teach-ict.com logo

THE education site for computer science and ICT

AQA 9-1 (8520) GCSE Computer Science

The material on this site is not endorsed by the AQA examination board. We do not guarantee that it covers all of the relevant theory that is required for the examination. Please refer to the 8520 syllabus to ensure that you are covering the material to the standard required.

GCSE 9-1 AQA 8520 Computer Science

3.1

Fundamentals of algorithms

3.1.1

Representing algorithms

Computational thinking

Flowcharts

Pseudocode

3.1.2 - 3.1.4

Types of algorithms

Algorithm efficiency

Searching algorithms

Sorting algorithms

3.2

Programming

3.2.1 - 3.2.6

Programming components

Data types

Variables and constants

Operators

Sequence, selection, iteration

Data Structures

Arrays & Records

3.2.7 - 3.2.10

Processes

File handling

String handling

Random number generation

Subroutines

3.2.11 - 3.2.13

Writing programs

Structured programming

Validation and authentication

Programming languages

3.3

Fundamentals of data representation

3.3.1 - 3.3.4

Representing numbers

Denary and Binary

Hexadecimal

Units and prefixes

3.3.5 - 3.3.7

Creating files

Character sets

Images

Sound

3.3.8

Compression

Compression

Huffman Encoding

Run Length Encoding

3.4

Computer Systems

3.4.1 Hardware and Software

Hardware, software and computer systems

3.4.2 Boolean Logic

Boolean logic

3.4.3 Software Classification

Application and system software

Operating systems

3.4.4

Systems Architecture: CPU

Parts of a CPU and Von Neumann architecture

CPU performance

Fetch-Execute cycle

3.4.4

Systems Architecture: Memory

Types of memory

Secondary storage (including cloud storage)

Embedded systems

 

 

 

3.5

Networks

 

 

 

 

 

 

Networks

 

 

 

Purpose of networks

PANs, LANs and WANs

Wired vs wireless

Network topologies

Network protocols

Network security

Four Layer Model

3.6

Cyber security

 

3.6.1

Cyber security threats

Introduction to Cyber-security

Social engineering

Malware

3.6.2

Prevention

Prevention

Penetration testing

3.7

Societal impact

Ethical impact

Legal impact

Environmental impact