Edexcel GCSE Computer Science
1: Algorithms
                    Computational thinking
                    
					
                  - Decomposition
 - Pattern recognition
 - Abstraction
 
                    Flowcharts
                    
					
                  - Standard shapes
 - Algorithms
 
                    Pseudocode
                    
					
                  - Syllabus pseudocode
 
                    Searching algorithms
                    
					
                  - Linear search
 - Binary search
 
                    Sorting algorithms
                    
					
                - Bubble sort
 - Merge sort
 
2: Programming
                    Data types
                    
					- Character
 - String
 - Integer
 - Real
 - Boolean
 
                    Variables and constants
                    
					- Naming
 - Assigning
 - Uses
 
                    Operators
                    
					- Arithmetic
 - Boolean
 - Relational
 
                    Sequence, selection, iteration
                    
					- IF
 - WHILE
 - CASE
 - REPEAT
 - FOR
 - Nesting
 
                    Data structures
                    
- One-dimensional arrays
 - Two-dimensional arrays
 - Records
 
                    String handling
                    
					- Indexing
 - Length
 - Traversal
 - Concatenation
 - Slicing
 - Casting and coercion
 
                    Subprograms
                    
					- Coding
 - Functions
 - Scope
 - Uses
 
                    Inputs and outputs
                    
					
					- Presence checks
 - Length checks
 - Range checks
 - Lookup checks
 - Reading files
 - Writing files
 
                    Maintainable code
                    
					
					- Comments
 - Headers
 - Whitespace
 - Indentation
 
                    Errors in code
                    
	
						- Logic errors
 - Arithmetic order
 - Syntax errors
 - Run-Time errors
 
                    Testing code
                    
											
				  
				- Test plans
 - Test data
 - Trace tables
 - IDEs
 - Evaluating programs
 
3: Data
                    Binary and denary
                    
					- Number systems
 - Denary to Binary
 - Binary to Denary
 - Binary Addition
 - Binary Shift
 
                    Hexadecimal
                    
					- Uses
 - Denary to Hex
 - Hex to Denary
 - Hex to Binary
 - Binary to Hex
 
                    Units and prefixes
                    
					
					
				  
	
					- Bit, Byte, Nibble
 - Kilobyte to Petabyte
 
                    Text data
                    
					- ASCII
 - Extended ASCII
 - Character Sets
 - Unicode
 
                    Image data
                    
					- Pixels
 - Grayscale
 - Colour Depth
 - Files size
 
                    Audio data
                    
							
					- Sampling
 - Sampling frequency
 - Bit Depth, Bit Rate
 - Channels
 - Metadata
 
                    Compression
                    
					
					- Lossy compression
 - Lossless compression
 - Dictionary compression
 - Images, Video, Music
 
                    Run-length encoding
                    
					- RLE data format
 - RLE & Images
 - RLE & Text
 
                    Encryption and ciphers
                    
					- Purpose
 - Symmetric encryption
 - Asymmetric encryption
 - Caesar Cipher
 
                    Databases: Structure
                    
					- Purpose
 - Parts
 - Flat-file
 - Relational
 - Keys
 
                    Databases: Relationships
                    
				  
				- Entities
 - Attributes
 - E-R diagrams
 
4: Computers
                    Input-Process-Output
                    
					
					- Input
 - Process
 - Software
 - Output
 - Storage
 
                    The CPU
                    
					- Architecture
 - ALU
 - Control Unit
 - Memory
 - Buses
 
                    Fetch-Decode-Execute cycle
                    
					
					- Hardware used
 - Steps in the cycle
 
                    Main memory
                    
					- RAM Random Access
 - DRAM and SRAM
 - ROM Read Only
 - Cache
 
                    Secondary storage
                    
					- Magnetic
 - Optical
 - Solid State
 - Cloud
 
                    Embedded systems
                    
					
									
					- Definition
 - Sensors
 - Analog-Digital converter
 - Actuators
 
                    Boolean logic
                    
										
					
					- Logic gates
 - Logic circuits
 - Truth tables
 
                    Operating systems
                    
					
					- Purpose
 - Kernel
 - User Interface
 - Device Drivers
 - Multitasking
 
                    Utility software
                    
				  - Encryption utilities
 - Defragmentation utilities
 - Compression
 - Backup
 - Information & diagnostics
 
                    Translators and languages
                    
				  
				- Machine code
 - Low Level
 - High level
 - Translators, Assemblers
 - Compiler, Interpreters
 
5: Networks
                    Introduction to networks
                    
					
				  - What is a network?
 - Home networks
 - Business networks
 - LANs/WANs
 - Client-Server/P2P
 
                    Network types and shapes
                    
					- Wired networks
 - Wireless networks
 - Topologies
 
                    Network protocols
                    
					- TCP/IP and UDP
 - HTTP and HTTPs
 - FTP, Ethernet, Wi-Fi
 - Email Protocols
 
                    TCP/IP Layers
                    
				  - Application Layer
 - Transport Layer
 - Network Layer
 - Data Link Layer
 
                    Network security
                    
								
								- Importance of security
 - Authentication methods
 - Encryption
 - Firewalls
 - MAC filtering
 
                    Cyberattacks
                    
								
					- Phishing
 - Pharming
 - Fraud
 - Identity theft
 
                    Preventing vulnerabilities
                    
					- Software design
 - Software testing
 - Network testing
 - Tools
 - Policy
 
                    The Internet
                    
					
				  
				- ISP
 - URL/IP address
 - DNS
 - Websites
 - Hosting
 - The Cloud
 - HTML
 - HTTP/S
 
6: The Bigger Picture
                    Ethics
                    
					
					- Professionalism
 - Privacy
 - Inclusion
 
                    The Environment
                    
					
				  - E-Waste
 - Recycling
 - Energy use
 - Carbon footprints
 
                    Legislation
                    
					- Data Protection Act
 - Computer Misuse Act
 - Copyright & Patents
 - Communication Acts
 - Health and Safety
 
                    Open source software
                    
				
					
				  
				- Open Source
 - Closed Source
 - Creative Commons