Wanted pages
Appearance
List of non-existing pages with the most links to them, excluding pages which only have redirects linking to them. For a list of non-existent pages that have redirects linking to them, see the list of broken redirects.
Showing below up to 50 results in range #1 to #50.
- A1.1.1 Describe the function and interaction of the main CPU components (1 link)
- A1.1.2 Describe the role of a GPU (1 link)
- A1.1.3 Explain the differences between the CPU and the GPU (HL only) (1 link)
- A1.1.4 Explain the purposes of different types of primary memory (1 link)
- A1.1.5 Describe the fetch, decode and execute cycle (1 link)
- A1.1.6 Describe the process of pipelining in multi-core architectures (HL only) (1 link)
- A1.1.7 Describe internal and external types of secondary memory storage (1 link)
- A1.1.8 Describe the concept of compression (1 link)
- A1.1.9 Describe the different types of services in cloud computing (1 link)
- A1.2.1 Describe the principal methods of representing data (1 link)
- A1.2.2 Explain how binary is used to store data (1 link)
- A1.2.3 Describe the purpose and use of logic gates (1 link)
- A1.2.4 Construct and analyze truth tables (1 link)
- A1.2.5 Construct logic diagrams (1 link)
- A1.3.1 Describe the role of operating systems (1 link)
- A1.3.2 Describe the functions of an operating system (1 link)
- A1.3.3 Compare different approaches to scheduling (1 link)
- A1.3.4 Evaluate the use of polling and interrupt handling (1 link)
- A1.3.5 Explain the role of the operating system in managing multitasking and resource allocation (HL only) (1 link)
- A1.3.6 Describe the use of the control system components (HL only) (1 link)
- A1.3.7 Explain the use of control systems in a range of real-world applications (HL only) (1 link)
- A1.4.1 Evaluate the translation processes of interpreters and compilers (HL only) (1 link)
- A2.1.1 Describe the purpose and characteristics of networks (1 link)
- A2.1.2 Describe the purpose, benefits, and limitations of modern digital infrastructures (1 link)
- A2.1.3 Describe the function of network devices (1 link)
- A2.1.4 Describe the network protocols used for transport and application (1 link)
- A2.1.5 Describe the function of the TCP/IP model (HL only) (1 link)
- A2.2.1 Describe the function and practical applications of network topologies (1 link)
- A2.2.2 Describe the function of servers (HL only) (1 link)
- A2.2.3 Compare and contrast networking models (1 link)
- A2.2.4 Explain the concepts and applications of network segmentation (1 link)
- A2.3.1 Describe different types of IP addressing (1 link)
- A2.3.2 Compare types of media for data transmission (1 link)
- A2.3.3 Explain how packet switching is used to send data across a network (1 link)
- A2.3.4 Explain how static routing and dynamic routing move data across local area networks (HL only) (1 link)
- A2.4.1 Discuss the effectiveness of firewalls at protecting a network (1 link)
- A2.4.2 Describe common network vulnerabilities (HL only) (1 link)
- A2.4.3 Describe common network countermeasures (HL only) (1 link)
- A2.4.4 Describe the process of encryption and digital certificates (1 link)
- A3.1.1 Explain the features, benefits and limitations of a relational database (1 link)
- A3.2.1 Describe database schema (1 link)
- A3.2.2 Construct ERDs (1 link)
- A3.2.3 Outline the different data types used in relational databases (1 link)
- A3.2.4 Construct tables for relational databases (1 link)
- A3.2.5 Explain the difference between normal forms (1 link)
- A3.2.6 Construct a database normalised to 3NF for a range of real world scenarios (1 link)
- A3.2.7 Evaluate the need for denormalising databases (1 link)
- A3.3.1 Outline the differences between data language types within SQL (1 link)
- A3.3.2 Construct queries between two tables in SQL (1 link)
- A3.3.3 Explain how SQL can be used to update data in a database (1 link)