OCR 9-1 (J277) GCSE Computer Science
First teaching 2020, first examination 2022
1.1.1 Architecture of the CPU
- Computer system
 - Input, process, output, storage
 - Data bus
 
- Control unit
 - ALU
 - Registers
 - Cache
 
- Von Neumann architecture
 - MAR & MDR
 - Program Counter
 - Accumulator
 
- Registers involved
 - Fetch, decode, execute cycle
 
1.1.3 Embedded systems
- Introduction
 - Features
 - Microcontroller
 
1.2.2 Secondary storage
- Common types of storage
 - Suitable devices
 - How to choose
 
1.2.4 Data storage
- Number systems
 - Digit position
 - Converting between binary/denary
 - Adding binary
 - Binary shift
 - Binary overflow
 
- Hex symbols
 - Converting between binary/hexadecimal
 - Converting between denary / hexadecimal
 
- ASCII
 - Character sets
 - Unicode
 
- Storing pixels
 - Meta data
 - Quality of image
 - Size of image file
 
- What is sound
 - Sample rate
 - Bit depth
 - Size of sound file
 
- Lossy compression
 - Lossless compression
 
1.3.1 Networks and topologies
- What is a network
 - Home network
 - Business network/denary
 - LAN
 - WAN
 
- Bandwidth
 - Number of users
 - Latency
 - Error rate
 - Wi-Fi performance
 
- Client - Server
 - Peer-to-peer
 
- NIC
 - Hub
 - Switch
 - Router
 - Transmission media
 - WAP and Wi-Fi
 
- DNS
 - Hosting
 - Cloud
 - Web servers and clients
 
- Star topology
 - Mesh topology
 
1.3.2 Networks, protocols and layers
- Wired - Ethernet
 - Wireless - Wi-Fi
 - Wireless - Bluetooth
 
- Encryption methods
 - Symmetric
 - Public - Private key
 
- IP addressing
 - MAC addressing
 
- TCP/IP
 - HTTP
 - HTTPS
 - FTP
 - POP
 - IMAP
 - SMTP
 - Layer concept
 
1.4.1 Network threats
- Malware
 - Social engineering,phishing
 - Brute force attack
 - Denial of Service
 - Data interception
 - SQL injection
 
1.4.2 Prevention methods
- Penetration testing
 - Anti-malware software
 - Firewalls
 - User-access rights
 - Passwords
 - Encryption
 - Physical security
 
1.5.1 Operating systems
- User interface
 - Memory management, multitasking
 - Peripheral management and drivers
 - User management
 - File management
 
1.5.2 Utility software
- Encryption software
 - Defragmentation
 - Data compression
 
1.6.1 Ethical Legal
- Digital divide
 - Genetic screening
 - Whistleblowers
 - Drones
 - Self-driving cars
 
- E-waste
 - Sustainability
 - Recycling
 - Energy
 - Earth monitoring
 - The stakeholders
 
- DNA profiling
 - National ID cards
 - CCTV
 - Electronic tracking
 - Earth monitoring
 - Personal data
 - Stakholder perspective
 
- Anonimity issues
 - Use of social media
 - Health issues arising
 - Citizen journalism
 - Making popular videos
 
- The Data Protection Act 2018
 - Computer Misuse Act 1990
 - Copyright Designs & Patents Act 1988
 - Software licences - open, proprietary
 
2.1.2 Computational thinking
- Abstraction
 - Decomposition
 - Algorithmic thinking
 - Structure diagrams
 - Abstraction practice
 - Input-process-output practice
 - Decomposition practice
 - Algorithm practice
 - Pattern recognition practice
 
Writing pseudocode (including Python practice)
- Pseudocode
 - Practice activities
 - Exam Reference language
 - Python practice
 
- Flowcharts
 - Practice activities
 
2.1.3 Searching and sorting algorithms
- Binary search
 - Linear search
 
- Bubble sort
 - Merge sort
 - Insertion sort
 - Practice questions
 
2.2.1 Programming Fundamentals
- Variables
 - Constants
 - Operators
 - Assignments
 - Input Output
 
- One dimenstion
 - Two dimension
 - Static
 - Dynamic
 - Array functions
 
- Sequence
 - Selection
 - Iteration
 - Conditionals - IF
 - Conditionals - CASE
 - WHILE iteration
 - DO iteration
 - FOR iteration
 
2.2.3 Additonal programming
- Assignment
 - Concatenate
 - Traversal
 - Search
 - Copy
 
- Open
 - Read
 - Write
 - Close
 
- Records
 - SQL
 - SELECT
 - WHERE
 - FROM
 
- Repeating code
 - Subprocedures
 - Functions
 - Code library
 
- Use of random numbers
 - Python worked example
 - Python files in zip
 
2.3.1 Defensive design methods
- User interface choice
 - Screen widgets
 - Repeat data entry
 - Input boxes
 - Validation
 - Authentication
 
- Comments
 - Headers
 - Whitespace
 - Indentation
 - Naming
 
2.3.2 Identify syntax and logic errors
- Logic errors
 - Syntax errors
 - Arithmetic order
 - Debugging tools
 - Runtime errors
 - Authentication
 
- Test plan
 - Test data
 - Black box strategy
 - White box strategy
 - Iterative testing
 - Final testing
 
2.5.1 & 2.5.2 Languages & IDE
- Machine code
 - Assembly language
 - High level language
 - Translator
 - Compilers
 - IDE features
 
