Edexcel GCSE Computer Science
1: Algorithms
Computational thinking
- Decomposition
- Pattern recognition
- Abstraction
Flowcharts
- Standard shapes
- Algorithms
Pseudocode
- Syllabus pseudocode
Searching algorithms
- Linear search
- Binary search
Sorting algorithms
- Bubble sort
- Merge sort
2: Programming
Data types
- Character
- String
- Integer
- Real
- Boolean
Variables and constants
- Naming
- Assigning
- Uses
Operators
- Arithmetic
- Boolean
- Relational
Sequence, selection, iteration
- IF
- WHILE
- CASE
- REPEAT
- FOR
- Nesting
Data structures
- One-dimensional arrays
- Two-dimensional arrays
- Records
String handling
- Indexing
- Length
- Traversal
- Concatenation
- Slicing
- Casting and coercion
Subprograms
- Coding
- Functions
- Scope
- Uses
Inputs and outputs
- Presence checks
- Length checks
- Range checks
- Lookup checks
- Reading files
- Writing files
Maintainable code
- Comments
- Headers
- Whitespace
- Indentation
Errors in code
- Logic errors
- Arithmetic order
- Syntax errors
- Run-Time errors
Testing code
- Test plans
- Test data
- Trace tables
- IDEs
- Evaluating programs
3: Data
Binary and denary
- Number systems
- Denary to Binary
- Binary to Denary
- Binary Addition
- Binary Shift
Hexadecimal
- Uses
- Denary to Hex
- Hex to Denary
- Hex to Binary
- Binary to Hex
Units and prefixes
- Bit, Byte, Nibble
- Kilobyte to Petabyte
Text data
- ASCII
- Extended ASCII
- Character Sets
- Unicode
Image data
- Pixels
- Grayscale
- Colour Depth
- Files size
Audio data
- Sampling
- Sampling frequency
- Bit Depth, Bit Rate
- Channels
- Metadata
Compression
- Lossy compression
- Lossless compression
- Dictionary compression
- Images, Video, Music
Run-length encoding
- RLE data format
- RLE & Images
- RLE & Text
Encryption and ciphers
- Purpose
- Symmetric encryption
- Asymmetric encryption
- Caesar Cipher
Databases: Structure
- Purpose
- Parts
- Flat-file
- Relational
- Keys
Databases: Relationships
- Entities
- Attributes
- E-R diagrams
4: Computers
Input-Process-Output
- Input
- Process
- Software
- Output
- Storage
The CPU
- Architecture
- ALU
- Control Unit
- Memory
- Buses
Fetch-Decode-Execute cycle
- Hardware used
- Steps in the cycle
Main memory
- RAM Random Access
- DRAM and SRAM
- ROM Read Only
- Cache
Secondary storage
- Magnetic
- Optical
- Solid State
- Cloud
Embedded systems
- Definition
- Sensors
- Analog-Digital converter
- Actuators
Boolean logic
- Logic gates
- Logic circuits
- Truth tables
Operating systems
- Purpose
- Kernel
- User Interface
- Device Drivers
- Multitasking
Utility software
- Encryption utilities
- Defragmentation utilities
- Compression
- Backup
- Information & diagnostics
Translators and languages
- Machine code
- Low Level
- High level
- Translators, Assemblers
- Compiler, Interpreters
5: Networks
Introduction to networks
- What is a network?
- Home networks
- Business networks
- LANs/WANs
- Client-Server/P2P
Network types and shapes
- Wired networks
- Wireless networks
- Topologies
Network protocols
- TCP/IP and UDP
- HTTP and HTTPs
- FTP, Ethernet, Wi-Fi
- Email Protocols
TCP/IP Layers
- Application Layer
- Transport Layer
- Network Layer
- Data Link Layer
Network security
- Importance of security
- Authentication methods
- Encryption
- Firewalls
- MAC filtering
Cyberattacks
- Phishing
- Pharming
- Fraud
- Identity theft
Preventing vulnerabilities
- Software design
- Software testing
- Network testing
- Tools
- Policy
The Internet
- ISP
- URL/IP address
- DNS
- Websites
- Hosting
- The Cloud
- HTML
- HTTP/S
6: The Bigger Picture
Ethics
- Professionalism
- Privacy
- Inclusion
The Environment
- E-Waste
- Recycling
- Energy use
- Carbon footprints
Legislation
- Data Protection Act
- Computer Misuse Act
- Copyright & Patents
- Communication Acts
- Health and Safety
Open source software
- Open Source
- Closed Source
- Creative Commons