Fundamentals of algorithms
| 3.1.1 Representing algorithms | Computational thinking | - Decomposition
- Pattern recognition
- Abstraction
- Algorithms
|
Flowcharts | - Standard Shapes
- Algorithms
|
Pseudocode | |
3.1.2 - 3.1.4 Types of algorithms | Algorithm efficiency | - Time efficiency
- Space efficiency
|
Searching algorithms | - Linear search
- Binary Search
|
Sorting algorithms | |
3.2 Programming | 3.2.1 - 3.2.6 Programming components | Data types | - Character
- String
- Integer
- Real
- Boolean
|
Variables and constants | |
Operators | - Arithmetic
- Boolean
- Relational
|
Sequence, selection, iteration | - IF
- WHILE
- CASE
- REPEAT
- FOR
- Nesting
|
Data Structures | - List
- Linked List
- Dictionary
- Tuple
|
Arrays & Records | - 1D Array
- 2D Array
- Array operations
- Records
|
3.2.7 - 3.2.10 Processes | File handling | |
String handling | - Storage
- Search
- Properties
- Type casting
- Character codes
|
Random number generation | - Random integers
- Python examples
- Uses
|
Subroutines | |
3.2.11 - 3.2.13 Writing programs | Structured programming | - Planning
- Iteration
- Subroutines\Functions
- Modules & Scope
- Python Examples
|
Validation and authentication | - Length check
- Range check
- Authentication
- Test Data
- Python Examples
|
Programming languages | - Machine code
- Low Level
- High level
- Translators, Assemblers
- Compiler, Interpreters
|
3.3 Fundamentals of data representation | 3.3.1 - 3.3.4 Representing numbers | Denary and Binary | - Number systems
- Denary to Binary
- Binary to Denary
- Binary Addition
- Binary Shift
|
Hexadecimal | - Uses
- Denary to Hex
- Hex to Denary
- Hex to Binary
- Binary to Hex
|
Units and prefixes | - Bit, Byte, Nibble
- Kilobyte to Petabyte
|
3.3.5 - 3.3.7 Creating files | Character sets | - ASCII
- Extended ASCII
- Character Sets
- Unicode
|
Images | - Pixels
- Grayscale
- Colour Depth
- Files size
|
Sound | - Sampling
- Sampling frequency
- Bit Depth, Bit Rate
- Channels
- Metadata
|
3.3.8 Compression | Compression | - Lossy compression
- Lossless compression
- Dictionary compression
- Images,Video,Music
|
Huffman Encoding | - Binary Tree
- Creating keywords
- Encoding
|
Run Length Encoding | - RLE data format
- RLE & Images
- RLE & Text
|
3.4 Computer Systems | 3.4.1 Hardware and Software | Hardware, software | - Computer System
- Hardware
- Software
|
3.4.2 Boolean Logic | Boolean logic | - AND, OR, NOT
- Logic Circuits
- Truth Tables
|
3.4.3 Software Classification | Software types | - System Software
- Application Software
|
Operating systems | - Purpose
- Kernel
- User Interface
- Device Drivers
- Multitasking
|
3.4.4 Systems Architecture: CPU | CPU and Von Neumann architecture | - What is it
- ALU, Control Unit
- Clock, Buses
- Von Neumann
|
CPU performance | - Cache
- Cores
- Overclocking
- Parallel processing
|
Fetch-Execute cycle | - Hardware used
- The FDE cycle
|
3.4.4 Systems Architecture: Memory | Types of memory | - RAM Random Access
- DRAM and SRAM
- ROM Read Only
|
Secondary storage | - Magnetic
- Optical
- Solid State
- Cloud
|
Embedded systems | - Definition
- Sensors
- Analog-Digital converter
- Actuators
|
3.5 Networks | Networks | PANs, LANs and WANs | - PAN
- LAN at home
- LAN in business
- WAN
|
Networks type and shape | - Wired, Wireless networks
- Star, Bus topology
- Star & Bus animations
- Network Builder
|
Network protocols | - TCP/IP and UDP
- HTTP and HTTPs
- FTP, Ethernet, Wi-Fi
- Email Protocols
|
Network security | - Importance of security
- Authentication methods
- Encryption
- Firewalls
- MAC filtering
|
Four Layer Model | - Application Layer
- Transport Layer
- Network Layer
- Data Link Layer
|
3.6 Cyber security | 3.6.1 Cyber security threats | Introduction to Cyber-security | - What is it
- Why is it important
- Malicious code
- Social engineering
- Prevention
|
Penetration testing | - What is it
- White box testing
- Black box testing
|
Social engineering | - What is it
- Phishing
- Pharming
- Blagging
- Other Social attacks
|
Malware | - Viruses and Worms
- Browser malware
- Other malware types
|
3.6.2 Prevention | Threats and Prevention | - Typical threats
- Strong Passwords
- Biometric authentication
- CAPTCHA
- Email confirmation
- Software updates
|
3.7 Societal Impact | 3.7.1 Ethical, Legal, Environmental | Ethical | - Internet
- Social media
- Digital divide
- Whistleblowing
- Self driving cars
- Genetic screening
- Drone use
|
Cultural | - Anonymity
- Citizen Journalism
- Military Drones
- Health & Technology
- Social Network Impacts
|
Legislation | - Data Protection Act
- Computer Misuse Act
- Copyright & Patents
- Freedom of Information Act
|
Environmental | - E-Waste
- Sustainability
- Recycling
- Energy use
- Data Centres
- Monitoring
- Stakeholders
|
Open-Close Source | - Open Source
- Closed Source
- Creative Commons
|
Privacy | - DNA profiling
- ID Cards
- CCTV
- Tracking
- Personal Data
- Stakeholders
|