GCSE AQA 8525 Computer Science |
3.1
Fundamentals of algorithms |
3.1.1
Representing algorithms |
Computational thinking |
- Decomposition
- Pattern recognition
- Abstraction
- Algorithms
|
Flowcharts |
- Standard Shapes
- Algorithms
|
Pseudocode |
|
3.1.2 - 3.1.4
Types of algorithms |
Algorithm efficiency |
- Time efficiency
- Space efficiency
|
Searching algorithms |
- Linear search
- Binary Search
|
Sorting algorithms |
|
3.2
Programming |
3.2.1 - 3.2.6
Programming components |
Data types |
- Character
- String
- Integer
- Real
- Boolean
|
Variables and constants |
|
Operators |
- Arithmetic
- Boolean
- Relational
|
Sequence, selection, iteration |
- IF
- WHILE
- CASE
- REPEAT
- FOR
- Nesting
|
Data Structures |
- List
- Linked List
- Dictionary
- Tuple
|
Arrays & Records |
- 1D Array
- 2D Array
- Array operations
- Records
|
3.2.7 - 3.2.10
Processes |
File handling |
|
String handling |
- Storage
- Search
- Properties
- Type casting
- Character codes
|
Random number generation |
- Random integers
- Python examples
- Uses
|
Subroutines |
- Coding
- Functions
- Scope
- Uses
|
3.2.11 - 3.2.13
Writing programs |
Structured programming |
- Planning
- Iteration
- Subroutines\Functions
- Modules & Scope
- Python Examples
|
Validation and authentication |
- Length check
- Range check
- Authentication
- Test Data
- Python Examples
|
Programming languages |
- Machine code
- Low Level
- High level
- Translators, Assemblers
- Compiler, Interpreters
|
3.3
Fundamentals of data representation |
3.3.1 - 3.3.4
Representing numbers |
Denary and Binary |
- Number systems
- Denary to Binary
- Binary to Denary
- Binary Addition
- Binary Shift
|
Hexadecimal |
- Uses
- Denary to Hex
- Hex to Denary
- Hex to Binary
- Binary to Hex
|
Units and prefixes |
- Bit, Byte, Nibble
- Kilobyte to Petabyte
|
3.3.5 - 3.3.7
Creating files |
Character sets |
- ASCII
- Extended ASCII
- Character Sets
- Unicode
|
Images |
- Pixels
- Grayscale
- Colour Depth
- Files size
|
Sound |
- Sampling
- Sampling frequency
- Bit Depth, Bit Rate
- Channels
- Metadata
|
3.3.8
Compression |
Compression |
- Lossy compression
- Lossless compression
- Dictionary compression
- Images,Video,Music
|
Huffman Encoding |
- Binary Tree
- The concept of it
- Encoding
|
Run Length Encoding |
- RLE data format
- RLE & Images
- RLE & Text
|
3.4
Computer Systems |
3.4.1 Hardware and Software |
Hardware, software |
- Computer System
- Hardware
- Software
|
3.4.2 Boolean Logic |
Boolean logic |
- AND, OR, NOT,XOR
- Logic Circuits
- Truth Tables
|
3.4.3 Software Classification |
Software types |
- System Software
- Application Software
|
Operating systems |
- Purpose
- Kernel
- User Interface
- Device Drivers
- Multitasking
|
3.4.4
Systems Architecture: CPU |
CPU and Von Neumann architecture |
- What is it
- ALU, Control Unit
- Clock, Buses
- Von Neumann
|
CPU performance |
- Cache
- Cores
- Overclocking
- Parallel processing
|
Fetch-Execute cycle |
- Hardware used
- The FDE cycle
|
3.4.4
Systems Architecture: Memory
| Types of memory |
- RAM Random Access
- DRAM and SRAM
- ROM Read Only
|
Secondary storage |
- Magnetic
- Optical
- Solid State
- Cloud
|
Embedded systems |
- Definition
- Sensors
- Analog-Digital converter
- Actuators
|
3.5
Networks
|
Networks
|
PANs, LANs and WANs |
- PAN
- LAN at home
- LAN in business
- WAN
|
Networks type and shape |
- Wired, Wireless networks
- Star, Bus topology
- Star & Bus animations
- Network Builder
|
Network protocols |
- TCP/IP and UDP
- HTTP and HTTPs
- FTP, Ethernet, Wi-Fi
- Email Protocols
|
Network security |
- Importance of security
- Authentication methods
- Encryption
- Firewalls
- MAC filtering
|
Four Layer Model |
- Application Layer
- Transport Layer
- Network Layer
- Data Link Layer
|
3.6
Cyber security
|
3.6.1
Cyber security threats |
Introduction to Cyber-security |
- What is it
- Why is it important
- Malicious code
- Social engineering
- Prevention
|
Penetration testing |
- What is it
- White box testing
- Black box testing
|
Social engineering |
- What is it
- Phishing
- Pharming
- Blagging
- Other Social attacks
|
Malware |
- Viruses and Worms
- Browser malware
- Other malware types
|
3.6.2
Prevention |
Threats and Prevention |
- Typical threats
- Strong Passwords
- Biometric authentication
- CAPTCHA
- Email confirmation
- Software updates
|
3.7
Databases |
Database |
Database |
- Definition
- Flat-file
- Relational
- RDBMS
|
3.8
Societal Impact
|
3.8.1
Ethical, Legal, Environmental |
Ethical |
- Internet
- Social media
- Digital divide
- Whistleblowing
- Self driving cars
- Genetic screening
- Drone use
|
Cultural |
- Anonymity
- Citizen Journalism
- Military Drones
- Health & Technology
- Social Network Impacts
|
Legislation |
- Data Protection Act
- Computer Misuse Act
- Copyright & Patents
- Freedom of Information Act
|
Environmental |
- E-Waste
- Sustainability
- Recycling
- Energy use
- Data Centres
- Monitoring
- Stakeholders
|
Open-Close Source |
- Open Source
- Closed Source
- Creative Commons
|
Privacy |
- DNA profiling
- ID Cards
- CCTV
- Tracking
- Personal Data
- Stakeholders
|