The document discusses game genres and asks students to identify common genres like action, adventure, driving, role-playing, sports, strategy, and puzzle games. It then asks students to name three games of their choice, the company that produced each game, and the genre(s) that best describe each game and why, based on its gameplay elements.
The document discusses the positive and negative environmental impacts of technology, with the negative impacts including electronic waste, resource depletion from manufacturing, and energy consumption from use. It also covers the concept of the carbon footprint from devices and advocates for understanding energy usage in computers and promoting energy saving methods and green technology.
The processor handles all instructions and ensures hardware and software function properly. It can execute millions of instructions per second and must fetch, decode, and execute instructions from RAM while performing arithmetic calculations and logical operations. The arithmetic logic unit handles all calculations and decisions by adding, subtracting, comparing, and using logical operators. Registers provide temporary storage, and the control unit manages data flow with a clock, reading and writing memory, and responding to interrupts.
The document discusses the main components of a computer system, including input devices, output devices, the processor, backing storage, and memory. It explains how these components interact according to the Von Neumann diagram. The document also defines hardware as the physical parts of a computer and software as the installed programs and applications. The overall goal is for students to understand the key parts of a computer system and the difference between hardware and software.
Lesson 3 - Coding with Minecraft - Variables.pptxmissstevenson01
This document discusses using variables in coding with Minecraft. It introduces different types of variables like number, string, boolean, and position variables. It provides examples of challenges that involve using variables to count chickens, provide feedback messages, and track arrows. The challenges demonstrate naming variables meaningfully, joining variables and strings, and using variables to activate parts of a program. The document encourages using variables to count things, keep score, and create reports in original Minecraft coding projects.
Lesson 2 - Coding with Minecraft - Events.pptxmissstevenson01
This document discusses using events in Minecraft coding. It introduces events and event handlers, and how they can be used to trigger actions when certain events occur in the game. The document outlines several lessons that teach coding blocks to make flowers and gold appear when walking, create parrots from broken cake blocks, and link events so that diamonds appear when glass breaks and wool appears when diamonds break. The final section encourages independent projects and documenting events coding in a programming diary.
Lesson 1 - Coding with Minecraft -Introduction.pptxmissstevenson01
This document provides an introduction to coding with Minecraft and MakeCode by demonstrating how to program blocks to make it rain chickens when a word is typed into chat. The lesson shows students how to try different pieces of code that respond to chat commands and teaches them how to change what rains down and where it falls to, allowing them to learn basic block programming and coding concepts through a fun example in Minecraft.
Lesson2 - Coding with Minecraft - Events.pptxmissstevenson01
This document discusses using events in Minecraft coding. It introduces events and event handlers, and how they can be used to trigger actions when certain events occur in the game. The document outlines several lessons that teach coding blocks to make flowers and gold appear when walking, create parrots from broken cake blocks, and link events so that breaking one block type causes another to appear. Students are challenged to build on these skills by coding their own linked event programs and documenting their work in a programming diary.
The document discusses game genres and asks students to identify common genres like action, adventure, driving, role-playing, sports, strategy, and puzzle games. It then asks students to name three games of their choice, the company that produced each game, and the genre(s) that best describe each game and why, based on its gameplay elements.
The document discusses the positive and negative environmental impacts of technology, with the negative impacts including electronic waste, resource depletion from manufacturing, and energy consumption from use. It also covers the concept of the carbon footprint from devices and advocates for understanding energy usage in computers and promoting energy saving methods and green technology.
The processor handles all instructions and ensures hardware and software function properly. It can execute millions of instructions per second and must fetch, decode, and execute instructions from RAM while performing arithmetic calculations and logical operations. The arithmetic logic unit handles all calculations and decisions by adding, subtracting, comparing, and using logical operators. Registers provide temporary storage, and the control unit manages data flow with a clock, reading and writing memory, and responding to interrupts.
The document discusses the main components of a computer system, including input devices, output devices, the processor, backing storage, and memory. It explains how these components interact according to the Von Neumann diagram. The document also defines hardware as the physical parts of a computer and software as the installed programs and applications. The overall goal is for students to understand the key parts of a computer system and the difference between hardware and software.
Lesson 3 - Coding with Minecraft - Variables.pptxmissstevenson01
This document discusses using variables in coding with Minecraft. It introduces different types of variables like number, string, boolean, and position variables. It provides examples of challenges that involve using variables to count chickens, provide feedback messages, and track arrows. The challenges demonstrate naming variables meaningfully, joining variables and strings, and using variables to activate parts of a program. The document encourages using variables to count things, keep score, and create reports in original Minecraft coding projects.
Lesson 2 - Coding with Minecraft - Events.pptxmissstevenson01
This document discusses using events in Minecraft coding. It introduces events and event handlers, and how they can be used to trigger actions when certain events occur in the game. The document outlines several lessons that teach coding blocks to make flowers and gold appear when walking, create parrots from broken cake blocks, and link events so that diamonds appear when glass breaks and wool appears when diamonds break. The final section encourages independent projects and documenting events coding in a programming diary.
Lesson 1 - Coding with Minecraft -Introduction.pptxmissstevenson01
This document provides an introduction to coding with Minecraft and MakeCode by demonstrating how to program blocks to make it rain chickens when a word is typed into chat. The lesson shows students how to try different pieces of code that respond to chat commands and teaches them how to change what rains down and where it falls to, allowing them to learn basic block programming and coding concepts through a fun example in Minecraft.
Lesson2 - Coding with Minecraft - Events.pptxmissstevenson01
This document discusses using events in Minecraft coding. It introduces events and event handlers, and how they can be used to trigger actions when certain events occur in the game. The document outlines several lessons that teach coding blocks to make flowers and gold appear when walking, create parrots from broken cake blocks, and link events so that breaking one block type causes another to appear. Students are challenged to build on these skills by coding their own linked event programs and documenting their work in a programming diary.
Trojans are malware that disguise themselves as legitimate programs to trick users into downloading and installing them. Once installed, they can allow hackers access and perform malicious activities like stealing data. Worms are standalone malware that spread automatically without needing user interaction. Ransomware encrypts users' files and demands payment for their return. Spyware secretly monitors users' online activities through keyloggers, hijacking webcams and microphones, and cracking passwords using dictionary attacks.
Anti-virus software detects and removes viruses and malware through four main techniques: memory resident monitoring, heuristic detection, virus signature detection, and checksums. Memory resident monitoring involves software that constantly monitors the system while running. Heuristic detection looks for suspicious program behavior. Virus signature detection compares programs to a database of known viruses. Checksums calculate a number based on a program's data to detect any changes from the original file.
Ethical hacking introduction to ethical hackingmissstevenson01
Ethical hacking is the process of authorized penetration testing of systems and networks to identify security vulnerabilities. It involves five stages: reconnaissance to gather target information; scanning open ports and services; gaining access using tools or exploits; maintaining persistent access covertly; and clearing logs and traces to cover tracks. The goal of ethical hacking is to improve security by finding and fixing vulnerabilities before criminals can exploit them.
1) The document discusses internet safety and how to chat safely online. It emphasizes the importance of only sharing private information with people you know well in real life and recognizing "red flag feelings" when chatting online.
2) It analyzes two stories of Sara chatting with different online friends - one she knows from school and one she does not know at all. The friendship with Jezza_east13, who she has never met, would be riskier since she does not have any information about who this person really is.
3) The document provides advice on how to stay safe online, such as being careful what you share, listening to "red flag feelings," and getting help from a trusted adult if you
Wireframes are quick sketches of page layouts used early in the design process to plan and agree on optimal designs before development. They show elements like navigation, content areas, and media but not final fonts/colors. Good wireframes include enough detail for others to understand ideas and should be quick to create and refine with clients. Key elements in wireframes represent things like text boxes, images, videos, navigation, and forms to help visualize the overall page structure and flow.
We used the CourseID rather than the Title in the DELETE statement criteria because:
- The CourseID is the primary key for identifying each unique record in the Course table. It will unambiguously identify the single record we want to delete.
- The Title could potentially match multiple records if the same course title was used more than once. Using the Title would risk deleting multiple records instead of just the intended one.
- Best practice is to always use the primary key field(s) to identify records when querying, updating, or deleting in order to ensure only the intended record(s) are affected.
So in summary, by using the CourseID we can be certain to only delete the single intended record, rather than
A database is being created to store details of aliens to make it easier for intergalactic authorities to manage. The database will include tables with records of individual aliens containing fields of information about each one.
This document discusses legal issues related to developing video games, including copyright, trademarks, and intellectual property laws. It explains that the code and creative elements of video games are protected under copyright as literary and audio-visual works. Certain standard elements like scoring systems are not copyrightable, but games cannot copy another's exact expression. The document also outlines the Copyright, Designs and Patents Act of 1988 and Registered Design Act of 1949, and discusses some legal cases involving intellectual property in video games.
A game design document is a highly descriptive document created by game designers, artists, and programmers that provides a guiding vision for a video game's narrative, characters, environments, mechanics, interface, and assets. It must include detailed descriptions in these key areas and can include supporting drawings. The document is created early in development and attached to agreements with publishers to communicate the game's vision throughout production.
A video game proposal is a brief document that aims to convince managers and investors to fund a new game idea. The proposal covers key elements at a high level, including the game title, genre, platform, narrative or objective, character and environment designs, gameplay mechanics, and features. It may include comparisons to other successful games. The goal is to attract backing for the idea before fully developing the design. Managers provide feedback that can strengthen the proposal. If approved, the full design process can begin.
Evaluation involves objectively reviewing software to determine if it meets required criteria such as fitness for purpose, efficient coding, usability, maintainability, and robustness. Efficiency considers achieving maximum productivity with minimum wasted effort. Usability testing observes users performing tasks to provide feedback on the user experience. Maintainability considers how readable and well-structured the code is for developers. The evaluation should identify any gaps between the specification and software, efficient coding practices used, enhancements to usability, maintainability features, and testing done to demonstrate robustness.
Evaluation involves objectively reviewing software to determine if it meets required criteria such as fitness for purpose, efficient coding, usability, maintainability, and robustness. Efficiency considers achieving maximum productivity with minimum wasted effort. Usability testing observes users performing tasks to provide feedback on the user experience. Maintainability considers how readable and well-structured the code is for developers. The evaluation should identify any gaps between the specification and software, efficient coding practices used, enhancements to usability, maintainability features, and testing done to demonstrate robustness.
The document discusses testing and debugging software. It describes the purpose of testing as ensuring software is fit for purpose by meeting specifications and is robust and reliable. Various types of tests are described, including normal, extreme, and exceptional test data and inputs. The importance of systematic and comprehensive testing is emphasized. Debugging techniques like dry runs, trace tables, breakpoints, and watchpoints are introduced to help identify bugs in software.
- The document discusses file handling in Python, including opening, reading from, writing to, and closing text files.
- It describes opening files in different modes like reading, writing, and appending. It also shows how to read and write data from files line by line and how to process comma separated value (CSV) files.
- Examples are given of opening a file, reading its contents, splitting lines on commas, and writing data to files from arrays and records.
This document provides descriptions and examples of standard algorithms:
1. Input validation ensures user input is in the correct format. An example checks a score is between 0-9999.
2. Finding min/max values uses a variable to track the lowest/highest items in an array. Examples find fastest time and best score.
3. Linear search checks each item to find a match. Using a flag improves it to report if the item was found. Conditional loops stop searching after a match.
This document discusses using records to store collections of data more efficiently than parallel arrays. It defines a BMI record structure with fields for height, weight, and BMI. It shows how to declare a single BMI record variable, assign values to its fields, and calculate the BMI. It then demonstrates declaring an array of BMI records to store multiple records, assigning values to fields of individual records, and calculating BMI values. Finally, it presents using a loop to efficiently input multiple records and calculate BMI values.
The document discusses using parallel arrays to store related data when a single array cannot hold all the necessary information. Parallel arrays store corresponding data in separate but aligned arrays. For example, storing student names in one array and ages in a second parallel array, with each element lining up to the corresponding student. This allows accessing a student's name and age together from their index in the parallel arrays. The document provides an example of parallel arrays to store student names, form class, prelim marks, and coursework marks to later calculate totals and averages.
By the end of the lesson, pupils will be able to describe the analysis phase, define requirements like purpose, scope and boundaries, and detail functional requirements and data flow. During analysis, the client's needs are extracted through interviews, questionnaires and observations to create a software specification. This specification outlines the scope, boundaries and functional requirements and is verified by the client. It forms the basis for development but may require revisions if limitations are identified. Analysis establishes the purpose, scope, boundaries and functional requirements to guide development.
This document outlines the analysis phase of a software development project. It describes the key aims and steps of analysis, including defining the purpose, scope, and boundaries, as well as functional requirements. Specifically, the purpose establishes the general problem to be solved. The scope defines project deliverables and timelines, while boundaries clarify assumptions and limits. Finally, functional requirements detail necessary inputs, processes, and outputs in terms of the problem and user needs. An example analysis is provided for a student grade calculation program.
This document provides information on iterative and agile development methodologies. It describes the waterfall method as an iterative process involving analysis, design, implementation, testing, and maintenance. Agile methodology uses short sprints involving similar phases but with frequent client feedback. The document outlines advantages of agile including client collaboration, flexibility, and measuring progress. Disadvantages include potential scope creep and prioritizing speed over quality for large projects.
Trojans are malware that disguise themselves as legitimate programs to trick users into downloading and installing them. Once installed, they can allow hackers access and perform malicious activities like stealing data. Worms are standalone malware that spread automatically without needing user interaction. Ransomware encrypts users' files and demands payment for their return. Spyware secretly monitors users' online activities through keyloggers, hijacking webcams and microphones, and cracking passwords using dictionary attacks.
Anti-virus software detects and removes viruses and malware through four main techniques: memory resident monitoring, heuristic detection, virus signature detection, and checksums. Memory resident monitoring involves software that constantly monitors the system while running. Heuristic detection looks for suspicious program behavior. Virus signature detection compares programs to a database of known viruses. Checksums calculate a number based on a program's data to detect any changes from the original file.
Ethical hacking introduction to ethical hackingmissstevenson01
Ethical hacking is the process of authorized penetration testing of systems and networks to identify security vulnerabilities. It involves five stages: reconnaissance to gather target information; scanning open ports and services; gaining access using tools or exploits; maintaining persistent access covertly; and clearing logs and traces to cover tracks. The goal of ethical hacking is to improve security by finding and fixing vulnerabilities before criminals can exploit them.
1) The document discusses internet safety and how to chat safely online. It emphasizes the importance of only sharing private information with people you know well in real life and recognizing "red flag feelings" when chatting online.
2) It analyzes two stories of Sara chatting with different online friends - one she knows from school and one she does not know at all. The friendship with Jezza_east13, who she has never met, would be riskier since she does not have any information about who this person really is.
3) The document provides advice on how to stay safe online, such as being careful what you share, listening to "red flag feelings," and getting help from a trusted adult if you
Wireframes are quick sketches of page layouts used early in the design process to plan and agree on optimal designs before development. They show elements like navigation, content areas, and media but not final fonts/colors. Good wireframes include enough detail for others to understand ideas and should be quick to create and refine with clients. Key elements in wireframes represent things like text boxes, images, videos, navigation, and forms to help visualize the overall page structure and flow.
We used the CourseID rather than the Title in the DELETE statement criteria because:
- The CourseID is the primary key for identifying each unique record in the Course table. It will unambiguously identify the single record we want to delete.
- The Title could potentially match multiple records if the same course title was used more than once. Using the Title would risk deleting multiple records instead of just the intended one.
- Best practice is to always use the primary key field(s) to identify records when querying, updating, or deleting in order to ensure only the intended record(s) are affected.
So in summary, by using the CourseID we can be certain to only delete the single intended record, rather than
A database is being created to store details of aliens to make it easier for intergalactic authorities to manage. The database will include tables with records of individual aliens containing fields of information about each one.
This document discusses legal issues related to developing video games, including copyright, trademarks, and intellectual property laws. It explains that the code and creative elements of video games are protected under copyright as literary and audio-visual works. Certain standard elements like scoring systems are not copyrightable, but games cannot copy another's exact expression. The document also outlines the Copyright, Designs and Patents Act of 1988 and Registered Design Act of 1949, and discusses some legal cases involving intellectual property in video games.
A game design document is a highly descriptive document created by game designers, artists, and programmers that provides a guiding vision for a video game's narrative, characters, environments, mechanics, interface, and assets. It must include detailed descriptions in these key areas and can include supporting drawings. The document is created early in development and attached to agreements with publishers to communicate the game's vision throughout production.
A video game proposal is a brief document that aims to convince managers and investors to fund a new game idea. The proposal covers key elements at a high level, including the game title, genre, platform, narrative or objective, character and environment designs, gameplay mechanics, and features. It may include comparisons to other successful games. The goal is to attract backing for the idea before fully developing the design. Managers provide feedback that can strengthen the proposal. If approved, the full design process can begin.
Evaluation involves objectively reviewing software to determine if it meets required criteria such as fitness for purpose, efficient coding, usability, maintainability, and robustness. Efficiency considers achieving maximum productivity with minimum wasted effort. Usability testing observes users performing tasks to provide feedback on the user experience. Maintainability considers how readable and well-structured the code is for developers. The evaluation should identify any gaps between the specification and software, efficient coding practices used, enhancements to usability, maintainability features, and testing done to demonstrate robustness.
Evaluation involves objectively reviewing software to determine if it meets required criteria such as fitness for purpose, efficient coding, usability, maintainability, and robustness. Efficiency considers achieving maximum productivity with minimum wasted effort. Usability testing observes users performing tasks to provide feedback on the user experience. Maintainability considers how readable and well-structured the code is for developers. The evaluation should identify any gaps between the specification and software, efficient coding practices used, enhancements to usability, maintainability features, and testing done to demonstrate robustness.
The document discusses testing and debugging software. It describes the purpose of testing as ensuring software is fit for purpose by meeting specifications and is robust and reliable. Various types of tests are described, including normal, extreme, and exceptional test data and inputs. The importance of systematic and comprehensive testing is emphasized. Debugging techniques like dry runs, trace tables, breakpoints, and watchpoints are introduced to help identify bugs in software.
- The document discusses file handling in Python, including opening, reading from, writing to, and closing text files.
- It describes opening files in different modes like reading, writing, and appending. It also shows how to read and write data from files line by line and how to process comma separated value (CSV) files.
- Examples are given of opening a file, reading its contents, splitting lines on commas, and writing data to files from arrays and records.
This document provides descriptions and examples of standard algorithms:
1. Input validation ensures user input is in the correct format. An example checks a score is between 0-9999.
2. Finding min/max values uses a variable to track the lowest/highest items in an array. Examples find fastest time and best score.
3. Linear search checks each item to find a match. Using a flag improves it to report if the item was found. Conditional loops stop searching after a match.
This document discusses using records to store collections of data more efficiently than parallel arrays. It defines a BMI record structure with fields for height, weight, and BMI. It shows how to declare a single BMI record variable, assign values to its fields, and calculate the BMI. It then demonstrates declaring an array of BMI records to store multiple records, assigning values to fields of individual records, and calculating BMI values. Finally, it presents using a loop to efficiently input multiple records and calculate BMI values.
The document discusses using parallel arrays to store related data when a single array cannot hold all the necessary information. Parallel arrays store corresponding data in separate but aligned arrays. For example, storing student names in one array and ages in a second parallel array, with each element lining up to the corresponding student. This allows accessing a student's name and age together from their index in the parallel arrays. The document provides an example of parallel arrays to store student names, form class, prelim marks, and coursework marks to later calculate totals and averages.
By the end of the lesson, pupils will be able to describe the analysis phase, define requirements like purpose, scope and boundaries, and detail functional requirements and data flow. During analysis, the client's needs are extracted through interviews, questionnaires and observations to create a software specification. This specification outlines the scope, boundaries and functional requirements and is verified by the client. It forms the basis for development but may require revisions if limitations are identified. Analysis establishes the purpose, scope, boundaries and functional requirements to guide development.
This document outlines the analysis phase of a software development project. It describes the key aims and steps of analysis, including defining the purpose, scope, and boundaries, as well as functional requirements. Specifically, the purpose establishes the general problem to be solved. The scope defines project deliverables and timelines, while boundaries clarify assumptions and limits. Finally, functional requirements detail necessary inputs, processes, and outputs in terms of the problem and user needs. An example analysis is provided for a student grade calculation program.
This document provides information on iterative and agile development methodologies. It describes the waterfall method as an iterative process involving analysis, design, implementation, testing, and maintenance. Agile methodology uses short sprints involving similar phases but with frequent client feedback. The document outlines advantages of agile including client collaboration, flexibility, and measuring progress. Disadvantages include potential scope creep and prioritizing speed over quality for large projects.
3. Emerging Technology is
about the future
It’s about up and coming
technology for games.
It has to be New, Unique
and different to be
successful.
4. The art of super-imposing computer
generated content over a live view of the
world.
http://bbc.in/TFW10
5. Isa form of game play that involves your
locations.
Will use portable devices like smartphones
Oftencalled,
“Urban Gaming”