AQA (8525) GCSE Computer Science
3.1.1 Representing algorithms
3.1.2–3.1.4 Using algorithms
3.2.1–3.1.6 Programming
3.2.7–3.2.10 Processes
3.2.11–3.2.13 Writing Programs
3.3.1–3.3.4 Representing numbers
3.3.5–3.3.7 Creating files
3.3.8 Compression
3.4.1 Hardware and software
3.4.2 Boolean logic
3.4.3 Software classification
3.4.4a The CPU
3.4.4b Memory and storage
3.5.1 Networks
3.6.1 Cyber-threats
3.6.2 Prevention
3.7.1 Databases
3.8.1 Societal impact
3.1.1: Representing algorithms
Computational thinking
- Decomposition
- Pattern recognition
- Abstraction
- Algorithms
Flowcharts
- Standard shapes
- Algorithms
Pseudocode
- Syllabus pseudocode
3.1.2–3.1.4: Using algorithms
Algorithm efficiency
- Time efficiency
- Space efficiency
Searching algorithms
- Linear search
- Binary search
Sorting algorithms
- Bubble sort
- Merge sort
3.2.1–3.2.6: Programming components
Data types
- Character
- String
- Integer
- Real
- Boolean
Variables and constants
- Naming
- Assigning
- Uses
Operators
- Arithmetic
- Boolean
- Relational
Sequence, selection, iteration
- IF
- WHILE
- CASE
- REPEAT
- FOR
- Nesting
Data structures
- List
- Linked List
- Dictionary
- Tuple
Arrays and records
- 1D Array
- 2D Array
- Array operations
- Records
3.2.7–3.2.10: Processes
File handling
- Open
- Close
- Read
- Write
String handling
- Storage
- Search
- Properties
- Type casting
- Character codes
Random number generation
- Random integers
- Python examples
- Uses
Subroutines
- Coding
- Functions
- Scope
- Uses
3.2.11–3.2.13: Writing programs
Structured programming
- Planning
- Iteration
- Subroutines and Functions
- Modules & Scope
- Python Examples
Validation and authentication
- Length check
- Range check
- Authentication
- Test Data
- Python Examples
Programming languages
- Machine code
- Low Level
- High level
- Translators, Assemblers
- Compiler, Interpreters
3.3.1–3.3.4: Representing numbers
Binary and denary
- Number systems
- Denary to Binary
- Binary to Denary
- Binary Addition
- Binary Shift
Hexadecimal
- Uses
- Denary to Hex
- Hex to Denary
- Hex to Binary
- Binary to Hex
Units and prefixes
- Bit, Byte, Nibble
- Kilobyte to Petabyte
3.3.5–3.3.7: Creating files
Character sets
- ASCII
- Extended ASCII
- Character Sets
- Unicode
Images
- Pixels
- Grayscale
- Colour Depth
- Files size
Audio
- Sampling
- Sampling frequency
- Bit Depth, Bit Rate
- Channels
- Metadata
3.3.8: Compression
Compression
- Lossy compression
- Lossless compression
- Dictionary compression
- Images, Video, Music
Huffman encoding
- Binary Tree
- The concept of it
- Encoding
Run-length encoding
- RLE data format
- RLE & Images
- RLE & Text
3.4.1: Hardware and software
Introduction to computer systems
- Computer System
- Hardware
- Software
3.4.2: Boolean logic
Boolean logic
- Logic gates
- Logic circuits
- Truth tables
3.4.3: Software classification
Software types
- System Software
- Application Software
Operating systems
- Purpose
- Kernel
- User Interface
- Device Drivers
- Multitasking
3.4.4a: Systems architecture: the CPU
CPU architecture
- What is the CPU?
- ALU, Control Unit
- Clock, Buses
- Von Neumann
CPU performance
- Cache
- Cores
- Overclocking
- Parallel processing
Fetch-Execute cycle
- Hardware used
- Steps in the cycle
3.4.4b: Systems architecture: Memory and storage
Main memory
- RAM Random Access
- DRAM and SRAM
- ROM Read Only
Secondary storage
- Magnetic
- Optical
- Solid State
- Cloud
Embedded systems
- Definition
- Sensors
- Analog-Digital converter
- Actuators
3.5.1: Networks
Network scale
- Personal Area Networks
- Local Area Networks at home
- Local Area Networks in business
- Wide Area Networks
Network types and shapes
- Wired, Wireless networks
- Star, Bus topology
- Star & Bus animations
- Network Builder
Network protocols
- TCP/IP and UDP
- HTTP and HTTPs
- FTP, Ethernet, Wi-Fi
- Email Protocols
Network security
- Importance of security
- Authentication methods
- Encryption
- Firewalls
- MAC filtering
Four layer model
- Application Layer
- Transport Layer
- Network Layer
- Data Link Layer
3.6.1: Cyber security threats
Introduction to cyber-security
- What is it
- Why is it important
- Malicious code
- Social engineering
- Prevention
Penetration testing
- White box testing
- Black box testing
Social engineering
- What is social engineering?
- Phishing
- Pharming
- Blagging
- Other social attacks
Malware
- Viruses and Worms
- Browser malware
- Other malware types
3.6.2: Preventing cyber-threats
Authentication
- Typical threats
- Strong Passwords
- Biometric authentication
- CAPTCHA
- Email confirmation
- Software updates
3.7.1: Databases
Databases
- Definition
- Flat-file
- Relational
- Management
3.8.1: Societal impact
Ethics
- Internet
- Social media
- Digital divide
- Whistleblowing
- Self driving cars
- Genetic screening
- Drone use
Culture
- Anonymity
- Citizen Journalism
- Military Drones
- Health & Technology
- Social Network Impacts
Legislation
- Data Protection Act
- Computer Misuse Act
- Copyright & Patents
- Freedom of Information Act
The Environment
- E-Waste
- Sustainability
- Recycling
- Energy use
- Data Centres
- Monitoring
- Stakeholders
Open source software
- Open Source
- Closed Source
- Creative Commons
Privacy
- DNA profiling
- ID Cards
- CCTV
- Tracking
- Personal Data
- Stakeholders