AQA GCSE Computer Science PLC

Similar documents
Switching to AQA from OCR

Switching to AQA from Edexcel

GCSE Computer Science for OCR Overview Scheme of Work

OCR GCSE (9-1) Computer Science J276 Accompanying Instructional Document

OCR J276 (9-1) GCSE Computer Science

HASTINGS HIGH SCHOOL

Autumn 1 Autumn 2 Spring 1 Spring 2 Summer 1 Summer 2. networks. environmental concerns. Knowledge and skills covered: Knowledge and skills covered:

Computing 1: Computer Systems

Edexcel GCSE in Computer Science Microsoft IT Academy Mapping

COMPUTING SUBJECT KNOWLEDGE AUDIT

Year 10 OCR GCSE Computer Science (9-1)

AQA GCSE (9-1) Computer Science. S Robson and PM Heathcote

OCR J276 GCSE Computer Science

GCSE Subject Level Conditions and Requirements for Computer Science May 2015

Learning objectives. Computer principles The characteristics of contemporary processors, input, output and storage devices

Unit 2: Technology Systems

OCR GCSE Computing Learning Grids H/W

elc International School

COURSE OUTLINE COMPUTER SCIENCE GENERAL YEAR 12: 2019 UNIT 3 AND UNIT 4

Learning Programme Fundamentals of data representation AS Level

SAMPLE COURSE OUTLINE COMPUTER SCIENCE GENERAL YEAR 12

ICT & Computing Progress Grid

Computer Science Curriculum Content, KS5

Computer Systems. IGCSE OCR AQA Edexcel Understand the term. embedded system and how an Purpose of embedded system

Systems Architecture. Systems Architecture. Memory. Memory. Memory. Memory. The Purpose and Function. The Purpose and Function

2c. Content of Computer systems (Component 01)

Department Curriculum and Assessment Outline

CSC 170 Fall 2017 Dr. R. M. Siegfried. Study Guide for Final Exam

Southam College Computing & ICT Department. Summer Project

AQ A G C S E 9-1 C O M P U T E R S C I E N C E R E V I S I O N G U I D E M U R P H Y V I A A M A Z O N

This document contains additional questions; it is not intended to be treated as a complete paper.

WYSE Academic Challenge Computer Fundamentals Test (State Finals)

Computing at Cox Green Curriculum Plan. Key Stage 3 Year 7

INTRODUCTION TO COMPUTERS

OHIO ASSESSMENTS FOR EDUCATORS (OAE) FIELD 010: COMPUTER INFORMATION SCIENCE

I1100 E Introduction to computer.

BCS Higher Education Qualifications. Level 4 Certificate in IT. Computer Network Technology Syllabus

IB Computer Science Topic.2-

Information Science 1

Syllabus for Computer Science General Part I

Chapter 1. Data Storage Pearson Addison-Wesley. All rights reserved

Dawood Public School Course Outline Computer Science

National 5 Computing Science Software Design & Development

GIRLS SECONDARY, L-IMRIEĦEL HALF YEARLY EXAMINATIONS 2015/2016

DUMBARTON ACADEMY NATIONAL 5 COMPUTING SCIENCE REVISION

Dawood Public School Course Outline Computer Science Class XI

CSIBridge: Computer Science for Digital Forensics and Cyber Security

understand the need for input and output devices describe suitable output devices for a wide range of computer controlled situations

Aryan College. Computer Fundamental. Introduction to Computer System

GCSE Computer Science Revision and Workbook

Dawood Public School Course Outline Computer Science Class XI

GCSE Computer Science Component 02

2nd Paragraph should make a point (could be an advantage or disadvantage) and explain the point fully giving an example where necessary.

Introduction to Computers. Joslyn A. Smith

University of Southern California EE450: Introduction to Computer Networks

Assignment - 1 Chap. 1 Wired LAN s

Defining Computers. Defining Computers. Understanding Essential Computer Concepts

Electricity: Voltage. Gate: A signal enters the gate at a certain voltage. The gate performs operations on it, and sends it out was a new signal.

GCSE Computer Science

HARDWARE AND OPERATING SYSTEMS

GCSE Computer Science

All Rights Reserved Index No. SCHOOL OF ACCOUNTING AND BUSINESS BSc. (APPLIED ACCOUNTING) GENERAL / SPECIAL DEGREE PROGRAMME

OCR J276 GCSE Computer Science

Lymm High School- KS3 Life after levels - Computing & ICT

COURSE OUTLINE APPLIED INFORMATION TECHNOLOGY GENERAL YEAR 12: 2018 UNIT 3 AND UNIT 4

COMPUTER SCIENCE UNIT 1: Understanding Computer Science

A Level Computing. Course Content Checklist. Name: Tutor Group: Teaching Group: Target Grade: Page 1 of 38

Textbook Charles Petzold, Programming Windows, 5th edition, Microsoft Press. References - other textbooks or materials none

An Overview of the Computer System. Kafui A. Prebbie 24

Computer Basics 1/6/16. Computer Organization. Computer systems consist of hardware and software.

N5 Computing Science - Revision

Experimental Methods I

Topics. Hardware and Software. Introduction. Main Memory. The CPU 9/21/2014. Introduction to Computers and Programming

Curriculum Catalog

«Computer Science» Requirements for applicants by Innopolis University

COURSE OUTLINE & WEEK WISE BREAKAGE

Computer Basics 1/24/13. Computer Organization. Computer systems consist of hardware and software.

N5 Computing Science - Solutions

Computer Systems. Communication (networks, radio links) Meatware (people, users don t forget them)

Year 8 Computing New Levels (Progress Pathways) Content and Concepts (depth of understanding and application) Computational Thinking

Stewards Pooi Kei College Secondary 4 Information and Communication Technology Teaching Schedule ( )

KINGS COLLEGE OF ENGINEERING DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING B.E. ECE UNIT I DATA COMMUNICATION PART A

Homeschool Enrichment. The System Unit: Processing & Memory

Computer Programming IA

8. A is approximately one billion bytes a. Kilobyte b. Bit c. Gigabyte d. Megabyte 9. SMPT, FTP and DNS are applications of the layer a. Data link b.

Angel International School - Manipay 2 nd Term Examination March, 2016 Computing

OCR Level 3 Advanced GCE in Computer Science (H446)

Computer Architecture and Assembly Language. Spring

COMPUTER SYSTEM. COMPUTER SYSTEM IB DP Computer science Standard Level ICS3U. COMPUTER SYSTEM IB DP Computer science Standard Level ICS3U

GUIDANCE FOR TEACHING

Networking interview questions

Intermediate Programming & Design (C++) Notation

Level 2: The Hardware World Chapters 4 and 5 (topics of other cs courses)

CompTIA A+ Accelerated course for & exams

Example 1: Denary = 1. Answer: Binary = (1 * 1) = 1. Example 2: Denary = 3. Answer: Binary = (1 * 1) + (2 * 1) = 3

Stonelaw High School. Computing Science. BGE - Computer Systems

Bits and Bit Patterns

ST. MARY S COLLEGE FORM 4

Total No. of Questions : 18] [Total No. of Pages : 02. M.Sc. DEGREE EXAMINATION, DEC First Year INFORMATION TECHNOLOGY.

Cambridge International General Certificate of Secondary Education 0478 Computer Science June 2015 Principal Examiner Report for Teachers

Transcription:

1 - Fundamentals of Algorithms Useful Websites BBC Bite Size Cambridge GCSE Exam Dates https://www.bbc.co.uk/education/subjects/z34k7ty Paper 1 14/05/2018 am https://www.cambridgegcsecomputing.org/ Paper 2 17/05/2018 pm AQA GCSE Computer Science PLC Week Beginning Revision Guide (zig zag) Section Topic AQA Learning Objective 1 Understand and explain the term algorithm. 2 Understand and explain the term decomposition. 3 Understand and explain the term abstraction. Representing algorithms Efficiency of algorithms Searching algorithms Sorting algorithms Data types Programming concepts 4 Use a systematic approach to problem solving and algorithm creation representing those algorithms using pseudo-code and flowcharts. 5 Explain simple algorithms in terms of their inputs, processing and outputs. 6 Determine the purpose of simple algorithms 7 Understand that more than one algorithm can be used to solve the same problem. Compare the efficiency of algorithms explaining how some algorithms are more 8 efficient than others in solving the same problem. 9 Understand and explain how the linear search algorithm works. 10 Understand and explain how the binary search algorithm works. 11 Compare and contrast linear and binary search algorithms. 12 Understand and explain how the merge sort algorithm works. 13 Understand and explain how the bubble sort algorithm works. 14 Compare and contrast merge sort and bubble sort algorithms. 15 Understand the concept of a data type Understand and use the following appropriately: integer real Boolean 16 character string. Use, understand and know how the following statement types can be combined in programs: Variable Declaration Constant declaration 17 Assignment Iteration 15/01/2017 22/01/2017 Test 1 Pages 14-18 Test 2 Pages 19-22 Test 3

2 - Programming Programming concepts Selection Subroutine (procedure / function) Use definite and indefinite iteration, including indefinite iteration with the 18 condition(s) at the start or the end of the iterative structure. 19 Use nested selection and nested iteration structures. 20 Use meaningful identifier names and know why it is important to use them. 29/01/2018 Test 3 Pages 39-41 Relational operations in a programming language 21 Be familiar with and be able to use: equal to not equal to less than greater than less than or equal to greater than or equal to. Boolean operations in a programming language Data structures Input / output and file handling 22 Be familiar with and be able to use: NOT AND OR. 23 Understand the concept of data structures. 24 Use arrays (or equivalent) in the design of solutions to simple problems. 25 Use records (or equivalent) in the design of solutions to simple problems. 26 Be able to obtain user input from the keyboard 27 Be able to output data and information from a program to the computer display. 28 Be able to read/write from/to a text file String handling operations in a programming language 29 Understand and be able to use: length position substring concatenation convert character to character code convert character code to character string conversion operations. Random number generation in a programming language 30 Be able to use random number generation. 05/02/2018 Test 4 Pages 42-44 Subroutines (procedures and functions) Structured 31 Understand the concept of subroutines 32 Explain the advantages of using subroutines in programs. 33 Describe the use of parameters to pass data within programs. 34 Use subroutines that return values to the calling routine. 35 Know that subroutines may declare their own variables, called local variables, and that local variables usually: only exist while the subroutine is executing are only accessible within the subroutine. 36 Use local variables and explain why it is good practice to do so 37 Describe the structured approach to programming.

ata Representation programming Robust and secure programming Classification of programming languages Number bases 38 Explain the advantages of the structured approach. 39 Be able to write simple data validation routines 40 Be able to write simple authentication routines. 41 Be able to select suitable test data that covers normal (typical), boundary (extreme) and erroneous data. Be able to justify the choice of test data. Know that there are different levels of programming language: low-level 42 language high-level language. Explain the main differences between low-level and high-level languages. 43 Know that machine code and assembly language are considered to be low-level languages and explain the differences between them. 44 Understand the advantages and disadvantages of low-level language programming compared with high-level language programming. 45 Understand the following number bases: decimal (base 10) binary (base 2) hexadecimal (base 16). 46 Understand that computers use binary to represent all data and instructions. 12/02/2018 Test 5 Pages 45-47 Converting between number bases Units of information Binary arithmetric Character encoding 47 Explain why hexadecimal is often used in computer science. 48 Understand how binary can be used to represent whole numbers. 49 Understand how hexadecimal can be used to represent whole numbers. 50 Be able to convert in both directions between: binary and decimal binary and hexadecimal decimal and hexadecimal. 51 Know that: a bit is the fundamental unit of information a byte is a group of 8 52 bits. Know that quantities of bytes can be described using prefixes. Know the names, symbols and corresponding values for the decimal prefixes: kilo, 1 kb is 1,000 bytes mega, 1 MB is 1,000 kilobytes giga, 1 GB is 1,000 Megabytes tera, 1 TB is 1,000 Gigabytes. 53 Be able to add together up to three binary numbers. 54 Be able to apply a binary shift to a binary number. 55 Describe situations where binary shifts can be used. 56 57 58 Understand what a character set is and be able to describe the following character encoding methods: 7-bit ASCII Unicode. Understand that character codes are commonly grouped and run in sequence within encoding tables. Describe the purpose of Unicode and the advantages of Unicode over ASCII. Know that Unicode uses the same codes as ASCII up to 127. 19/02/2018 Test 6 Pages 59-108

ms 3 - Fundamentals of Da Represenging images 59 Understand what a pixel is and be able to describe how pixels relate to an image and the way images are displayed 60 Describe the following for bitmaps: size in pixels colour depth. 61 Describe how a bitmap represents an image using pixels and colour depth. 62 Describe using examples how the number of pixels and colour depth can affect the file size of a bitmap image. 63 Calculate bitmap image file sizes based on the number of pixels and colour depth. 64 Convert binary data into a black and white image. 65 Convert a black and white image into binary data. 66 Understand that sound is analogue and that it must be converted to a digital form for storage and processing in a computer. 26/02/2018 Test 7 Pages 62-65 Representing sound 67 Understand that sound waves are sampled to create the digital version of sound. 68 Describe the digital representation of sound in terms of: sampling rate sample resolution. 69 Calculate sound file sizes based on the sampling rate and the sample resolution. Data compression Hardware and software Boolean logic Software classification 70 Explain how data can be compressed using Huffman coding. Be able to interpret Huffman trees. Be able to calculate the number of bits required to store a piece of data 71 compressed using Huffman coding. Be able to calculate the number of bits required to store a piece of uncompressed data in ASCII. 72 Explain how data can be compressed using run length encoding (RLE). 73 Represent data in RLE frequency/data pairs 74 Define the terms hardware and software and understand the relationship between them. 75 Construct truth tables for the following logic gates: NOT AND OR. 76 Construct truth tables for simple logic circuits. Interpret the results of simple truth tables. 77 Create, modify and interpret simple logic circuit diagrams. 78 Explain what is meant by: system software application software. Give examples of both types of software. Understand the need for, and functions of, operating systems (OS) and utility 79 programs. Understand that the OS handles management of the: processor(s) memory I/O devices applications security. 80 Explain the Von Neumann architecture 05/03/2017 Test 8 Pages 76-78

5 - Fundamentals of Computer Networks 4 - Computer System Systems architecture Fundamentals of computer networks Explain the role and operation of main memory and the following major 81 components of a central processing unit (CPU): arithmetic logic unit control unit clock bus. 82 Explain the effect of the following on the performance of the CPU: clock speed number of processor cores cache size cache type. 83 Understand and explain the Fetch-Execute cycle. 84 Understand the differences between main memory and secondary storage. Understand the differences between RAM and ROM. 85 Understand why secondary storage is required. 86 Be aware of different types of secondary storage (solid state, optical and magnetic). Explain the operation of solid state, optical and magnetic storage. Discuss the advantages and disadvantages of solid state, optical and magnetic storage. 87 Explain the term 'cloud storage'. 88 Explain the advantages and disadvantages of cloud storage when compared to local storage. 89 Understand the term 'embedded system' and explain how an embedded system differs from a non-embedded system. 90 Define what a computer network is. Discuss the benefits and risks of computer networks. 91 Describe the main types of computer network including: Personal Area Network (PAN) Local Area Network (LAN) Wide Area Network (WAN) 92 Understand that networks can be wired or wireless. Discuss the benefits and risks of wireless networks as opposed to wired networks. 93 Explain the following common network topologies: star bus. 94 Define the term network protocol. 95 Explain the purpose and use of common network protocols including: Ethernet Wi-Fi TCP (Transmission Control Protocol) UDP (User Datagram Protocol) IP (Internet Protocol) HTTP (Hypertext Transfer Protocol) HTTPS (Hypertext Transfer Protocol Secure) FTP (File Transfer Protocol) email protocols: SMTP (Simple Mail Transfer Protocol) IMAP (Internet Message Access Protocol). 96 Understand the need for, and importance of, network security. 97 Explain the following methods of network security: authentication encryption firewall MAC address filtering. 98 Describe the 4 layer TCP/IP model: application layer transport layer network layer data link layer 12/03/2017 Test 9 Pages 79-81 19/03/2017 Test 10 Pages 87 and 88 26/03/2017 Test 10 Pages 89 and 90

7 - Ethical, Legal and Environment 6 - Fundamentals of Cyber Security Fundamentals of cyber security Cyber security threats Social engineering Malicious code Methods to detect and prevent cyber security threats 99 Understand that the HTTP, HTTPS, SMTP, IMAP and FTP protocols operate at the application layer. 100 Understand that the TCP and UDP protocols operate at the transport layer 101 Understand that the IP protocol operates at the network layer. 102 Be able to define the term cyber security and be able to describe the main 103 purposes of cyber security Understand and be able to explain the following cyber security threats: social engineering techniques malicious code weak and default passwords misconfigured access rights removable media unpatched and/or outdated software. 104 Explain what penetration testing is and what it is used for. 105 Define the term social engineering. 106 Describe what social engineering is and how it can be protected against. 107 Explain the following forms of social engineering: blagging (pretexting) phishing pharming shouldering (or shoulder surfing). 108 Define the term 'malware'. 109 Describe what malware is and how it can be protected against. Describe the following forms of malware: computer virus trojan spyware 110 adware. Understand and be able to explain the following security measures: biometric measures (particularly for mobile devices) password systems CAPTCHA (or 111 similar) using email confirmations to confirm a user s identity automatic software updates. 02/04/2017 Test 11 Pages 95 and 96 09/04/2017 Test 11 Pages 97-98 Ethical, legal and environmental impacts of digital technology on wider society, including issues of privacy 112 Explain the current ethical, legal and environmental impacts and risks of digital technology on society. Where data privacy issues arise these should be considered. 23/04/2017 Test 12 Pages 104-106 30/04/2017 Test 13 Pages 107-108 07/05/2017 Test 13 Pages 109-110