Edexcel GCSE Computer Science

1: Algorithms

Computational thinking
  • Decomposition
  • Pattern recognition
  • Abstraction
Flowcharts
  • Standard shapes
  • Algorithms
Pseudocode
  • Syllabus pseudocode
Searching algorithms
  • Linear search
  • Binary search
Sorting algorithms
  • Bubble sort
  • Merge sort

2: Programming

Data types
  • Character
  • String
  • Integer
  • Real
  • Boolean
Variables and constants
  • Naming
  • Assigning
  • Uses
Operators
  • Arithmetic
  • Boolean
  • Relational
Sequence, selection, iteration
  • IF
  • WHILE
  • CASE
  • REPEAT
  • FOR
  • Nesting
Data structures
  • One-dimensional arrays
  • Two-dimensional arrays
  • Records
String handling
  • Indexing
  • Length
  • Traversal
  • Concatenation
  • Slicing
  • Casting and coercion
Subprograms
  • Coding
  • Functions
  • Scope
  • Uses
Inputs and outputs
  • Presence checks
  • Length checks
  • Range checks
  • Lookup checks
  • Reading files
  • Writing files
Maintainable code
  • Comments
  • Headers
  • Whitespace
  • Indentation
Errors in code
  • Logic errors
  • Arithmetic order
  • Syntax errors
  • Run-Time errors
Testing code
  • Test plans
  • Test data
  • Trace tables
  • IDEs
  • Evaluating programs

3: Data

Binary and denary
  • Number systems
  • Denary to Binary
  • Binary to Denary
  • Binary Addition
  • Binary Shift
Hexadecimal
  • Uses
  • Denary to Hex
  • Hex to Denary
  • Hex to Binary
  • Binary to Hex
Units and prefixes
  • Bit, Byte, Nibble
  • Kilobyte to Petabyte
Text data
  • ASCII
  • Extended ASCII
  • Character Sets
  • Unicode
Image data
  • Pixels
  • Grayscale
  • Colour Depth
  • Files size
Audio data
  • Sampling
  • Sampling frequency
  • Bit Depth, Bit Rate
  • Channels
  • Metadata
Compression
  • Lossy compression
  • Lossless compression
  • Dictionary compression
  • Images, Video, Music
Run-length encoding
  • RLE data format
  • RLE & Images
  • RLE & Text
Encryption and ciphers
  • Purpose
  • Symmetric encryption
  • Asymmetric encryption
  • Caesar Cipher
Databases: Structure
  • Purpose
  • Parts
  • Flat-file
  • Relational
  • Keys
Databases: Relationships
  • Entities
  • Attributes
  • E-R diagrams

4: Computers

Input-Process-Output
  • Input
  • Process
  • Software
  • Output
  • Storage
The CPU
  • Architecture
  • ALU
  • Control Unit
  • Memory
  • Buses
Fetch-Decode-Execute cycle
  • Hardware used
  • Steps in the cycle
Main memory
  • RAM Random Access
  • DRAM and SRAM
  • ROM Read Only
  • Cache
Secondary storage
  • Magnetic
  • Optical
  • Solid State
  • Cloud
Embedded systems
  • Definition
  • Sensors
  • Analog-Digital converter
  • Actuators
Boolean logic
  • Logic gates
  • Logic circuits
  • Truth tables
Operating systems
  • Purpose
  • Kernel
  • User Interface
  • Device Drivers
  • Multitasking
Utility software
  • Encryption utilities
  • Defragmentation utilities
  • Compression
  • Backup
  • Information & diagnostics
Translators and languages
  • Machine code
  • Low Level
  • High level
  • Translators, Assemblers
  • Compiler, Interpreters

5: Networks

Introduction to networks
  • What is a network?
  • Home networks
  • Business networks
  • LANs/WANs
  • Client-Server/P2P
Network types and shapes
  • Wired networks
  • Wireless networks
  • Topologies
Network protocols
  • TCP/IP and UDP
  • HTTP and HTTPs
  • FTP, Ethernet, Wi-Fi
  • Email Protocols
TCP/IP Layers
  • Application Layer
  • Transport Layer
  • Network Layer
  • Data Link Layer
Network security
  • Importance of security
  • Authentication methods
  • Encryption
  • Firewalls
  • MAC filtering
Cyberattacks
  • Phishing
  • Pharming
  • Fraud
  • Identity theft
Preventing vulnerabilities
  • Software design
  • Software testing
  • Network testing
  • Tools
  • Policy
The Internet
  • ISP
  • URL/IP address
  • DNS
  • Websites
  • Hosting
  • The Cloud
  • HTML
  • HTTP/S

6: The Bigger Picture

Ethics
  • Professionalism
  • Privacy
  • Inclusion
The Environment
  • E-Waste
  • Recycling
  • Energy use
  • Carbon footprints
Legislation
  • Data Protection Act
  • Computer Misuse Act
  • Copyright & Patents
  • Communication Acts
  • Health and Safety
Open source software
  • Open Source
  • Closed Source
  • Creative Commons