessing inappropriate or dangerous websites. Parents can also install filters at home.

3.5 Different Document Types

The same information can be presented in different document formats depending on the purpose and audience:

Document Type Purpose Features
Report Presents findings or information formally Headings, numbered sections, charts, formal language
Newsletter Shares news and updates with a group Columns, images, headlines, informal tone
Memo Short internal communication within an organisation To/From/Date/Subject fields, brief and direct

📝 Activity 3.1 — Repurposing Content

You have been given information about Internet connectivity. Create THREE different documents using the same information:

  1. A report for your teacher with formal headings and a chart
  2. A newsletter for students with columns and images
  3. A memo to the head teacher summarising the key points

Discuss: How did you change the content and layout for each audience?

📋 Chapter 3 Summary

  • Wired connections use copper cable or fibre optic cable
  • Wireless connections use radio waves (Wi-Fi or mobile data)
  • Satellites are used for TV, radio and GPS
  • Wired connections are faster and more reliable, but wireless offers portability
  • A web browser displays websites; a search engine helps you find them
  • Filter software blocks inappropriate content
  • The same content can be repurposed into reports, newsletters and memos

✅ Check Your Understanding

1. Name two types of wired connection.

2. What is the difference between Wi-Fi and mobile data?

3. Give two advantages of wired connections over wireless.

4. Explain the difference between a web browser and a search engine.

5. What does filter software do?

04
🔢

Internet Protocol & Binary

How computers represent data using 1s and 0s, and how information travels across the Internet

🎯 Learning Objectives

  • Understand that computers use binary to represent all data
  • Understand why binary is used
  • Convert between binary and denary (decimal)
  • Understand ASCII and Unicode character encoding
  • Understand IP addresses and data packets
  • Know that network speeds are measured in bits per second

4.1 What is Binary?

📘 Key Term: Binary

Binary is a number system that uses only two digits: 0 and 1. It is a base-2 number system. Every piece of data in a computer — numbers, text, images, sounds and instructions — is represented in binary.

Why Do Computers Use Binary?

Inside every computer processor, there are billions of tiny electronic switches called transistors. These transistors can only be in one of two states:

1
ON (electricity flowing)
or
0
OFF (no electricity)

Since transistors have only two states, computers use a two-state (binary) system.

A single binary digit (0 or 1) is called a bit (short for binary digit). Eight bits grouped together make one byte.

4.2 Binary and Denary Number Systems

📘 Key Term: Denary (Decimal)

Denary (also called decimal) is the number system we use every day. It is a base-10 system using ten digits: 0, 1, 2, 3, 4, 5, 6, 7, 8, 9.

Place Values

In denary, each column is worth 10 times more than the one to its right (powers of 10):

Ten Thousands Thousands Hundreds Tens Units
10,000 1,000 100 10 1

In binary, each column is worth 2 times more than the one to its right (powers of 2):

128 64 32 16 8 4 2 1
2⁷ 2⁶ 2⁵ 2⁴ 2⁰

4.3 Converting Binary to Denary

To convert a binary number to denary, write the binary digits under the place values and add up all the columns that contain a 1.

Example: Convert 00101010 to denary

Step-by-step conversion

128 64 32 16 8 4 2 1
0 0 1 0 1 0 1 0

Add up the values where there is a 1:

32 + 8 + 2 = 42

So, binary 00101010 = denary 42

📝 Activity 4.1 — Binary Conversion Practice

Convert these binary numbers to denary:

  1. 01010101
  2. 11110000
  3. 10000001
  4. 01100110

Convert these denary numbers to binary:

  1. 100
  2. 75
  3. 200
  4. 33

4.4 Representing Text: ASCII and Unicode

📘 Key Term: ASCII

ASCII (American Standard Code for Information Interchange) is a system that assigns a unique number (0–127) to each character, including letters, numbers and symbols. Each character is stored as a 7-bit binary number.

Here are some common ASCII values:

Character Denary Value Binary Value
A 65 01000001
B 66 01000010
Z 90 01011010
a 97 01100001
0 48 00110000
Space 32 00100000

📘 Key Term: Unicode

Unicode is a more modern character encoding system that can represent characters from virtually every language in the world, as well as emojis! 😊 Unicode can represent over 140,000 characters using up to 32 bits per character.

4.5 IP Addresses and Data Packets

📘 Key Term: IP Address

An IP (Internet Protocol) address is a unique number assigned to every device connected to a network. It works like a postal address, allowing data to be sent to the correct device. Example: 192.168.1.1

How Data Travels: Packets

When you send data across the Internet (like loading a web page), the data is broken up into small chunks called packets. Each packet takes its own route to the destination, where they are reassembled in the correct order.

Network Speeds

📘 Key Term: Bits Per Second

Network data speeds are measured in bits per second (bps):

  • Mbps = Megabits per second (millions of bits per second)
  • Gbps = Gigabits per second (billions of bits per second)

A typical home broadband speed is around 30–100 Mbps. Fibre optic can reach 1 Gbps or more!

📋 Chapter 4 Summary

  • Computers use binary (0s and 1s) because processors contain transistors with only two states
  • Binary is base-2; denary (decimal) is base-10
  • Binary place values are: 128, 64, 32, 16, 8, 4, 2, 1
  • ASCII assigns numbers (0–127) to characters; Unicode supports all world languages
  • IP addresses uniquely identify devices on a network
  • Data is sent in packets containing a header, body and footer
  • Network speeds are measured in Mbps or Gbps
05
⌨️

Programming (A)

Learning to write code using variables, operators, selection and iteration

🎯 Learning Objectives

  • Code algorithms in both visual and textual languages
  • Understand and use arithmetic and relational operators
  • Understand the order of operations (BIDMAS)
  • Understand and use variables
  • Use sequence, selection and iteration
  • Locate and fix syntax errors (debugging)

5.1 What is Programming?

Programming (also called coding) is the process of writing instructions that a computer can follow to complete a task. These instructions are written in a programming language.

🧩 Visual Languages

Use colourful blocks that snap together, like a jigsaw puzzle. Great for learning programming concepts.

Examples: Scratch, Blockly, MakeCode

📝 Textual Languages

Use typed text commands following strict rules (syntax). More powerful and used in the real world.

Examples: Python, JavaScript, Java

5.2 Variables

📘 Key Term: Variable

A variable is a named storage location in the computer's memory that can hold a value. The value can be changed (varied) as the program runs. Think of it as a labelled box that holds information.

name = "Alice" # A string variable age = 12 # An integer variable print(name) # Output: Alice

5.3 Arithmetic Operators

Arithmetic operators let you perform mathematical calculations in your programs:

Operator Symbol Example Result
Addition + 5 + 3 8
Subtraction - 10 - 4 6
Multiplication * 6 * 7 42
Division / 15 / 4 3.75
Integer Division // 15 // 4 3 (whole number only)
Modulus (remainder) % 15 % 4 3 (the remainder)
Exponent (power) ** 2 ** 3 8 (2³)

5.4 Relational Operators

Relational operators compare two values and return either True or False:

Operator Symbol Example Result
Equal to == 5 == 5 True
Not equal to != 5 != 3 True
Less than < 3 < 5 True
Greater than > 5 > 3 True

⚠️ Common Mistake

Don't confuse = (assignment — gives a variable a value) with == (comparison — checks if two values are equal)!

5.5 Sequence, Selection and Iteration

All programs are built from three basic building blocks, called programming constructs:

1. Sequence

Sequence means instructions are carried out one after another, in order, from top to bottom.

2. Selection (if/else)

Selection means the program makes a decision. Different code runs depending on whether a condition is True or False.

if age >= 18: print("You are an adult.") else: print("You are a child.")

3. Iteration (Loops)

Iteration means repeating a set of instructions. There are two types:

🔄 Count-Controlled Loop (for)

Repeats a set number of times. You know in advance how many times to repeat.

🔁 Condition-Controlled Loop (while)

Keeps repeating as long as a condition is True. You might not know how many times it will repeat.

# Count-controlled loop (for loop) for i in range(5): print("Hello!") # Prints "Hello!" 5 times

📝 Activity 5.1 — Number Guessing Game

Create a program that:

  1. Generates a random number between 1 and 20
  2. Asks the user to guess the number
  3. Tells the user if their guess is too high, too low or correct
  4. Keeps looping until they guess correctly

📋 Chapter 5 Summary

  • Programs can be written in visual (block-based) or textual languages
  • Variables store values that can change during a program
  • Arithmetic operators: + - * / // % **
  • BIDMAS determines the order of calculations
  • Sequence: instructions run in order
  • Selection: if/elif/else makes decisions
  • Iteration: for loops (count) and while loops (condition)
06
🐍

Programming (B)

Working with IDEs, strings, concatenation, slicing and more advanced coding

🎯 Learning Objectives

  • Understand and use an Integrated Development Environment (IDE)
  • Know about IDE features: syntax highlighting, auto-indentation, bracket matching, autocomplete
  • Convert between string and numeric types
  • Use string methods: upper(), lower(), len()
  • Use escape characters and string slicing
  • Understand and use concatenation

6.1 Integrated Development Environments (IDEs)

📘 Key Term: IDE

An Integrated Development Environment (IDE) is software that provides tools for writing, testing and debugging code all in one place. Think of it as a workshop for programmers.

Examples: IDLE (Python), Thonny, Visual Studio Code, PyCharm, repl.it

Helpful IDE Features

Feature What It Does Why It Helps
Syntax Highlighting Uses different colours for different code elements Makes code easier to read and spot mistakes
Auto-indentation Automatically indents code inside loops Keeps code properly structured
Bracket Matching Highlights matching opening and closing brackets Prevents missing bracket errors
Autocomplete Suggests completions as you type Speeds up coding and reduces typos

6.2 Working with Strings

📘 Key Term: String

A string is a sequence of characters (letters, numbers, symbols and spaces) enclosed in quotation marks. Examples: "Hello", "Year 7"

String Methods

Strings come with built-in methods (actions you can perform on them):

Method What It Does Example Result
.upper() Converts all letters to UPPERCASE "computer".upper() "COMPUTER"
.lower() Converts all letters to lowercase "My Name".lower() "my name"
len() Returns the number of characters len("computer") 8

6.3 String Slicing

String slicing lets you extract parts of a string. Each character has an index (position number), starting from 0:

Character Indices

Index 0 1 2 3 4 5 6 7
Character C O M P U T E R
word = "COMPUTER" # From the start up to index 3 print(word[:3]) # Output: COM # From index 3 to the end print(word[3:]) # Output: PUTER # A single character print(word[0]) # Output: C

6.4 Concatenation

📘 Key Term: Concatenation

Concatenation means joining strings together. In Python, you can use the + operator or commas in a print statement.

first_name = "John" last_name = "Smith" full_name = first_name + " " + last_name print(full_name) # Output: John Smith

📝 Activity 6.1 — String Manipulation Challenge

Write a program that:

  1. Asks the user for their first name and last name
  2. Displays their full name in UPPERCASE
  3. Tells them how many characters are in their full name
  4. Displays their initials

📋 Chapter 6 Summary

  • An IDE provides tools for writing, testing and debugging code
  • IDE features include syntax highlighting, auto-indentation, bracket matching
  • Use int() and str() to convert between data types
  • String methods: .upper(), .lower(), len()
  • String slicing uses indices: word[start:end]
  • Concatenation joins strings using +
📚

Glossary

Key terms and definitions from all chapters

Term Definition
Algorithm A step-by-step set of instructions to solve a problem
ASCII A character encoding system that assigns numbers (0–127) to characters
Bandwidth The maximum amount of data that can be transmitted in a given time
Binary A base-2 number system using only 0 and 1
Bit A single binary digit (0 or 1) — the smallest unit of data
Bug An error in a computer program
Byte A group of 8 bits
Cloud Computing Storing and accessing data over the Internet
Concatenation Joining strings together
Copyright Legal protection for creators of original work
Digital Footprint The trail of data you leave behind online
IDE Integrated Development Environment — software for writing code
Internet A global network of interconnected computers
IP Address A unique number assigned to a device on a network
Iteration Repeating a set of instructions (loops)
Packet A small chunk of data sent across a network
Plagiarism Presenting someone else's work as your own
Selection A programming construct that makes decisions (if/else)
String A data type consisting of a sequence of characters
Variable A named storage location in memory that holds a value

End of Textbook

Computing