https://www.trccompsci.online/mediawiki/api.php?action=feedcontributions&user=ThomasWard&feedformat=atomTRCCompSci - AQA Computer Science - User contributions [en-gb]2024-03-28T13:16:12ZUser contributionsMediaWiki 1.31.6https://www.trccompsci.online/mediawiki/index.php?title=Stacks&diff=2868Stacks2017-05-23T09:04:44Z<p>ThomasWard: </p>
<hr />
<div>A stack is a last in, first out data structure that can only have data added or removed from the top.<br />
The stack has limited size and the stack pointer will always point to the value at the top of the stack. An empty stack thus has a stack pointer value of 0. You can only push an item if the stack is not full. You can only pop an item if the stack is not empty.<br />
==Check for Full==<br />
==Check for Empty==<br />
==Push==<br />
When an item is pushed it is added to the top of the stack. if Bill is at value one and Ted is pushed, he would be added to value 2.<br />
<br />
==Pop==<br />
Using the example from before, if Bob was at value 1 and Bill was at value 2, the value from the top of the stack would be removed. so Bill would be removed, just leaving Bob at value 1.<br />
<br />
==Peek==<br />
Allows you to get the value from the top of the stack, without actually popping it.</div>ThomasWardhttps://www.trccompsci.online/mediawiki/index.php?title=Merge_Sort&diff=2804Merge Sort2017-05-22T11:02:32Z<p>ThomasWard: Created page with "Merge sort is an example of a divide and conquer algorithm."</p>
<hr />
<div>Merge sort is an example of a divide and conquer algorithm.</div>ThomasWardhttps://www.trccompsci.online/mediawiki/index.php?title=Trees&diff=2622Trees2017-05-18T07:34:42Z<p>ThomasWard: /* What is a Rooted Tree */</p>
<hr />
<div>==What is a Tree==<br />
A tree is a connected undirected graph with no cycles in it.<br />
<br />
==What is a Rooted Tree==<br />
A tree with one vertex singled out as a starting point.<br />
<br />
==What is a Binary Tree==<br />
==What is a Binary Tree Search==</div>ThomasWardhttps://www.trccompsci.online/mediawiki/index.php?title=Trees&diff=2621Trees2017-05-18T07:34:05Z<p>ThomasWard: /* What is a Tree */</p>
<hr />
<div>==What is a Tree==<br />
A tree is a connected undirected graph with no cycles in it.<br />
<br />
==What is a Rooted Tree==<br />
==What is a Binary Tree==<br />
==What is a Binary Tree Search==</div>ThomasWardhttps://www.trccompsci.online/mediawiki/index.php?title=Queues&diff=2582Queues2017-05-16T08:31:11Z<p>ThomasWard: Created page with "A queue is a linear list with a first-in first-out structure.There are three different types of queue circular queues, linear queues and priority queues."</p>
<hr />
<div>A queue is a linear list with a first-in first-out structure.There are three different types of queue circular queues, linear queues and priority queues.</div>ThomasWardhttps://www.trccompsci.online/mediawiki/index.php?title=Stacks&diff=2548Stacks2017-05-15T10:47:18Z<p>ThomasWard: </p>
<hr />
<div>A stack is a data structure that can only have data added or removed from the top.<br />
The stack has limited size and the stack pointed will always point to the value at the top of the stack. An empty stack thus has a stack pointer value of 0. You can only push an item if the stack is not full. You can only pop an item if the stack is not empty.</div>ThomasWardhttps://www.trccompsci.online/mediawiki/index.php?title=TCP/IP&diff=2100TCP/IP2017-03-13T14:34:19Z<p>ThomasWard: /* Well known port numbers */</p>
<hr />
<div>==What is a protocol==<br />
<br />
=TCPIP Stack=<br />
<br />
==Application layer==<br />
<br />
==Transport layer==<br />
<br />
==Network layer==<br />
<br />
==Link layer==<br />
<br />
=Ports=<br />
==Why we need them==<br />
<br />
==Well known port numbers==<br />
21 TCP File Transfer Protocol (FTP) control <br />
22 Secure Shell (SSH), secure logins file transfers and port forwarding<br />
<br />
=Socket=<br />
<br />
=Protocols=<br />
==http==<br />
'''H'''yper '''T'''ext '''T'''ransfer '''P'''rotocol, most often found at the beginning of URLs, is used to transfer an user to a web address that is specified via the domain.<br />
<br />
==https==<br />
A verified, '''s'''ecure version of '''HTTP'''. This ensures the user that the website they are on is safe and well protected.<br />
<br />
==ftp==<br />
'''F'''ile '''T'''ransfer '''P'''rotocol.<br />
<br />
==SSH==<br />
'''S'''ecure '''Sh'''ell protocol. Designed for operating securely over an unsecure network.<br />
<br />
==telnet==<br />
Allows a user to log into a remote computer over the interlinking network.<br />
<br />
==pop3==<br />
'''P'''ost '''O'''ffice '''P'''rotocol, version '''3'''.<br />
<br />
==smtp==<br />
Simple Mail Transfer Protocol.<br />
<br />
==imap==</div>ThomasWardhttps://www.trccompsci.online/mediawiki/index.php?title=TCP/IP&diff=2099TCP/IP2017-03-13T14:33:02Z<p>ThomasWard: /* Well known port numbers */</p>
<hr />
<div>==What is a protocol==<br />
<br />
=TCPIP Stack=<br />
<br />
==Application layer==<br />
<br />
==Transport layer==<br />
<br />
==Network layer==<br />
<br />
==Link layer==<br />
<br />
=Ports=<br />
==Why we need them==<br />
<br />
==Well known port numbers==<br />
22 Secure Shell (SSH), secure logins file transfers and port forwarding<br />
<br />
=Socket=<br />
<br />
=Protocols=<br />
==http==<br />
'''H'''yper '''T'''ext '''T'''ransfer '''P'''rotocol, most often found at the beginning of URLs, is used to transfer an user to a web address that is specified via the domain.<br />
<br />
==https==<br />
A verified, '''s'''ecure version of '''HTTP'''. This ensures the user that the website they are on is safe and well protected.<br />
<br />
==ftp==<br />
'''F'''ile '''T'''ransfer '''P'''rotocol.<br />
<br />
==SSH==<br />
'''S'''ecure '''Sh'''ell protocol. Designed for operating securely over an unsecure network.<br />
<br />
==telnet==<br />
Allows a user to log into a remote computer over the interlinking network.<br />
<br />
==pop3==<br />
'''P'''ost '''O'''ffice '''P'''rotocol, version '''3'''.<br />
<br />
==smtp==<br />
Simple Mail Transfer Protocol.<br />
<br />
==imap==</div>ThomasWardhttps://www.trccompsci.online/mediawiki/index.php?title=Client_Server_Model&diff=2090Client Server Model2017-03-13T14:26:32Z<p>ThomasWard: /* XML */</p>
<hr />
<div>==Response & Request==<br />
<br />
==API==<br />
An API or Application Program Interface is a set of routines enabling one program to interface with each other. The code defines how the programs work together.<br />
<br />
Twitter has an API to allow other programs to use the service.<br />
<br />
==WebSockets Protocol==<br />
<br />
==CRUD==<br />
Data must be stored, managed and represented correctly <br><br />
CRUD is an acronym to explain the main processes required <br><br />
-Create <br><br />
-Retrieve <br><br />
-Update <br><br />
-Delete <br><br />
All are needed to have a complete working database <br><br />
SQL and Relational Databases conform to CRUD: <br><br />
Insert , Select, Update, Delete <br><br />
<br />
==REST==<br />
<br />
==JSON==<br />
<br />
==XML==<br />
XML or Extensible Markup Language is a programming language used to define data types. The code uses tags represented as angled brackets <> and </> to signify the beginning and end of a segment of data of the type defined in the tags. <br />
<br />
e.g.<br />
<syntaxhighlight lang=xml><br />
<customers><br />
<customer><br />
<name> Eddie </name><br />
<address> 16 Wilson Grove </address><br />
</customer><br />
</customers><br />
</syntaxhighlight><br />
<br />
This defines a parent data type <customers> containing one or more <customer> which contains <name> and <address>.<br />
<br />
==XML vs JSON==<br />
<br />
{| class="wikitable" border="1"<br />
|-<br />
! <br />
! JSON<br />
! XML<br />
|-<br />
| Human Readable<br />
| It's easy to read because it's just defining objects and values.<br />
| Less readable because it's contained within markup tags<br />
|-<br />
| Compact Code<br />
| Less code than XML<br />
| More code than JSON<br />
|-<br />
| Speed of Parsing<br />
| Quicker, because it's defined as object and value<br />
| Slower, because the data has to be extracted from tags<br />
|-<br />
| Ease of Creation<br />
| Easier, because syntax is easier<br />
| More like programming so more knowledge is needed.<br />
|-<br />
| Flexibility & Extendibilty<br />
| Only works with limited data types, not enough for all applications<br />
| Gives total freedom, because you can create what data types there are, so it has greater flexibility<br />
|}<br />
<br />
==REST Model==</div>ThomasWardhttps://www.trccompsci.online/mediawiki/index.php?title=Client_Server_Model&diff=2089Client Server Model2017-03-13T14:24:07Z<p>ThomasWard: /* XML */</p>
<hr />
<div>==Response & Request==<br />
<br />
==API==<br />
An API or Application Program Interface is a set of routines enabling one program to interface with each other. The code defines how the programs work together.<br />
<br />
Twitter has an API to allow other programs to use the service.<br />
<br />
==WebSockets Protocol==<br />
<br />
==CRUD==<br />
Data must be stored, managed and represented correctly <br><br />
CRUD is an acronym to explain the main processes required <br><br />
-Create <br><br />
-Retrieve <br><br />
-Update <br><br />
-Delete <br><br />
All are needed to have a complete working database <br><br />
SQL and Relational Databases conform to CRUD: <br><br />
Insert , Select, Update, Delete <br><br />
<br />
==REST==<br />
<br />
==JSON==<br />
<br />
==XML==<br />
XML or Extensible Markup Language is a programming language used to define data types. The code uses tags represented as angled brackets <> and </> to signify the beginning and end of a segment of data of the type defined in the tags. <br />
<br />
e.g.<br />
<br />
<customers><br />
<customer><br />
<name> Eddie </name><br />
<address> 16 Wilson Grove </address><br />
</customer><br />
</customers><br />
This defines a parent data type <customers> containing one or more <customer> which contains <name> and <address>.<br />
<br />
==XML vs JSON==<br />
<br />
{| class="wikitable" border="1"<br />
|-<br />
! <br />
! JSON<br />
! XML<br />
|-<br />
| Human Readable<br />
| It's easy to read because it's just defining objects and values.<br />
| Less readable because it's contained within markup tags<br />
|-<br />
| Compact Code<br />
| Less code than XML<br />
| More code than JSON<br />
|-<br />
| Speed of Parsing<br />
| Quicker, because it's defined as object and value<br />
| Slower, because the data has to be extracted from tags<br />
|-<br />
| Ease of Creation<br />
| Easier, because syntax is easier<br />
| More like programming so more knowledge is needed.<br />
|-<br />
| Flexibility & Extendibilty<br />
| Only works with limited data types, not enough for all applications<br />
| Gives total freedom, because you can create what data types there are, so it has greater flexibility<br />
|}<br />
<br />
==REST Model==</div>ThomasWardhttps://www.trccompsci.online/mediawiki/index.php?title=Client_Server_Model&diff=2079Client Server Model2017-03-13T14:16:21Z<p>ThomasWard: /* XML */</p>
<hr />
<div>==Response & Request==<br />
<br />
==API==<br />
An API or Application Program Interface is a set of routines enabling one program to interface with each other. The code defines how the programs work together.<br />
<br />
Twitter has an API to allow other programs to use the service.<br />
<br />
==WebSockets Protocol==<br />
<br />
==CRUD==<br />
<br />
==REST==<br />
<br />
==JSON==<br />
<br />
==XML==<br />
WIP<br />
<br />
==XML vs JSON==<br />
<br />
THIS IS MY SHOTGUN<br />
{| class="wikitable" border="1"<br />
|-<br />
! <br />
! JSON<br />
! XML<br />
|-<br />
| Human Readable<br />
| row 1, cell 2<br />
| row 1, cell 3<br />
|-<br />
|-<br />
| Compact Code<br />
| row 2, cell 2<br />
| row 2, cell 3<br />
|-<br />
| Speed of Parsing<br />
| row 3, cell 2<br />
| row 3, cell 3<br />
|-<br />
| Ease of Creation<br />
| row 4, cell 2<br />
| row 4, cell 3<br />
|-<br />
| Flexibility & Extendibilty<br />
| row 3, cell 2<br />
| row 3, cell 3<br />
|}<br />
<br />
==REST Model==</div>ThomasWardhttps://www.trccompsci.online/mediawiki/index.php?title=Client_Server_Model&diff=2077Client Server Model2017-03-13T14:14:19Z<p>ThomasWard: /* API */</p>
<hr />
<div>==Response & Request==<br />
<br />
==API==<br />
An API or Application Program Interface is a set of routines enabling one program to interface with each other. The code defines how the programs work together.<br />
<br />
Twitter has an API to allow other programs to use the service.<br />
<br />
==WebSockets Protocol==<br />
<br />
==CRUD==<br />
<br />
==REST==<br />
<br />
==JSON==<br />
<br />
==XML==<br />
<br />
==XML vs JSON==<br />
<br />
THIS IS MY SHOTGUN<br />
{| class="wikitable" border="1"<br />
|-<br />
! <br />
! JSON<br />
! XML<br />
|-<br />
| Human Readable, cell 1<br />
| Compact Code, cell 2<br />
| Speed of Parsing, cell 3<br />
|-<br />
| row 2, cell 1<br />
| row 2, cell 2<br />
| row 2, cell 3<br />
|}<br />
<br />
==REST Model==</div>ThomasWardhttps://www.trccompsci.online/mediawiki/index.php?title=Client_Server_Model&diff=2073Client Server Model2017-03-13T14:10:53Z<p>ThomasWard: /* API */</p>
<hr />
<div>==Response & Request==<br />
<br />
==API==<br />
WIP<br />
<br />
==WebSockets Protocol==<br />
<br />
==CRUD==<br />
<br />
==REST==<br />
<br />
==JSON==<br />
<br />
==XML==<br />
<br />
==XML vs JSON==<br />
<br />
==REST Model==</div>ThomasWardhttps://www.trccompsci.online/mediawiki/index.php?title=TCP/IP&diff=1878TCP/IP2017-03-06T14:39:36Z<p>ThomasWard: /* pop3 */</p>
<hr />
<div>==What is a protocol==<br />
<br />
=TCPIP Stack=<br />
<br />
==Application layer==<br />
<br />
==Transport layer==<br />
<br />
==Network layer==<br />
<br />
==Link layer==<br />
<br />
=Ports=<br />
==Why we need them==<br />
<br />
==Well known port numbers==<br />
<br />
=Socket=<br />
<br />
=Protocols=<br />
==http==<br />
Hyper Text Transfer Protocol<br />
<br />
==https==<br />
==ftp==<br />
File Transfer Protocol<br />
<br />
==SSH==<br />
Secure SHell Protocol. Designed for operating securely over an unsecure network.<br />
<br />
==telnet==<br />
Allows a user to log into a remote computer over the interlinking network.<br />
<br />
==pop3==<br />
Post Office Protocol 3<br />
<br />
==smtp==<br />
==imap==</div>ThomasWardhttps://www.trccompsci.online/mediawiki/index.php?title=TCP/IP&diff=1877TCP/IP2017-03-06T14:39:18Z<p>ThomasWard: /* ftp */</p>
<hr />
<div>==What is a protocol==<br />
<br />
=TCPIP Stack=<br />
<br />
==Application layer==<br />
<br />
==Transport layer==<br />
<br />
==Network layer==<br />
<br />
==Link layer==<br />
<br />
=Ports=<br />
==Why we need them==<br />
<br />
==Well known port numbers==<br />
<br />
=Socket=<br />
<br />
=Protocols=<br />
==http==<br />
Hyper Text Transfer Protocol<br />
<br />
==https==<br />
==ftp==<br />
File Transfer Protocol<br />
<br />
==SSH==<br />
Secure SHell Protocol. Designed for operating securely over an unsecure network.<br />
<br />
==telnet==<br />
Allows a user to log into a remote computer over the interlinking network.<br />
<br />
==pop3==<br />
==smtp==<br />
==imap==</div>ThomasWardhttps://www.trccompsci.online/mediawiki/index.php?title=TCP/IP&diff=1876TCP/IP2017-03-06T14:38:58Z<p>ThomasWard: /* http */</p>
<hr />
<div>==What is a protocol==<br />
<br />
=TCPIP Stack=<br />
<br />
==Application layer==<br />
<br />
==Transport layer==<br />
<br />
==Network layer==<br />
<br />
==Link layer==<br />
<br />
=Ports=<br />
==Why we need them==<br />
<br />
==Well known port numbers==<br />
<br />
=Socket=<br />
<br />
=Protocols=<br />
==http==<br />
Hyper Text Transfer Protocol<br />
<br />
==https==<br />
==ftp==<br />
==SSH==<br />
Secure SHell Protocol. Designed for operating securely over an unsecure network.<br />
<br />
==telnet==<br />
Allows a user to log into a remote computer over the interlinking network.<br />
<br />
==pop3==<br />
==smtp==<br />
==imap==</div>ThomasWardhttps://www.trccompsci.online/mediawiki/index.php?title=TCP/IP&diff=1874TCP/IP2017-03-06T14:37:08Z<p>ThomasWard: /* telnet */</p>
<hr />
<div>==What is a protocol==<br />
<br />
=TCPIP Stack=<br />
<br />
==Application layer==<br />
<br />
==Transport layer==<br />
<br />
==Network layer==<br />
<br />
==Link layer==<br />
<br />
=Ports=<br />
==Why we need them==<br />
<br />
==Well known port numbers==<br />
<br />
=Socket=<br />
<br />
=Protocols=<br />
==http==<br />
==https==<br />
==ftp==<br />
==SSH==<br />
Secure SHell Protocol. Designed for operating securely over an unsecure network.<br />
<br />
==telnet==<br />
Allows a user to log into a remote computer over the interlinking network.<br />
<br />
==pop3==<br />
==smtp==<br />
==imap==</div>ThomasWardhttps://www.trccompsci.online/mediawiki/index.php?title=TCP/IP&diff=1873TCP/IP2017-03-06T14:34:04Z<p>ThomasWard: /* why we need them */</p>
<hr />
<div>==What is a protocol==<br />
<br />
=TCPIP Stack=<br />
<br />
==Application layer==<br />
<br />
==Transport layer==<br />
<br />
==Network layer==<br />
<br />
==Link layer==<br />
<br />
=Ports=<br />
==Why we need them==<br />
<br />
==Well known port numbers==<br />
<br />
=Socket=<br />
<br />
=Protocols=<br />
==http==<br />
==https==<br />
==ftp==<br />
==SSH==<br />
Secure SHell Protocol. Designed for operating securely over an unsecure network.<br />
<br />
==telnet==<br />
==pop3==<br />
==smtp==<br />
==imap==</div>ThomasWardhttps://www.trccompsci.online/mediawiki/index.php?title=TCP/IP&diff=1872TCP/IP2017-03-06T14:33:48Z<p>ThomasWard: /* SSH */</p>
<hr />
<div>==What is a protocol==<br />
<br />
=TCPIP Stack=<br />
<br />
==Application layer==<br />
<br />
==Transport layer==<br />
<br />
==Network layer==<br />
<br />
==Link layer==<br />
<br />
=Ports=<br />
==why we need them==<br />
==Well known port numbers==<br />
<br />
=Socket=<br />
<br />
=Protocols=<br />
==http==<br />
==https==<br />
==ftp==<br />
==SSH==<br />
Secure SHell Protocol. Designed for operating securely over an unsecure network.<br />
<br />
==telnet==<br />
==pop3==<br />
==smtp==<br />
==imap==</div>ThomasWardhttps://www.trccompsci.online/mediawiki/index.php?title=The_Internet&diff=1651The Internet2017-02-28T12:31:58Z<p>ThomasWard: /* Internet Registries */</p>
<hr />
<div>==What is the Internet==<br />
<br />
The Internet is an international Wide Area Network. It connects computers and networks over a large area. <br />
<br />
The Internet originates with the U.S. government's Advanced Research Projects Agency and was used for governmental and academic communication purposes. At this stage in the development it was used to send files and emails. After the issues of connecting packet switched networks was solved, the internet took a more recognizable form. By 1983 TCP/IP protocol was created and today's internet was essentially formed. <br />
<br />
The term 'The Internet' was adopted in 1995.<br />
<br />
==How is the Internet connected==<br />
===Router===<br />
A Router receives packets from a host or router and uses the destination IP address that they contain to pass on the packets to another host or router.<br />
<br />
It would be impractical to connect hosts to other hosts, which is the main reason as to why we use routers. So that many hosts can connect to the router and then the router can connect to other networks.<br />
<br />
===Gateway===<br />
A Gateway is basically Donald Trump. It controls the wall between two different systems, for example on your home router to connect from your devices to the Internet. However, unlike the Donald, Gateways can translate. They translate the current protocols for the new system to understand. This allows two different systems with different protocols to be connected. Without this, data would be kept outside the border and could not communicate across it - welcome to Trump's America.<br />
<br />
==How is data transmitted==<br />
===Packet Switching===<br />
===Circuit Switching===<br />
===The End to End Principle===<br />
The devices that are communicating should be the endpoints of the communication with no external input. The Internet serves as a medium to carry traffic between them but makes no changes the data involved.<br />
Therefore the transmitting devices control every aspect of the transmission, allowing security (through encryption) and the detection of errors, which maintains the integrity of transmitted data.<br />
<br />
Using this principle allows the Internet to easily grow because there is no direct control over the number of endpoints.<br />
<br />
==URL==<br />
The Uniform Resource Locator is the standard address used to find a page, Web server or other device on the Web or Internet.<br />
<br />
It specifies:<br />
How to access the server, ie which protocol to use<br />
Which server to access, ie the address if server<br />
What is to be accessed on the server, ie the path on the addressed server.<br />
<br />
This was invented so that users could use a memorable name to refer to a network and a host on that network. Often the term 'Domain Name' is used instead of the correct term 'Full Qualified Domain Name' (FQDN). The domain name identifies one or more IP addresses. For example, the domain name "Microsoft.com" represents about a dozen IP addresses.<br />
<br />
The DNS system is a hierarchy. A Domain Name Server accepts a Domain Name and returns the IP address associated with this Domain Name.<br />
<br />
==Domain Name==<br />
<br />
==IP Address==<br />
<br />
===Class 1===<br />
===Class 2===<br />
===Class 3===<br />
<br />
==Domain Name Server==<br />
<br />
==Internet Registrar==<br />
<br />
An organization which is capable of providing and controlling the domain of an URL is known as a registrar. They allow for the reservation of specific web addresses for anybody who wishes to purchase it, a vast majority of which are to be repaid annually or else be open to the public again.<br />
<br />
Different domains have different costs and requirements depending on what they are, with the best examples being country-specific top-level domains such as ''.uk'' or ''.us''<br />
<br />
Domains that are created by and for governmental and military purposes are typically restricted from the public or are made invisible to the public altogether.<br />
<br />
==Internet Registries==<br />
An Internet Registry holds registered domain names, according to which ones are currently in use. The registry will allow users accessing the domain name to access the linked IP address and thus the intended website.<br />
<br />
==Related Topics==<br />
[[Subnet Masks]]<br />
<br />
[[Private - Public IP Addresses]]<br />
<br />
[[IP6 vs IP4]]<br />
<br />
[[DHCP]]<br />
<br />
[[Network Address Translation]]<br />
<br />
[[Port Forwarding]]</div>ThomasWardhttps://www.trccompsci.online/mediawiki/index.php?title=The_Internet&diff=1630The Internet2017-02-28T12:05:34Z<p>ThomasWard: /* What is the Internet */</p>
<hr />
<div>==What is the Internet==<br />
<br />
The Internet is an international Wide Area Network. It connects computers and networks over a large area. <br />
<br />
The Internet originates with the U.S. government's Advanced Research Projects Agency and was used for governmental and academic communication purposes. At this stage in the development it was used to send files and emails. After the issues of connecting packet switched networks was solved, the internet took a more recognizable form. By 1983 TCP/IP protocol was created and today's internet was essentially formed. <br />
<br />
The term 'The Internet' was adopted in 1995.<br />
<br />
==How is the Internet connected==<br />
===Router===<br />
A Router receives packets from a host or router and uses the destination IP address that they contain to pass on the packets to another host or router.<br />
<br />
It would be impractical to connect hosts to other hosts, which is the main reason as to why we use routers. So that many hosts can connect to the router and then the router can connect to other networks.<br />
<br />
===Gateway===<br />
A Gateway is basically Donald Trump. It controls the wall between two different systems, for example on your home router to connect from your devices to the Internet. However, unlike the Donald, Gateways can translate. They translate the current protocols for the new system to understand. This allows two different systems with different protocols to be connected. Without this, data would be kept outside the border and could not communicate across it - welcome to Trump's America.<br />
<br />
==How is data transmitted==<br />
===Packet Switching===<br />
===Circuit Switching===<br />
===The End to End Principle===<br />
The devices that are communicating should be the endpoints of the communication with no external input. The Internet serves as a medium to carry traffic between them but makes no changes the data involved.<br />
Therefore the transmitting devices control every aspect of the transmission, allowing security (through encryption) and the detection of errors, which maintains the integrity of transmitted data.<br />
<br />
Using this principle allows the Internet to easily grow because there is no direct control over the number of endpoints.<br />
<br />
==URL==<br />
The Uniform Resource Locator is the standard address used to find a page, Web server or other device on the Web or Internet.<br />
<br />
It specifies:<br />
How to access the server, ie which protocol to use<br />
Which server to access, ie the address if server<br />
What is to be accessed on the server, ie the path on the addressed server.<br />
<br />
This was invented so that users could use a memorable name to refer to a network and a host on that network. Often the term 'Domain Name' is used instead of the correct term 'Full Qualified Domain Name' (FQDN). The domain name identifies one or more IP addresses. For example, the domain name "Microsoft.com" represents about a dozen IP addresses.<br />
<br />
The DNS system is a hierarchy. A Domain Name Server accepts a Domain Name and returns the IP address associated with this Domain Name.<br />
<br />
==Domain Name==<br />
<br />
==IP Address==<br />
<br />
===Class 1===<br />
===Class 2===<br />
===Class 3===<br />
<br />
==Domain Name Server==<br />
<br />
==Internet Registrar==<br />
<br />
==Internet Registries==<br />
<br />
<br />
==Related Topics==<br />
[[Subnet Masks]]<br />
<br />
[[Private - Public IP Addresses]]<br />
<br />
[[IP6 vs IP4]]<br />
<br />
[[DHCP]]<br />
<br />
[[Network Address Translation]]<br />
<br />
[[Port Forwarding]]</div>ThomasWardhttps://www.trccompsci.online/mediawiki/index.php?title=The_Internet&diff=1629The Internet2017-02-28T12:04:59Z<p>ThomasWard: /* What is the Internet */</p>
<hr />
<div>==What is the Internet==<br />
<br />
The Internet is an international Wide Area Network. It connects computers and networks over a large area. <br />
<br />
The Internet originates with the U.S. government's Advanced Research Projects Agency and was used for governmental and academic communication purposes. At this stage in the development it was used to send files and emails. After the issues of connecting packet switched networks was solved, the internet took a more recognizable form. By 1983 TCP/IP protocol was created and todays form of the internet was essentially formed. <br />
<br />
The term 'The Internet' was adopted in 1995.<br />
<br />
==How is the Internet connected==<br />
===Router===<br />
A Router receives packets from a host or router and uses the destination IP address that they contain to pass on the packets to another host or router.<br />
<br />
It would be impractical to connect hosts to other hosts, which is the main reason as to why we use routers. So that many hosts can connect to the router and then the router can connect to other networks.<br />
<br />
===Gateway===<br />
A Gateway is basically Donald Trump. It controls the wall between two different systems, for example on your home router to connect from your devices to the Internet. However, unlike the Donald, Gateways can translate. They translate the current protocols for the new system to understand. This allows two different systems with different protocols to be connected. Without this, data would be kept outside the border and could not communicate across it - welcome to Trump's America.<br />
<br />
==How is data transmitted==<br />
===Packet Switching===<br />
===Circuit Switching===<br />
===The End to End Principle===<br />
The devices that are communicating should be the endpoints of the communication with no external input. The Internet serves as a medium to carry traffic between them but makes no changes the data involved.<br />
Therefore the transmitting devices control every aspect of the transmission, allowing security (through encryption) and the detection of errors, which maintains the integrity of transmitted data.<br />
<br />
Using this principle allows the Internet to easily grow because there is no direct control over the number of endpoints.<br />
<br />
==URL==<br />
The Uniform Resource Locator is the standard address used to find a page, Web server or other device on the Web or Internet.<br />
<br />
It specifies:<br />
How to access the server, ie which protocol to use<br />
Which server to access, ie the address if server<br />
What is to be accessed on the server, ie the path on the addressed server.<br />
<br />
This was invented so that users could use a memorable name to refer to a network and a host on that network. Often the term 'Domain Name' is used instead of the correct term 'Full Qualified Domain Name' (FQDN). The domain name identifies one or more IP addresses. For example, the domain name "Microsoft.com" represents about a dozen IP addresses.<br />
<br />
The DNS system is a hierarchy. A Domain Name Server accepts a Domain Name and returns the IP address associated with this Domain Name.<br />
<br />
==Domain Name==<br />
<br />
==IP Address==<br />
<br />
===Class 1===<br />
===Class 2===<br />
===Class 3===<br />
<br />
==Domain Name Server==<br />
<br />
==Internet Registrar==<br />
<br />
==Internet Registries==<br />
<br />
<br />
==Related Topics==<br />
[[Subnet Masks]]<br />
<br />
[[Private - Public IP Addresses]]<br />
<br />
[[IP6 vs IP4]]<br />
<br />
[[DHCP]]<br />
<br />
[[Network Address Translation]]<br />
<br />
[[Port Forwarding]]</div>ThomasWardhttps://www.trccompsci.online/mediawiki/index.php?title=The_Internet&diff=1628The Internet2017-02-28T11:58:23Z<p>ThomasWard: /* What is the Internet */</p>
<hr />
<div>==What is the Internet==<br />
*Being Edited*<br />
<br />
==How is the Internet connected==<br />
===Router===<br />
A Router receives packets from a host or router and uses the destination IP address that they contain to pass on the packets to another host or router.<br />
<br />
It would be impractical to connect hosts to other hosts, which is the main reason as to why we use routers. So that many hosts can connect to the router and then the router can connect to other networks.<br />
<br />
===Gateway===<br />
A Gateway is basically Donald Trump. It controls the wall between two different systems, for example on your home router to connect from your devices to the Internet. However, unlike the Donald, Gateways can translate. They translate the current protocols for the new system to understand. This allows two different systems with different protocols to be connected. Without this, data would be kept outside the border and could not communicate across it - welcome to Trump's America.<br />
<br />
==How is data transmitted==<br />
===Packet Switching===<br />
===Circuit Switching===<br />
===The End to End Principle===<br />
The devices that are communicating should be the endpoints of the communication with no external input. The Internet serves as a medium to carry traffic between them but makes no changes the data involved.<br />
Therefore the transmitting devices control every aspect of the transmission, allowing security (through encryption) and the detection of errors, which maintains the integrity of transmitted data.<br />
<br />
Using this principle allows the Internet to easily grow because there is no direct control over the number of endpoints.<br />
<br />
==URL==<br />
The Uniform Resource Locator is the standard address used to find a page, Web server or other device on the Web or Internet.<br />
<br />
It specifies:<br />
How to access the server, ie which protocol to use<br />
Which server to access, ie the address if server<br />
What is to be accessed on the server, ie the path on the addressed server.<br />
<br />
This was invented so that users could use a memorable name to refer to a network and a host on that network. Often the term 'Domain Name' is used instead of the correct term 'Full Qualified Domain Name' (FQDN). The domain name identifies one or more IP addresses. For example, the domain name "Microsoft.com" represents about a dozen IP addresses.<br />
<br />
The DNS system is a hierarchy. A Domain Name Server accepts a Domain Name and returns the IP address associated with this Domain Name.<br />
<br />
==Domain Name==<br />
<br />
==IP Address==<br />
<br />
===Class 1===<br />
===Class 2===<br />
===Class 3===<br />
<br />
==Domain Name Server==<br />
<br />
==Internet Registrar==<br />
<br />
==Internet Registries==<br />
<br />
<br />
==Related Topics==<br />
[[Subnet Masks]]<br />
<br />
[[Private - Public IP Addresses]]<br />
<br />
[[IP6 vs IP4]]<br />
<br />
[[DHCP]]<br />
<br />
[[Network Address Translation]]<br />
<br />
[[Port Forwarding]]</div>ThomasWardhttps://www.trccompsci.online/mediawiki/index.php?title=Subroutines_-_Methods_-_2017&diff=1374Subroutines - Methods - 20172017-02-06T14:00:49Z<p>ThomasWard: </p>
<hr />
<div>A subroutine is a name given to a block of code that can be called by name to perform the operation in the subroutine without having to copy the code it contains. If the subroutine is used to return a value and not just perform an operation, it is known as a function. The subroutine can be passed by a variable parameter if the data type is specified.<br />
<br />
<syntaxhighlight lang="csharp" line><br />
private void CreateNewFox()<br />
{<br />
int x, y;<br />
do<br />
{<br />
x = Rnd.Next(0, LandscapeSize);<br />
y = Rnd.Next(0, LandscapeSize);<br />
} while (Landscape[x, y].Fox != null);<br />
if (ShowDetail) {<br />
Console.WriteLine(" New Fox at (" + x + "," + y + ")");<br />
}<br />
Landscape[x, y].Fox = new Fox(Variability);<br />
FoxCount++;<br />
}<br />
</syntaxhighlight><br />
<br />
This is an example of a non-function subroutine in the skeleton program.</div>ThomasWardhttps://www.trccompsci.online/mediawiki/index.php?title=Subroutines_-_Methods_-_2017&diff=1371Subroutines - Methods - 20172017-02-06T13:58:44Z<p>ThomasWard: </p>
<hr />
<div>A subroutine is a name given to a block of code that can be called by name to perform the operation in the subroutine without having to copy the code it contains. If the subroutine is used to return a value and not just perform an operation, it is known as a function. The subroutine can be passed by a variable parameter if the data type is specified.<br />
<br />
<syntaxhighlight lang="csharp" line><br />
private void CreateNewFox()<br />
{<br />
int x, y;<br />
do<br />
{<br />
x = Rnd.Next(0, LandscapeSize);<br />
y = Rnd.Next(0, LandscapeSize);<br />
} while (Landscape[x, y].Fox != null);<br />
if (ShowDetail) {<br />
Console.WriteLine(" New Fox at (" + x + "," + y + ")");<br />
}<br />
Landscape[x, y].Fox = new Fox(Variability);<br />
FoxCount++;<br />
}<br />
</syntaxhighlight></div>ThomasWardhttps://www.trccompsci.online/mediawiki/index.php?title=Subroutines_-_Methods_-_2017&diff=1370Subroutines - Methods - 20172017-02-06T13:57:31Z<p>ThomasWard: Created page with "A subroutine is a name given to a block of code that can be called by name to perform the operation in the subroutine without having to copy the code it contains. If the subro..."</p>
<hr />
<div>A subroutine is a name given to a block of code that can be called by name to perform the operation in the subroutine without having to copy the code it contains. If the subroutine is used to return a value and not just perform an operation, it is known as a function. The subroutine can be passed by a variable parameter if the data type is specified.<br />
<br />
private void CreateNewFox()<br />
{<br />
int x, y;<br />
do<br />
{<br />
x = Rnd.Next(0, LandscapeSize);<br />
y = Rnd.Next(0, LandscapeSize);<br />
} while (Landscape[x, y].Fox != null);<br />
if (ShowDetail) {<br />
Console.WriteLine(" New Fox at (" + x + "," + y + ")");<br />
}<br />
Landscape[x, y].Fox = new Fox(Variability);<br />
FoxCount++;<br />
}</div>ThomasWardhttps://www.trccompsci.online/mediawiki/index.php?title=Classification_of_Programming_Languages&diff=1228Classification of Programming Languages2017-01-03T20:38:53Z<p>ThomasWard: /* Machine Code */</p>
<hr />
<div>=Low Level Languages=<br />
<br />
==Machine Code==<br />
Machine code is essentially the basic binary information required for a computer to perform a function.<br />
<br />
==Assembly Language==<br />
<br />
==Relationship Between Machine Code & Assembly Language==<br />
<br />
==Terms==<br />
===Mnemonics===<br />
<br />
===Source Code===<br />
<br />
===Object Code===<br />
<br />
=High Level Languages=<br />
The main characteristics of a high level language are:<br />
*It is easier for the programmer to identify what a command does (English words)<br />
*High level languages need to be translated<br />
*One command in a high level language represents many lines of code in assembler or machine code<br />
*They are portable between systems<br />
*More straight forward to program<br />
*Wider variety of data structures<br />
<br />
==Imperative==<br />
==Object Oriented==<br />
==Declarative==</div>ThomasWardhttps://www.trccompsci.online/mediawiki/index.php?title=Classification_of_Programming_Languages&diff=1221Classification of Programming Languages2017-01-03T20:13:07Z<p>ThomasWard: /* Machine Code */</p>
<hr />
<div>=Low Level Languages=<br />
<br />
==Machine Code==<br />
Machine code is essentially the basic binary information requires for a computer to perform a function.<br />
<br />
==Assembly Language==<br />
<br />
==Relationship Between Machine Code & Assembly Language==<br />
<br />
==Terms==<br />
===Mnemonics===<br />
<br />
===Source Code===<br />
<br />
===Object Code===<br />
<br />
=High Level Languages=<br />
The main characteristics of a high level language are:<br />
*It is easier for the programmer to identify what a command does (English words)<br />
*High level languages need to be translated<br />
*One command in a high level language represents many lines of code in assembler or machine code<br />
*They are portable between systems<br />
*More straight forward to program<br />
*Wider variety of data structures<br />
<br />
==Imperative==<br />
==Object Oriented==<br />
==Declarative==</div>ThomasWardhttps://www.trccompsci.online/mediawiki/index.php?title=Database_Normalisation&diff=940Database Normalisation2016-12-22T14:58:23Z<p>ThomasWard: </p>
<hr />
<div>An un-normalised database is a database that has not undergone the process to remove unnecessary or repeating information from the system's tables. Normalisation will remove this data providing a more efficient database requiring less storage.<br />
<br />
To use Normalisation to create a Relational Database we do the following:<br />
<br />
Start with the data in one large (un-normalised) table<br />
<br />
Remove repeating groups to give 1NF<br />
<br />
Remove partial dependencies to give 2NF<br />
<br />
Remove non-key dependencies to give 3NF<br />
<br />
The final normalized table will have no repeating groups and will have all the tables in the database linked via common keys.</div>ThomasWardhttps://www.trccompsci.online/mediawiki/index.php?title=Database_Normalisation&diff=939Database Normalisation2016-12-22T13:36:34Z<p>ThomasWard: Created page with "An un-normalised database is a database that has not undergone the process to remove unnecessary or repeating information from the system's tables. Normalisation will remove t..."</p>
<hr />
<div>An un-normalised database is a database that has not undergone the process to remove unnecessary or repeating information from the system's tables. Normalisation will remove this data providing a more efficient database requiring less storage.<br />
<br />
To use Normalisation to create a Relational Database we do the following:<br />
<br />
Start with the data in one large (un-normalised) table<br />
Remove repeating groups to give 1NF<br />
Remove partial dependencies to give 2NF<br />
Remove non-key dependencies to give 3NF<br />
<br />
The final normalized table will have no repeating groups and will have all the tables in the database linked via common keys.</div>ThomasWardhttps://www.trccompsci.online/mediawiki/index.php?title=Floating_Point_Numbers_-_Yr_2_Only&diff=463Floating Point Numbers - Yr 2 Only2016-12-15T11:08:45Z<p>ThomasWard: Created page with "Floating point numbers are a method of dynamic binary numerical representation, allowing for a customizable range and accuracy using the same number of digits. Floating point ..."</p>
<hr />
<div>Floating point numbers are a method of dynamic binary numerical representation, allowing for a customizable range and accuracy using the same number of digits. Floating point consists of 2 parts, a mantissa which contains the binary value of the represented number, and the exponent which shifts the decimal point according to the size of the number.<br />
For a floating point number to be normalized and make the best use of available memory, it must begin with "0.1" for a positive number and "1.0" for a negative number. Any deviation with this could be a waste of bits, as the same number could be represented with a smaller mantissa.<br />
<br />
For example, the number 32 could be represented by a floating point number with an 8 bit mantissa and a 5 bit exponent. <br />
<br />
The mantissa would be as follows:<br />
0.1000000<br />
<br />
The exponent must shift the decimal point to shift 1 into the value of 32, it must therefore have a value of 6:<br />
00110</div>ThomasWard