Click a paper to view its questions. The specification for the course is shown on the right. For each question, its specification references are listed and can be clicked to scroll the relevant part of the specification into view.

AS-Level 2024 June Paper 2AS-Level 2023 June Paper 2AS-Level 2022 June Paper 2AS-Level 2020 June Paper 2AS-Level 2019 June Paper 2AS-Level 2018 June Paper 2AS-Level 2017 June Paper 2AS-Level 2016 June Paper 2A-Level 2024 June Paper 2A-Level 2023 June Paper 2A-Level 2022 June Paper 2A-Level 2021 June Paper 2A-Level 2020 June Paper 2A-Level 2019 June Paper 2A-Level 2018 June Paper 2A-Level 2017 June Paper 2
AS-Level2018June1.1multiple-choice1 mark

Shade in one lozenge to indicate which of the descriptions in Table 1 describes the set of real numbers.

AA set of numbers that represent all possible real world quantities.
BA set of numbers that can be written as fractions (ratios of integers).
CA set of numbers that cannot be written as fractions (ratios of integers).

A;

R. More than one lozenge shaded

AS-Level2018June1.2multiple-choice1 mark

Shade in one lozenge to indicate which of the descriptions in Table 1 describes the set of irrational numbers.

AA set of numbers that represent all possible real world quantities.
BA set of numbers that can be written as fractions (ratios of integers).
CA set of numbers that cannot be written as fractions (ratios of integers).

C;

R. More than one lozenge shaded

AS-Level2018June2.1table2 marks

Table 2 lists five different quantities of memory, each measured using different units.

Place the quantities of memory into order by writing the numbers 1 to 5 in the Position column of Table 2, with 1 representing the smallest quantity and 5 representing the largest quantity.

QuantityPosition
3 kilobytes
2 mebibytes
2 bytes
2 megabytes
20 bits
QuantityPosition
3 kilobytes3
2 mebibytes5
2 bytes1
2 megabytes4
20 bits2

Mark as follows:

  • 1 mark for bits, bytes and kilobytes in correct positions
  • 1 mark for mebibytes and megabytes in correct positions
AS-Level2018June2.2calculation2 marks

Convert the hexadecimal numbers 27 and C9 into binary. Then, in binary, add them together to work out the total. Finally, convert the total back into hexadecimal to give the answer.

You must show your working.

Answer in hexadecimal:

1 mark for correct conversions between representations, allowing follow through for final answer.

2716 = 0010 01112

C916 = 1100 10012

Final answer: F016

1 mark for binary addition 111100002 allowing follow through if conversion was incorrect.

AS-Level2018June2.3calculation1 mark

In decimal, what is the most negative number that can be represented using a 12-bit two’s complement binary integer?

-2048;

AS-Level2018June3.1open2 marks

Describe the difference between analogue and digital data.

  • 1 mark for identifying that analogue is continuous data
  • 1 mark for identifying that digital has discrete values / stored as binary values A. consists of 1s and 0s.
AS-Level2018June3.2open2 marks

State two advantages of representing music using MIDI instead of as sampled sound.

  • More compact representation;
  • Easy to modify / edit notes // easy to change values eg octave for entire score;
  • Easy to change instruments;
  • Simple method to compose algorithmically;
  • Musical score can be generated directly from a MIDI file;
  • No data lost about musical notes // no data lost through sampling; A. "better quality" but only if it there is some explanation of this eg "no error introduced during sampling", "no background noise recorded"
  • The MIDI file can be directly output to control a device;
  • MIDI records the musician's inputs rather than the sound produced;

Max 2

AS-Level2018June4.1open1 mark

What is encryption?

(Using an algorithm) to convert a message into a form that is not understandable (without the key to decrypt it);

(Using an algorithm) to convert a message into a form that is only understandable by the intended parties // can only be read with the correct key;

(Using an algorithm) to convert a message into cipher text;

N.E. Scrambling unless further explanation is provided

N.E. Coding

A. "Unreadable" for "understandable"

A. "Data" for "a message"

R. Responses that do not make clear that encryption is a process

Max 1

AS-Level2018June4.2open2 marks

A sensitive message could be encrypted using either the Vernam cipher or the Caesar cipher.

Explain why the Vernam cipher is a better choice.

  • Vernam cipher (if implemented correctly) is unbreakable / harder to crack / Caesar cipher can be easily cracked;
  • Frequency / statistical analysis of ciphertext reveals nothing about plaintext;
  • More possible keys;
  • Vernam cipher does not always translate a ciphertext character to the same plaintext character (removing repeated patterns);

A. Points made in reverse, ie as disadvantages of the Caesar cipher

Max 2

AS-Level2018June4.3calculation3 marks

The bit pattern 1010011 1001111 1001110 represents the string ‘SON’ in 7-bit ASCII.

The bit pattern 1000001 represents the character ‘A’ in 7-bit ASCII and other characters follow on from this in sequence. For example, the bit pattern 1001000 represents the character ‘H’.

What bit pattern results from encrypting the string ‘SON’ using a Vernam cipher with the key ‘HOG’?

You must show your working.

  • 1 mark for identifying 1001000 1001111 1000111 as the binary representation of 'HOG'
  • 1 mark for final result being 21 bits long;

R. if result is the same as HOG (1001000 1001111 1000111) or SON (1010011 1001111 1001110)

1 mark for correct application of XOR;

0011011 0000000 0001001

A. follow through mistakes

AS-Level2018June5.1multiple-choice1 mark

Shade one lozenge to indicate which category of software an operating system belongs to.

  • System software
  • Application software
  • Translation software

System Software;

R. More than one lozenge shaded

AS-Level2018June5.2open1 mark

State one resource that the operating system manages.

Mark as follows:

  • Processors A. CPU;
  • Memory / Memories A. RAM;
  • I/O devices (among competing processes) A. examples;

A. Hardware

Max 1

AS-Level2018June5.3open1 mark

State one role of the operating system, other than resource management.

The role of the operating system is to hide the complexities of the hardware from the user;

A. other reasonable answers that are not resource management.

AS-Level2018June6.1open2 marks

What is the stored program concept?

  • Instructions are stored in (main) memory;
  • Instructions are fetched, (decoded) and executed (serially) by the processor;
  • Programs can be moved in and out of main memory;

Max 2

AS-Level2018June6.2open2 marks

Ella’s executable file will not run on Josephine’s computer because the two computers have different processors.

Explain why having different processors may have caused this problem.

Mark as follows:

AO2 (analyse) – 1 mark:

The different processors have different instruction sets;

A. Examples such as different numbers of general purpose registers / different architecture.

AO1 (understanding) – 1 mark:

The program is in machine code / platform dependent / makes use of those instructions;

A. The program has been compiled

NE. Not portable

AS-Level2018June6.3open2 marks

The processor in Ella’s computer has four cores running at 2.8 GHz and the processor in Josephine’s computer has one core running at 3.2 GHz.

Considering these differences, explain why Josephine’s computer might be able to complete a particular task more quickly than Ella’s.

Mark as follows:

AO2 (analyse) – 1 mark:

A processor with a clock speed of 3.2GHz may be able to execute (sequential) instructions more quickly than a processor with a clock speed of 2.8GHz;

AO1 (understanding) – 1 mark:

Where parallel processing is not possible / sequential processing is needed this may enable the 3.2GHz processor to complete the task sooner than the 2.8GHz processor;

A. 'Josephine's computer' for 3.2GHz processor and 'Ella's computer' for 2.8GHz processor

AS-Level2018June7.1open9 marks

A company employs a team of programmers to develop software to control a fleet of driverless cars, providing a taxi service for clients in a large city.

Discuss a range of moral, ethical, legal and cultural issues that the programmers may need to consider whilst developing the service and that may arise during the use of the service by the public.

In your answer you will be assessed on your ability to follow a line of reasoning to produce a coherent, relevant and structured response.

Level of response question

LevelDescriptionMark Range
3A line of reasoning has been followed to produce a coherent, relevant and substantiated and logically structured response. The response covers at least three of moral, ethical, legal and cultural issues. In these areas there is sufficient detail to show that the student has a good level of understanding of the issues faced by the programmers. A good level of understanding would be indicated by at least seven substantiated points being made.7-9
2A line of reasoning has been followed to produce a mostly coherent, relevant, substantiated and logically structured response that covers at least two of moral, ethical, legal and cultural issues. At least four valid points must have been made showing reasonable understanding of the issues faced by the programmers.4-6
1A few relevant points have been made but there is no evidence that a line of reasoning has been followed. At least one of moral, ethical, legal and cultural issues must be covered. Links to the programmer may be tenuous.1-3

Note: The following notes are indicative content only and should not be used as a checklist.

Moral:

  • The developers may have to take on board the responsibility should an accident occur.
  • The developers may need to develop systems that cause the vehicle to make moral decisions in times of crisis e.g. if a crash is inevitable, what does the vehicle choose to crash in to.
  • The developer will have to accept that they are perpetuating or increasing use of vehicles which may have a negative impact on the environment.
  • The ability to keep them protected from hackers who might want to take over their controls while someone is on-board.

Ethical:

  • The developer may be putting taxi drivers out of business.
  • By developing self-driving taxis, other similar businesses may follow suit causing further ethical considerations.
  • Customers may not realise the taxi is computer-controlled until they enter the vehicle leaving them in a dilemma.
  • If a customer is taken ill the taxi may not be able to deal with the situation.

Legal:

  • Legal responsibility for accidents may be called into question.
  • If videos/images are taken during driving these may infringe the privacy of the occupants.
  • Passengers may find it easier to defraud or not pay the taxi company.

Cultural:

  • Some cultures may dislike the assignation of human virtues on machines.
  • The culture of the 'cabbie' may be damaged.
  • As most accidents are caused by driver error and so the use of driverless cars, in theory, would improve safety. How can the public be persuaded of this?
  • Driverless cars would, in theory, reduce congestion and so how can this be communicated to improve uptake?
AS-Level2018June7.2open6 marks

Cameras within the taxi take still images once every second for security purposes. The images are compressed using run-length encoding and stored on a flash memory card within the camera.

Describe how a digital image could be captured by a digital camera and compressed using run-length encoding.

Level of response question

LevelDescriptionMark Range
3At least five points have been made that shows a very good understanding of both how an image is captured and how run-length encoding is applied.5-6
2At least three points have been made that show a good understanding of at least one of how an image is captured and how run-length encoding is applied.3-4
1At least one point has been made that shows some understanding of either image-capture or run-length encoding.1-2

Guidance – Indicative Response

Image Capture

  • Light enters through/is focussed by the lens; on to (an array of sensors on) the sensor chip A. light sensors capture/record light (intensity) A. CCD as sensor;
  • Each sensor produces an electrical current/signal;
  • The signal represents a pixel;
  • An (ADC) converts measurement of light intensity into binary/digital data;
  • (Colour) filter is applied to generate separate data values for red, green and blue colour components;
  • The pixels are recorded as a group / array;

Run-Length Encoding

  • The image is analysed to identify runs/sequences of the same colour/value NE. patterns;
  • The colours/values and counts of pixels/values/run-lengths are represented/identified/stored A. example;
AS-Level2018June8.1open2 marks

A network with a physical star topology can have a logical bus topology.

Describe the difference between a physical and a logical topology.

Physical: The (physical) layout/arrangement/architecture of the cabling/wiring/connections (between the devices/computers on the network);

A. The (physical) layout/arrangement/architecture of the devices/computers/network

NE. How the devices/computers are connected to each other

NE. "Setup" for layout

NE. List of topologies eg bus, star

Logical: How the data/packets flow around a network // architecture of the communication mechanism in a network;

A. Conceptual way that data moves around a network

A. The type of protocol used (must be related to logical topology)

NE. How a network operates/behaves

AS-Level2018June8.2open2 marks

Explain the operation of a physical star topology.

  • Every device is (directly) connected to a central node/switch/hub;
  • Every device sends data via the central node/switch/hub;
  • The switch sends packets of data to the intended recipient only // The hub sends every packet of data to every device;

R. Computer

Max 2

AS-Level2018June8.3open6 marks

A new bank is setting up an internal network.

Two types of networking are client-server and peer-to-peer. With reference to the needs of the bank and the properties of the two types of networking, explain why the bank should implement a client-server rather than a peer-to-peer network.

Level of response question

LevelDescriptionMark Range
3A detailed answer includes at least three points, with at least two expansions showing thorough understanding and justification of the proposed solution. The student has demonstrated a good analysis of the problem and made reference to a number of needs of the organisation to achieve this level of understanding.5-6
2At least two points have been made, with at least one expansion showing some understanding and justification of the proposed solution. The student has demonstrated some analysis of the problem and made some reference to the needs of the organisation to achieve this level of understanding.3-4
1At least one point has been made showing minimal understanding of the proposed solution. There may be an expansion on the point, or a separate point for a second mark or there may be some application of the point to the organisation's needs. The student has only shown a limited understanding of the problem.1-2

Guidance – Indicative response.

Note: Points in analysis column are not worth a mark of their own. Allow AO2 analysis marks in higher mark bands when combined with expansion points.

Examples could include:

PointExpansionAnalysis
Servers would be accessible at all timesComputers in a peer-to-peer network may be turned off meaning some data may not be available to all users as needed
Centralised backupsreducing cost and time taken // avoiding users forgetting to back up files regularlyensuring customers' data is safe and secure
Centralised securityensuring anti-virus, firewalls, encryption etc are up to date and correctly configuredensuring maximum possible security of customer data.
Better client performanceas "server" functionality is performed by servers, not the clients themselvesensuring customer data is accessible swiftly and securely
Services and hardware such as printers, e-mail access, address books can be shared (through a managed, accountable access point)leading to cost-effectiveness for the customerand better tracking for audit purposes.
Expandability, client-server networks are better able to deal with network growthensuring customer confidence and securitywhich is important for a new, potentially growing business.
Greater control of security including levels of access, tracking and storageensure the organisation complies with the needs of the law.which is essential given the confidential/purposeful nature of the data.
Improves monitoring of data/employee usagefor data protection purposes
Centralised software distributionensures efficient and systematic distribution of updates and changes.
Centralised data storageensuring data consistency / lack of different, duplicated data.
AS-Level2018June9.1openDiagram1 mark

Figure 1 shows a logic gate symbol.

Answer:

Write the name of the logic gate underneath the figure.

XOR // Exclusive OR // EOR // EXOR;

AS-Level2018June9.2tableDiagram1 mark

Figure 2 shows a logic gate symbol.

Complete the truth table below for the logic gate shown in Figure 2.

ABQ
00
01
10
11

1 mark for correct column Q;

ABQ
000
011
101
110
AS-Level2018June9.3diagram3 marks

Represent the Boolean equation A' + B' ∙ C as a logic circuit by drawing a diagram of it in the space below.

  • 1 mark for having A and B connected to (different) NOT gates;
  • 1 mark for an AND gate connected to C and to the output of a NOT gate;
  • 1 mark for an OR gate connected to NOT A and NOT B AND C and outputting to Q;

Max 2 if circuit not fully correct.

AS-Level2018June9.4calculation4 marks

Using the rules of Boolean algebra, simplify the following expression:

((A ∙ (B' + 0))' ∙ (A' ∙ (B + B))')'

You must show your working.

Answer:

Marking guidance for examiners

  • Award marks for working out until an incorrect step has been made.
  • If, in any one step, a candidate is simplifying different parts of an expression simultaneously award all relevant marks for this multiple stage but don't award any further marks for working in any parts simplified incorrectly. Example, if the expression P.P.(P+Q) + P.P.1 was changed to P.(P+Q)+P.0, the candidate would get one mark for simplifying the first part to P.(P+Q) and could get further marks for correctly simplifying this part of the expression further but should not be awarded marks for simplifying the incorrectly changed part P.0 (ie to 0)

Mark as follows

MAX 3 marks for working

Award one mark each for applying the techniques below:

  • a successful application of De Morgan's Law (and any associated cancellation of NOTs) that produces a simpler expression.
  • successfully expanding brackets.

Award one mark for each application of a Boolean identity MAX 2.

Note: A simpler expression is one that is logically equivalent to the original expression but uses fewer logical operators.

Example working (1)

A ∙ B̅̅̅̅̅̅ ∙ A̅ ∙ (B + B)̅̅̅̅̅̅̅̅̅̅̅̅̅̅

A ∙ B̅̅̅̅̅̅ ∙ A̅ ∙ B̅̅̅̅̅̅

A ∙ B̅ + A̅ ∙ B

[use of B̅ + 0 = B̅ ]

[use of B + B = B]

[application of De Morgan's Law]

Example working (2)

A ⋅ (B̅ + 0) + A̅ ⋅ (B + B)

A ⋅ B̅ + A̅ ⋅ 0 + A̅ ⋅ B + A̅ ⋅ B

A ∙ B̅ + A̅ ∙ B + A̅ ∙ B

A ∙ B̅ + A̅ ∙ B

[use of De Morgan's Law]

[expansion of brackets]

[use of A̅ ⋅ 0 = 0 and removal]

[application of A̅ ∙ B + A̅ ∙ B = A̅ ∙ B]

Example working (3)

A ⋅ (B̅ + 0) + A̅ ⋅ (B + B)

A ⋅ B̅ + A̅ ⋅ B

[use of De Morgan's Law]

[B̅ + 0 = B̅ and B+B=B means two marks for identities within brackets]

1 mark for final answer A XOR B // A Exclusive OR B // A EOR B // A EXOR B // A ⨁ B

AS-Level2018June10.1diagram4 marks

Complete the program in Figure 3.

You should assume that R1 has already been assigned a value to divide.

You may not need to use all four lines for your solution and you should not write more than one instruction per line.

Figure 3:

MOV R3, #0

loopstart: CMP R1, #10

...

end:
HALT

Mark as follows:

AO3 (design) – 1 mark

1 mark for identifying the need for two branch commands

AO3 (program) – 3 marks

For the AO3 (program) marks, the syntax used must be correct for the language as described on the question paper.

  • 1 mark: Subtracting 10 from R1 and storing the result in R1
  • 1 mark: Adding 1 to R3 and storing the result in R3
  • 1 mark: Having two branches with the correct condition(s)

Max 2 marks for programming if any syntax incorrect or program does not work correctly under all circumstances

DPT incorrect use of commas, colons, semi-colons, etc. Note this does not apply to #.

Refer alternative answers to team leaders

  • BLT end
  • SUB R1, R1, #10
  • ADD R3, R3, #1
  • B loopstart
AS-Level2018June10.2calculationDiagram1 mark

How many different opcodes is the machine potentially capable of supporting?

64 // 26;

AS-Level2018June10.3calculationDiagram1 mark

In direct addressing mode, how many memory locations could a processor that used the instruction format described in Figure 4 potentially make use of?

1024 // 210;

AS-Level2018June11.1open1 mark

Explain why some compilers produce bytecode as the final output instead of executable code.

The code may need to run on multiple platforms // target platform may not be known // may need to be platform independent;

A. Portable with some explanation

A. (May lead to) smaller file sizes

AS-Level2018June11.2open2 marks

Describe how bytecode programs are executed after the bytecode has been produced.

A virtual machine; performs just in time compilation // translation; to convert the bytecode to object code and execute it;

//

A virtual machine; interprets bytecode an instruction at a time; and runs the necessary code/subroutine to carry out the command in the hardware's instruction set;

Max 2

Max 1 if no concept of translation shown.

R. Suggestion that anything other than the virtual machine carries out translation

AS-Level2018June11.3open2 marks

Explain what is meant by the term imperative high-level language.

Instructions are executed in a programmer-defined order // Imperative programs define sequences of commands for the computer to perform;

Imperative languages describe how to solve a problem (in terms of sequences of actions to be taken);

Max 1

High level language instructions use English-like keywords // constructs;

High level languages support structured statements (A. by example);

High level languages support use of local variables / parameters / named constants / indentation;

R. Closer to natural language / almost written in English

R. Machine independent / problem-oriented / top-down

Max 1

AS-Level2018June12.1calculationDiagram3 marks

Calculate the minimum size of file (excluding metadata) that could be used to store the bitmap image in Figure 5. Express your answer in bytes.

You must show your working.

  • 1 mark for calculating number of pixels ( 8x10 // 80 )
  • 1 mark for multiplying number of pixels by correct colour depth ( 80 x 3)
  • 1 mark for correctly converting to bytes ( 240 / 8 // 30 bytes)

A. Follow through errors

AS-Level2018June12.2multiple-choice1 mark

Shade in one lozenge to indicate the minimum colour depth in bits required for an image with 18 colours.

  • 3
  • 4
  • 5

5;

R. More than one lozenge shaded

Paper 2 covers sections 5-9 of the AQA AS Computer Science specification.

5 Fundamentals of data representation

5.1 Number systems

5.1.1 Natural numbers

ReferenceContentAdditional information
5.1.1.1
View

Be familiar with the concept of a natural number and the set ℕ of natural numbers (including zero).

ℕ = {0, 1, 2, 3, …}

5.1.2 Integer numbers

ReferenceContentAdditional information
5.1.2.1
View

Be familiar with the concept of an integer and the set ℤ of integers.

ℤ = { …, -3, -2, -1, 0, 1, 2, 3, … }

5.1.3 Rational numbers

ReferenceContentAdditional information
5.1.3.1
View

Be familiar with the concept of a rational number and the set ℚ of rational numbers, and that this set includes the integers.

ℚ is the set of numbers that can be written as fractions (ratios of integers). Since a number such as 7 can be written as 7/1, all integers are rational numbers.

5.1.4 Irrational numbers

ReferenceContentAdditional information
5.1.4.1
View

Be familiar with the concept of an irrational number.

An irrational number is one that cannot be written as a fraction, for example √2.

5.1.5 Real numbers

ReferenceContentAdditional information
5.1.5.1
View

Be familiar with the concept of a real number and the set ℝ of real numbers, which includes the natural numbers, the rational numbers, and the irrational numbers.

ℝ is the set of all 'possible real world quantities'.

5.1.6 Ordinal numbers

ReferenceContentAdditional information
5.1.6.1
View

Be familiar with the concept of ordinal numbers and their use to describe the numerical positions of objects.

When objects are placed in order, ordinal numbers are used to tell their position. For example, if we have a well-ordered set S = {'a', 'b', 'c', 'd'}, then 'a' is the 1st object, 'b' the 2nd, and so on.

5.1.7 Counting and measurement

ReferenceContentAdditional information
5.1.7.1
View

Be familiar with the use of natural numbers for counting.

5.1.7.2
View

Be familiar with the use of real numbers for measurement.

5.2 Number bases

5.2.1 Number base

ReferenceContentAdditional information
5.2.1.1
View

Be familiar with the concept of a number base, in particular:

  • decimal (base 10)
  • binary (base 2)
  • hexadecimal (base 16)

Students should be familiar with expressing a number's base using a subscript as follows:

  • Base 10: Number10, eg 6710
  • Base 2: Number2, eg 100110112
  • Base 16: Number16, eg AE16
5.2.1.2
View

Convert between decimal, binary and hexadecimal number bases.

5.2.1.3
View

Be familiar with, and able to use, hexadecimal as a shorthand for binary and to understand why it is used in this way.

5.3 Units of information

5.3.1 Bits and bytes

ReferenceContentAdditional information
5.3.1.1
View

Know that the bit is the fundamental unit of information.

A bit is either 0 or 1.

5.3.1.2
View

Know that a byte is a group of 8 bits.

5.3.1.3
View

Know that 2n different values can be represented with n bits.

For example, 3 bits can be configured in 23 = 8 different ways: 000, 001, 010, 011, 100, 101, 110, 111.

5.3.2 Units

ReferenceContentAdditional information
5.3.2.1
View

Know the names, symbols and corresponding powers of 10 for the decimal prefixes:

  • kilo, k - 103
  • mega, M - 106
  • giga, G - 109
  • tera, T - 1012
5.3.2.2
View

Know the names, symbols and corresponding powers of 2 for the binary prefixes:

  • kibi, Ki - 210
  • mebi, Mi - 220
  • gibi, Gi - 230
  • tebi, Ti - 240
5.3.2.3
View

Know that quantities of bytes can be described using binary prefixes representing powers of 2 or using decimal prefixes representing powers of 10, eg one kibibyte is written as 1KiB = 210 B and one kilobyte is written as 1 kB = 103 B.

Historically the terms kilobyte, megabyte, etc have often been used when kibibyte, mebibyte, etc are meant.

5.4 Binary number system

5.4.1 Unsigned binary

ReferenceContentAdditional information
5.4.1.1
View

Know the difference between unsigned binary and signed binary.

Students are expected to be able to convert between unsigned binary and decimal and vice versa.

5.4.1.2
View

Know that in unsigned binary the minimum and maximum values for a given number of bits, n, are 0 and 2n - 1 respectively.

5.4.2 Unsigned binary arithmetic

ReferenceContentAdditional information
5.4.2.1
View

Be able to add two unsigned binary integers.

5.4.2.2
View

Be able to multiply two unsigned binary integers.

5.4.3 Signed binary using two's complement

ReferenceContentAdditional information
5.4.3.1
View

Know that signed binary can be used to represent negative integers and that one possible coding scheme is two's complement.

This is the only representation of negative integers that will be examined. Students are expected to be able to convert between signed binary and decimal and vice versa.

5.4.3.2
View

Know how to represent negative and positive integers in two's complement.

5.4.3.3
View

Know how to perform subtraction using two's complement.

5.4.3.4
View

Know how to calculate the range of a given number of bits, n.

5.4.4 Numbers with a fractional part

ReferenceContentAdditional information
5.4.4.1
View

Know how numbers with a fractional part can be represented in fixed point form in binary in a given number of bits.

5.4.4.2
View

Be able to convert decimal to fixed point binary of a given number of bits.

5.4.4.3
View

Be able to convert fixed point binary to decimal of a given number of bits.

5.5 Information coding systems

5.5.1 Character form of a decimal digit

ReferenceContentAdditional information
5.5.1.1
View

Differentiate between the character code representation of a decimal digit and its pure binary representation.

5.5.2 ASCII and Unicode

ReferenceContentAdditional information
5.5.2.1
View

Describe ASCII and Unicode coding systems for coding character data.

5.5.2.2
View

Explain why Unicode was introduced.

5.5.3 Error checking and correction

ReferenceContentAdditional information
5.5.3.1
View

Describe and explain the use of parity bits.

5.5.3.2
View

Describe and explain the use of majority voting.

5.5.3.3
View

Describe and explain the use of check digits.

5.5.3.4
View

Evaluate the use of parity bits, majority voting and check digits

5.6 Representing images, sound and other data

5.6.1 Bit patterns, images, sound and other data

ReferenceContentAdditional information
5.6.1.1
View

Describe how bit patterns may represent other forms of data, including graphics and sound.

5.6.2 Analogue and digital

ReferenceContentAdditional information
5.6.2.1
View

Understand the difference between analogue and digital:

  • data
  • signals

5.6.3 Analogue/digital conversion

ReferenceContentAdditional information
5.6.3.1
View

Describe the principles of operation of an analogue to digital converter (ADC).

5.6.3.2
View

Describe the principles of operation of a digital to analogue converter (DAC).

5.6.4 Bitmapped graphics

ReferenceContentAdditional information
5.6.4.1
View

Explain how bitmaps are represented.

5.6.4.2
View

Explain resolution.

Resolution is expressed as number of dots per inch where a dot is a pixel.

5.6.4.3
View

Know that colour depth is the number of bits stored for each pixel.

5.6.4.4
View

Know that the size of an image in pixels is width of image in pixels × height of image in pixels.

The size of an image is also alternatively sometimes described as the resolution of an image.

5.6.4.5
View

Calculate storage requirements for bitmapped images and be aware that bitmap image files may also contain metadata.

Ignoring metadata, storage requirements = size in pixels x colour depth where size in pixels is width in pixels x height in pixels.

5.6.4.6
View

Be familiar with typical metadata.

eg width, height, colour depth.

5.6.5 Digital representation of sound

ReferenceContentAdditional information
5.6.5.1
View

Describe the digital representation of sound.

5.6.5.2
View

Understand sample resolution and its effect on the quality of audio recordings.

5.6.5.3
View

Understand sampling rate and its effect on the quality of audio recordings.

5.6.5.4
View

Know Nyquist's theorem.

5.6.5.5
View

Calculate sound sample sizes in bytes.

5.6.6 Musical Instrument Digital Interface (MIDI)

ReferenceContentAdditional information
5.6.6.1
View

Describe the purpose of MIDI and the use of event messages in MIDI.

5.6.6.2
View

Describe the advantages of using MIDI files for representing music.

5.6.7 Data compression

ReferenceContentAdditional information
5.6.7.1
View

Know why images and sound files are often compressed and that other files, such as text files, can also be compressed.

5.6.7.2
View

Understand the difference between lossless and lossy compression and explain the advantages and disadvantages of each.

5.6.7.3
View

Explain the principles behind run length encoding (RLE) for lossless compression.

5.6.7.4
View

Explain the principles behind dictionary-based methods for lossless compression.

5.6.8 Encryption

ReferenceContentAdditional information
5.6.8.1
View

Understand what is meant by encryption and be able to define it.

Caesar and Vernam ciphers are at opposite extremes. One offers perfect security, the other doesn't. Between these two types are ciphers that are computationally secure – see below. Students will be assessed on the two types. Ciphers other than Caesar may be used to assess students' understanding of the principles involved. These will be explained and be similar in terms of computational complexity.

5.6.8.2
View

Be familiar with the term cipher.

5.6.8.3
View

Be familiar with the term plaintext.

5.6.8.4
View

Be familiar with the term ciphertext.

5.6.8.5
View

Be familiar with Caesar cipher and be able to apply it to encrypt a plaintext message and decrypt a ciphertext.

5.6.8.6
View

Be able to explain why Caesar cipher is easily cracked.

5.6.8.7
View

Be familiar with Vernam cipher or one-time pad and be able to apply it to encrypt a plaintext message and decrypt a ciphertext.

Since the key k is chosen uniformly at random, the ciphertext c is also distributed uniformly. The key k must be used once only. The key k is known as a one-time pad.

5.6.8.8
View

Explain why Vernam cipher is considered as a cypher with perfect security.

5.6.8.9
View

Compare Vernam cipher with ciphers that depend on computational security.

Vernam cipher is the only one to have been mathematically proved to be completely secure. The worth of all other ciphers ever devised is based on computational security. In theory, every cryptographic algorithm except for Vernam cipher can be broken, given enough ciphertext and time.

6 Fundamentals of computer systems

6.1 Hardware and software

6.1.1 Relationship between hardware and software

ReferenceContentAdditional information
6.1.1.1
View

Define the term hardware.

6.1.1.2
View

Define the term software.

6.1.1.3
View

Understand the relationship between hardware and software.

6.1.2 Classification of software

ReferenceContentAdditional information
6.1.2.1
View

Explain what is meant by system software.

6.1.2.2
View

Explain what is meant by application software.

6.1.2.3
View

Understand the need for, and attributes of, different types of software.

6.1.3 System software

ReferenceContentAdditional information
6.1.3.1
View

Know that system software includes operating systems (OSs), utility programs, libraries and translators (compiler, assembler, interpreter).

6.1.3.2
View

Understand the need for, and functions of operating systems (OSs).

6.1.3.3
View

Understand the need for, and functions of utility programs.

6.1.3.4
View

Understand the need for, and functions of libraries.

6.1.3.5
View

Understand the need for, and functions of translators (compiler, assembler, interpreter).

6.1.4 Role of an operating system (OS)

ReferenceContentAdditional information
6.1.4.1
View

Understand that a role of the operating system is to hide the complexities of the hardware.

6.1.4.2
View

Know that the OS handles resource management, managing hardware to allocate processors, memories and I/O devices among competing processes.

6.2 Classification of programming languages

6.2.1 Classification of programming languages

ReferenceContentAdditional information
6.2.1.1
View

Show awareness of the development of types of programming languages and their classification into low- and high-level languages.

6.2.1.2
View

Know that low-level languages are considered to be:

  • machine-code
  • assembly language
6.2.1.3
View

Know that high-level languages include imperative high-level language.

6.2.1.4
View

Describe machine-code language and assembly language.

6.2.1.5
View

Understand the advantages and disadvantages of machine-code and assembly language programming compared with high-level language programming.

6.2.1.6
View

Explain the term 'imperative high-level language' and its relationship to low-level languages.

6.3 Types of program translator

6.3.1 Types of program translator

ReferenceContentAdditional information
6.3.1.1
View

Understand the role of assemblers.

6.3.1.2
View

Understand the role of compilers.

6.3.1.3
View

Understand the role of interpreters.

6.3.1.4
View

Explain the differences between compilation and interpretation. Describe situations in which each would be appropriate.

6.3.1.5
View

Explain why an intermediate language such as bytecode is produced as the final output by some compilers and how it is subsequently used.

6.3.1.6
View

Understand the difference between source and object (executable) code.

6.4 Logic gates

6.4.1 Logic gates

ReferenceContentAdditional information
6.4.1.1
View

Construct truth tables for the NOT logic gate.

Students should know and be able to use ANSI/IEEE standard 91-1984 Distinctive shape logic gate symbols for these logic gates.

6.4.1.2
View

Construct truth tables for the AND logic gate.

6.4.1.3
View

Construct truth tables for the OR logic gate.

6.4.1.4
View

Construct truth tables for the XOR logic gate.

6.4.1.5
View

Construct truth tables for the NAND logic gate.

6.4.1.6
View

Construct truth tables for the NOR logic gate.

6.4.1.7
View

Be familiar with drawing and interpreting logic gate circuit diagrams involving one or more of the above gates.

6.4.1.8
View

Complete a truth table for a given logic gate circuit.

6.4.1.9
View

Write a Boolean expression for a given logic gate circuit.

6.4.1.10
View

Draw an equivalent logic gate circuit for a given Boolean expression.

6.5 Boolean algebra

6.5.1 Using Boolean algebra

ReferenceContentAdditional information
6.5.1.1
View

Be familiar with the use of Boolean identities and De Morgan's laws to manipulate and simplify Boolean expressions.

7 Fundamentals of computer organisation and architecture

7.1 Internal hardware components of a computer

7.1.1 Internal hardware components of a computer

ReferenceContentAdditional information
7.1.1.1
View

Have an understanding and knowledge of the basic internal components of a computer system.

Although exam questions about specific machines will not be asked, it might be useful to base this section on the machines used at the centre.

7.1.1.2
View

Understand the role of the processor.

7.1.1.3
View

Understand the role of main memory.

7.1.1.4
View

Understand the role of the address bus.

7.1.1.5
View

Understand the role of the data bus.

7.1.1.6
View

Understand the role of the control bus.

7.1.1.7
View

Understand the role of I/O controllers.

7.1.1.8
View

Be able to explain the difference between von Neumann and Harvard architectures and describe where each is typically used.

Embedded systems such as digital signal processing (DSP) systems use Harvard architecture processors extensively. Von Neumann architecture is used extensively in general purpose computing systems.

7.1.1.9
View

Understand the concept of addressable memory.

7.2 The stored program concept

7.2.1 The meaning of the stored program concept

ReferenceContentAdditional information
7.2.1.1
View

Be able to describe the stored program concept: machine code instructions stored in main memory are fetched and executed serially by a processor that performs arithmetic and logical operations.

7.3 Structure and role of the processor and its components

7.3.1 The processor and its components

ReferenceContentAdditional information
7.3.1.1
View

Explain the role and operation of the arithmetic logic unit.

7.3.1.2
View

Explain the role and operation of the control unit.

7.3.1.3
View

Explain the role and operation of the clock.

7.3.1.4
View

Explain the role and operation of general-purpose registers.

7.3.1.5
View

Explain the role and operation of the program counter.

7.3.1.6
View

Explain the role and operation of the current instruction register.

7.3.1.7
View

Explain the role and operation of the memory address register.

7.3.1.8
View

Explain the role and operation of the memory buffer register.

7.3.1.9
View

Explain the role and operation of the status register.

7.3.2 The Fetch-Execute cycle and the role of registers within it

ReferenceContentAdditional information
7.3.2.1
View

Explain how the Fetch-Execute cycle is used to execute machine code programs, including the stages in the cycle (fetch, decode, execute) and details of registers used.

7.3.3 The processor instruction set

ReferenceContentAdditional information
7.3.3.1
View

Understand the term 'processor instruction set' and know that an instruction set is processor specific.

7.3.3.2
View

Know that instructions consist of an opcode and one or more operands (value, memory address or register).

A simple model will be used in which the addressing mode will be incorporated into the bits allocated to the opcode so the latter defines both the basic machine operation and the addressing mode. Students will not be expected to define opcode, only interpret opcodes in the given context of a question.

For example, 4 bits have been allocated to the opcode (3 bits for basic machine operation, eg ADD, and 1 bit for the addressing mode). 4 bits have been allocated to the operand, making the instruction, opcode + operand, 8 bits in length. In this example, 16 different opcodes are possible (24 = 16).

OpcodeOperand
Basic Machine OperationAddressing Mode
00100101

7.3.4 Addressing modes

ReferenceContentAdditional information
7.3.4.1
View

Understand and apply immediate addressing.

Immediate addressing: the operand is the datum.

7.3.4.2
View

Understand and apply direct addressing.

Direct addressing: the operand is the address of the datum. Address to be interpreted as meaning either main memory or register.

7.3.5 Machine-code/assembly language operations

ReferenceContentAdditional information
7.3.5.1
View

Understand and apply the basic machine-code operations of:

  • load
  • add
  • subtract
  • store
  • branching (conditional and unconditional)
  • compare
  • logical bitwise operators (AND, OR, NOT, XOR)
  • logical
  • shift right
  • shift left
  • halt

Use the basic machine-code operations above when machine-code instructions are expressed in mnemonic form—assembly language, using immediate and direct addressing.

7.3.6 Factors affecting processor performance

ReferenceContentAdditional information
7.3.6.1
View

Explain the effect on processor performance of multiple cores.

7.3.6.2
View

Explain the effect on processor performance of cache memory.

7.3.6.3
View

Explain the effect on processor performance of clock speed.

7.3.6.4
View

Explain the effect on processor performance of word length.

7.3.6.5
View

Explain the effect on processor performance of address bus width.

7.3.6.6
View

Explain the effect on processor performance of data bus width.

7.4 External hardware devices

7.4.1 Input and output devices

ReferenceContentAdditional information
7.4.1.1
View

Know the main characteristics, purpose and suitability of barcode readers and understand their principles of operation.

7.4.1.2
View

Know the main characteristics, purpose and suitability of digital cameras and understand their principles of operation.

7.4.1.3
View

Know the main characteristics, purpose and suitability of laser printers and understand their principles of operation.

7.4.1.4
View

Know the main characteristics, purpose and suitability of RFID and understand their principles of operation.

7.4.2 Secondary storage devices

ReferenceContentAdditional information
7.4.2.1
View

Explain the need for secondary storage within a computer system.

7.4.2.2
View

Know the main characteristics, purposes, suitability and understand the principles of operation of the hard disk.

7.4.2.3
View

Know the main characteristics, purposes, suitability and understand the principles of operation of the optical disk.

7.4.2.4
View

Know the main characteristics, purposes, suitability and understand the principles of operation of the solid-state disk (SSD).

SSD = NAND flash memory + a controller that manages pages, and blocks and complexities of writing. Based on floating gate transistors that trap and store charge. A block, made up of many pages, cannot overwrite pages; a page has to be erased before it can be written to but technology requires the whole block to be erased. Lower latency and faster transfer speeds than a magnetic disk drive.

7.4.2.5
View

Compare the capacity and speed of access of various media and make a judgement about their suitability for different applications.

8 Consequences of uses of computing

8.1 Individual (moral), social (ethical), legal and cultural issues and opportunities

ReferenceContentAdditional information
8.1.1
View

Show awareness of current individual (moral), social (ethical), legal and cultural opportunities and risks of computing.

Understand that:

  • developments in computer science and digital technologies have dramatically altered the shape of communications and information flows in societies, enabling massive transformations in the capacity to:
    • monitor behaviour
    • amass and analyse personal information
    • distribute, publish, communicate and disseminate personal information
  • computer scientists and software engineers therefore have power, as well as the responsibilities that go with it, in the algorithms that they devise and the code that they deploy.
  • software and their algorithms embed moral and cultural values.
  • the issue of scale, for software the whole world over, creates potential for individual computer scientists and software engineers to produce great good, but with it comes the ability to cause great harm.

Be able to discuss the challenges facing legislators in the digital age.

Teachers may wish to employ two very powerful techniques, hypotheticals and case studies, to engage students in the issues.

Hypotheticals allow students to isolate quickly important ethical principles in an artificially simplified context. For example, a teacher might ask students to explain and defend how, as a Google project manager, they would evaluate a proposal to bring Google's Street View technology to a remote African village. What questions should be asked? Who should be consulted? What benefits, risks and safeguards considered? What are the trade-offs?

Case studies allow students to confront the tricky interplay between the sometimes competing ethical values and principles relevant in real world settings. For example, the Google Street View case might be used to tease out the ethical conflicts between individual and cultural expectations, the principle of informed consent, Street View's value as a service, its potential impact on human perceptions and behaviours, and its commercial value to Google and its shareholders.

There are many resources available on the Internet to support teaching of this topic.

9 Fundamentals of communication and networking

9.1 Communication

9.1.1 Communication methods

ReferenceContentAdditional information
9.1.1.1
View

Define serial transmission methods.

9.1.1.2
View

Define parallel transmission methods.

9.1.1.3
View

Discuss the advantages of serial over parallel transmission.

9.1.1.4
View

Define and compare synchronous and asynchronous data transmission.

9.1.1.5
View

Describe the purpose of start and stop bits in asynchronous data transmission.

9.1.2 Communication basics

ReferenceContentAdditional information
9.1.2.1
View

Define baud rate.

9.1.2.2
View

Define bit rate.

9.1.2.3
View

Define bandwidth.

9.1.2.4
View

Define latency.

9.1.2.5
View

Define protocol.

9.1.2.6
View

Differentiate between baud rate and bit rate.

Bit rate can be higher than baud rate if more than one bit is encoded in each signal change.

9.1.2.7
View

Understand the relationship between bit rate and bandwidth.

Bit rate is directly proportionate to bandwidth.

9.2 Networking

9.2.1 Network topology

ReferenceContentAdditional information
9.2.1.1
View

Understand and explain the operation of a physical star topology.

9.2.1.2
View

Understand and explain the operation of a logical bus network topology.

A network physically wired in star topology can behave logically as a bus network by using a bus protocol and appropriate physical switching.

9.2.1.3
View

Differentiate between the physical star topology and the logical bus network topology.

9.2.2 Types of networking between hosts

ReferenceContentAdditional information
9.2.2.1
View

Explain peer-to-peer networking and describe situations where it might be used.

In a peer-to-peer network, each computer has equal status.

9.2.2.2
View

Explain client-server networking and describe situations where it might be used.

In a client-server network, most computers are nominated as clients and one or more as servers. The clients request services from the servers, which provide these services, for example file server, email server.

9.2.3 Wireless networking

ReferenceContentAdditional information
9.2.3.1
View

Explain the purpose of WiFi.

A wireless local area network that is based on international standards.

Used to enable devices to connect to a network wirelessly.

9.2.3.2
View

Be familiar with the components required for wireless networking.

  • Wireless network adapter
  • Wireless access point
9.2.3.3
View

Be familiar with the purpose of Service Set Identifier (SSID).

9.2.3.4
View

Be familiar with how wireless networks are secured using WPA (Wifi Protected Access)/WPA2.

9.2.3.5
View

Be familiar with how wireless networks are secured by disabling SSID (Service Set Identifier) broadcasting.

9.2.3.6
View

Be familiar with how wireless networks are secured using a MAC (Media Access Control) address allow list.

9.2.3.7
View

Explain the wireless protocol Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) with and without Request to Send/Clear to Send (RTS/CTS).