3.1 Fundamentals of algorithms | Webpage Mapping |
3.1.1 Representing algorithms Understand and explain the term algorithm. Understand and explain the term decomposition. Understand and explain the term abstraction. Use a systematic approach to problem solving and algorithm creation representing those algorithms using pseudo-code and flowcharts. Explain simple algorithms in terms of their inputs, processing and outputs. Determine the purpose of simple algorithms. 3.1.2 Efficiency of algorithms 3.1.3 Searching algorithms 3.1.4 Sorting algorithms |
Covered in the following ‘Revision Zones’: |
3.2 Programming | |
3.2.1 Data typesUnderstand the concept of a data type. Understand and use the following appropriately: • integer • real • Boolean • character • string. 3.2.2 Programming concepts 3.2.3 Arithmetic operations in a programming language 3.2.4 Relational operations in a programming language 3.2.5 Boolean operations in a programming language 3.2.6 Data structures 3.2.7 Input/output and file handling 3.2.8 String handling operations in a programming language 3.2.9 Random number generation in a programming language 3.2.10 Subroutines (procedures and functions) 3.2.11 Structured programming 3.2.12 Robust and secure programming 3.2.13 Classification of programming languages |
Covered in the following ‘Revision Zones’: |
3.3 Fundamentals of data representation | |
3.3.1 Number bases Understand the following number bases: • decimal (base 10) • binary (base 2) • hexadecimal (base 16). Understand that computers use binary to represent all data and instructions. Explain why hexadecimal is often used in computer science. 3.3.2 Converting between number bases 3.3.3 Units of information 3.3.4 Binary arithmetic 3.3.5 Character encoding 3.3.6 Representing images 3.3.7 Representing sound 3.3.8 Data compression |
Covered in the following ‘Revision Zones’: |
3.4 Computer systems | |
3.4.1 Hardware and software Define the terms hardware and software and understand the relationship between them. 3.4.2 Boolean logic 3.4.3 Software classification 3.4.4 Systems architecture |
Covered in the following ‘Revision Zones’: |
3.5 Fundamentals of computer networks | |
Define what a computer network is. Discuss the benefits and risks of computer networks. Describe the main types of computer network including: • Personal Area Network (PAN) • Local Area Network (LAN) • Wide Area Network (WAN). Understand that networks can be wired or wireless. Discuss the benefits and risks of wireless networks as opposed to wired networks. Explain the following common network topologies: • star • bus. Define the term ‘network protocol’. Explain the purpose and use of common network protocols including: • Ethernet • Wi-Fi • TCP (Transmission Control Protocol) • UDP (User Datagram Protocol) • IP (Internet Protocol) • HTTP (Hypertext Transfer Protocol) • HTTPS (Hypertext Transfer Protocol Secure) • FTP (File Transfer Protocol) • email protocols: • SMTP (Simple Mail Transfer Protocol) • IMAP (Internet Message Access Protocol). Understand the need for, and importance of, network security. Explain the following methods of network security: • authentication • encryption • firewall • MAC address filtering. Describe the 4 layer TCP/IP model: • application layer • transport layer • internet layer • link layer. Understand that the HTTP, HTTPS, SMTP, IMAP and FTP protocols operate at the application layer. Understand that the TCP and UDP protocols operate at the transport layer. Understand that the IP protocol operates at the internet layer. |
Covered in the following ‘Revision Zones’: |
3.6 Fundamentals of cyber security | |
Be able to define the term cyber security and be able to describe the main purposes of cyber security.
3.6.1 Cyber security threats 3.6.1.1 Social engineering 3.6.1.2 Malicious code 3.6.2 Methods to detect and prevent cyber security threats |
Covered in the following ‘Revision Zone’: |
3.7 Ethical, legal and environmental impacts of digital technology on wider society, including issues of privacy |
|
Explain the current ethical, legal and environmental impacts and risks of digital technology on society. Where data privacy issues arise these should be considered. |
Covered in the following ‘Revision Zone’: |