For first teaching in 2020.
The material on this site is not endorsed by the AQA examination board. We do not guarantee that it covers all of the relevant theory that is required for the examination. Please refer to the 8525 syllabus to ensure that you are covering the material to the standard required.
GCSE AQA 8525 Computer Science |
3.1
Fundamentals of algorithms |
3.1.1
Representing algorithms |
Computational thinking |
- Decomposition
- Pattern recognition
- Abstraction
- Algorithms
|
Flowcharts |
- Standard Shapes
- Algorithms
|
Pseudocode |
|
3.1.2 - 3.1.4
Types of algorithms |
Algorithm efficiency |
- Time efficiency
- Space efficiency
|
Searching algorithms |
- Linear search
- Binary Search
|
Sorting algorithms |
|
3.2
Programming |
3.2.1 - 3.2.6
Programming components |
Data types |
- Character
- String
- Integer
- Real
- Boolean
|
Variables and constants |
|
Operators |
- Arithmetic
- Boolean
- Relational
|
Sequence, selection, iteration |
- IF
- WHILE
- CASE
- REPEAT
- FOR
- Nesting
|
Data Structures |
- List
- Linked List
- Dictionary
- Tuple
|
Arrays & Records |
- 1D Array
- 2D Array
- Array operations
- Records
|
3.2.7 - 3.2.10
Processes |
File handling |
|
String handling |
- Storage
- Search
- Properties
- Type casting
- Character codes
|
Random number generation |
- Random integers
- Python examples
- Uses
|
Subroutines |
- Coding
- Functions
- Scope
- Uses
|
3.2.11 - 3.2.13
Writing programs |
Structured programming |
- Planning
- Iteration
- Subroutines\Functions
- Modules & Scope
- Python Examples
|
Validation and authentication |
- Length check
- Range check
- Authentication
- Test Data
- Python Examples
|
Programming languages |
- Machine code
- Low Level
- High level
- Translators, Assemblers
- Compiler, Interpreters
|
3.3
Fundamentals of data representation |
3.3.1 - 3.3.4
Representing numbers |
Denary and Binary |
- Number systems
- Denary to Binary
- Binary to Denary
- Binary Addition
- Binary Shift
|
Hexadecimal |
- Uses
- Denary to Hex
- Hex to Denary
- Hex to Binary
- Binary to Hex
|
Units and prefixes |
- Bit, Byte, Nibble
- Kilobyte to Petabyte
|
3.3.5 - 3.3.7
Creating files |
Character sets |
- ASCII
- Extended ASCII
- Character Sets
- Unicode
|
Images |
- Pixels
- Grayscale
- Colour Depth
- Files size
|
Sound |
- Sampling
- Sampling frequency
- Bit Depth, Bit Rate
- Channels
- Metadata
|
3.3.8
Compression |
Compression |
- Lossy compression
- Lossless compression
- Dictionary compression
- Images,Video,Music
|
Huffman Encoding |
- Binary Tree
- The concept of it
- Encoding
|
Run Length Encoding |
- RLE data format
- RLE & Images
- RLE & Text
|
3.4
Computer Systems |
3.4.1 Hardware and Software |
Hardware, software |
- Computer System
- Hardware
- Software
|
3.4.2 Boolean Logic |
Boolean logic |
- AND, OR, NOT,XOR
- Logic Circuits
- Truth Tables
|
3.4.3 Software Classification |
Software types |
- System Software
- Application Software
|
Operating systems |
- Purpose
- Kernel
- User Interface
- Device Drivers
- Multitasking
|
3.4.4
Systems Architecture: CPU |
CPU and Von Neumann architecture |
- What is it
- ALU, Control Unit
- Clock, Buses
- Von Neumann
|
CPU performance |
- Cache
- Cores
- Overclocking
- Parallel processing
|
Fetch-Execute cycle |
- Hardware used
- The FDE cycle
|
3.4.4
Systems Architecture: Memory
| Types of memory |
- RAM Random Access
- DRAM and SRAM
- ROM Read Only
|
Secondary storage |
- Magnetic
- Optical
- Solid State
- Cloud
|
Embedded systems |
- Definition
- Sensors
- Analog-Digital converter
- Actuators
|
3.5
Networks
|
Networks
|
PANs, LANs and WANs |
- PAN
- LAN at home
- LAN in business
- WAN
|
Networks type and shape |
- Wired, Wireless networks
- Star, Bus topology
- Star & Bus animations
- Network Builder
|
Network protocols |
- TCP/IP and UDP
- HTTP and HTTPs
- FTP, Ethernet, Wi-Fi
- Email Protocols
|
Network security |
- Importance of security
- Authentication methods
- Encryption
- Firewalls
- MAC filtering
|
Four Layer Model |
- Application Layer
- Transport Layer
- Network Layer
- Data Link Layer
|
3.6
Cyber security
|
3.6.1
Cyber security threats |
Introduction to Cyber-security |
- What is it
- Why is it important
- Malicious code
- Social engineering
- Prevention
|
Penetration testing |
- What is it
- White box testing
- Black box testing
|
Social engineering |
- What is it
- Phishing
- Pharming
- Blagging
- Other Social attacks
|
Malware |
- Viruses and Worms
- Browser malware
- Other malware types
|
3.6.2
Prevention |
Threats and Prevention |
- Typical threats
- Strong Passwords
- Biometric authentication
- CAPTCHA
- Email confirmation
- Software updates
|
3.7
Databases |
Database |
Database |
- Definition
- Flat-file
- Relational
- RDBMS
|
3.8
Societal Impact
|
3.8.1
Ethical, Legal, Environmental |
Ethical |
- Internet
- Social media
- Digital divide
- Whistleblowing
- Self driving cars
- Genetic screening
- Drone use
|
Cultural |
- Anonymity
- Citizen Journalism
- Military Drones
- Health & Technology
- Social Network Impacts
|
Legislation |
- Data Protection Act
- Computer Misuse Act
- Copyright & Patents
- Freedom of Information Act
|
Environmental |
- E-Waste
- Sustainability
- Recycling
- Energy use
- Data Centres
- Monitoring
- Stakeholders
|
Open-Close Source |
- Open Source
- Closed Source
- Creative Commons
|
Privacy |
- DNA profiling
- ID Cards
- CCTV
- Tracking
- Personal Data
- Stakeholders
|