AQA 7516 AS Computer Science
3.1 Fundamentals
- Character
- Integer
- Real
- Boolean
- Arrays
- Date and Time
- User defined
- Variables
- Constants
- Assignment
- Arithmetic
- Boolean
- Relational
- Sequence
- Iteration
- Selection
- IF, CASE
- WHILE, FOR, REPEAT
- Uses of random numbers
- Python random() function
- Python Lottery picker example
- Assigning
- Storage
- Position, length
- Casting, Search
- Character codes and functions
- Repeating code
- Building procedures
- Using procedures
- Functions
- Variable Scope, code libraries, organising code
- Top-Down design
- Hierarchy charts
- Using procedures
- Functions and subroutines
- Variable Scope
- Python examples
3.2 Data Structures
- One dimension
- Uses
- Two dimensions
- Array Functions
- Records
- Read \ Write file
- Binary file
1.2.2 Secondary storage
- Common types of storage
- Suitable devices
- How to choose
1.2.4 Data storage
- Number systems
- Digit position
- Converting between binary/denary
- Adding binary
- Binary shift
- Binary overflow
- Hex symbols
- Converting between binary/hexadecimal
- Converting between denary / hexadecimal
- ASCII
- Character sets
- Unicode
- Storing pixels
- Meta data
- Quality of image
- Size of image file
- What is sound
- Sample rate
- Bit depth
- Size of sound file
- Lossy compression
- Lossless compression
1.3.1 Networks and topologies
- What is a network
- Home network
- Business network/denary
- LAN
- WAN
- Bandwidth
- Number of users
- Latency
- Error rate
- Wi-Fi performance
- Client - Server
- Peer-to-peer
- NIC
- Hub
- Switch
- Router
- Transmission media
- WAP and Wi-Fi
- DNS
- Hosting
- Cloud
- Web servers and clients
- Star topology
- Mesh topology
1.3.2 Networks, protocols and layers
- Wired - Ethernet
- Wireless - Wi-Fi
- Wireless - Bluetooth
- Encryption methods
- Symmetric
- Public - Private key
- IP addressing
- MAC addressing
- TCP/IP
- HTTP
- HTTPS
- FTP
- POP
- IMAP
- SMTP
- Layer concept
1.4.1 Network threats
- Malware
- Social engineering,phishing
- Brute force attack
- Denial of Service
- Data interception
- SQL injection
1.4.2 Prevention methods
- Penetration testing
- Anti-malware software
- Firewalls
- User-access rights
- Passwords
- Encryption
- Physical security
1.5.1 Operating systems
- User interface
- Memory management, multitasking
- Peripheral management and drivers
- User management
- File management
1.5.2 Utility software
- Encryption software
- Defragmentation
- Data compression
1.6.1 Ethical Legal
- Digital divide
- Genetic screening
- Whistleblowers
- Drones
- Self-driving cars
- E-waste
- Sustainability
- Recycling
- Energy
- Earth monitoring
- The stakeholders
- DNA profiling
- National ID cards
- CCTV
- Electronic tracking
- Earth monitoring
- Personal data
- Stakholder perspective
- Anonimity issues
- Use of social media
- Health issues arising
- Citizen journalism
- Making popular videos
- The Data Protection Act 2018
- Computer Misuse Act 1990
- Copyright Designs & Patents Act 1988
- Software licences - open, proprietary
2.1.2 Computational thinking
- Abstraction
- Decomposition
- Algorithmic thinking
- Structure diagrams
- Abstraction practice
- Input-process-output practice
- Decomposition practice
- Algorithm practice
- Pattern recognition practice
- Pseudocode
- Practice activities
- Exam Reference language
- Flowcharts
- Practice activities
2.1.3 Searching and sorting algorithms
- Binary search
- Linear search
- Bubble sort
- Merge sort
- Insertion sort
- Practice questions
2.2.1 Programming Fundamentals
- Variables
- Constants
- Operators
- Assignments
- Input Output
- One dimenstion
- Two dimension
- Static
- Dynamic
- Array functions
- Sequence
- Selection
- Iteration
- Conditionals - IF
- Conditionals - CASE
- WHILE iteration
- DO iteration
- FOR iteration
2.2.3 Additonal programming
- Assignment
- Concatenate
- Traversal
- Search
- Copy
- Open
- Read
- Write
- Close
- Records
- SQL
- SELECT
- WHERE
- FROM
- Repeating code
- Subprocedures
- Functions
- Code library
- Use of random numbers
- Python worked example
- Python files in zip
2.3.1 Defensive design methods
- User interface choice
- Screen widgets
- Repeat data entry
- Input boxes
- Validation
- Authentication
- Comments
- Headers
- Whitespace
- Indentation
- Naming
2.3.2 Identify syntax and logic errors
- Logic errors
- Syntax errors
- Arithmetic order
- Debugging tools
- Runtime errors
- Authentication
- Test plan
- Test data
- Black box strategy
- White box strategy
- Iterative testing
- Final testing
2.5.1 & 2.5.2 Languages & IDE
- Machine code
- Assembly language
- High level language
- Translator
- Compilers
- IDE features
The material on this site is not endorsed by the AQA examination board. We do not guarantee that it covers all of the relevant theory that is required for the examination. Please refer to the 7516 syllabus to ensure that you are covering the material to the standard required.
