Computer Science Aqa Specification Checklist
Computer Science Aqa Specification Checklist
uk
Computer Science AQA – 11/05 & 14/05
https://filestore.aqa.org.uk/resources/computing/specifications/AQA-8520-SP-2016.PDF
1. Fundamentals of Algorithms
Representing algorithms NOTES
Understand and explain the term algorithm.
An algorithm is a sequence of steps that can be followed to complete
a task.
Be aware that a computer program is an implementation of an
algorithm and that an algorithm is not a computer program.
Understand and explain the term decomposition.
Decomposition means breaking a problem into a number of sub-
problems, so that each sub- problem accomplishes an identifiable
task, which might itself be further subdivided.
Understand and explain the term abstraction. Abstraction is the
process of removing unnecessary detail from a problem.
Use a systematic approach to problem solving and algorithm
creation representing those algorithms using pseudo-code and
flowcharts.
Any exam question where students are given pseudo-code will use the
AQA standard version. However, when students are writing their own
pseudo-code they may do so using any form as long as the meaning is
clear and unambiguous.
Explain simple algorithms in terms of their inputs, processing and
outputs.
Students must be able to identify where inputs, processing and
outputs are taking place within an algorithm.
Explain simple algorithms in terms of their inputs, processing and
outputs.
Students must be able to identify where inputs, processing and
outputs are taking place within an algorithm.
2. Programming
Data types NOTES
Understand the concept of a data type.
An example of indefinite iteration with the condition at the start would be:
examchecklist.co.uk 2
examchecklist.co.uk
An example of indefinite iteration with the condition at the end would be:
examchecklist.co.uk 3
examchecklist.co.uk
Note that different languages may use different symbols to represent
these operators.
In assessment material we will use the following symbols:
=, ≠, <, >, ≤, ≥
examchecklist.co.uk 4
examchecklist.co.uk
• string to real
• integer to string
• real to string.
examchecklist.co.uk 5
examchecklist.co.uk
examchecklist.co.uk 7
examchecklist.co.uk
• B represents byte
Know that quantities of bytes can be described using prefixes.
Know the names, symbols and corresponding values for the
decimal prefixes:
• kilo, 1 kB is 1,000 bytes
• mega, 1 MB is 1,000 kilobytes
• giga, 1 GB is 1,000 Megabytes
• tera, 1 TB is 1,000 Gigabytes
The SI units of kilo, mega and so forth refer to values based on powers
of 10.
Students might benefit from knowing that historically the terms
kilobyte, megabyte, etc have often been used to represent powers of
2.
examchecklist.co.uk 9
examchecklist.co.uk
examchecklist.co.uk 10
examchecklist.co.uk
Students could be given a bitmap representation and they would be
expected to show the frequency and value pairs for each row,
e.g. 0000011100000011
would become 5 0 3 1 6 0 2 1
4. Computer Systems
Hardware and Software NOTES
Define the terms hardware and software and understand the
relationship between them.
examchecklist.co.uk 11
examchecklist.co.uk
• I/O devices
• applications
• security
Explain the role and operation of main memory and the following
major components of a central processing unit (CPU):
• arithmetic logic unit
• control unit
• clock
• bus
A bus is a collection of wires through which data is transmitted from
one component to another. Main memory will be considered to be any
form of memory that is directly accessible by the CPU, except for
cache and registers.
Explain the effect of the following on the
performance of the CPU:
• clock speed
• number of processor cores
• cache size
• cache type
Understand and explain the Fetch-Execute cycle.
The CPU continuously reads instructions stored in main memory and
executes them as required:
• fetch: the next instruction is fetched to the CPU from main memory
• decode: the instruction is decoded to work out what it is
• execute: the instruction is executed (carried out). This may include
reading/writing from/to main memory
Understand the differences between main memory and secondary
storage.
Understand the differences between RAM and ROM.
Students should be able to explain the terms volatile and non-volatile.
Secondary storage is considered to be any non-volatile storage
mechanism not directly accessible by the CPU.
Understand why secondary storage is required.
examchecklist.co.uk 12
examchecklist.co.uk
Explain the term 'cloud storage'.
Students should understand that cloud storage uses magnetic and
increasingly solid state storage at a remote location.
Explain the advantages and disadvantages of cloud storage when
compared to local storage.
examchecklist.co.uk 13
examchecklist.co.uk
• Ethernet
• Wi-Fi
• TCP (Transmission Control Protocol)
• UDP (User Datagram Protocol)
• IP (Internet Protocol)
• HTTP (Hypertext Transfer Protocol)
• HTTPS (Hypertext Transfer Protocol Secure)
• FTP (File Transfer Protocol)
• email protocols:
• SMTP (Simple Mail Transfer Protocol)
• IMAP (Internet Message Access Protocol)
Students should know what each protocol is used for (eg HTTPS
provides an encrypted version of HTTP for more secure web
transactions).
Students should understand that Ethernet is a family of related
protocols rather than a single protocol. They do not need to know the
individual protocols that make up the Ethernet family.
Students should understand that Wi-Fi is a family of related protocols
rather than a single protocol. They do not need to know the individual
protocols that make up the Wi-Fi family but they should know that Wi-
Fi is a trademark and that the generic term for networks of this nature
is WLAN.
Understand the need for, and importance of, network security.
examchecklist.co.uk 16
examchecklist.co.uk
• theft of computer code
• issues around copyright of algorithms
• cracking
• hacking
• wearable technologies
• computer-based implants.
Students will be expected to understand and explain the general
principles behind the issues rather than have detailed knowledge on
specific issues.
Students should be aware that ordinary citizens normally value their
privacy and may not like it when governments or security services have
too much access.
Students should be aware that governments and security services
often argue that they cannot keep their citizens safe from terrorism
and other attacks unless they have access to private data.
examchecklist.co.uk 17