Click a paper to view its questions. The specification for the course is shown on the right. For each question, its specification references are listed and can be clicked to scroll the relevant part of the specification into view.

AS-Level 2024 June Paper 2AS-Level 2023 June Paper 2AS-Level 2022 June Paper 2AS-Level 2020 June Paper 2AS-Level 2019 June Paper 2AS-Level 2018 June Paper 2AS-Level 2017 June Paper 2AS-Level 2016 June Paper 2A-Level 2024 June Paper 2A-Level 2023 June Paper 2A-Level 2022 June Paper 2A-Level 2021 June Paper 2A-Level 2020 June Paper 2A-Level 2019 June Paper 2A-Level 2018 June Paper 2A-Level 2017 June Paper 2

Only A-Level questions relating to the AS-Level specification are shown.

A-Level2022June1.1open2 marks

Describe how a 12-bit unsigned binary integer such as 010010101110 can be converted directly into hexadecimal.

The method you describe must not involve converting into decimal.

Put the bits into groups of four/nibbles (starting at the right);

Convert each group of bits/nibble into a hexadecimal digit;

A. group/section/chunk of bits, even if number of bits not stated or incorrect for this mark

A. "value" or "number" for "digit"

A. convert each group of bits into decimal for 0 to 9, and letter A-F for 10 to 15

Do not award marks if the conversion has been done but has not been described, although it is acceptable for the conversion to be performed as part of the description.

A-Level2022June1.2open1 mark

State one reason why hexadecimal is often used in preference to binary.

More compact when displayed // can be displayed using fewer digits;

Easier (for people) to understand / remember; A. read, write

Lower likelihood of an error when typing in data;

Saves (the programmer) time writing / typing in data;

NE. takes up less space

R. if stated that hexadecimal uses less memory / storage

Max 1

A-Level2022June2.1open2 marks

A data communications system uses parallel data transmission.

Describe how parallel data transmission works.

Multiple bits transmitted simultaneously / at same time;

NE. data, values etc for bits

Each (simultaneously transmitted) bit is sent down a different wire / cable / path / line;

A. multiple wires / cables / paths / lines used for transmission

A-Level2022June2.2open1 mark

State one advantage of serial data transmission over parallel data transmission.

The hardware / wiring required for serial data transmission is cheaper;

NE. cheaper without reference to hardware or wiring

Serial transmission does not suffer from crosstalk // (two) bits cannot interfere with each other because they are not sent simultaneously;

Serial transmission does not suffer from data skewing // bits transmitted are guaranteed to arrive in the order they were sent;

NE. more reliable, lower probability of interference / corruption

Serial transmission can be used over longer distances;

Max 1

A-Level2022June2.3multiple-choice1 mark

Shade one lozenge to indicate which of these statements about data communications systems is false.

  • A:For a particular communications channel, the bit rate can be higher than the baud rate.
  • B:Latency is the rate at which signals on a wire or line can change.
  • C:The bandwidth of a transmission medium is the range of signal frequencies that the medium can transmit without a significant reduction in signal strength.
  • D:The greater the bandwidth of a transmission medium the higher the bit rate that can be achieved by a communication system using it.

B Latency is the rate at which signals on a wire or line can change;

R. if more than one lozenge shaded

A-Level2022June2.4open1 mark

State the purpose of the start bit in asynchronous serial transmission.

Start the receiver clock ticking;

A. to wake up the receiver

Synchronise the clock in the receiver to the transmitter clock // bring the clock in the receiver into phase with the clock in the transmitter;

A. to synchronise the receiver and transmitter clocks

A. synchronise the clocks in the devices

NE. synchronise the (two) clocks

R. indicates start of transmission

Max 1

A-Level2022June2.5open1 mark

State the purpose of the stop bit in asynchronous serial transmission.

Provides time for the receiver to process / transfer the received data;

NE. indicates that the received data can be processed

Allows the (next) start bit to be recognised;

R. indicates end of transmission

R. indicates clocks no longer need to be synchronised

Max 1

A-Level2022June3.1tableDiagram1 mark

Complete the truth table in Figure 1 for the inputs A and B.

ABA + BAB'A' ∙ B'(A' ∙ B')'
0001110
0111001
1010101
1110001

1 mark: Table correctly completed

A-Level2022June3.2openDiagram1 mark

The truth table in Figure 1 demonstrates the correctness of an important law in Boolean algebra.

State the name of the law.

De Morgan's (Law);

A-Level2022June3.3calculation4 marks

Using the rules of Boolean algebra, simplify the following Boolean expression.

(A' + B ∙ C + B ⋅ C')' + C ⋅ (A + A' ∙ (B + 1))

You must show your working.

Simplification of the two sub-expressions (A' + B ∙ C + B ⋅ C')' and C ⋅ (A + A' ∙ (B + 1)) should be marked independently. Stop awarding marks for a sub-expression as soon as a mistake has been made in that sub-expression, but continue to award marks for simplifying the other sub-expression.

Marking guidance for examiners:

  • award marks for working out until an incorrect step has been made
  • ignore missing steps from the example solutions, as long as the jumps between steps are logically correct
  • if, in any one step, a candidate is simplifying different parts of an expression simultaneously award all relevant marks for this multiple stage but don't award any further marks for working in any parts simplified incorrectly.

1 mark for final answer: A ∙ B̅ + C

Max 3 for working. Award up to three marks for applying each one of the three techniques (one mark per application):

  • a successful application of De Morgan's Law (and any associated cancellation of NOTs) that produces a simpler expression
  • applying an identity other than cancelling NOTs that produces a simpler expression
  • successfully putting terms into brackets
  • successfully expanding brackets
  • successfully using the distributive law.

Note: A simpler expression is one that is logically equivalent to the original expression but uses fewer logical operators.

Max 3 overall if any working is incorrect

A-Level2022June4.1open1 mark

Define the term 'system software'.

Software used in the management of a computer system // layer(s) of software that abstract the user from how the computer works // software that provides a platform for other software to use;

A. software used to run the computer

A. software that provides a virtual machine

NE. software that maintains a computer

A-Level2022June4.2multiple-choice1 mark

The list below contains five types of software. Four of the types are examples of system software.

Shade one lozenge to indicate which type of software is not system software.

  • A:Assemblers
  • B:Bitmap image editors
  • C:Interpreters
  • D:Libraries
  • E:Utility programs

B Bitmap image editors;

R. if more than one lozenge shaded

A-Level2022June4.3open2 marks

Describe two functions of an operating system.

To hide the complexities of the hardware from the user;

NE. virtual machine without description

R. user interface

To handle interrupts // to call appropriate interrupt handler (A. ISR) when an interrupt occurs;

To allocate processors/cores to processes // schedule processes // decide which process to carry out when // manage the execution of multiple processes;

NE. processor management

To allocate memory/RAM to processes // to determine what areas of memory are used for what purpose // moving data into and out of RAM / to a paging file for virtual memory // ensuring processes can only write to memory that they have been allocated;

NE. memory management

To allocate I/O devices to processes // manages communication between processes and I/O devices // automatic installation of drivers for new I/O devices;

A. examples of devices (but no more than one mark)

NE. manages I/O devices

To allocate space on a storage device to files // organising files into directories // determines where on a device to save a file // recognising storage devices when they are connected;

A. defragmentation of disks

NE. saving a file

Installation of new software // automatic / managing updating of software;

A. "programs" or "tasks" for "processes"

Manage power consumption / use of battery;

A. examples of this eg controlling clock speed, brightness of screen

Note: Students must describe – phrases such as "processor management", "allocating memory" etc are not enough.

Max 2

A-Level2022June6open12 marks

Supermarkets often gather information about their customers and the purchases that they make. This information can be analysed by the supermarket and other companies for a range of purposes.

Some of the information is collected at the checkout, where the identity of the person is read from a loyalty or payment card using RFID (radio-frequency identification) and a barcode reader is used to identify the products being purchased.

By analysing the purchases that a shopper has made, it might be possible to identify such things as whether the shopper has children, is pregnant, or lives in a house with a garden. Other types of analysis might include the amount of money a customer spends, the times that they choose to shop at and the differences in shopping habits of different groups of shoppers.

Describe the principles of operation of the hardware used to collect the information and discuss some of the ethical and legal issues that might arise as a result of the capture and processing of this data.

In your answer you will be assessed on your ability to follow a line of reasoning to produce a coherent, relevant and structured response.

Level 4 (10–12 marks): A line of reasoning has been followed to produce a coherent, relevant, substantiated and logically structured response. The response covers all three areas indicated in the guidance below and there is sufficient detail to show that the student has a good level of understanding of at least two of these.

Level 3 (7–9 marks): A line of reasoning has been followed to produce a coherent, relevant, substantiated and logically structured response which shows a good level of understanding of at least one area indicated in the guidance below and a satisfactory understanding of at least one other area.

Level 2 (4–6 marks): A limited attempt has been made to follow a line of reasoning and the response has a mostly logical structure. Either a good level of understanding has been demonstrated of one area or some understanding had been demonstrated of at least two areas.

Level 1 (1–3 marks): A few relevant points have been made but there is no evidence that a line of reasoning has been followed. The points may only relate to one or two of the areas from the guidance. There is insufficient evidence of a good understanding of any of the three areas.

Area 1: How RFID works

  • RFID tag contains (transmission) circuitry and antenna
  • Memory on tag stores (customer) data
  • RFID reader (at till) transmits / sends signal // emits electric / electro-magnetic field
  • Signal activates / energises / induces current in RFID tag
  • RFID tag transmits / sends data by radio (wave)
  • RFID reader converts radio (wave) / signal back into (binary) data
  • RFID tag (on a card) is a passive device
  • RFID transmits over very short range

Area 2: How barcode works

(reflected light method)

  • A light source / laser is directed at bar code // bar code is illuminated
  • (Moving) mirror / prism moves light beam across bar code // user moves reader across bar code // user moves the bar code across the reader
  • Light reflected back
  • Black / white bands reflect different amounts of light // black reflects less light // white reflects more light
  • Light sensor / photodiode / CCD (measures amount of reflected light)
  • Light reflected converted into an electrical signal A. convert reflection to (binary) numbers / characters / ASCII

(CMOS/CCD/camera method)

  • Grid of (pixel) sensors // CMOS/CCD sensor
  • Each sensor measures light intensity of a point
  • Sensor outputs a voltage dependent upon light intensity
  • Voltages turned into binary data // voltages passed through Analogue-to-Digital Converter (ADC) // voltages turned into a digitised version of the image / barcode
  • Image processing software analyses image
  • This identifies black / white bands in barcode (which are turned into numbers)

Note: Students only need to describe one of the two methods for barcodes.

Area 3: Ethical and legal issues

(ethical)

  • Customers may believe that data about what they buy/spend is personal // invasion of privacy
  • Purchase of some items might be considered sensitive // some data might be considered to be sensitive (accept relevant examples)
  • Will people fully understand what will be done with the data, even if they are told it is being collected
  • Customers need to decide whether to allow the store to collect data about them (is it worth it for the return that they may get eg incentives / vouchers?) //do people feel forced to consent to benefit from offers
  • Can company be sufficiently confident that any other companies they share the data with will process the data legally / fairly/for the purposes that they said they would?
  • Risk of the supermarket carrying out actions that might reveal to other members of a shopper's household things that the supermarket has deduced that the householders don't know
  • Should ethical consideration be given to the products promoted to people using the data collected about them or is it okay to promote a product to anyone?
  • Are there some types of customers who should not be targeted with promotions at all // is it ethical to promote products to vulnerable customers?

(legal)

  • Naming a relevant law – GDPR, Data Protection Act
  • Need to inform customers of what will be done with data // consent required to collect data R. customer has not consented
  • Data must be kept securely
  • Need to consider what purposes data should be used for
  • Consideration of who should be able to access the data // there are rules about who the data can be shared with
  • Possible negative impact if data stolen or leaked // information could be misused
  • Limit on time-period that the data can be kept for
  • Need to ensure that collected data is accurate
  • Ensure data only transferred to countries it is legally allowed to go to // if transferred abroad, different laws may apply
  • The supermarket should let the customers see/edit data about them
  • Use of RFID might make data vulnerable to theft
A-Level2022June8.1open3 marks

Compare how peer-to-peer networking and client-server networking work.

Award 1 mark for each comparison made (row in the table below). The student only needs to state one side of the comparison to be awarded the mark. Stating both sides is not worth two marks.

Max 3

Peer-to-PeerClient-Server
Each computer has equal status // each computer can act as (both) a client and a server
R. "user" for "computer"
One or more computer(s) nominated as server(s), other computers are clients
Resources stored on / shared from any computer
A. examples of resources
NE. data can be sent between clients
Clients access resources from server(s) // resources are stored on the server(s)
A. examples of resources
No centralised management of security // security can be managed individually on each computer (by the user)Centralised management of security // must login to access server(s)
The same resource can be made available or shared from multiple computers // no reliance on central serverResources cannot be accessed if server(s) turned off // reliance on central server(s) // the server(s) must always be turned on
Hardware and software on computers is general purpose // not optimised for providing servicesHardware and software on server(s) can be optimised for providing services
A-Level2022June8.2open3 marks

Explain why a peer-to-peer system would be most appropriate to use in the house.

Small number of users / devices;

NE. small network

Likely that the users will trust each other // unlikely that confidential data that requires security will be stored // no requirement for complex security; (A. examples eg access rights, types of user)

Individual users will have ability to choose which files/resources they share and with who;

Will avoid additional cost of buying server;

R. cheaper without further explanation

No additional expertise required to set up / manage server(s) // easier to setup as no server to configure;

R. easier to set up / maintain without further explanation

Max 3

A-Level2022June9.1openDiagram1 mark

State the name of the addressing mode used in the instruction ADD R3, R3, R0

Direct (addressing);

A-Level2022June9.2tableDiagram5 marks

Memory location 120 contains the value 23 and memory location 121 contains the value 5.

Complete the trace table to show how the contents of the memory locations and registers change when the program in Figure 7 is executed.

Memory LocationsRegisters
120121122R0R1R2R3
2352350
123
462
9211115
1840
115115

1 mark: Correct initial values loaded into registers R0, R1 and R3: 23, 5, 0

1 mark: R2 has initial value 1 and R3 is updated to 23

1 mark: R0 shifted left to give 46 and R1 shifted right to give 2

1 mark: R0 changes to 92 then 184, R1 changes to 1 then 0, R2 changes to 0 then 1

1 mark: R3 and memory location 122 set to 115

Max 4 if any incorrect values written into table

A-Level2022June9.3openDiagram1 mark

State the purpose of the program in Figure 7.

(To) multiply (the two numbers in memory locations 120 and 121 together, storing the result in memory location 122);

A. multiplication

A-Level2022June9.4openDiagram2 marks

The program in Figure 7 has been written using assembly language.

State two reasons why the programmer may have chosen to write this program in assembly language rather than in a high-level programming language.

So it will execute more quickly;

TO. if stated that it executes more quickly because translation is not required

So it will use less memory (when translated);

NE. uses less space, more compact

A translator for a high-level language might not have been available;

Programmer would have complete (A. more) control over the final machine code that is output by the translator / executed;

R. direct access to hardware / registers

Max 2

A-Level2022June9.5openDiagram1 mark

The program in Figure 7 will be translated into machine code.

Explain the relationship between an assembly language instruction and a machine code instruction.

There is a one-to-one mapping // each assembly language instruction translates into one machine code instruction;

A-Level2022June10.1calculation3 marks

A digital recording was made using a sampling rate of 44 100 Hz with a 16-bit sample resolution.

A sampling rate of 1 Hz means that one sample has been taken every second.

The file, which stores only the recording, is 17.199 megabytes in size.

Calculate the duration of the recording in seconds.

You should show your working.

Award 3 marks if correct final answer is shown: 195 seconds

A. 3 minutes 15 seconds, 3.25 minutes but NE. 3.25 without units given

If final answer is not given / incorrect then award up to 2 marks for working for points from this list:

  • Conversion of sample size into bytes or bits: multiplication by 1000 and 1000 (and 8) // multiplication by 1000000 / 8000000 // value 17199000 / 137592000 used in calculation
  • Calculating number of seconds from size of sample: dividing a number by both 44100 and 16 (or 2) OR multiplying 44100 by 16 (or 2)
    Note: Award this mark even if sample size incorrectly calculated.
A-Level2022June10.2open3 marks

MIDI is a system that can be used to enable musical devices to communicate and to represent music on a computer.

Describe the advantages of using MIDI to represent music instead of using sampled sound.

More compact representation;

NE. requires less space

Easy to modify / edit (at note level) // easy to change values eg octave for entire score // easy to change instruments;

Simple method to compose algorithmically;

Musical score can be generated directly from a MIDI file;

No data lost about musical notes // no data lost through sampling;

A. "better quality" but only if there is some explanation of this related to the sampling process eg "no error introduced during sampling", "no background noise recorded"

A. MIDI records the musician's inputs rather than the sound produced

The MIDI file can be directly output to control an instrument / a device;

Max 3

A-Level2022June13.1multiple-choice1 mark

Below is a definition of a term relating to the architecture of a computer system:

Machine code instructions stored in main memory are fetched and executed serially by a processor that performs arithmetic and logical operations.

Shade one lozenge to indicate which term this defines.

  • A:The Harvard architecture
  • B:The processor instruction set
  • C:The stored program concept
  • D:The von Neumann architecture

C The stored program concept;

R. if more than one lozenge shaded

A-Level2022June13.2open2 marks

Explain why desktop computers usually have secondary storage devices.

To store data / programs whilst the computer is turned off;

A. long-term / permanent storage

NE. secondary storage devices are non-volatile

NE. store data this is not in use

(As) the contents of RAM are lost when the computer is turned off;

R. "main memory" for "RAM"

A. main memory (RAM)

To transfer data / programs between computers;

NE. secondary storage devices are portable

Allows the storage of data sets / files that could not fit in RAM // computer architecture supports a limited amount of main memory/RAM;

A. primary store for main memory

NE. to extend storage capacity, to store more, to store large files, higher capacity

Max 2

A-Level2022June13.3open4 marks

A computer is fitted with a solid-state disk (SSD).

Describe the principles of operation of an SSD.

Level 2 (3-4 marks): A good understanding of the operation of an SSD has been demonstrated. The response is well structured, covers most of the points in the indicative content and does not contain any errors of understanding.

Level 1 (1-2 marks): Some relevant points have been made, but the description omits important details or contains some errors so that only a limited understanding is demonstrated.

Indicative content:

  • Data is stored electronically // there are no mechanical / moving parts
  • Data is stored in floating gate transistors // data is stored in transistors that do not lose their charge/state when power is no longer applied // electrons are trapped between oxide layers
  • Presence of trapped electrons / charge or absence indicates 0 / 1
    A. 0 or 1 either way around
    A. state represents 0 or 1
    A. off = 0, on = 1 (or other way around)
    A. "bit" for 0 or 1, but not "binary"
    R. positive and negative charges
  • NAND memory // flash memory // EEPROM memory is used
  • Data is organised into pages / blocks
  • A whole block (A. page) of data must be written // it is not possible to write individual values
  • A block (A. page) must be erased before it can be overwritten
  • Controller manages the organisation of the data // controller manages the reading and writing of data

Paper 2 covers sections 5-9 of the AQA AS Computer Science specification.

5 Fundamentals of data representation

5.1 Number systems

5.1.1 Natural numbers

ReferenceContentAdditional information
5.1.1.1
View

Be familiar with the concept of a natural number and the set ℕ of natural numbers (including zero).

ℕ = {0, 1, 2, 3, …}

5.1.2 Integer numbers

ReferenceContentAdditional information
5.1.2.1
View

Be familiar with the concept of an integer and the set ℤ of integers.

ℤ = { …, -3, -2, -1, 0, 1, 2, 3, … }

5.1.3 Rational numbers

ReferenceContentAdditional information
5.1.3.1
View

Be familiar with the concept of a rational number and the set ℚ of rational numbers, and that this set includes the integers.

ℚ is the set of numbers that can be written as fractions (ratios of integers). Since a number such as 7 can be written as 7/1, all integers are rational numbers.

5.1.4 Irrational numbers

ReferenceContentAdditional information
5.1.4.1
View

Be familiar with the concept of an irrational number.

An irrational number is one that cannot be written as a fraction, for example √2.

5.1.5 Real numbers

ReferenceContentAdditional information
5.1.5.1
View

Be familiar with the concept of a real number and the set ℝ of real numbers, which includes the natural numbers, the rational numbers, and the irrational numbers.

ℝ is the set of all 'possible real world quantities'.

5.1.6 Ordinal numbers

ReferenceContentAdditional information
5.1.6.1
View

Be familiar with the concept of ordinal numbers and their use to describe the numerical positions of objects.

When objects are placed in order, ordinal numbers are used to tell their position. For example, if we have a well-ordered set S = {'a', 'b', 'c', 'd'}, then 'a' is the 1st object, 'b' the 2nd, and so on.

5.1.7 Counting and measurement

ReferenceContentAdditional information
5.1.7.1
View

Be familiar with the use of natural numbers for counting.

5.1.7.2
View

Be familiar with the use of real numbers for measurement.

5.2 Number bases

5.2.1 Number base

ReferenceContentAdditional information
5.2.1.1
View

Be familiar with the concept of a number base, in particular:

  • decimal (base 10)
  • binary (base 2)
  • hexadecimal (base 16)

Students should be familiar with expressing a number's base using a subscript as follows:

  • Base 10: Number10, eg 6710
  • Base 2: Number2, eg 100110112
  • Base 16: Number16, eg AE16
5.2.1.2
View

Convert between decimal, binary and hexadecimal number bases.

5.2.1.3
View

Be familiar with, and able to use, hexadecimal as a shorthand for binary and to understand why it is used in this way.

5.3 Units of information

5.3.1 Bits and bytes

ReferenceContentAdditional information
5.3.1.1
View

Know that the bit is the fundamental unit of information.

A bit is either 0 or 1.

5.3.1.2
View

Know that a byte is a group of 8 bits.

5.3.1.3
View

Know that 2n different values can be represented with n bits.

For example, 3 bits can be configured in 23 = 8 different ways: 000, 001, 010, 011, 100, 101, 110, 111.

5.3.2 Units

ReferenceContentAdditional information
5.3.2.1
View

Know the names, symbols and corresponding powers of 10 for the decimal prefixes:

  • kilo, k - 103
  • mega, M - 106
  • giga, G - 109
  • tera, T - 1012
5.3.2.2
View

Know the names, symbols and corresponding powers of 2 for the binary prefixes:

  • kibi, Ki - 210
  • mebi, Mi - 220
  • gibi, Gi - 230
  • tebi, Ti - 240
5.3.2.3
View

Know that quantities of bytes can be described using binary prefixes representing powers of 2 or using decimal prefixes representing powers of 10, eg one kibibyte is written as 1KiB = 210 B and one kilobyte is written as 1 kB = 103 B.

Historically the terms kilobyte, megabyte, etc have often been used when kibibyte, mebibyte, etc are meant.

5.4 Binary number system

5.4.1 Unsigned binary

ReferenceContentAdditional information
5.4.1.1
View

Know the difference between unsigned binary and signed binary.

Students are expected to be able to convert between unsigned binary and decimal and vice versa.

5.4.1.2
View

Know that in unsigned binary the minimum and maximum values for a given number of bits, n, are 0 and 2n - 1 respectively.

5.4.2 Unsigned binary arithmetic

ReferenceContentAdditional information
5.4.2.1
View

Be able to add two unsigned binary integers.

5.4.2.2
View

Be able to multiply two unsigned binary integers.

5.4.3 Signed binary using two's complement

ReferenceContentAdditional information
5.4.3.1
View

Know that signed binary can be used to represent negative integers and that one possible coding scheme is two's complement.

This is the only representation of negative integers that will be examined. Students are expected to be able to convert between signed binary and decimal and vice versa.

5.4.3.2
View

Know how to represent negative and positive integers in two's complement.

5.4.3.3
View

Know how to perform subtraction using two's complement.

5.4.3.4
View

Know how to calculate the range of a given number of bits, n.

5.4.4 Numbers with a fractional part

ReferenceContentAdditional information
5.4.4.1
View

Know how numbers with a fractional part can be represented in fixed point form in binary in a given number of bits.

5.4.4.2
View

Be able to convert decimal to fixed point binary of a given number of bits.

5.4.4.3
View

Be able to convert fixed point binary to decimal of a given number of bits.

5.5 Information coding systems

5.5.1 Character form of a decimal digit

ReferenceContentAdditional information
5.5.1.1
View

Differentiate between the character code representation of a decimal digit and its pure binary representation.

5.5.2 ASCII and Unicode

ReferenceContentAdditional information
5.5.2.1
View

Describe ASCII and Unicode coding systems for coding character data.

5.5.2.2
View

Explain why Unicode was introduced.

5.5.3 Error checking and correction

ReferenceContentAdditional information
5.5.3.1
View

Describe and explain the use of parity bits.

5.5.3.2
View

Describe and explain the use of majority voting.

5.5.3.3
View

Describe and explain the use of check digits.

5.5.3.4
View

Evaluate the use of parity bits, majority voting and check digits

5.6 Representing images, sound and other data

5.6.1 Bit patterns, images, sound and other data

ReferenceContentAdditional information
5.6.1.1
View

Describe how bit patterns may represent other forms of data, including graphics and sound.

5.6.2 Analogue and digital

ReferenceContentAdditional information
5.6.2.1
View

Understand the difference between analogue and digital:

  • data
  • signals

5.6.3 Analogue/digital conversion

ReferenceContentAdditional information
5.6.3.1
View

Describe the principles of operation of an analogue to digital converter (ADC).

5.6.3.2
View

Describe the principles of operation of a digital to analogue converter (DAC).

5.6.4 Bitmapped graphics

ReferenceContentAdditional information
5.6.4.1
View

Explain how bitmaps are represented.

5.6.4.2
View

Explain resolution.

Resolution is expressed as number of dots per inch where a dot is a pixel.

5.6.4.3
View

Know that colour depth is the number of bits stored for each pixel.

5.6.4.4
View

Know that the size of an image in pixels is width of image in pixels × height of image in pixels.

The size of an image is also alternatively sometimes described as the resolution of an image.

5.6.4.5
View

Calculate storage requirements for bitmapped images and be aware that bitmap image files may also contain metadata.

Ignoring metadata, storage requirements = size in pixels x colour depth where size in pixels is width in pixels x height in pixels.

5.6.4.6
View

Be familiar with typical metadata.

eg width, height, colour depth.

5.6.5 Digital representation of sound

ReferenceContentAdditional information
5.6.5.1
View

Describe the digital representation of sound.

5.6.5.2
View

Understand sample resolution and its effect on the quality of audio recordings.

5.6.5.3
View

Understand sampling rate and its effect on the quality of audio recordings.

5.6.5.4
View

Know Nyquist's theorem.

5.6.5.5
View

Calculate sound sample sizes in bytes.

5.6.6 Musical Instrument Digital Interface (MIDI)

ReferenceContentAdditional information
5.6.6.1
View

Describe the purpose of MIDI and the use of event messages in MIDI.

5.6.6.2
View

Describe the advantages of using MIDI files for representing music.

5.6.7 Data compression

ReferenceContentAdditional information
5.6.7.1
View

Know why images and sound files are often compressed and that other files, such as text files, can also be compressed.

5.6.7.2
View

Understand the difference between lossless and lossy compression and explain the advantages and disadvantages of each.

5.6.7.3
View

Explain the principles behind run length encoding (RLE) for lossless compression.

5.6.7.4
View

Explain the principles behind dictionary-based methods for lossless compression.

5.6.8 Encryption

ReferenceContentAdditional information
5.6.8.1
View

Understand what is meant by encryption and be able to define it.

Caesar and Vernam ciphers are at opposite extremes. One offers perfect security, the other doesn't. Between these two types are ciphers that are computationally secure – see below. Students will be assessed on the two types. Ciphers other than Caesar may be used to assess students' understanding of the principles involved. These will be explained and be similar in terms of computational complexity.

5.6.8.2
View

Be familiar with the term cipher.

5.6.8.3
View

Be familiar with the term plaintext.

5.6.8.4
View

Be familiar with the term ciphertext.

5.6.8.5
View

Be familiar with Caesar cipher and be able to apply it to encrypt a plaintext message and decrypt a ciphertext.

5.6.8.6
View

Be able to explain why Caesar cipher is easily cracked.

5.6.8.7
View

Be familiar with Vernam cipher or one-time pad and be able to apply it to encrypt a plaintext message and decrypt a ciphertext.

Since the key k is chosen uniformly at random, the ciphertext c is also distributed uniformly. The key k must be used once only. The key k is known as a one-time pad.

5.6.8.8
View

Explain why Vernam cipher is considered as a cypher with perfect security.

5.6.8.9
View

Compare Vernam cipher with ciphers that depend on computational security.

Vernam cipher is the only one to have been mathematically proved to be completely secure. The worth of all other ciphers ever devised is based on computational security. In theory, every cryptographic algorithm except for Vernam cipher can be broken, given enough ciphertext and time.

6 Fundamentals of computer systems

6.1 Hardware and software

6.1.1 Relationship between hardware and software

ReferenceContentAdditional information
6.1.1.1
View

Define the term hardware.

6.1.1.2
View

Define the term software.

6.1.1.3
View

Understand the relationship between hardware and software.

6.1.2 Classification of software

ReferenceContentAdditional information
6.1.2.1
View

Explain what is meant by system software.

6.1.2.2
View

Explain what is meant by application software.

6.1.2.3
View

Understand the need for, and attributes of, different types of software.

6.1.3 System software

ReferenceContentAdditional information
6.1.3.1
View

Know that system software includes operating systems (OSs), utility programs, libraries and translators (compiler, assembler, interpreter).

6.1.3.2
View

Understand the need for, and functions of operating systems (OSs).

6.1.3.3
View

Understand the need for, and functions of utility programs.

6.1.3.4
View

Understand the need for, and functions of libraries.

6.1.3.5
View

Understand the need for, and functions of translators (compiler, assembler, interpreter).

6.1.4 Role of an operating system (OS)

ReferenceContentAdditional information
6.1.4.1
View

Understand that a role of the operating system is to hide the complexities of the hardware.

6.1.4.2
View

Know that the OS handles resource management, managing hardware to allocate processors, memories and I/O devices among competing processes.

6.2 Classification of programming languages

6.2.1 Classification of programming languages

ReferenceContentAdditional information
6.2.1.1
View

Show awareness of the development of types of programming languages and their classification into low- and high-level languages.

6.2.1.2
View

Know that low-level languages are considered to be:

  • machine-code
  • assembly language
6.2.1.3
View

Know that high-level languages include imperative high-level language.

6.2.1.4
View

Describe machine-code language and assembly language.

6.2.1.5
View

Understand the advantages and disadvantages of machine-code and assembly language programming compared with high-level language programming.

6.2.1.6
View

Explain the term 'imperative high-level language' and its relationship to low-level languages.

6.3 Types of program translator

6.3.1 Types of program translator

ReferenceContentAdditional information
6.3.1.1
View

Understand the role of assemblers.

6.3.1.2
View

Understand the role of compilers.

6.3.1.3
View

Understand the role of interpreters.

6.3.1.4
View

Explain the differences between compilation and interpretation. Describe situations in which each would be appropriate.

6.3.1.5
View

Explain why an intermediate language such as bytecode is produced as the final output by some compilers and how it is subsequently used.

6.3.1.6
View

Understand the difference between source and object (executable) code.

6.4 Logic gates

6.4.1 Logic gates

ReferenceContentAdditional information
6.4.1.1
View

Construct truth tables for the NOT logic gate.

Students should know and be able to use ANSI/IEEE standard 91-1984 Distinctive shape logic gate symbols for these logic gates.

6.4.1.2
View

Construct truth tables for the AND logic gate.

6.4.1.3
View

Construct truth tables for the OR logic gate.

6.4.1.4
View

Construct truth tables for the XOR logic gate.

6.4.1.5
View

Construct truth tables for the NAND logic gate.

6.4.1.6
View

Construct truth tables for the NOR logic gate.

6.4.1.7
View

Be familiar with drawing and interpreting logic gate circuit diagrams involving one or more of the above gates.

6.4.1.8
View

Complete a truth table for a given logic gate circuit.

6.4.1.9
View

Write a Boolean expression for a given logic gate circuit.

6.4.1.10
View

Draw an equivalent logic gate circuit for a given Boolean expression.

6.5 Boolean algebra

6.5.1 Using Boolean algebra

ReferenceContentAdditional information
6.5.1.1
View

Be familiar with the use of Boolean identities and De Morgan's laws to manipulate and simplify Boolean expressions.

7 Fundamentals of computer organisation and architecture

7.1 Internal hardware components of a computer

7.1.1 Internal hardware components of a computer

ReferenceContentAdditional information
7.1.1.1
View

Have an understanding and knowledge of the basic internal components of a computer system.

Although exam questions about specific machines will not be asked, it might be useful to base this section on the machines used at the centre.

7.1.1.2
View

Understand the role of the processor.

7.1.1.3
View

Understand the role of main memory.

7.1.1.4
View

Understand the role of the address bus.

7.1.1.5
View

Understand the role of the data bus.

7.1.1.6
View

Understand the role of the control bus.

7.1.1.7
View

Understand the role of I/O controllers.

7.1.1.8
View

Be able to explain the difference between von Neumann and Harvard architectures and describe where each is typically used.

Embedded systems such as digital signal processing (DSP) systems use Harvard architecture processors extensively. Von Neumann architecture is used extensively in general purpose computing systems.

7.1.1.9
View

Understand the concept of addressable memory.

7.2 The stored program concept

7.2.1 The meaning of the stored program concept

ReferenceContentAdditional information
7.2.1.1
View

Be able to describe the stored program concept: machine code instructions stored in main memory are fetched and executed serially by a processor that performs arithmetic and logical operations.

7.3 Structure and role of the processor and its components

7.3.1 The processor and its components

ReferenceContentAdditional information
7.3.1.1
View

Explain the role and operation of the arithmetic logic unit.

7.3.1.2
View

Explain the role and operation of the control unit.

7.3.1.3
View

Explain the role and operation of the clock.

7.3.1.4
View

Explain the role and operation of general-purpose registers.

7.3.1.5
View

Explain the role and operation of the program counter.

7.3.1.6
View

Explain the role and operation of the current instruction register.

7.3.1.7
View

Explain the role and operation of the memory address register.

7.3.1.8
View

Explain the role and operation of the memory buffer register.

7.3.1.9
View

Explain the role and operation of the status register.

7.3.2 The Fetch-Execute cycle and the role of registers within it

ReferenceContentAdditional information
7.3.2.1
View

Explain how the Fetch-Execute cycle is used to execute machine code programs, including the stages in the cycle (fetch, decode, execute) and details of registers used.

7.3.3 The processor instruction set

ReferenceContentAdditional information
7.3.3.1
View

Understand the term 'processor instruction set' and know that an instruction set is processor specific.

7.3.3.2
View

Know that instructions consist of an opcode and one or more operands (value, memory address or register).

A simple model will be used in which the addressing mode will be incorporated into the bits allocated to the opcode so the latter defines both the basic machine operation and the addressing mode. Students will not be expected to define opcode, only interpret opcodes in the given context of a question.

For example, 4 bits have been allocated to the opcode (3 bits for basic machine operation, eg ADD, and 1 bit for the addressing mode). 4 bits have been allocated to the operand, making the instruction, opcode + operand, 8 bits in length. In this example, 16 different opcodes are possible (24 = 16).

OpcodeOperand
Basic Machine OperationAddressing Mode
00100101

7.3.4 Addressing modes

ReferenceContentAdditional information
7.3.4.1
View

Understand and apply immediate addressing.

Immediate addressing: the operand is the datum.

7.3.4.2
View

Understand and apply direct addressing.

Direct addressing: the operand is the address of the datum. Address to be interpreted as meaning either main memory or register.

7.3.5 Machine-code/assembly language operations

ReferenceContentAdditional information
7.3.5.1
View

Understand and apply the basic machine-code operations of:

  • load
  • add
  • subtract
  • store
  • branching (conditional and unconditional)
  • compare
  • logical bitwise operators (AND, OR, NOT, XOR)
  • logical
  • shift right
  • shift left
  • halt

Use the basic machine-code operations above when machine-code instructions are expressed in mnemonic form—assembly language, using immediate and direct addressing.

7.3.6 Factors affecting processor performance

ReferenceContentAdditional information
7.3.6.1
View

Explain the effect on processor performance of multiple cores.

7.3.6.2
View

Explain the effect on processor performance of cache memory.

7.3.6.3
View

Explain the effect on processor performance of clock speed.

7.3.6.4
View

Explain the effect on processor performance of word length.

7.3.6.5
View

Explain the effect on processor performance of address bus width.

7.3.6.6
View

Explain the effect on processor performance of data bus width.

7.4 External hardware devices

7.4.1 Input and output devices

ReferenceContentAdditional information
7.4.1.1
View

Know the main characteristics, purpose and suitability of barcode readers and understand their principles of operation.

7.4.1.2
View

Know the main characteristics, purpose and suitability of digital cameras and understand their principles of operation.

7.4.1.3
View

Know the main characteristics, purpose and suitability of laser printers and understand their principles of operation.

7.4.1.4
View

Know the main characteristics, purpose and suitability of RFID and understand their principles of operation.

7.4.2 Secondary storage devices

ReferenceContentAdditional information
7.4.2.1
View

Explain the need for secondary storage within a computer system.

7.4.2.2
View

Know the main characteristics, purposes, suitability and understand the principles of operation of the hard disk.

7.4.2.3
View

Know the main characteristics, purposes, suitability and understand the principles of operation of the optical disk.

7.4.2.4
View

Know the main characteristics, purposes, suitability and understand the principles of operation of the solid-state disk (SSD).

SSD = NAND flash memory + a controller that manages pages, and blocks and complexities of writing. Based on floating gate transistors that trap and store charge. A block, made up of many pages, cannot overwrite pages; a page has to be erased before it can be written to but technology requires the whole block to be erased. Lower latency and faster transfer speeds than a magnetic disk drive.

7.4.2.5
View

Compare the capacity and speed of access of various media and make a judgement about their suitability for different applications.

8 Consequences of uses of computing

8.1 Individual (moral), social (ethical), legal and cultural issues and opportunities

ReferenceContentAdditional information
8.1.1
View

Show awareness of current individual (moral), social (ethical), legal and cultural opportunities and risks of computing.

Understand that:

  • developments in computer science and digital technologies have dramatically altered the shape of communications and information flows in societies, enabling massive transformations in the capacity to:
    • monitor behaviour
    • amass and analyse personal information
    • distribute, publish, communicate and disseminate personal information
  • computer scientists and software engineers therefore have power, as well as the responsibilities that go with it, in the algorithms that they devise and the code that they deploy.
  • software and their algorithms embed moral and cultural values.
  • the issue of scale, for software the whole world over, creates potential for individual computer scientists and software engineers to produce great good, but with it comes the ability to cause great harm.

Be able to discuss the challenges facing legislators in the digital age.

Teachers may wish to employ two very powerful techniques, hypotheticals and case studies, to engage students in the issues.

Hypotheticals allow students to isolate quickly important ethical principles in an artificially simplified context. For example, a teacher might ask students to explain and defend how, as a Google project manager, they would evaluate a proposal to bring Google's Street View technology to a remote African village. What questions should be asked? Who should be consulted? What benefits, risks and safeguards considered? What are the trade-offs?

Case studies allow students to confront the tricky interplay between the sometimes competing ethical values and principles relevant in real world settings. For example, the Google Street View case might be used to tease out the ethical conflicts between individual and cultural expectations, the principle of informed consent, Street View's value as a service, its potential impact on human perceptions and behaviours, and its commercial value to Google and its shareholders.

There are many resources available on the Internet to support teaching of this topic.

9 Fundamentals of communication and networking

9.1 Communication

9.1.1 Communication methods

ReferenceContentAdditional information
9.1.1.1
View

Define serial transmission methods.

9.1.1.2
View

Define parallel transmission methods.

9.1.1.3
View

Discuss the advantages of serial over parallel transmission.

9.1.1.4
View

Define and compare synchronous and asynchronous data transmission.

9.1.1.5
View

Describe the purpose of start and stop bits in asynchronous data transmission.

9.1.2 Communication basics

ReferenceContentAdditional information
9.1.2.1
View

Define baud rate.

9.1.2.2
View

Define bit rate.

9.1.2.3
View

Define bandwidth.

9.1.2.4
View

Define latency.

9.1.2.5
View

Define protocol.

9.1.2.6
View

Differentiate between baud rate and bit rate.

Bit rate can be higher than baud rate if more than one bit is encoded in each signal change.

9.1.2.7
View

Understand the relationship between bit rate and bandwidth.

Bit rate is directly proportionate to bandwidth.

9.2 Networking

9.2.1 Network topology

ReferenceContentAdditional information
9.2.1.1
View

Understand and explain the operation of a physical star topology.

9.2.1.2
View

Understand and explain the operation of a logical bus network topology.

A network physically wired in star topology can behave logically as a bus network by using a bus protocol and appropriate physical switching.

9.2.1.3
View

Differentiate between the physical star topology and the logical bus network topology.

9.2.2 Types of networking between hosts

ReferenceContentAdditional information
9.2.2.1
View

Explain peer-to-peer networking and describe situations where it might be used.

In a peer-to-peer network, each computer has equal status.

9.2.2.2
View

Explain client-server networking and describe situations where it might be used.

In a client-server network, most computers are nominated as clients and one or more as servers. The clients request services from the servers, which provide these services, for example file server, email server.

9.2.3 Wireless networking

ReferenceContentAdditional information
9.2.3.1
View

Explain the purpose of WiFi.

A wireless local area network that is based on international standards.

Used to enable devices to connect to a network wirelessly.

9.2.3.2
View

Be familiar with the components required for wireless networking.

  • Wireless network adapter
  • Wireless access point
9.2.3.3
View

Be familiar with the purpose of Service Set Identifier (SSID).

9.2.3.4
View

Be familiar with how wireless networks are secured using WPA (Wifi Protected Access)/WPA2.

9.2.3.5
View

Be familiar with how wireless networks are secured by disabling SSID (Service Set Identifier) broadcasting.

9.2.3.6
View

Be familiar with how wireless networks are secured using a MAC (Media Access Control) address allow list.

9.2.3.7
View

Explain the wireless protocol Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) with and without Request to Send/Clear to Send (RTS/CTS).