Pearson Edexcel iLowerSecondary Computing Year 9 Checkpoint Study Guide
Pearson Edexcel iLowerSecondary Computing Year 9 Checkpoint Study Guide
computer. Storage devices (hard drives, SSDs, USB sticks, optical discs) hold data long-term and use units of
data: a bit is a single binary digit (0 or 1), and 8 bits = 1 byte 5 6 . Larger units are: 1024 bytes = 1 KB,
1024 KB = 1 MB, 1024 MB = 1 GB, etc. 7 .
Digital devices connect through networks. A Local Area Network (LAN) connects devices in one location
(e.g. a school), a Wide Area Network (WAN) links devices over large distances (e.g. the Internet) 8 , and a
Personal Area Network (PAN) is for very short range (e.g. Bluetooth between phone and headset).
Networks allow sharing of data and resources (files, printers, Internet access) more easily than isolated
machines 8 . Network devices include routers, switches, hubs and modems. Wireless networks (Wi-Fi,
Bluetooth) let devices connect without cables, while wired networks use Ethernet cables. In networks, data
is broken into packets. Each packet contains part of the data plus a header with control information (such
as source/destination addresses and sequence numbers) 9 . Sending data in packets makes
communication reliable: packets can take different routes and be reassembled at the destination.
Communication over networks uses standard protocols. For example, the World Wide Web uses HTTP/
HTTPS and text is formatted in HTML. When you enter a web address (URL), the network finds the server
and requests data. Internal networks use IP addresses to identify devices. Data speed in networks is
measured in bits per second (bps); common measures are Mbps (million bits per second) and Gbps. (For
example, a 100 Mbps connection can theoretically transfer 100 million bits every second.)
1
1+1+1=11 (result 1 carry 1) 13 . For example, adding binary 1011 (11) + 0101 (5) yields 10000 (16) through
those rules.
Beyond numbers, computers represent other data in binary. Text characters use character encoding (like
ASCII or Unicode) where each character maps to a byte value. Images are stored as grids of pixel values
(each pixel’s color as binary numbers), and sound is digitized into binary samples. Units of storage help
quantify large amounts of binary data: 1024 bytes = 1 kilobyte (KB); 1024 KB = 1 megabyte (MB); 1024 MB = 1
gigabyte (GB); and so on 7 . (For example, a 3 GB file has roughly 3×10^9 bytes.)
Control flow dictates the order in which a program’s statements execute. By default, code runs in
sequence from top to bottom. Selection (decision) statements allow different paths: an if statement
checks a condition and chooses one path if true, another if false. “Selection allows more than one path
through a program” 17 . For example:
Here the program does one thing if the player beat the high score, another otherwise. Without selection,
programs couldn’t make choices.
Iteration (loops) repeats actions. In programming this is done with for or while loops. “Iteration is
implemented in programming using FOR and WHILE statements” 18 . For example, a loop that prints
numbers 1 to 5:
2
for i in range(1, 6):
print(i)
This repeats (loops) the print statement five times. Iteration lets us run code multiple times efficiently (e.g.
processing each item in a list). In everyday terms, iteration is just repeating steps in an algorithm 19 18 .
Larger programs are often broken into subprograms (procedures and functions) to avoid repetitive code. A
procedure (or method) is a named block of code that performs a task; it does not return a value. A function
is similar but does return a value (result). Both keep code modular and easier to manage 20 . For example, a
function add(a, b) might return the sum of two numbers. Functions help avoid rewriting the same logic
and make programs shorter and clearer 21 .
Algorithms can be represented in pseudocode or flowcharts before writing actual code. Pseudocode uses
plain-English-like statements resembling code; it lets us plan logic without worrying about exact syntax 24 .
For example:
This simple pseudo-code repeatedly asks for input until the user types “done” 24 . Flowcharts use standard
symbols (oval for Start/Stop, rectangle for a process, diamond for decision, parallelogram for I/O) to show
the flow of an algorithm 25 . The diagram below shows common flowchart symbols and their meanings:
3
Diagram: Standard flowchart symbols (Start/Stop, Process, Decision, Input/Output, Connector) 25 .
By using pseudocode or flowcharts, we can design algorithms without writing full code. Once designed,
they are translated into code.
Searching and sorting algorithms are common algorithmic tasks. A linear search looks through each
item in a list one by one until it finds the target or reaches the end. It is the simplest search method 26 (e.g.
checking each name in a phonebook sequentially). A binary search (for sorted lists) repeatedly halves the
search range – but is more advanced and usually introduced later. Sorting arranges data in order. A simple
example is bubble sort, which repeatedly passes through a list, comparing adjacent items and swapping
them if they are out of order. “For each value, compare it with the next; if it is higher, swap the values so that
the highest value moves toward the end” 27 . Repeating this over the list many times “bubbles” the largest
items to the end each pass. Bubble sort is not efficient on large lists, but it illustrates sorting by repetition
and swapping 27 .
Overall, algorithms ensure we have a clear, unambiguous procedure to solve a problem. We can evaluate
different algorithms by their speed and correctness, and use tools like flowcharts or pseudocode to
communicate and test them.
4
Databases are powerful for storing and retrieving large amounts of structured information. They have many
advantages over paper or simple lists: it’s easy to add or update records, data can be sorted or searched by
any field, and multiple users or applications can access the database simultaneously 29 . For instance,
searching a database for all customers from London can be done with a query instead of manually scanning
records. Databases also enforce data integrity and security better than paper records: for example, using
passwords or user accounts to restrict who can view or edit data 29 . Databases often support queries (like
SQL SELECT) to filter and combine data.
“Data handling” also covers how data is collected and used. Data collection can be primary (gathered first-
hand via surveys, experiments, forms) or secondary (using existing sources like websites or books). When
handling data, students should consider reliability: data from trustworthy, up-to-date sources is more
reliable. Sampling issues can arise if data is not representative of the whole population. Data can be
analyzed to find patterns or trends (e.g. creating charts from experimental results). For example, a
spreadsheet can sort test scores, compute averages, or create graphs to identify trends over time.
Understanding how to sort, filter, and analyze data is a key skill.
Phishing is a common online scam where attackers send fake emails or messages pretending to be a
trusted organization (e.g. bank) and ask you to reveal sensitive information. The email may say “Your
account will be DELETED unless you confirm your password” and include a link to a fake site 33 . The image
below shows a typical phishing example: it’s not addressed to you personally, has bad spelling, asks for
personal info, and links to a fake site.
5
Image: A phishing email example with red flags (not addressed to you, bad spelling, asking for personal
information, link to fake site). Use caution and delete such emails 33 .
To protect yourself online, follow these guidelines: use strong passwords (at least 8 characters, mixing
letters, numbers and symbols, and not your name or common words) 34 , and never reuse passwords
across sites. Change passwords regularly and consider two-factor authentication where available. Be careful
what personal information you share: “The easiest way to stay safe online is to stay in control of personal
information” 35 . Do not post full name, address, phone number, or school publicly on social media. Treat
people you meet online as strangers unless you know them offline. Do not meet up in person with someone
you only met online without adult supervision. If someone harasses you or sends upsetting content, report
it and tell a trusted adult.
Cyberbullying and online predators are serious issues. Most platforms let you block or report abusive users.
Also be aware of legal and ethical aspects: copyright law means you cannot freely copy or distribute digital
media without permission 36 37 . Downloading music, movies or software without paying is illegal and
deprives creators of income 36 37 . Respect others’ privacy and don’t share someone else’s personal data
or images without consent.
6
Environmental impact is also important. The manufacture, use and disposal of computers and devices
consume resources and energy and produce waste 38 . Data centers (huge server farms) use vast
electricity, contributing to carbon emissions. Old electronics create e-waste containing toxic materials
unless recycled properly. Students should recognize that using technology has an environmental footprint
(powering devices, cooling systems, mining minerals). Buying used devices or recycling components can
reduce this impact (as noted in exam contexts) 40 38 .
Socially and legally, technology has changed how we live and work. Laws protect digital content: the
Copyright, Designs and Patents Act gives creators exclusive rights to their work 36 . It is illegal to copy and
share copyrighted material (like songs or games) without permission 36 37 . There are also laws (e.g.
Computer Misuse Act) against hacking and spreading malware. Ethically, we should use technology
responsibly (e.g. not plagiarizing or harassing others online) 36 35 .
In summary, technology shapes society: it brings convenience and connectivity but also ethical,
environmental and social challenges. By understanding both its benefits and risks, we can use digital
technology wisely and responsibly.
26 29 28 30 33 35 34 36 37 39 38 .
1 What is the purpose of the CPU? - The CPU and the fetch-execute cycle - KS3 Computer Science Revision
- BBC Bitesize
https://www.bbc.co.uk/bitesize/guides/zws8d2p/revision/1
2 4 Random access memory - Memory and storage - OCR - GCSE Computer Science Revision - OCR - BBC
Bitesize
https://www.bbc.co.uk/bitesize/guides/zd4r97h/revision/3
3 Read-only memory - Memory and storage - OCR - GCSE Computer Science Revision - OCR - BBC Bitesize
https://www.bbc.co.uk/bitesize/guides/zd4r97h/revision/2
5 6 7 Representation of data - Binary and data representation - Edexcel - GCSE Computer Science
Revision - Edexcel - BBC Bitesize
https://www.bbc.co.uk/bitesize/guides/z6qqmsg/revision/1
8 9 38 39 qualifications.pearson.com
https://qualifications.pearson.com/content/dam/pdf/International-Lower-Secondary-Curriculum/Computing/iLS-
Computing-2019/Specificationandsampleassessments/9781446959930-iLS-Computing-Specification.pdf
10 11 12Converting between number bases using binary - Fundamentals of data representation - AQA
41
14 Data types - Programming concepts - AQA - GCSE Computer Science Revision - AQA - BBC Bitesize
https://www.bbc.co.uk/bitesize/guides/zh66pbk/revision/1
7
15 16 Variables - Programming basics - KS3 Computer Science Revision - BBC Bitesize
https://www.bbc.co.uk/bitesize/guides/zwmbgk7/revision/2
20 21 What is a function? - Procedures and functions - KS3 Computer Science Revision - BBC Bitesize
https://www.bbc.co.uk/bitesize/guides/zqh49j6/revision/5
22 42 Decomposition - Fundamentals of algorithms - AQA - GCSE Computer Science Revision - AQA - BBC
Bitesize
https://www.bbc.co.uk/bitesize/guides/zjddqhv/revision/2
23 Abstraction - Fundamentals of algorithms - AQA - GCSE Computer Science Revision - AQA - BBC Bitesize
https://www.bbc.co.uk/bitesize/guides/zjddqhv/revision/3
24 Pseudo-code - Algorithms - Edexcel - GCSE Computer Science Revision - Edexcel - BBC Bitesize
https://www.bbc.co.uk/bitesize/guides/z7kkw6f/revision/2
30 31 32 33 How to stay safe online - Online safety - 4th level Computing Science and Digital Literacy
35
36 37 Copyright, Designs and Patents Act - The law and ethics - KS3 Computer Science Revision - BBC
Bitesize
https://www.bbc.co.uk/bitesize/guides/z9nk87h/revision/3