Click a paper to view its questions. The specification for the course is shown on the right. For each question, its specification references are listed and can be clicked to scroll the relevant part of the specification into view.

AS-Level 2024 June Paper 2AS-Level 2023 June Paper 2AS-Level 2022 June Paper 2AS-Level 2020 June Paper 2AS-Level 2019 June Paper 2AS-Level 2018 June Paper 2AS-Level 2017 June Paper 2AS-Level 2016 June Paper 2A-Level 2024 June Paper 2A-Level 2023 June Paper 2A-Level 2022 June Paper 2A-Level 2021 June Paper 2A-Level 2020 June Paper 2A-Level 2019 June Paper 2A-Level 2018 June Paper 2A-Level 2017 June Paper 2
AS-Level2019June1.1open1 mark

Explain the difference between the set of natural numbers and the set of integer numbers.

The set of integers includes negative (whole) numbers;

The set of natural numbers do not contain negative (whole) numbers;

Max 1

AS-Level2019June1.2open1 mark

Explain the difference between rational and irrational numbers.

Rational numbers are any numbers able to be represented/expressed as fractions/one integer divided by another;

Irrational numbers are any number that are not able to be represented/expressed as fractions/one integer divided by another;

Max 1

AS-Level2019June2.1calculation1 mark

Convert the bit pattern shown below into hexadecimal.

1 0 1 1 0 1 1 1

B7;

AS-Level2019June2.2open1 mark

Explain why programmers often use hexadecimal to represent bit patterns instead of binary.

More compact when displayed;

Easier (for people) to understand/remember; A. read

Lower likelihood of an error when typing in data;

Saves (the programmer) time writing/typing in data;

NE. takes up less space

R. if answer states that hexadecimal uses less memory/storage

Max 1

AS-Level2019June2.3calculation2 marks

The bit pattern below represents an unsigned fixed-point binary number with five bits before and five bits after the binary point.

Convert the binary number into decimal.

1 0 0 1 1 1 0 0 0 1

1 mark for whole number 19

1 mark for decimal number: .53125 // 17/32

AS-Level2019June2.4open2 marks

Explain how the two's complement binary integer 00100111 can be subtracted from the two's complement binary integer 01001001 without converting the numbers into decimal.

The (positive number) 00100111 must be converted to its negative equivalent/11011001;

The (negative number) 11011001/result must then be added to the second number/01001001 (equalling 00100010);

Note: Award 1 mark if both working and correct answer shown but no explanation

AS-Level2019June3.1open1 mark

The bit pattern 00111000 is the character code for the numeric character '8'.

The bit pattern 00001000 represents the decimal number 8.

Explain how a computer could convert the character code for '8' to the bit pattern for its corresponding decimal value.

Subtract 48 / 00110000 from the character code / bit pattern;

AND the character code / bit pattern with the bit pattern 00001111;

XOR the character code / bit pattern with the bit pattern 00110000;

Max 1

AS-Level2019June3.2open2 marks

ASCII and Unicode are two common information coding systems.

Explain why Unicode was introduced as an alternative to ASCII.

Introduced to support a larger range of characters;

Due to increased international communication // use of files in multiple countries;

A. sensible alternatives to international communication:

eg facilitate interchange of documents between countries.

eg culturally unacceptable to only allow non-English speaking countries to communicate in English

NE. use in other countries or examples of this.

Each character code is always interpreted as the same character;

Max 2

AS-Level2019June4.1calculation1 mark

Sampling with an 8-bit sample resolution means that each sample can be approximated to one of 256 different levels.

If the sample resolution is increased to 10 bits, how many more levels are available for approximating samples?

768;

AS-Level2019June4.2calculation3 marks

A sound lasts 3 minutes and 20 seconds. It is sampled at a 44.1kHz sample rate with a 16-bit sample resolution.

A sample rate of 1Hz means that one sample has been taken every second.

Calculate the minimum amount of storage space, in megabytes (MB), needed to store the sampled sound. You should show your working.

Identification of length (200s / 3 * 60 + 20), sample resolution (16 bit) and sample rate (44,100 Hz) in working;

A. 44.1 (kHz) for sample rate

Showing the correct calculation ((3 * 60+20) * 16 * 44,100 // 200 * 16 * 44,100) or showing correct intermediary value (141,120,000 (bits) / 17,640,000 (Bytes));

I. Conversion.

A. Allow follow through as long as it is clear the student is attempting to multiply length, sample rate and sample resolution.

Conversion of answer in bits to megabytes (17.64MB);

I. Incorrect value for number of bits.

A. rounded up to fewer significant places as long as correct method can be seen in working.

Max 2 if final answer is incorrect

Award 3 marks if final answer 17.64MB

AS-Level2019June5.1open1 mark

What is meant by the term hardware?

The electronic / electrical / physical / mechanical components of the computer system;

NE. Tangible without further explanation.

AS-Level2019June5.2open1 mark

What is meant by the term software?

Instructions / code / programs;

AS-Level2019June5.3open2 marks

Explain the key difference between system software and application software.

System software is software that controls/manage the operation of (some aspects of) the computer system // software which enables user to operate a computer // system software is required to operate a computer;

Application software is for carrying out tasks that are user-oriented / that the user would want to do even if they did not have a computer system;

AS-Level2019June5.4multiple-choice2 marks

Some of the following types of software are examples of system software.

Shade in two lozenges to indicate which types of software are system software.

  • A:Compiler
  • B:Photo editor
  • C:Spreadsheet
  • D:Computer game
  • E:Operating system
  • F:Word processor

1 mark for Compiler checked

1 mark for Operating system checked

R. Award 0 marks if more than two lozenges shaded

AS-Level2019June6.1tableDiagram1 mark

State the name of the logic gate represented by the truth table shown in Figure 1.

Figure 1

ABQ
001
010
100
110

NOR;

AS-Level2019June6.2diagram3 marks

A factory has a machine for filling bottles on a conveyor belt.

  • Q represents the signal to move the conveyor belt on. When Q is set to true, the belt will move on.
  • A is a sensor which outputs true if a bottle is present.
  • B is a sensor which outputs true if a bottle is full.
  • C is a sensor which outputs true if a bottle is correctly positioned.
  • D is a sensor which outputs true if the next section has a bottle in it.

The conveyor belt is able to move if both of these conditions are true:

  • A bottle is full and correctly positioned or there is no bottle present.
  • There is no bottle in the next section.

In the box below, draw a logic circuit for the machine.

Mark as follows

1 mark for B and C into AND gate

1 mark for the result of B and C (I. incorrect gate) as one input and a NOT gated A as a second input to an OR gate

1 mark D connected to NOT gate and output of this to an AND gate, the results of A, B and C (I. previously incorrect gates) as the other input, with the output going into Q

MAX 2 if not fully correct

AS-Level2019June6.3open1 mark

De Morgan's laws can be applied to enable a combination of logic gates to be replaced by a single gate that produces the same output.

What single gate could replace the combination of gates in the expression A' ⋅ B'?

OR;

A. A+B // +

AS-Level2019June6.4calculation4 marks

Using the rules and identities of Boolean Algebra, simplify the following Boolean expression.

A ⋅ (A + C) ⋅ A + A ⋅ A ⋅ B

Marking guidance for examiners

  • Award marks for working out until an incorrect step has been made.
  • If, in any one step, a candidate is simplifying different parts of an expression simultaneously award all relevant marks for this multiple stage but don't award any further marks for working in any parts simplified incorrectly. Example, if the expression P.P.(P+Q) + P.P.1 was changed to P.(P+Q)+P.0, the candidate would get one mark for simplifying the first part to P.(P+Q) and could get further marks for correctly simplifying this part of the expression further but should not be awarded marks for simplifying the incorrectly changed part P.0 (ie to 0)

Mark as follows

1 mark for final answer A

3 marks for working

Max 3 for working. Award up to two marks for applying each one of the three techniques (one mark per application):

  • a successful application of De Morgan's Law (and any associated cancellation of NOTs) that produces a simpler expression
  • applying an identity other than cancelling NOTs that produces a simpler expression
  • successfully expanding brackets

Note: A simpler expression is one that is logically equivalent to the original expression but uses fewer logical operators.

Note: Any application of De Morgan's Law or expanding brackets which result in an expression which should be bracketed must be shown with brackets to be awarded a mark.

AS-Level2019June7open4 marks

When the processor writes data to the main memory it will make use of the address, control and data buses.

Explain how each of these buses will be used during this write process.

The address of the memory to be written to is placed on the address bus (by the processor);

The data to be written is placed on the data bus (by the processor);

The signal to write is placed on the control bus (by the processor);

The control bus carries a clock signal (to synchronise the memory and processor);

When the write signal is received (by the memory) on the control bus; the data from the data bus is stored; into the location identified by the address bus;

A. CPU for processor

NE. Implication that the busses are doing the 'sending' rather than 'carrying' of data / addresses / signals

MAX 2 per bus

MAX 3 if only two buses referenced

MAX 4 marks

AS-Level2019June8.1open2 marks

Explain why computers often have both hard disks and solid-state disks (SSD) rather than just having a hard disk or just having an SSD.

Magnetic disk drives are useful where large capacity is needed (without the cost of very large SSDs);

Solid state disk drives have faster access speeds/lower latency than magnetic disk drives (which is useful for loading frequently used software) // access to data would be faster than if just magnetic disk drive was used;

R. Faster by itself

Max 1 if just differences are given rather than benefits of having both.

AS-Level2019June8.2open2 marks

Explain why it is faster to access data from solid-state storage than from an optical disk.

No movable parts (so no need for the read/write heads to move to the correct position);

Purely electronic (so minimal latency);

AS-Level2019June9.1open2 marks

Explain why a peer-to-peer network might be a better choice for the students than a client-server network.

A peer-to-peer network does not need a central server;

A peer-to-peer network will be cheaper / easier to set up / maintain;

The students are unlikely to need the extra security provided by a client-server network;

The students are unlikely to need the extra services provided by a client-server network;

Max 2

AS-Level2019June9.2open1 mark

Define the term 'protocol'.

A set of rules (which govern communication);

AS-Level2019June9.3open1 mark

Define the term 'baud rate'.

The number of signal changes (which may occur) in a given period of time/in a second;

A. rate

A. voltage changes / number of symbols for signal changes as BOD

AS-Level2019June9.4open1 mark

Define the term 'bandwidth'.

The range of frequencies that can be transmitted across a network connection;

AS-Level2019June9.5open3 marks

Discuss how encrypting data with WPA/WPA2, disabling SSID broadcasting and MAC address whitelisting could enhance the security of a WiFi network.

WPA/WPA2 encrypted data (significantly) reduces the chance of unauthorised devices reading transmitted data;

SSID Broadcast disabled makes it harder for people that don't know the SSID to join the network // SSID Broadcast disabled means the network (SSID) won't show up in a search;

MAC address whitelisting means only approved devices can join the network;

AS-Level2019June9.6open8 marks

When transmitting data, the wireless network uses the following systems:

  • Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) with Request to Send/Clear to Send (RTS/CTS)
  • Majority Voting.

Explain the process the transmitting device will go through to transmit data and what the receiving device would then do when it receives data.

CSMA/CA and RTS/CTS

  • Transmitting device checks for traffic;
  • If (data) signal present/another transmission is in progress, then the transmitter continues to wait;
  • If the channel is detected as idle, the transmitter would send a request to send (RTS);
  • Receiver/WAP (A. router R. server) responds (to RTS) with a Clear to Send (CTS) signal
  • If CTS is not received, the transmitter would wait a random amount of time/until the end of the transmission before resending the RTS;
  • When CTS is received, the transmitter begins transmitting data;
  • Receiver sends acknowledgement (ACK) (if all data is received);
  • If no ACK received then data is resent;

Max 6 for CSMA/CA and RTS/CTS

Majority Voting

  • The transmitter would send each bit / byte / bit pattern (R. data) an odd number of times (greater than 2); A. multiple times / specified odd number greater than 2
  • The receiver checks the bits / byte / bit pattern received and if they are not all the same it assumes the one it received the most copies of is the correct value;

R. Receiver knows the data is correct

Max 2 for majority voting

Max 8 in total

AS-Level2019June9.7open1 mark

Explain an advantage that majority voting has over using parity bits when transmitting data.

Parity bits can only detect errors not correct them // Majority voting can correct (most) errors that occur during transmission;

Majority voting can detect multiple (bit) errors;

Majority voting is more efficient at detecting errors;

Majority voting can (sometimes) detect an even number of errors;

Max 1

AS-Level2019June10.1openDiagram7 marks

Write a sequence of assembly language instructions that perform multiplication using the same method shown in Figure 2. Assume that registers 0, 1, 2, and 3 are used to store the values represented by variables W, X, Y, and Z accordingly. Some lines, including those equivalent to line numbers 1 to 5 in Figure 2, have been completed for you.

Figure 2

1 W ← 9
2 X ← 12
3 Y ← 0
4 REPEAT
5 Z ← W LOGICAL BITWISE AND 1
6 IF Z = 1 THEN
7 Y ← Y + X
8 END IF
9 W ← W DIV 2
10 X ← X * 2
11 UNTIL W = 0

MOV R0, #9
MOV R1, #12
MOV R2, #0
startloop: AND R3, R0, #1
CMP R3, #1
BNE jump
ADD R2, R2, R1 // ADD R2, R1, R2
jump:
LSR R0, R0, #1
LSL R1, R1, #1
CMP R0, #0
BEQ endloop
B startloop
endloop:

Alternative Answer 1:
LSL R1, R1, #1 could be replaced with ADD R1, R1, R1

Alternative Answer 2:
BNE jump could be replaced with:
BEQ doadd
B jump
doadd:

AO2 (analyse) – 2 marks

1 mark: Recognising that logical shift (LSR/LSL) is needed to perform integer division by 2 / multiplication by 2 even if the syntax used is incorrect.

1 mark: Recognise that two comparisons and two branch instructions are needed even if the syntax is incorrect or the wrong types of branch instructions are used.

AO3 (program) – 5 marks

1 mark: CMP R3, #1 before the jump: label and syntactically correct.

1 mark: BNE jump before the jump: label and syntactically correct.

1 mark: ADD R2, R2, R1 is before the jump: label and syntactically correct.

1 mark: LSR R0, R0, #1 and LSL R1, R1, #1 are after the jump: label and syntactically correct. I. order of commands

1 mark: CMP R0,#0 and BEQ endloop are after the jump: label, before B startloop and syntactically correct.

Max 4 marks for programming if any syntax incorrect or program does not work correctly under all circumstances

A. Answers that use hexadecimal or binary values

DPT Missing hash for immediate addressing

DPT incorrect use of commas, colons, semi-colons, line numbers, etc.

AS-Level2019June10.2open2 marks

Describe two differences between machine code and assembly language.

Machine code is binary/the actual instruction whereas assembly language is written using mnemonics;

Assembly language needs translating before it can run // machine code can be executed without needing to be translated;

AS-Level2019June10.3open2 marks

Assemblers and compilers are two different types of translator. Describe one similarity and one difference between the role of an assembler and the role of a compiler.

Both convert source code into object code;

An assembler takes assembly code / (simple) mnemonics as input while a compiler takes complex instructions / HLL code;

AS-Level2019June11open9 marks

There have been some cases where law enforcement officers have requested a phone manufacturer to bypass access restrictions on a phone that they believe contains evidence of criminal activity. The manufacturers frequently refuse to do so.

Discuss a range of ethical and legal issues raised by the manufacturer agreeing or refusing to bypass access restrictions to the contents of the phone.

In your answer you will be assessed on your ability to follow a line of reasoning to produce a coherent, relevant and structured response.

Level of response question

LevelDescriptionMark Range
3A line of reasoning has been followed to produce a coherent, relevant and substantiated and logically structured response. The response covers at least four arguments, some of which have been expanded upon.

Answers must cover both ethical and legal arguments.
7–9
2A line of reasoning has been followed to produce a mostly coherent, relevant, substantiated and logically structured response that covers at least four points (any mix of arguments and expansion points).

Answers must cover both ethical and legal arguments.
4–6
1At least one argument has been made, possibly with an expansion point but there is no evidence that a line of reasoning has been followed.1–3

Examples could include:

Ethical

  • Law enforcement officers may see disturbing images/messages on the phone which could affect the way they feel.
  • This may be seen as a breach of privacy.
  • Personal data such as photos of family may be lost.
  • Law enforcement officers may misuse the phones for their own purposes.
  • Law enforcement officers may be able to use the phone to contact (potential) victims and offer support.
  • Law enforcement officers may use the phones to perform "stings" on other criminals.
  • The ethical issue is one of creating "a slippery slope." If the law enforcement officers are granted access in this case, where will it stop? Will foreign governments have similar access – or the right for the encrypted data to be shared
  • This could cause increased conflict between law enforcement officers and the public.
  • People may have private photos/data which while legal may go against their culture or the cultural beliefs of the law enforcement officer.
  • Breach of trust between manufacturer and client (count as legal if contract rather than trust).

Legal

  • Relevant legislation identified with reference to personal information or privacy.
  • Law enforcement officers may be able to make a decision not to press charges based upon evidence on the phone // May have to let people they believe to be guilty go free if they cannot access data.
  • This may be in breach of (human rights of) privacy.
  • Law enforcement officers may be able to use the data to solve other crimes.
  • Law enforcement officers may be able to use the data to prevent further criminal activity.
  • Allowing access to encrypted information stored on the phone may undermine the very freedoms and liberty that the law is meant to protect.
  • Providing access to phones may also create a vulnerability that hackers (from hostile countries) can exploit.
  • A legal issue when a judge gives permission for a phone's encrypted data to be accessed and it can't/it is refused.
  • If we have the technology to prevent terrorist attacks by gaining valuable data from the attackers' electronic devices then access to encrypted data should be allowed.
  • The police may not keep the data as secure as the user wants.
  • Law enforcement officers may edit the data on the phone.
  • What level of authority/who is needed to give permission to a law enforcement officer to access data?
  • Manufacturers may be breaking the law by refusing to allow access.

Students may be awarded marks for individual issues or expansions upon issues.

Expansion points may include further details on how the issue may arise or the impact of the issue occurring. Examples of expansion points could include:

  • Law enforcement officers may accidentally lose data through inexperience.
  • While it may be a breach in human rights privacy, this may be outweighed by lives saved.
  • If personal data is lost, the owner of the phone may lose income from missed business appointments.

Paper 2 covers sections 5-9 of the AQA AS Computer Science specification.

5 Fundamentals of data representation

5.1 Number systems

5.1.1 Natural numbers

ReferenceContentAdditional information
5.1.1.1
View

Be familiar with the concept of a natural number and the set ℕ of natural numbers (including zero).

ℕ = {0, 1, 2, 3, …}

5.1.2 Integer numbers

ReferenceContentAdditional information
5.1.2.1
View

Be familiar with the concept of an integer and the set ℤ of integers.

ℤ = { …, -3, -2, -1, 0, 1, 2, 3, … }

5.1.3 Rational numbers

ReferenceContentAdditional information
5.1.3.1
View

Be familiar with the concept of a rational number and the set ℚ of rational numbers, and that this set includes the integers.

ℚ is the set of numbers that can be written as fractions (ratios of integers). Since a number such as 7 can be written as 7/1, all integers are rational numbers.

5.1.4 Irrational numbers

ReferenceContentAdditional information
5.1.4.1
View

Be familiar with the concept of an irrational number.

An irrational number is one that cannot be written as a fraction, for example √2.

5.1.5 Real numbers

ReferenceContentAdditional information
5.1.5.1
View

Be familiar with the concept of a real number and the set ℝ of real numbers, which includes the natural numbers, the rational numbers, and the irrational numbers.

ℝ is the set of all 'possible real world quantities'.

5.1.6 Ordinal numbers

ReferenceContentAdditional information
5.1.6.1
View

Be familiar with the concept of ordinal numbers and their use to describe the numerical positions of objects.

When objects are placed in order, ordinal numbers are used to tell their position. For example, if we have a well-ordered set S = {'a', 'b', 'c', 'd'}, then 'a' is the 1st object, 'b' the 2nd, and so on.

5.1.7 Counting and measurement

ReferenceContentAdditional information
5.1.7.1
View

Be familiar with the use of natural numbers for counting.

5.1.7.2
View

Be familiar with the use of real numbers for measurement.

5.2 Number bases

5.2.1 Number base

ReferenceContentAdditional information
5.2.1.1
View

Be familiar with the concept of a number base, in particular:

  • decimal (base 10)
  • binary (base 2)
  • hexadecimal (base 16)

Students should be familiar with expressing a number's base using a subscript as follows:

  • Base 10: Number10, eg 6710
  • Base 2: Number2, eg 100110112
  • Base 16: Number16, eg AE16
5.2.1.2
View

Convert between decimal, binary and hexadecimal number bases.

5.2.1.3
View

Be familiar with, and able to use, hexadecimal as a shorthand for binary and to understand why it is used in this way.

5.3 Units of information

5.3.1 Bits and bytes

ReferenceContentAdditional information
5.3.1.1
View

Know that the bit is the fundamental unit of information.

A bit is either 0 or 1.

5.3.1.2
View

Know that a byte is a group of 8 bits.

5.3.1.3
View

Know that 2n different values can be represented with n bits.

For example, 3 bits can be configured in 23 = 8 different ways: 000, 001, 010, 011, 100, 101, 110, 111.

5.3.2 Units

ReferenceContentAdditional information
5.3.2.1
View

Know the names, symbols and corresponding powers of 10 for the decimal prefixes:

  • kilo, k - 103
  • mega, M - 106
  • giga, G - 109
  • tera, T - 1012
5.3.2.2
View

Know the names, symbols and corresponding powers of 2 for the binary prefixes:

  • kibi, Ki - 210
  • mebi, Mi - 220
  • gibi, Gi - 230
  • tebi, Ti - 240
5.3.2.3
View

Know that quantities of bytes can be described using binary prefixes representing powers of 2 or using decimal prefixes representing powers of 10, eg one kibibyte is written as 1KiB = 210 B and one kilobyte is written as 1 kB = 103 B.

Historically the terms kilobyte, megabyte, etc have often been used when kibibyte, mebibyte, etc are meant.

5.4 Binary number system

5.4.1 Unsigned binary

ReferenceContentAdditional information
5.4.1.1
View

Know the difference between unsigned binary and signed binary.

Students are expected to be able to convert between unsigned binary and decimal and vice versa.

5.4.1.2
View

Know that in unsigned binary the minimum and maximum values for a given number of bits, n, are 0 and 2n - 1 respectively.

5.4.2 Unsigned binary arithmetic

ReferenceContentAdditional information
5.4.2.1
View

Be able to add two unsigned binary integers.

5.4.2.2
View

Be able to multiply two unsigned binary integers.

5.4.3 Signed binary using two's complement

ReferenceContentAdditional information
5.4.3.1
View

Know that signed binary can be used to represent negative integers and that one possible coding scheme is two's complement.

This is the only representation of negative integers that will be examined. Students are expected to be able to convert between signed binary and decimal and vice versa.

5.4.3.2
View

Know how to represent negative and positive integers in two's complement.

5.4.3.3
View

Know how to perform subtraction using two's complement.

5.4.3.4
View

Know how to calculate the range of a given number of bits, n.

5.4.4 Numbers with a fractional part

ReferenceContentAdditional information
5.4.4.1
View

Know how numbers with a fractional part can be represented in fixed point form in binary in a given number of bits.

5.4.4.2
View

Be able to convert decimal to fixed point binary of a given number of bits.

5.4.4.3
View

Be able to convert fixed point binary to decimal of a given number of bits.

5.5 Information coding systems

5.5.1 Character form of a decimal digit

ReferenceContentAdditional information
5.5.1.1
View

Differentiate between the character code representation of a decimal digit and its pure binary representation.

5.5.2 ASCII and Unicode

ReferenceContentAdditional information
5.5.2.1
View

Describe ASCII and Unicode coding systems for coding character data.

5.5.2.2
View

Explain why Unicode was introduced.

5.5.3 Error checking and correction

ReferenceContentAdditional information
5.5.3.1
View

Describe and explain the use of parity bits.

5.5.3.2
View

Describe and explain the use of majority voting.

5.5.3.3
View

Describe and explain the use of check digits.

5.5.3.4
View

Evaluate the use of parity bits, majority voting and check digits

5.6 Representing images, sound and other data

5.6.1 Bit patterns, images, sound and other data

ReferenceContentAdditional information
5.6.1.1
View

Describe how bit patterns may represent other forms of data, including graphics and sound.

5.6.2 Analogue and digital

ReferenceContentAdditional information
5.6.2.1
View

Understand the difference between analogue and digital:

  • data
  • signals

5.6.3 Analogue/digital conversion

ReferenceContentAdditional information
5.6.3.1
View

Describe the principles of operation of an analogue to digital converter (ADC).

5.6.3.2
View

Describe the principles of operation of a digital to analogue converter (DAC).

5.6.4 Bitmapped graphics

ReferenceContentAdditional information
5.6.4.1
View

Explain how bitmaps are represented.

5.6.4.2
View

Explain resolution.

Resolution is expressed as number of dots per inch where a dot is a pixel.

5.6.4.3
View

Know that colour depth is the number of bits stored for each pixel.

5.6.4.4
View

Know that the size of an image in pixels is width of image in pixels × height of image in pixels.

The size of an image is also alternatively sometimes described as the resolution of an image.

5.6.4.5
View

Calculate storage requirements for bitmapped images and be aware that bitmap image files may also contain metadata.

Ignoring metadata, storage requirements = size in pixels x colour depth where size in pixels is width in pixels x height in pixels.

5.6.4.6
View

Be familiar with typical metadata.

eg width, height, colour depth.

5.6.5 Digital representation of sound

ReferenceContentAdditional information
5.6.5.1
View

Describe the digital representation of sound.

5.6.5.2
View

Understand sample resolution and its effect on the quality of audio recordings.

5.6.5.3
View

Understand sampling rate and its effect on the quality of audio recordings.

5.6.5.4
View

Know Nyquist's theorem.

5.6.5.5
View

Calculate sound sample sizes in bytes.

5.6.6 Musical Instrument Digital Interface (MIDI)

ReferenceContentAdditional information
5.6.6.1
View

Describe the purpose of MIDI and the use of event messages in MIDI.

5.6.6.2
View

Describe the advantages of using MIDI files for representing music.

5.6.7 Data compression

ReferenceContentAdditional information
5.6.7.1
View

Know why images and sound files are often compressed and that other files, such as text files, can also be compressed.

5.6.7.2
View

Understand the difference between lossless and lossy compression and explain the advantages and disadvantages of each.

5.6.7.3
View

Explain the principles behind run length encoding (RLE) for lossless compression.

5.6.7.4
View

Explain the principles behind dictionary-based methods for lossless compression.

5.6.8 Encryption

ReferenceContentAdditional information
5.6.8.1
View

Understand what is meant by encryption and be able to define it.

Caesar and Vernam ciphers are at opposite extremes. One offers perfect security, the other doesn't. Between these two types are ciphers that are computationally secure – see below. Students will be assessed on the two types. Ciphers other than Caesar may be used to assess students' understanding of the principles involved. These will be explained and be similar in terms of computational complexity.

5.6.8.2
View

Be familiar with the term cipher.

5.6.8.3
View

Be familiar with the term plaintext.

5.6.8.4
View

Be familiar with the term ciphertext.

5.6.8.5
View

Be familiar with Caesar cipher and be able to apply it to encrypt a plaintext message and decrypt a ciphertext.

5.6.8.6
View

Be able to explain why Caesar cipher is easily cracked.

5.6.8.7
View

Be familiar with Vernam cipher or one-time pad and be able to apply it to encrypt a plaintext message and decrypt a ciphertext.

Since the key k is chosen uniformly at random, the ciphertext c is also distributed uniformly. The key k must be used once only. The key k is known as a one-time pad.

5.6.8.8
View

Explain why Vernam cipher is considered as a cypher with perfect security.

5.6.8.9
View

Compare Vernam cipher with ciphers that depend on computational security.

Vernam cipher is the only one to have been mathematically proved to be completely secure. The worth of all other ciphers ever devised is based on computational security. In theory, every cryptographic algorithm except for Vernam cipher can be broken, given enough ciphertext and time.

6 Fundamentals of computer systems

6.1 Hardware and software

6.1.1 Relationship between hardware and software

ReferenceContentAdditional information
6.1.1.1
View

Define the term hardware.

6.1.1.2
View

Define the term software.

6.1.1.3
View

Understand the relationship between hardware and software.

6.1.2 Classification of software

ReferenceContentAdditional information
6.1.2.1
View

Explain what is meant by system software.

6.1.2.2
View

Explain what is meant by application software.

6.1.2.3
View

Understand the need for, and attributes of, different types of software.

6.1.3 System software

ReferenceContentAdditional information
6.1.3.1
View

Know that system software includes operating systems (OSs), utility programs, libraries and translators (compiler, assembler, interpreter).

6.1.3.2
View

Understand the need for, and functions of operating systems (OSs).

6.1.3.3
View

Understand the need for, and functions of utility programs.

6.1.3.4
View

Understand the need for, and functions of libraries.

6.1.3.5
View

Understand the need for, and functions of translators (compiler, assembler, interpreter).

6.1.4 Role of an operating system (OS)

ReferenceContentAdditional information
6.1.4.1
View

Understand that a role of the operating system is to hide the complexities of the hardware.

6.1.4.2
View

Know that the OS handles resource management, managing hardware to allocate processors, memories and I/O devices among competing processes.

6.2 Classification of programming languages

6.2.1 Classification of programming languages

ReferenceContentAdditional information
6.2.1.1
View

Show awareness of the development of types of programming languages and their classification into low- and high-level languages.

6.2.1.2
View

Know that low-level languages are considered to be:

  • machine-code
  • assembly language
6.2.1.3
View

Know that high-level languages include imperative high-level language.

6.2.1.4
View

Describe machine-code language and assembly language.

6.2.1.5
View

Understand the advantages and disadvantages of machine-code and assembly language programming compared with high-level language programming.

6.2.1.6
View

Explain the term 'imperative high-level language' and its relationship to low-level languages.

6.3 Types of program translator

6.3.1 Types of program translator

ReferenceContentAdditional information
6.3.1.1
View

Understand the role of assemblers.

6.3.1.2
View

Understand the role of compilers.

6.3.1.3
View

Understand the role of interpreters.

6.3.1.4
View

Explain the differences between compilation and interpretation. Describe situations in which each would be appropriate.

6.3.1.5
View

Explain why an intermediate language such as bytecode is produced as the final output by some compilers and how it is subsequently used.

6.3.1.6
View

Understand the difference between source and object (executable) code.

6.4 Logic gates

6.4.1 Logic gates

ReferenceContentAdditional information
6.4.1.1
View

Construct truth tables for the NOT logic gate.

Students should know and be able to use ANSI/IEEE standard 91-1984 Distinctive shape logic gate symbols for these logic gates.

6.4.1.2
View

Construct truth tables for the AND logic gate.

6.4.1.3
View

Construct truth tables for the OR logic gate.

6.4.1.4
View

Construct truth tables for the XOR logic gate.

6.4.1.5
View

Construct truth tables for the NAND logic gate.

6.4.1.6
View

Construct truth tables for the NOR logic gate.

6.4.1.7
View

Be familiar with drawing and interpreting logic gate circuit diagrams involving one or more of the above gates.

6.4.1.8
View

Complete a truth table for a given logic gate circuit.

6.4.1.9
View

Write a Boolean expression for a given logic gate circuit.

6.4.1.10
View

Draw an equivalent logic gate circuit for a given Boolean expression.

6.5 Boolean algebra

6.5.1 Using Boolean algebra

ReferenceContentAdditional information
6.5.1.1
View

Be familiar with the use of Boolean identities and De Morgan's laws to manipulate and simplify Boolean expressions.

7 Fundamentals of computer organisation and architecture

7.1 Internal hardware components of a computer

7.1.1 Internal hardware components of a computer

ReferenceContentAdditional information
7.1.1.1
View

Have an understanding and knowledge of the basic internal components of a computer system.

Although exam questions about specific machines will not be asked, it might be useful to base this section on the machines used at the centre.

7.1.1.2
View

Understand the role of the processor.

7.1.1.3
View

Understand the role of main memory.

7.1.1.4
View

Understand the role of the address bus.

7.1.1.5
View

Understand the role of the data bus.

7.1.1.6
View

Understand the role of the control bus.

7.1.1.7
View

Understand the role of I/O controllers.

7.1.1.8
View

Be able to explain the difference between von Neumann and Harvard architectures and describe where each is typically used.

Embedded systems such as digital signal processing (DSP) systems use Harvard architecture processors extensively. Von Neumann architecture is used extensively in general purpose computing systems.

7.1.1.9
View

Understand the concept of addressable memory.

7.2 The stored program concept

7.2.1 The meaning of the stored program concept

ReferenceContentAdditional information
7.2.1.1
View

Be able to describe the stored program concept: machine code instructions stored in main memory are fetched and executed serially by a processor that performs arithmetic and logical operations.

7.3 Structure and role of the processor and its components

7.3.1 The processor and its components

ReferenceContentAdditional information
7.3.1.1
View

Explain the role and operation of the arithmetic logic unit.

7.3.1.2
View

Explain the role and operation of the control unit.

7.3.1.3
View

Explain the role and operation of the clock.

7.3.1.4
View

Explain the role and operation of general-purpose registers.

7.3.1.5
View

Explain the role and operation of the program counter.

7.3.1.6
View

Explain the role and operation of the current instruction register.

7.3.1.7
View

Explain the role and operation of the memory address register.

7.3.1.8
View

Explain the role and operation of the memory buffer register.

7.3.1.9
View

Explain the role and operation of the status register.

7.3.2 The Fetch-Execute cycle and the role of registers within it

ReferenceContentAdditional information
7.3.2.1
View

Explain how the Fetch-Execute cycle is used to execute machine code programs, including the stages in the cycle (fetch, decode, execute) and details of registers used.

7.3.3 The processor instruction set

ReferenceContentAdditional information
7.3.3.1
View

Understand the term 'processor instruction set' and know that an instruction set is processor specific.

7.3.3.2
View

Know that instructions consist of an opcode and one or more operands (value, memory address or register).

A simple model will be used in which the addressing mode will be incorporated into the bits allocated to the opcode so the latter defines both the basic machine operation and the addressing mode. Students will not be expected to define opcode, only interpret opcodes in the given context of a question.

For example, 4 bits have been allocated to the opcode (3 bits for basic machine operation, eg ADD, and 1 bit for the addressing mode). 4 bits have been allocated to the operand, making the instruction, opcode + operand, 8 bits in length. In this example, 16 different opcodes are possible (24 = 16).

OpcodeOperand
Basic Machine OperationAddressing Mode
00100101

7.3.4 Addressing modes

ReferenceContentAdditional information
7.3.4.1
View

Understand and apply immediate addressing.

Immediate addressing: the operand is the datum.

7.3.4.2
View

Understand and apply direct addressing.

Direct addressing: the operand is the address of the datum. Address to be interpreted as meaning either main memory or register.

7.3.5 Machine-code/assembly language operations

ReferenceContentAdditional information
7.3.5.1
View

Understand and apply the basic machine-code operations of:

  • load
  • add
  • subtract
  • store
  • branching (conditional and unconditional)
  • compare
  • logical bitwise operators (AND, OR, NOT, XOR)
  • logical
  • shift right
  • shift left
  • halt

Use the basic machine-code operations above when machine-code instructions are expressed in mnemonic form—assembly language, using immediate and direct addressing.

7.3.6 Factors affecting processor performance

ReferenceContentAdditional information
7.3.6.1
View

Explain the effect on processor performance of multiple cores.

7.3.6.2
View

Explain the effect on processor performance of cache memory.

7.3.6.3
View

Explain the effect on processor performance of clock speed.

7.3.6.4
View

Explain the effect on processor performance of word length.

7.3.6.5
View

Explain the effect on processor performance of address bus width.

7.3.6.6
View

Explain the effect on processor performance of data bus width.

7.4 External hardware devices

7.4.1 Input and output devices

ReferenceContentAdditional information
7.4.1.1
View

Know the main characteristics, purpose and suitability of barcode readers and understand their principles of operation.

7.4.1.2
View

Know the main characteristics, purpose and suitability of digital cameras and understand their principles of operation.

7.4.1.3
View

Know the main characteristics, purpose and suitability of laser printers and understand their principles of operation.

7.4.1.4
View

Know the main characteristics, purpose and suitability of RFID and understand their principles of operation.

7.4.2 Secondary storage devices

ReferenceContentAdditional information
7.4.2.1
View

Explain the need for secondary storage within a computer system.

7.4.2.2
View

Know the main characteristics, purposes, suitability and understand the principles of operation of the hard disk.

7.4.2.3
View

Know the main characteristics, purposes, suitability and understand the principles of operation of the optical disk.

7.4.2.4
View

Know the main characteristics, purposes, suitability and understand the principles of operation of the solid-state disk (SSD).

SSD = NAND flash memory + a controller that manages pages, and blocks and complexities of writing. Based on floating gate transistors that trap and store charge. A block, made up of many pages, cannot overwrite pages; a page has to be erased before it can be written to but technology requires the whole block to be erased. Lower latency and faster transfer speeds than a magnetic disk drive.

7.4.2.5
View

Compare the capacity and speed of access of various media and make a judgement about their suitability for different applications.

8 Consequences of uses of computing

8.1 Individual (moral), social (ethical), legal and cultural issues and opportunities

ReferenceContentAdditional information
8.1.1
View

Show awareness of current individual (moral), social (ethical), legal and cultural opportunities and risks of computing.

Understand that:

  • developments in computer science and digital technologies have dramatically altered the shape of communications and information flows in societies, enabling massive transformations in the capacity to:
    • monitor behaviour
    • amass and analyse personal information
    • distribute, publish, communicate and disseminate personal information
  • computer scientists and software engineers therefore have power, as well as the responsibilities that go with it, in the algorithms that they devise and the code that they deploy.
  • software and their algorithms embed moral and cultural values.
  • the issue of scale, for software the whole world over, creates potential for individual computer scientists and software engineers to produce great good, but with it comes the ability to cause great harm.

Be able to discuss the challenges facing legislators in the digital age.

Teachers may wish to employ two very powerful techniques, hypotheticals and case studies, to engage students in the issues.

Hypotheticals allow students to isolate quickly important ethical principles in an artificially simplified context. For example, a teacher might ask students to explain and defend how, as a Google project manager, they would evaluate a proposal to bring Google's Street View technology to a remote African village. What questions should be asked? Who should be consulted? What benefits, risks and safeguards considered? What are the trade-offs?

Case studies allow students to confront the tricky interplay between the sometimes competing ethical values and principles relevant in real world settings. For example, the Google Street View case might be used to tease out the ethical conflicts between individual and cultural expectations, the principle of informed consent, Street View's value as a service, its potential impact on human perceptions and behaviours, and its commercial value to Google and its shareholders.

There are many resources available on the Internet to support teaching of this topic.

9 Fundamentals of communication and networking

9.1 Communication

9.1.1 Communication methods

ReferenceContentAdditional information
9.1.1.1
View

Define serial transmission methods.

9.1.1.2
View

Define parallel transmission methods.

9.1.1.3
View

Discuss the advantages of serial over parallel transmission.

9.1.1.4
View

Define and compare synchronous and asynchronous data transmission.

9.1.1.5
View

Describe the purpose of start and stop bits in asynchronous data transmission.

9.1.2 Communication basics

ReferenceContentAdditional information
9.1.2.1
View

Define baud rate.

9.1.2.2
View

Define bit rate.

9.1.2.3
View

Define bandwidth.

9.1.2.4
View

Define latency.

9.1.2.5
View

Define protocol.

9.1.2.6
View

Differentiate between baud rate and bit rate.

Bit rate can be higher than baud rate if more than one bit is encoded in each signal change.

9.1.2.7
View

Understand the relationship between bit rate and bandwidth.

Bit rate is directly proportionate to bandwidth.

9.2 Networking

9.2.1 Network topology

ReferenceContentAdditional information
9.2.1.1
View

Understand and explain the operation of a physical star topology.

9.2.1.2
View

Understand and explain the operation of a logical bus network topology.

A network physically wired in star topology can behave logically as a bus network by using a bus protocol and appropriate physical switching.

9.2.1.3
View

Differentiate between the physical star topology and the logical bus network topology.

9.2.2 Types of networking between hosts

ReferenceContentAdditional information
9.2.2.1
View

Explain peer-to-peer networking and describe situations where it might be used.

In a peer-to-peer network, each computer has equal status.

9.2.2.2
View

Explain client-server networking and describe situations where it might be used.

In a client-server network, most computers are nominated as clients and one or more as servers. The clients request services from the servers, which provide these services, for example file server, email server.

9.2.3 Wireless networking

ReferenceContentAdditional information
9.2.3.1
View

Explain the purpose of WiFi.

A wireless local area network that is based on international standards.

Used to enable devices to connect to a network wirelessly.

9.2.3.2
View

Be familiar with the components required for wireless networking.

  • Wireless network adapter
  • Wireless access point
9.2.3.3
View

Be familiar with the purpose of Service Set Identifier (SSID).

9.2.3.4
View

Be familiar with how wireless networks are secured using WPA (Wifi Protected Access)/WPA2.

9.2.3.5
View

Be familiar with how wireless networks are secured by disabling SSID (Service Set Identifier) broadcasting.

9.2.3.6
View

Be familiar with how wireless networks are secured using a MAC (Media Access Control) address allow list.

9.2.3.7
View

Explain the wireless protocol Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) with and without Request to Send/Clear to Send (RTS/CTS).