100% found this document useful (1 vote)
252 views

Edexcel Gcse Computerscience Notes

The document outlines topics related to computing fundamentals. Topic 3 covers binary, data representation, data storage and compression, encryption, and databases. Topic 4 discusses machines and computational models, hardware, software, logic, and programming languages. Topic 5 is about networks, network security, and the internet and world wide web. Topic 6 presents emerging trends, issues and impacts. Each topic is broken down into subsections that provide learning objectives and associated page numbers.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
252 views

Edexcel Gcse Computerscience Notes

The document outlines topics related to computing fundamentals. Topic 3 covers binary, data representation, data storage and compression, encryption, and databases. Topic 4 discusses machines and computational models, hardware, software, logic, and programming languages. Topic 5 is about networks, network security, and the internet and world wide web. Topic 6 presents emerging trends, issues and impacts. Each topic is broken down into subsections that provide learning objectives and associated page numbers.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 164

CONTENTS

TOPIC 3
3.1 Binary 0 to 10

3.2 Data Representation 11 to 22

3.3 Data Storage and Compression 23 to 29

3.4 Encryption 30 to 32

3.5 Databases 33 to 40

TOPIC 4
4.1 Machines and Computational Models 41 to 44

4.2 Hardware 45 to 65

4.4 Software 66 to 77

4.3 Logic 78 to 84

4.5 Programming Languages 85 to 92

TOPIC 5
5.1 Networks 93 to 120

5.2 Network Security 121 to 132

5.3 The Internet and the World Wide Web 133 to 139

TOPIC 6
6.1 Emerging Trends, Issues and Impact 140 to 162

Downloaded by Success Groups


3.1 Binary
Use this Checklist to monitor your own progress √
understand that computers use binary to
3.1.1 represent data (numbers, text, sound,
graphics) and program instructions

understand how computers represent and


manipulate numbers (unsigned integers,
3.1.2
signed integers (sign and magnitude, two’s
complement))

be able to convert between binary and


3.1.3
denary whole numbers (0–255)

understand how to perform binary


arithmetic (add, shifts (logical and
3.1.4
arithmetic)) and understand the concept of
overflow

understand why hexadecimal notation is


3.1.5 used and be able to convert between
hexadecimal and binary

0
1
2
3
4
5
6
7
8
9
10
3.2 Data
Representation
Use this Checklist to monitor your own progress √
understand how computers encode
3.2.1
characters using ASCII

understand how bitmap images are


3.2.2 represented in binary
(pixels, resolution, colour depth)

understand how sound, an analogue


3.2.3
signal, is represented in binary

understand the limitations of binary


representation of data (sampling
3.2.4
frequency, resolution) when constrained
by the number of available bits

11
12
13
14
p9.

15
16
17
18
19
1

The diagram to the left di

20
21
22
3.3 Data Storage
and Compression
Use this Checklist to monitor your own progress √
understand how to convert between the
terms ‘bit, nibble, byte, kilobyte (KB),
3.3.1
megabyte (MB), gigabyte (GB), terabyte
(TB)’

understand the need for data compression


and methods of compressing data (lossless,
3.3.2
lossy) and that JPEG and MP3 are examples
of lossy algorithms

understand how a lossless, run-length


3.3.3
encoding (RLE) algorithm works

understand that file storage is measured in


3.3.4
bytes and be able to calculate file sizes

23
17
21

7,8

24
25
below

26
27
28
29
3.4 Encryption
Use this Checklist to monitor your own progress √
3.4.1 understand the need for data encryption

understand how a Caesar cipher algorithm


3.4.2
works

30
31
32
3.5 Databases
Use this Checklist to monitor your own progress √
understand the characteristics of
3.5.1
structured and unstructured data

understand that data can be decomposed,


organised and managed in a structured
3.5.2
database (tables, records, fields,
relationships, keys)

33
34
35
36
37
38
39
40
4.1 Machines and
Computational
Modelling
Use this Checklist to monitor your own progress √
understand the input-process-output
4.1.1
model

41
Here is another example of the IPO model. Feedback has been
included because actual machines are always reviewed and
upgrades with new ideas / information. This is to show that the
IPO model is forever in a constant loop.

42
43
44
4.2 Hardware
Use this Checklist to monitor your own progress √
understand the function of the hardware
components of a computer system
4.2.1 (CPU, main memory, secondary storage,
input and output devices) and how they
work together
understand the function of different types of
4.2.2
main memory (RAM, ROM, cache)
understand the concept of a stored program
and the role of components of the CPU
(control unit (CU), arithmetic/logic unit
4.2.3
(ALU), registers, clock, address bus, data bus,
control bus) in the fetch-decode-execute
cycle (the Von Neumann model)
understand how data is stored on physical
4.2.4
devices (magnetic, optical, solid state)
understand the concept of storing data in
4.2.5 the ‘cloud’ and other contemporary
secondary storage
understand the need for embedded systems
4.2.6
and their functions

45
46
47
48
49
Downloaded by Success Groups

50
24

51
52
53
54
55
56
57
58
below

59
60
123

61
62
63
64
65
4.4 Software
Use this Checklist to monitor your own progress √
know what an operating system is and how
4.4.1 it manages files, processes, hardware and
the user interface

understand the purpose and functions of


utility software
4.4.2 (managing, repairing and converting files;
compression; defragmentation; backing
up; anti-virus, anti-spyware)

understand how software can be used to


4.4.3 simulate and model aspects of the real
world

66
67
68
69
70
71
72
73
74
75
76
77
4.3 Logic
Use this Checklist to monitor your own progress √
be able to construct truth tables for a given
4.3.1 logic statement
(AND, OR, NOT)

be able to produce logic statements for a


4.3.2
given problem

78
79
80
81
‘ ’

82
83
84
4.5 Programming
Languages
Use this Checklist to monitor your own progress √
understand what is meant by high-level and
low-level programming languages and
4.5.1
understand their suitability for a particular
task

understand what is meant by an assembler,


a compiler and an interpreter when
4.5.2 translating programming languages and
know the advantages and disadvantages of
each.

85
86
87
88
89
90
91
92
5.1 Networks
Use this Checklist to monitor your own progress √
understand why computers are connected
5.1.1
in a network

understand the different types of


5.1.2 networks (LAN, WAN) and usage models
(client-server, peer-to-peer)

understand wired and wireless


5.1.3
connectivity

understand that network data speeds are


5.1.4 measured in bits per second
(Mbps, Gbps)
understand the role of and need for
network protocols
5.1.5
(Ethernet, Wi-Fi, TCP/IP, HTTP. HTTPS, FTP,
email (POP3, SMTP, IMAP))
understand that data can be transmitted
5.1.6 in packets using layered protocol stacks
(TCP/IP)

understand characteristics of network


5.1.7
topologies (bus, ring, star, mesh)

93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
24

111
Information about each TCP/IP
layer is available on page 113.

112
113
114
115
116
117
118
119
120
5.2 Network
Security
Use this Checklist to monitor your own progress √
understand the importance of network security and
be able to use appropriate validation and
5.2.1
authentication techniques
(access control, physical security and firewalls)

understand security issues associated with the


5.2.2
‘cloud’ and other contemporary storage

understand different forms of cyberattack (based on


technical weaknesses and behaviour) including
social engineering (phishing, shoulder surfing),
5.2.3
unpatched
software, USB devices, digital devices and
eavesdropping
understand methods of identifying vulnerabilities
including penetration testing, ethical hacking,
5.2.4
commercial analysis tools and review of network
and user policies
understand how to protect software systems from
cyber attacks, including considerations at the design
stage, audit trails, securing operating systems, code
5.2.5 reviews to remove code vulnerabilities in
programming languages and bad
programming practices, modular testing and
effective network security provision

121
122
61

123
31

124
125
148

126
127
128
129
130
131
132
5.3 The Internet
and the WWW
Use this Checklist to monitor your own progress √
understand what is meant by the internet
5.3.1 and how the internet is structured (IP
addressing, routers)

understand what is meant by the world


wide web (WWW) and components of the
5.3.2
WWW (web server URLs, ISP, HTTP, HTTPS,
HTML)

133
134
135
98

136
137
138
139
6.1 Emerging
Trends, Issues
and Impact
Use this Checklist to monitor your own progress √
understand the environmental impact of
6.1.1 technology (health, energy use, resources)
on society

understand the ethical impact of using


6.1.2 technology (privacy, inclusion,
professionalism) on society

understand the legal impact of using


technology (intellectual property, patents,
6.1.3
licensing, open source and proprietary
software, cyber-security) on society

140
141
61

142
143
144
145
146
146

147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162

You might also like