AQA (8525) GCSE Computer Science
              3.1.1 Representing algorithms
			  3.1.2–3.1.4 Using algorithms
              3.2.1–3.1.6 Programming
              3.2.7–3.2.10 Processes
              3.2.11–3.2.13 Writing Programs
              3.3.1–3.3.4 Representing numbers
              3.3.5–3.3.7 Creating files
              3.3.8 Compression
				
			  3.4.1 Hardware and software
			  3.4.2 Boolean logic
			  3.4.3 Software classification
			  3.4.4a The CPU
			  3.4.4b Memory and storage
				
			  3.5.1 Networks		
				
			  3.6.1 Cyber-threats				
			  3.6.2 Prevention	
				
			  3.7.1 Databases	
				
			  3.8.1 Societal impact				
            
			  
			  
			  
            3.1.1: Representing algorithms
                    Computational thinking
                    
					
                  - Decomposition
 - Pattern recognition
 - Abstraction
 - Algorithms
 
                    Flowcharts
                    
					
                  - Standard shapes
 - Algorithms
 
                    Pseudocode
                    
	
			    - Syllabus pseudocode
 
3.1.2–3.1.4: Using algorithms
                    Algorithm efficiency
                    
					
                  - Time efficiency
 - Space efficiency
 
                    Searching algorithms
                    
					
                  - Linear search
 - Binary search
 
                    Sorting algorithms
                    
					
                - Bubble sort
 - Merge sort
 
3.2.1–3.2.6: Programming components
                    Data types
                    
					- Character
 - String
 - Integer
 - Real
 - Boolean
 
                    Variables and constants
                    
					- Naming
 - Assigning
 - Uses
 
                    Operators
                    
					- Arithmetic
 - Boolean
 - Relational
 
                    Sequence, selection, iteration
                    
					- IF
 - WHILE
 - CASE
 - REPEAT
 - FOR
 - Nesting
 
                    Data structures
                    
					- List
 - Linked List
 - Dictionary
 - Tuple
 
                    Arrays and records
                    
					
					
				  
				- 1D Array
 - 2D Array
 - Array operations
 - Records
 
3.2.7–3.2.10: Processes
                    File handling
                    
					- Open
 - Close
 - Read
 - Write
 
                    String handling
                    
					- Storage
 - Search
 - Properties
 - Type casting
 - Character codes
 
                    Random number generation
                    
					- Random integers
 - Python examples
 - Uses
 
                    Subroutines
                    
					
					
				  
				- Coding
 - Functions
 - Scope
 - Uses
 
3.2.11–3.2.13: Writing programs
                    Structured programming
                    
					- Planning
 - Iteration
 - Subroutines and Functions
 - Modules & Scope
 - Python Examples
 
                    Validation and authentication
                    
					- Length check
 - Range check
 - Authentication
 - Test Data
 - Python Examples
 
                    Programming languages
                    
					
					
				  
				- Machine code
 - Low Level
 - High level
 - Translators, Assemblers
 - Compiler, Interpreters
 
3.3.1–3.3.4: Representing numbers
                    Binary and denary
                    
					- Number systems
 - Denary to Binary
 - Binary to Denary
 - Binary Addition
 - Binary Shift
 
                    Hexadecimal
                    
					- Uses
 - Denary to Hex
 - Hex to Denary
 - Hex to Binary
 - Binary to Hex
 
                    Units and prefixes
                    
					
					
				  
				- Bit, Byte, Nibble
 - Kilobyte to Petabyte
 
3.3.5–3.3.7: Creating files
                    Character sets
                    
					- ASCII
 - Extended ASCII
 - Character Sets
 - Unicode
 
                    Images
                    
					- Pixels
 - Grayscale
 - Colour Depth
 - Files size
 
                    Audio
                    
					
					
				  
				- Sampling
 - Sampling frequency
 - Bit Depth, Bit Rate
 - Channels
 - Metadata
 
3.3.8: Compression
                    Compression
                    
					- Lossy compression
 - Lossless compression
 - Dictionary compression
 - Images, Video, Music
 
                    Huffman encoding
                    
					- Binary Tree
 - The concept of it
 - Encoding
 
                    Run-length encoding
                    
					
					
				  
				- RLE data format
 - RLE & Images
 - RLE & Text
 
3.4.1: Hardware and software
                    Introduction to computer systems
                    
					
				- Computer System
 - Hardware
 - Software
 
3.4.2: Boolean logic
                    Boolean logic
                    
					
					
				  
				- Logic gates
 - Logic circuits
 - Truth tables
 
3.4.3: Software classification
                    Software types
                    
					- System Software
 - Application Software
 
                    Operating systems
                    
					
					
				  
				- Purpose
 - Kernel
 - User Interface
 - Device Drivers
 - Multitasking
 
3.4.4a: Systems architecture: the CPU
                    CPU architecture
                    
					- What is the CPU?
 - ALU, Control Unit
 - Clock, Buses
 - Von Neumann
 
                    CPU performance
                    
					- Cache
 - Cores
 - Overclocking
 - Parallel processing
 
                    Fetch-Execute cycle
                    
					
					
				  
				- Hardware used
 - Steps in the cycle
 
3.4.4b: Systems architecture: Memory and storage
                    Main memory
                    
					- RAM Random Access
 - DRAM and SRAM
 - ROM Read Only
 
                    Secondary storage
                    
					- Magnetic
 - Optical
 - Solid State
 - Cloud
 
                    Embedded systems
                    
					
					
				  
				- Definition
 - Sensors
 - Analog-Digital converter
 - Actuators
 
3.5.1: Networks
                    Network scale
                    
					- Personal Area Networks
 - Local Area Networks at home
 - Local Area Networks in business
 - Wide Area Networks
 
                    Network types and shapes
                    
					- Wired, Wireless networks
 - Star, Bus topology
 - Star & Bus animations
 - Network Builder
 
                    Network protocols
                    
					- TCP/IP and UDP
 - HTTP and HTTPs
 - FTP, Ethernet, Wi-Fi
 - Email Protocols
 
                    Network security
                    
					- Importance of security
 - Authentication methods
 - Encryption
 - Firewalls
 - MAC filtering
 
                    Four layer model
                    
					
					
				  
				- Application Layer
 - Transport Layer
 - Network Layer
 - Data Link Layer
 
3.6.1: Cyber security threats
                    Introduction to cyber-security
                    
					- What is it
 - Why is it important
 - Malicious code
 - Social engineering
 - Prevention
 
                    Penetration testing
                    
					- White box testing
 - Black box testing
 
                    Social engineering
                    
					- What is social engineering?
 - Phishing
 - Pharming
 - Blagging
 - Other social attacks
 
                    Malware
                    
					
					
				  
				- Viruses and Worms
 - Browser malware
 - Other malware types
 
3.6.2: Preventing cyber-threats
                    Authentication
                    
					
					
				  
				- Typical threats
 - Strong Passwords
 - Biometric authentication
 - CAPTCHA
 - Email confirmation
 - Software updates
 
3.7.1: Databases
                    Databases
                    
					
					
				  
				- Definition
 - Flat-file
 - Relational
 - Management
 
3.8.1: Societal impact
                    Ethics
                    
					- Internet
 - Social media
 - Digital divide
 - Whistleblowing
 - Self driving cars
 - Genetic screening
 - Drone use
 
                    Culture
                    
					- Anonymity
 - Citizen Journalism
 - Military Drones
 - Health & Technology
 - Social Network Impacts
 
                    Legislation
                    
					- Data Protection Act
 - Computer Misuse Act
 - Copyright & Patents
 - Freedom of Information Act
 
                    The Environment
                    
					- E-Waste
 - Sustainability
 - Recycling
 - Energy use
 - Data Centres
 - Monitoring
 - Stakeholders
 
                    Open source software
                    
					- Open Source
 - Closed Source
 - Creative Commons
 
                    Privacy
                    
					
					
				  
				- DNA profiling
 - ID Cards
 - CCTV
 - Tracking
 - Personal Data
 - Stakeholders