Www.kingarthurs.org.uk
OCR GCSE COMPUTER SCIENCEThese are the topics that will be in your mock. A full exam topic list for the summer can be found at the end of the document.You have two exams:Computer Systems (1 Hour)Computational Thinking, Algorithms & Programming (1 Hour)Both papers are non-calculator.Page numbers refer to the revision guides (not sure which will amend get a copy for you as may be 2016)The links take you to the teach-ict website. You will need to log in.Username: ba99bxPassword: bitmap7Exam 1 Computer SystemsTopicWhat should I be able to do?Resources1.1 Systems ArchitectureThe CPUDescribe what the function of the CPU isP1-2 CPU ComponentsExplain what the arithmetic and logic unit, the control unit, the clock and cache memory doP1-2 Fetch Decode Execute CycleExplain the function of the CPU as fetch and execute instructions stored in memoryP3-4 Describe how the fetch, decode, execute cycle relates to registers and Von Neumann architectureP3-4CPU PerformanceExplain how cache size, clock speed and number of cores affect the performance of a CPUP5 Embedded SystemsDescribe the differences between embedded and general computing systemsP6 Identify the key characteristics of an embedded systemp6Give examples of embedded systemsp61.2 MemoryRAM & ROMDescribe the differences between RAM and ROMP7 Explain what RAM does in a computer systemp7Explain what ROM does in a computer systemp7Explain how cache memory is used in a computer systemp5Describe the differences in function of SRAM and DRAMp7Virtual MemoryDescribe what virtual memory isP8 Explain how a computer uses virtual memoryp81.3 StorageMagnetic StorageIdentify examples of magnetic storage (magnetic hard disk drive, magnetic tape)P9 Explain how magnetic storage worksp9Suggest scenarios in which magnetic storage would be an appropriate storage mediump9Optical StorageIdentify examples of optical storage (CD-R, CD-ROM, DVD, HD-DVD, Blu-Ray)P9 Secondary Storage: Capacity, Speed & CostExplain how optical storage worksp9Secondary Storage: Portability, Durability & ReliabilitySuggest scenarios in which optical storage would be an appropriate storage mediump9Solid State StorageIdentify examples of solid state storage (SSD, USB stick, SD memory card)P10 Networks: LANs & WANsExplain how solid state storage worksp10Networks: Client Server & Peer To PeerSuggest scenarios in which solid state storage would be an appropriate storage mediump10Storage CharacteristicsCompare different types of storage mediumP11-12 Identify the advantages and disadvantages of the different types of storage mediump11-12Describe the difference between a storage device and storage mediap11-12Understand how cost, durability, reliability, speed, capacity and portability affect the user’s choice of storage mediump11-12Calculate the amount of storage required for a given applicationp11-121.4 Wired & Wireless NetworksTypes of NetworkExplain what a network isP13-14 Describe the differences between a WAN and a LANp13-14,16Discuss how different types of network may be applicable for different scenariosp13-14The InternetExplain that the Internet is a worldwide network of computersP17 Explain the terms hosting and domain namesp17Understand how DNS servers workp17Explain how cloud computing worksp17Understand the terms IP address, ISP, and URLp171.5 Network Topologies, Protocols & LayersNetwork TopologiesDescribe what a network topology isP18 Explain how the star network topology functionsp18Explain how the mesh network topology functionsp18Discuss the benefits and drawbacks of these two network topologiesp18ProtocolsDescribe what a network protocol isP19-21 Explain the send and receive process in the transmission control protocol and internet protocol (TCP/IP)p19-21Understand how file transfer protocol works and its usesp19-21LayersUnderstand the purpose of the four layer modelP19-21 Explain the function of network layersp19-21Identify the benefits of organising protocols into layersp19-21Packet SwitchingDescribe what a data packet isP22 Explain how packet switching networks functionp22Explain what circuit switching isp221.6 System SecurityNetwork SecurityExplain why network security is importantP23-25 Describe what network security isp23-25Network ThreatsIdentify examples of malwareP23-25 Explain how social engineering and phishing are implementedp23-25Discuss the impacts of having poor network securityp23-25Identifying & Preventing VulnerabilitiesExplain why user access rights and passwords are importantP26-27 Explain the importance of ensuring users agree to an acceptable use policy and network policyp26-27Explain the purpose and importance of backups and disaster recoveryp26-27Understand the process of penetration testingp26-27Describe how firewalls functionp26-27Explain what anti-malware software doesp26-27Understand the purpose of network forensicsp26-271.7 Systems SoftwareUtility System SoftwareDescribe the purpose of defragmentation software and why this should be used regularlyP30 Describe how backup utilities work and why they should be implemented regularlyp30Explain the difference between full and incremental backupsp30Ethical, Legal, Cultural & Environmental ConcernsEthical IssuesUnderstand that it can be considered immoral to not follow an ethical code but it is not illegalP31 Understand the role of the computer ethics institutep31Explain what the digital divide isp31Discuss ethical issues such as drone warfare, driverless cars and whistleblowingp31Understand what a hacker is and why someone might choose to do thisp31Cultural IssuesUnderstand what a stakeholder isP32-33 Explore the impact that social media has had on the way that humans interactp32-33Explain the terms trolling and cyberbullyingp32-33Discuss the use of technology in everyday lifep32-33Explore the impact of technology advancements in business, entertainment, education, gaming and medicinep32-33Environmental IssuesKnow what e-waste is and the importance of recycling and sustainability in the technology sectorP34 Understand the need for low energy consumption devices and technologiesp34Benefits and drawbacks of the use of technology and its impact on the environmentp34Privacy IssuesUnderstand what data mining is and how you can protect yourself onlineP35 Explain the term digital footprintp35Discuss privacy issues such as the national DNA database, location tracking, CCTV, facial recognition and online monitoringp35LegislationExplain the key points and issues of:The Data Protection Act 1998Computer Misuse Act 1990Copyright Designs & Patent Act 1998Creative Commons LicensingFreedom of Information Act 2000P36-37 Exam 2 Computational Thinking, Algorithms & ProgrammingTopicWhat should I be able to do?Resources2.1 AlgorithmsStandard Searching AlgorithmsExplain how binary search worksP44 Standard Sorting AlgorithmsExplain how bubble sort worksP46 PseudocodeRead pseudocode and translate into a language of your choiceP41 Produce pseudocode that is able to be understood by a computer programmerp41Understand the importance of keywords such as FUNCTION, INPUT, OUTPUT, PROCEDURE p41Correct or complete an incomplete pseudocodep41Flow DiagramsInterpret a flow diagram to perform a given taskP42 Produce flow diagrams that use iteration, sequence and selectionp42Understand flow diagram shapes and their usesp42Correct or complete an incomplete flow diagramp422.2 Programming TechniquesProgramming BasicsImplement variables, constants, operators, inputs and outputsP51 Explain what a variable is and identify a variable in a piece of codep51Explain what a constant is and identify a constant in a piece of codep51Explain the functions of logic and arithmetic operatorsp52-54Programming ConstructsImplement sequences, selection & iterationP55-56 Identify sequences, selection & iteration in a piece of codep55-56Describe what a sequence isp55Describe what selection isp55Understand the difference between comparison and conditional selectionp55Describe what iteration is (with reference to count and condition controlled loops)p56ArraysImplement arrays in your programmingP59 Understand the need for arraysp59SubprogramsUnderstand the need for subprograms to produce structured and efficient codeP63-64 Implement subprograms in your programmingP63-64Data TypesExplain what an integer isP57 Explain what real data isp57Explain what a string isp57Explain what Boolean data type isp57Identify integers, real, strings, and Boolean data types in a piece of codep57Implement integers, real, strings, and Boolean data types in your programmingp57Arithmetic OperatorsUnderstand the functions of the common arithmetic operators (+ - * / % ^ != > < =)p52Implement the common arithmetic operators (+ - * / % ^ != > < = ) in your programmingp522.3 Producing Robust ProgramsMaintainabilityUnderstand the importance of maintainability (making sure the code can be easily updated or changed)p66 Ensure your code contains commentsp66Ensure your code contains consistent whitespacep66Syntax & Logic ErrorsUnderstand what a syntax error isP49 Understand what a logic error isp49Identify syntax and logic errors in a piece of codep49Explain the purpose and function of a debuggerp49Use debugging software to identify errorsp492.4 Computational LogicBinary LogicUnderstand that data is represented in computer systems in binary formP67-68 Explain why computers use binary numbersp67-682.5 Translators & Facilities of LanguageComputer LanguagesExplain what machine code isP69 Explain what a low level or assembly language is and give examplesp69Explain what a high level or source language is and give examplesp69Language FacilitiesExplain the purpose and function of a translatorp70Explain the purpose and function of an assemblerp70Explain the purpose and function of a compilerp70Explain the purpose and function of an interpreterp70The IDEExplain what an integrated development environment is and who might use oneP71 Understand the purpose of the editor, error diagnostics and the run-time environmentp71Confidently use an IDE such as Python IDLEp712.6 Data RepresentationUnitsUnderstand the terms bit, nibble, byte, kilobyte, megabyte, gigabyte, terabyte, petabyteP72 Convert data sizes between the different unitsp72Know how many bytes are in each unitp72NumbersConvert denary whole numbers (0-255) into 8 bit binary numbers and vice versaP73 Add two 8 bit binary integersp74Explain overflow errorsp74Conduct binary shiftsp75Convert denary whole numbers (0-255) into 2 digit hexadecimal numbers and vice versaP76 Convert from binary to hexadecimal and vice versap77Understand the purpose and function of check digitsp78SoundGive examples of sound input devicesP81 Explain how sound works with reference to frequency and amplitudep81Explain what sample rate isp81Explain what bit depth isp81Discuss the effects that sample rate and bit depth have on the quality of a sound and the size of a sound filep81Explain what bit rate isp81Explain the difference between a mono and a stereo filep81SUMMER 2018 TOPIC LISTExam 1 Computer SystemsTopicWhat should I be able to do?1.1 Systems ArchitectureThe CPUDescribe what the function of the CPU isExplain how Von Neumann architecture worksExplain what the memory address register, memory data register, program counter and accumulator doExplain the function of buses within a computer systemExplore the differences between Harvard and Von Neumann architectureCPU ComponentsExplain what the arithmetic and logic unit, the control unit, the clock and cache memory doFetch Decode Execute CycleExplain the function of the CPU as fetch and execute instructions stored in memoryDescribe how the fetch, decode, execute cycle relates to registers and Von Neumann architectureCPU PerformanceExplain how cache size, clock speed and number of cores affect the performance of a CPUKnow what a GPU isEmbedded SystemsDescribe the differences between embedded and general computing systemsIdentify the key characteristics of an embedded systemGive examples of embedded systems1.2 MemoryRAM & ROMDescribe the differences between RAM and ROMExplain what RAM does in a computer systemExplain what ROM does in a computer systemExplain how cache memory is used in a computer systemDescribe the differences in function of SRAM and DRAMVirtual MemoryDescribe what virtual memory isExplain how a computer uses virtual memory1.3 StorageMagnetic StorageIdentify examples of magnetic storage (magnetic hard disk drive, magnetic tape)Explain how magnetic storage worksSuggest scenarios in which magnetic storage would be an appropriate storage mediumOptical StorageIdentify examples of optical storage (CD-R, CD-ROM, DVD, HD-DVD, Blu-Ray)Secondary Storage: Capacity, Speed & CostExplain how optical storage worksSecondary Storage: Portability, Durability & ReliabilitySuggest scenarios in which optical storage would be an appropriate storage mediumSolid State StorageIdentify examples of solid state storage (SSD, USB stick, SD memory card)Networks: LANs & WANsExplain how solid state storage worksNetworks: Client Server & Peer To PeerSuggest scenarios in which solid state storage would be an appropriate storage mediumStorage CharacteristicsCompare different types of storage mediumIdentify the advantages and disadvantages of the different types of storage mediumDescribe the difference between a storage device and storage mediaUnderstand how cost, durability, reliability, speed, capacity and portability affect the user’s choice of storage mediumCalculate the amount of storage required for a given application1.4 Wired & Wireless NetworksTypes of NetworkExplain what a network isDescribe the differences between a WAN and a LANDiscuss how different types of network may be applicable for different scenariosExplain how a client server network worksExplain how a peer to peer network worksExplain the different roles of computers in a client server and peer to peer networkExplain how virtual networks work and why you might use oneNetwork PerformanceExplain what bandwidth is with relation to Kbps, Mbps, GbpsExplain how bandwidth is shared and understand the term contention ratioDiscuss the performance characteristics of wired and wireless networksExplain what error rate and latency areNetwork HardwareIdentify the hardware needed to create a LAN (router, WAP, switch, hub, NIC, clients, server, nodes)Discuss the benefits and drawbacks of different types of transmission media (copper wire, fibre optic, Ethernet, radio waves (wireless), Bluetooth, 3G, 4G)The InternetExplain that the Internet is a worldwide network of computersExplain the terms hosting and domain namesUnderstand how DNS servers workExplain how cloud computing worksUnderstand the terms IP address, ISP, and URL1.5 Network Topologies, Protocols & LayersNetwork TopologiesDescribe what a network topology isExplain how the star network topology functionsExplain how the mesh network topology functionsDiscuss the benefits and drawbacks of these two network topologiesWi-FiExplain the different frequencies and channels used in Wi-FiExplain how encryption worksProtocolsDescribe what a network protocol isExplain the send and receive process in the transmission control protocol and internet protocol (TCP/IP)Explain the terms HTTP and HTTPSUnderstand how file transfer protocol works and its usesExplain the use of SMTP, POP and IMAP for email applicationsLayersUnderstand the purpose of the four layer modelExplain the function of network layersIdentify the benefits of organising protocols into layersPacket SwitchingDescribe what a data packet isExplain how packet switching networks functionExplain what circuit switching is1.6 System SecurityNetwork SecurityExplain why network security is importantDescribe what network security isNetwork ThreatsIdentify examples of malwareExplain how social engineering and phishing are implementedExplain how brute force attacks and denial of service attacks functionDescribe the issues surrounding data interception and SQL injectionDiscuss the impacts of having poor network securityMalwareDescribe what malware isExplain how viruses, worms and browser malware workIdentifying & Preventing VulnerabilitiesExplain why user access rights and passwords are importantExplain the importance of ensuring users agree to an acceptable use policy and network policyExplain the purpose and importance of backups and disaster recoveryUnderstand the process of penetration testingDescribe how firewalls functionExplain what anti-malware software doesUnderstand the purpose of network forensics1.7 Systems SoftwareOperating SystemsDescribe the role of the kernelIdentify the different types of user interface (command line, menu interface and graphical user interface)Comment on the suitability of user interface depending on the computer systemExplain the role of the operating system in memory managementDescribe what multitasking isExplain the purpose of device drivers and why they are necessary for peripheralsExplain what user access rights are and the three common ones: read, write, executeExplain the importance of good file managementUtility System SoftwareExplain how encryption software works and list some of its usesDescribe the purpose of defragmentation software and why this should be used regularlyExplain the purpose of compression software and why it might be usedExplain the difference between lossy and lossless compressionDescribe how backup utilities work and why they should be implemented regularlyExplain the difference between full and incremental backupsEthical, Legal, Cultural & Environmental ConcernsEthical IssuesUnderstand that it can be considered immoral to not follow an ethical code but it is not illegalUnderstand the role of the computer ethics instituteExplain what the digital divide isDiscuss ethical issues such as drone warfare, driverless cars and whistleblowingUnderstand what a hacker is and why someone might choose to do thisCultural IssuesUnderstand what a stakeholder isExplore the impact that social media has had on the way that humans interactExplain the terms trolling and cyberbullyingDiscuss the use of technology in everyday lifeExplore the impact of technology advancements in business, entertainment, education, gaming and medicineEnvironmental IssuesKnow what e-waste is and the importance of recycling and sustainability in the technology sectorUnderstand the need for low energy consumption devices and technologiesBenefits and drawbacks of the use of technology and its impact on the environmentPrivacy IssuesUnderstand what data mining is and how you can protect yourself onlineExplain the term digital footprintDiscuss privacy issues such as the national DNA database, location tracking, CCTV, facial recognition and online monitoringLegislationExplain the key points and issues of:The Data Protection Act 1998Computer Misuse Act 1990Copyright Designs & Patent Act 1998Creative Commons LicensingFreedom of Information Act 2000Proprietary & Open Source SoftwareExplain the difference between proprietary & open source softwareExam 2 Computational Thinking, Algorithms & ProgrammingTopicWhat should I be able to do?2.1 AlgorithmsComputational ThinkingExplain what abstraction is and give real world examplesUse abstraction to help to solve a given taskExplain what decomposition is and give real world examplesUse decomposition to break down a given task into smaller partsUse decomposition to produce a top down diagramExplain what algorithmic thinking is and give real world examplesRecognise patterns when solving tasksStandard Searching AlgorithmsExplain how binary search worksExplain how linear search worksDiscuss the benefits and drawbacks of each approach and when you might use themStandard Sorting AlgorithmsExplain how bubble sort worksExplain how merge sort worksExplain how insertion sort worksDiscuss the benefits and drawbacks of each approach and when you might use themPseudocodeRead pseudocode and translate into a language of your choiceInterpret pseudocode to perform a given taskProduce pseudocode that is able to be understood by a computer programmerUnderstand the importance of keywords such as FUNCTION, INPUT, OUTPUT, PROCEDURE Correct or complete an incomplete pseudocodeFlow DiagramsInterpret a flow diagram to perform a given taskProduce flow diagrams that use iteration, sequence and selectionUnderstand flow diagram shapes and their usesCorrect or complete an incomplete flow diagram2.2 Programming TechniquesProgramming BasicsImplement variables, constants, operators, inputs and outputsExplain what a variable is and identify a variable in a piece of codeExplain what a constant is and identify a constant in a piece of codeExplain the functions of logic and arithmetic operatorsExplain the need for inputs within a program and how to do this in your chosen programming languageExplain the need for outputs within a program and how to do this in your chosen programming languageProgramming ConstructsImplement sequences, selection & iterationIdentify sequences, selection & iteration in a piece of codeDescribe what a sequence isDescribe what selection isUnderstand the difference between comparison and conditional selectionDescribe what iteration is (with reference to count and condition controlled loops)String ManipulationImplement concatenation, traversal, length, casting and case string manipulationExplain what concatenation isExplain what casting isUnderstand that a string is a series of charactersFile HandlingImplement the following file handling operations:OpenReadWriteCloseDatabasesExplain what a database isUnderstand the differences between records, fields and tablesExplain the purpose of Structured Query LanguageUnderstand how SQL can be used to search for dataArraysImplement arrays in your programmingUnderstand the need for arraysExplain the difference between one and two dimensional arraysExplain the differences between static and dynamic arraysSubprogramsUnderstand the need for subprograms to produce structured and efficient codeImplement subprograms in your programmingData TypesExplain what an integer isExplain what real data isExplain what a string isExplain what Boolean data type isIdentify integers, real, strings, and Boolean data types in a piece of codeImplement integers, real, strings, and Boolean data types in your programmingArithmetic OperatorsUnderstand the functions of the common arithmetic operators (+ - * / % ^ != > < =)Implement the common arithmetic operators (+ - * / % ^ != > < = ) in your programmingLogical OperatorsUnderstand the functions of the common logical operators (AND, OR, NOT, XOR)Implement the common logical operators (AND, OR, NOT, XOR) in your programming2.3 Producing Robust ProgramsDefensive Design ConsiderationsUnderstand the purpose of defensive designIdentify when your defensive design is not good enoughExplain the four methods of validation:Data typeLength CheckFormat CheckRange CheckPlan your program so that multiple possibilites are counted forAnticipate misuse of a program in the planning stageExplain the role of authenticationGive examples of one and two step authenticationMaintainabilityUnderstand the importance of maintainability (making sure the code can be easily updated or changed)Ensure your code contains commentsEnsure your code contains consistent whitespaceTestingUnderstand the importance and purpose of testing in the systems lifecycleConstruct a test planUnderstand how to use different test data (expected, erroneous, extreme, invalid)Explain the difference between iterative and final/terminal testingApply single-step testing and record the results in a trace tableSyntax & Logic ErrorsUnderstand what a syntax error isUnderstand what a logic error isIdentify syntax and logic errors in a piece of codeExplain the purpose and function of a debuggerUse debugging software to identify errors2.4 Computational LogicBinary LogicUnderstand that data is represented in computer systems in binary formExplain why computers use binary numbersExplain what the AND, OR and NOT operations doLogic DiagramsIdentify the AND, OR and NOT logic gatesConstruct a logic diagram from a given statementCombine Boolean operators to two levelsTruth TablesExplain the purpose of a truth tableConstruct truth tables for the AND, OR and NOT operations2.5 Translators & Facilities of LanguageComputer LanguagesExplain what machine code isExplain what a low level or assembly language is and give examplesExplain what a high level or source language is and give examplesLanguage FacilitiesExplain the purpose and function of a translatorExplain the purpose and function of an assemblerExplain the purpose and function of a compilerExplain the purpose and function of an interpreterThe IDEExplain what an integrated development environment is and who might use oneUnderstand the purpose of the editor, error diagnostics and the run-time environmentConfidently use an IDE such as Python IDLE2.6 Data RepresentationUnitsUnderstand the terms bit, nibble, byte, kilobyte, megabyte, gigabyte, terabyte, petabyteConvert data sizes between the different unitsKnow how many bytes are in each unitNumbersConvert denary whole numbers (0-255) into 8 bit binary numbers and vice versaAdd two 8 bit binary integersExplain overflow errorsConduct binary shiftsConvert denary whole numbers (0-255) into 2 digit hexadecimal numbers and vice versaConvert from binary to hexadecimal and vice versaUnderstand the purpose and function of check digitsCharactersUnderstand that binary code is used to represent charactersExplain the term character setExplain the relationship between the number of bits per character and the number of characters that can be representedGive examples of commonly used character sets (e.g. Unicode, ASCII, ASCII extended.)ImagesGive examples of image input devicesExplain what a pixel isUnderstand that a digital image is represented as a series of pixels in binaryExplain what resolution isExplain what colour depth isUnderstand what metadata is and what might be included in an image fileDiscuss the effects that colour depth and resolution have on the quality of an image and the size of an image fileSoundGive examples of sound input devicesExplain how sound works with reference to frequency and amplitudeExplain what sample rate isExplain what bit depth isDiscuss the effects that sample rate and bit depth have on the quality of a sound and the size of a sound fileExplain what bit rate isExplain the difference between a mono and a stereo fileCompressionExplain the difference between lossy and lossless compressionGive examples of compressed and uncompressed image file formats e.g .jpg .rawGive examples of compressed and uncompressed sound file formats e.g. .mp3 .wavIdentify file extensions depending on whether they are lossy or lossless compression ................
................
In order to avoid copyright disputes, this page is only a partial summary.
To fulfill the demand for quickly locating and searching documents.
It is intelligent file search solution for home and business.
Related download
- binary coded decimal b c d dublin city university
- decimal binary hexadecimal conversion chart
- the journey insidesm digital information student
- binary conversion practice convert these binary
- binary numbers electronics
- binary to english converter
- rajalakshmi engineering college
- introduction to binary computers
- csec it home
- section 4 organisation structure of data