National 5 Computing Science SQA

This subject is broken down into 35 topics in 4 modules:

  1. Software Design and Development 14 topics
  2. Computer Systems 5 topics
  3. Database Design and Development 7 topics
  4. Web Design and Development 9 topics
Study this subject in the Adapt App →
  • 4
    modules
  • 35
    topics
  • 12,679
    words of revision content
  • 1+
    hours of audio lessons

This page was last modified on 28 September 2024.

A preview of National 5 Computing Science SQA in the Adapt app

Adapt is a revision planning app with full content coverage and unlimited past paper questions for 1,200+ GCSE and A Level subjects.

Study this subject in the Adapt app →

Computing Science

Software Design and Development

Development Methodologies

🤓 Study

📖 Quiz

Play audio lesson

Development Methodologies

Development Methodologies

Waterfall Methodology

  • Sequential design process: stages are completed one at a time, with each stage depending on the output of the previous stage.
  • Rigorous structure: provides clear milestones for project management.
  • Limited flexibility: issues can arise if changes are needed after a stage has been completed, as it often requires revisiting multiple stages.

Agile Methodology

  • Iterative and incremental approach: Agile methodology involves frequent incremental releases with gradual improvement and iteration at each stage.
  • Responsive to changes: Unlike the waterfall method, Agile allows for changes to be made after the initial planning.
  • Early and predictable delivery: Using time-boxed, fixed schedule Sprints or iterations, new features are delivered quickly and predictably.
  • Promotes teamwork: Agile encourages active stakeholder involvement, collaboration, and face-to-face communication.
  • Can lead to frequent changes, which can increase the risk of the project scope spiralling out of control if not managed correctly.

Spiral Model

  • Combines Waterfall and Agile: The Spiral Model is a risk-driven process model generator for software projects that combines aspects of both design and prototyping-in-stages.
  • Focus on risk analysis: It requires a direct consideration of identified project risks during the development of the software.
  • Costly and complex: Suitable for large, expensive and complicated projects.

Methodology Comparison

  • Determine the most suitable development methodology by evaluating the project size and requirements, how definitive the project requirements are, the client's availability for communication and engagement, the technical skills of the development team, and the importance of risk assessment.
  • Waterfall methodology is good for smaller projects with very well-defined requirements and little change expected.
  • Agile methodology is best for projects where there is a higher likelihood of regular changes and need for client input throughout the project.
  • Spiral methodology is the go-to for large, complex and high risk projects, where both the development team and the client need to understand and react to risks at each stage.

Course material for Computing Science, module Software Design and Development, topic Development Methodologies

Computing Science

Computer Systems

Security Precautions

🤓 Study

📖 Quiz

Play audio lesson

Security Precautions

Understanding Threats

  • Cyber threats come in various forms, including viruses, worms, Trojans, and spyware, each with their unique abilities and harms.
  • Phishing is a method used by scammers to trick you into providing personal information or performing actions that compromise your security.
  • Identity theft involves someone else using your personal information, often sourced from insecure online activities, to impersonate you or conduct fraudulent activities.
  • Ransomware is a type of malicious software that locks you out of your system or files until a ransom is paid.

Fundamental Security Precautions

  • Firewalls provide a first line of defence by controlling traffic between different networks, often the internet and a private network.
  • Antivirus software scans your computer for known threats and helps to isolate and eliminate them.
  • Use of strong, unique passwords helps protect your accounts from being easily breached.
  • Regular software updates are essential as they often include patches for known security vulnerabilities.

Communications and Online Safety

  • Avoid clicking on unknown links or downloading files from untrusted sources. These can often lead to malware or phishing sites.
  • Encrypt your sensitive data to prevent unauthorized access. This is particularly vital when using public Wi-Fi networks.
  • Two-factor authentication (2FA) adds an extra level of security by requiring a second factor, such as a OTP sent to your mobile, in addition to your password.
  • Be cautious when sharing personal information online. Use privacy settings on social media platforms and think before posting anything that could be used maliciously.

Data Protection and Backups

  • Regular backups are critical to ensure that you can recover files lost due to malware attacks, systems failures or accidental deletion.
  • Consider using a secure cloud storage solution for backing up your data, as these often come with built-in security measures.
  • Be mindful of where your data is stored and who has access to it. Use access controls to restrict who can view or edit sensitive information.
  • Securely wipe any storage devices you get rid of to ensure residual data cannot be recovered and misused.

Responsible Usage

  • Be aware of your legal responsibilities when using computers. Know that accessing another person's computer system without permission is illegal under the Computer Misuse Act.
  • Understand that online behaviour has consequences. Cyberbullying is the use of digital communication tools to make another person's experience negative—it's harmful and often illegal.
  • Be cautious about what you post online. Maintain a positive digital footprint as it may impact your future opportunities.

Course material for Computing Science, module Computer Systems, topic Security Precautions

Can I trust Adapt’s expertise?

Adapt is already used by over 600,000 students and trusted by over 3,000 schools. Our exam-specific content and assessments are meticulously crafted by expert teachers and examiners.

Find out more about the Adapt app →

Planner

An always up-to-date revision timetable.

A personalised, flexible revision timetable that stays up-to-date automatically.

Content

All the exam resources, in one place.

Over 20,000 topics broken down into manageable lessons with teacher-written, exam-specific lessons.

Assessment

Past-paper questions, with instant feedback.

Unlimited past paper questions with instant examiner feedback on how to improve.

Progress

Track progress, together.

Progress tracking to stay motivated, with real-time updates to the Parent Portal.

Download the app today to start revising for free.