Click a paper to view its questions. The specification for the course is shown on the right. For each question, its specification references are listed and can be clicked to scroll the relevant part of the specification into view.

AS-Level 2024 June Paper 2AS-Level 2023 June Paper 2AS-Level 2022 June Paper 2AS-Level 2020 June Paper 2AS-Level 2019 June Paper 2AS-Level 2018 June Paper 2AS-Level 2017 June Paper 2AS-Level 2016 June Paper 2A-Level 2024 June Paper 2A-Level 2023 June Paper 2A-Level 2022 June Paper 2A-Level 2021 June Paper 2A-Level 2020 June Paper 2A-Level 2019 June Paper 2A-Level 2018 June Paper 2A-Level 2017 June Paper 2
AS-Level2020June1.1open1 mark

State the decimal equivalent of the hexadecimal number C57

3159;

AS-Level2020June1.2open1 mark

How many different values can be represented using two bytes?

216 / 65 536;

AS-Level2020June1.3multiple-choiceDiagram1 mark

A data transmission system transmits one byte of data, using the majority voting system for error correction.

Figure 1 shows the bit pattern that was received.

Figure 1

  • 1 1 1 0 0 0 0 0 0 1 1 0 0 0 1 1 0 1 1 1 1 0 1 1

Shade one lozenge to indicate the byte of data that the receiver will assume was sent.

  • A: 10010011
  • B: 10011011
  • C: 10010111
  • D: 10011110
  • A:10010011
  • B:10011011
  • C:10010111
  • D:10011110

C;

AS-Level2020June1.4open2 marks

A check digit can be used to detect errors when data are entered or transmitted.

Explain what a check digit is and outline how the check digit is generated.

Consists of a digit calculated (using an algorithm); from the other digits/letters (in the input sequence);
A. Answer by example.

AS-Level2020June2.1calculationDiagram2 marks

Figure 2 shows two unsigned binary integers.

Figure 2

  • 00101101
  • 00000101

What is the result in binary of multiplying the two numbers shown in Figure 2?

You must show all your working in binary.

Mark as follows:

1 mark for any relevant working out such as multiplying one number on a bit-wise basis by the other or summing the results of (incorrect) bitwise multiplications:

10110100
101101

1 mark for final answer:

11100001

Alternative Method
10100000
101000
10100
101

MAX 2
MAX 1 if no working is shown

AS-Level2020June2.2calculation2 marks

Convert the decimal number 6.34375 into an unsigned fixed point binary number using 8 bits with 5 bits after the binary point.

You may use the space below for working.

110;01011;

AS-Level2020June3.1open3 marks

A sound is being recorded from an analogue source using a sound card in a computer. The sound card contains an analogue to digital converter (ADC).

Describe the steps the ADC performs in this process.

(Analogue signal) sampled at fixed/regular time intervals; R.
Amplitude/Voltage of signal/wave (at each sample point) measured;
Measurement coded into a fixed number of bits // coded in binary;

AS-Level2020June3.2calculation2 marks

A sound has been recorded and takes up 34.56 megabytes (MB) of storage space. The sound lasts 360 seconds and was recorded with a sample resolution of 16 bits.

Calculate the sample rate used for the recording. State your answer in samples per second (Hertz). You should show your working.

48 000 (Hz) // 34.56 * 1000 * 1000 * 8 / 16 / 360;;
A. 48 kHz;;
NE. 48

If final answer is incorrect then award 1 mark for working for one of:

  • calculating recording size in bits: 34.56 * 1000 * 1000 * 8
  • showing recording size in bits: 276 480 000
  • dividing (A. incorrect) recording size in bits by 16 and 360

Note: Award 2 marks if correct answer given regardless of working.
Max 1 if final answer is incorrect.

AS-Level2020June3.3open2 marks

State Nyquist's theorem.

You must sample at a rate that is at least double; the highest frequency (component) in the original sound;

AS-Level2020June4open2 marks

A student has attempted to calculate the minimum file size, in bytes, of a bitmapped image.

The bitmapped image is 10 pixels wide by 16 pixels high with 4 possible colours for each pixel.

The student calculates the answer to be 80 bytes by using the following method:

number of pixels wide × number of pixels high × number of colours ÷ number of bits in a byte

Explain what the student has done wrong and state the correct minimum file size in bytes.

The student has used the number of colours (4) instead of the colour depth/number of bits per pixel (2);
The correct minimum file size is 40 bytes;

AS-Level2020June5.1table1 mark

Complete the truth table for A NAND B.

ABA NAND B
00
01
10
11
ABA NAND B
001
011
101
110
AS-Level2020June5.2diagram3 marks

A XOR B can be implemented as a logic circuit without using an XOR gate.

Using only AND, OR and NOT gates draw a circuit that will produce an output Q which is logically equivalent to A XOR B.

1 mark for getting Part 1 or Part 2 correct on any of the three diagrams.
1 mark for getting corresponding Part 1 or Part 2 correct on the same diagram.
1 mark for getting corresponding Part 3 correct on the same diagram.

MAX 2 if not fully correct
Mark response against diagram that will give the highest mark.
Mark point 3 can only be awarded if at least one other mark point has been awarded.

AS-Level2020June5.3calculation4 marks

Using the rules and identities of Boolean algebra, simplify the following Boolean expression.

A + (B ⋅ B') + (C ⋅ A)

You must show your working.

1 mark for final answer A ⋅ C̅

Max 3 marks for working:

  • 1 mark for each application of an identity or theorem other than cancelling NOTs that produces a simpler expression.
  • 1 mark for a single successful application of the distributive law that produces a simpler expression.

Note: a simpler expression is one that is logically equivalent to the original expression but uses fewer logical operators.

Max 3 if answer is correct but any incorrect working or significant steps of working is missing.

Marking guidance for examiners

  • Award marks for working out until an incorrect step has been made. If a student misses out some steps but does not make an error then continue marking.
  • If, in any one step, a candidate is simplifying different parts of an expression simultaneously award all relevant marks for this multiple stage but don't award any further marks for working in any parts simplified incorrectly.

Example working (1)
A + 0̅̅̅̅̅̅̅ + C ⋅ A̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅ [B. NOT B = 0]
(A + 0) ⋅ C ⋅ A̅̅̅̅̅̅ [Application of De Morgan's Law]
(A + 0) ⋅ (C̅ + A̅) [Application of De Morgan's Law]
A ⋅ (C̅ + A̅) [A + 0 = A]
A ⋅ C̅ + A ⋅ A̅ [Expand brackets]
A ⋅ C̅ + 0 [A ⋅ A̅ = 0]
A ⋅ C̅ [A + 0 = A]

Example working (2)
(A + B ⋅ B̅) ⋅ C ⋅ A̅̅̅̅̅̅ [Application of De Morgan's Law]
(A + 0) ⋅ C ⋅ A̅̅̅̅̅̅ [B. NOT B = 0]
A ⋅ C ⋅ A̅̅̅̅̅̅ [A + 0 = A]
A ⋅ (C̅ + A̅) [Application of De Morgan's Law]
A ⋅ C̅ + A ⋅ A̅ [Expand brackets]
A ⋅ C̅ + 0 [A ⋅ A̅ = 0]
A ⋅ C̅ [A + 0 = A]

AS-Level2020June6.1open1 mark

The memory buffer register and the program counter are examples of registers.

What is a register?

A memory/storage location inside/on a processor; A. CPU instead of processor
NE. memory/storage location

AS-Level2020June6.2open2 marks

Describe the stored program concept.

Instructions are stored in (main) memory;
Instructions are fetched, (decoded) and executed (serially) by the processor;
Programs can be moved in and out of main memory;
MAX 2

AS-Level2020June6.3open2 marks

Some buses in a computer system have to be bidirectional, meaning data or instructions can travel both ways.

Explain why the data bus in a computer system must be bidirectional.

When data/instructions are needed/fetched they have to be transferred from memory to the processor (using the data bus);
(after execution) result/data may need to be transferred back to memory (using the data bus);
A. responses referring to I/O controllers instead of memory

AS-Level2020June6.4open2 marks

State two differences between how the Harvard and von Neumann architectures operate.

In the Harvard architecture:

  • Instructions and data have separate buses;
  • Instructions and data are stored in separate memories // Instructions and data have separate memory/address spaces; NE. Places, locations, registers, areas of memory
  • Instruction word size can be different to data word size // Instruction bus width can be different to data bus width;
  • Instructions and data can be fetched simultaneously;

A. points made in reverse that state how the von Neumann architecture works
MAX 2

AS-Level2020June6.5open8 marks

Describe four steps that a processor goes through during the fetch stage of the Fetch-Execute cycle. You must explain the purpose of each step.

DescriptionExplanation
Contents of the Program Counter / PC transferred to the Memory Address Register / MARso that the PC can be updated // to enable the memory address to be transferred along the address bus/to the memory
Contents of MAR placed onto address busso the correct location in the main memory will be accessed
Contents of addressed memory location/value received on data bus loaded into the Memory Buffer Register / MBRnot all fetches will be for instructions so cannot be loaded directly into Current Instruction Register / CIR // the value will only be present transiently on the bus so must be stored in a register // the MBR is used to cope with the speed difference between the processor and the main memory
(Contents of) PC is incrementedso that the next instruction in the sequence can be fetched
The contents of the MBR is copied to the CIRso that if data is fetched/written during the execute phase it does not overwrite the instruction // because the control unit uses the instruction from the CIR

A. Memory Data Register/MDR for Memory Buffer Register/MBR
Max 4 for descriptions
Max 4 for explanations
Max 8

AS-Level2020June7.1openDiagram4 marks

Write an assembly language program to encrypt a single character using the Caesar cipher. The character to be encrypted is represented using a character set consisting of 26 characters with character codes 0–25. The output of the process should be the character code of the encrypted character.

Memory location 100 contains the character code to be encrypted, which is in the range 0–25. Memory location 101 contains an integer key to be used for encryption, which is in the range 0–25. The program should store the character code of the encrypted character in memory location 102.

Example 1:
LDR R0, 100
LDR R1, 101
ADD R2, R0, R1
CMP R2, #26
BLT store
SUB R2, R2, #26
store: STR R2, 102

Example 2:
LDR R0, 100
LDR R1, 101
ADD R2, R0, R1
CMP R2, #25
BGT adjust
STR R2, 102
HALT
adjust: SUB R2, R2, #26
STR R2, 102

Example 3:
LDR R0, 100
LDR R1, 101
ADD R2, R0, R1
CMP R2, #25
BGT adjust
B end
adjust: SUB R2, R2, #26
end: STR R2, 102

A. Use of alternative registers
A. Any label name in place of store / adjust
DPT. Use of invalid register name eg Rd
DPT. Use of incorrect addressing mode
DPT. Inclusion of invalid symbols in commands

Programming Marks:

  • 1 Mark for LDR R0, 100, LDR R1, 101 and STR R2, 102
  • 1 Mark for ADD R2, R0, R1
  • 1 Mark for SUB R2, R2, #26
  • 1 Mark for either:
    • CMP R2, #26, BLT store and store: aligned to a STR instruction or
    • CMP R2, #25, BGT adjust and adjust: aligned to a SUB instruction

Max 3 if any errors.

AS-Level2020June7.2open1 mark

An instruction uses immediate addressing. What is immediate addressing?

The operand is the datum;

AS-Level2020June7.3open1 mark

Another method of encryption is the Vernam cipher. Explain why, under the correct conditions, the Vernam cipher is perfectly secure.

Frequency/statistical/syntactical analysis cannot provide clues to the plaintext // nothing can be learnt about the plaintext from the ciphertext;

AS-Level2020June8.1open9 marks

The managers of a care home expect all of their residents to wear a Personal Emergency Response System (PERS) device. This is a device which residents wear around their neck and has a button that can be used to summon help should they feel unwell or require assistance.

A company has developed a life-blogging device. Like the PERS device it is worn around the neck. The life-blogging device monitors bodily signs such as blood pressure and heart rate as well as recording audio and video. The data collected are sent to a server and all of the data collected on the server can be accessed via a website.

The care home managers are considering using the life-blogging system instead of PERS so that the staff can monitor the residents' data. The life-blogging system will allow the care home to respond more quickly to an emergency situation and deal with situations where the resident is not capable of pushing a button. The managers are considering not telling the residents about the new device as they think it may confuse them.

Discuss any moral, ethical, legal and cultural issues that the care home managers should consider before introducing the new life-blogging devices.

Level of response question

LevelDescriptionMark Range
3A line of reasoning has been followed to produce a coherent, relevant, substantiated and logically structured response. The response covers a wide range of issues that are consistently explained and/or supported by examples.

Answers may cover moral/ethical, legal and cultural arguments or examine a smaller range of arguments in depth.
7–9
2A line of reasoning has been followed to produce a mostly coherent, relevant, substantiated and logically structured response that covers a range of issues that are sometimes explained and/or supported by examples.

Answers will cover a range of arguments in some depth.
4–6
1There is little evidence that a line of reasoning has been followed. The response covers a small number of issues that are generally not explained nor supported by examples.

Answers lack range and depth.
1–3

Examples could include:

Note: Some points may fit under more than one heading. These have been indicated with a #.

Moral/Ethical

  • It is unethical to collect data about people without them knowing what the data is to be used for. #
  • It is unethical to have residents wear a device if they don't have a full understanding of its capabilities.
  • If the device is in testing, it may not be as reliable as the PERS devices.
  • The observers may watch the streams for reasons other than monitoring. #
  • It may not be ethical to have your actions monitored in more detail than just your essential life signs.
  • Could be an invasion of privacy. #
  • Who controls the data? Should a resident be able to press a button to stop the recording?
  • Need to consider exactly what data should be recorded/stored. #

Legal

  • Will the data be stored securely? #
  • If the data is being life blogged, who will be able to see it?
  • Will the data be stored in compliance with the data protection regulations?
  • Who will be responsible if the devices go wrong and someone dies? #
  • Will the data be shared with doctors?
  • What happens if the observers see something (eg an illegal act) being carried out on the life blogger cameras? #
  • How long will data be stored?
  • Can monitor staff/visitors via camera in case of abuse allegation. #
  • Do visitors need to be told about cameras? #
  • What happens to data when the resident dies? How long can the data be kept for?
  • Can next of kin get access to data?
  • Who owns the data – the company/home/residents? #
  • In what country will the data be stored?

Cultural

  • Some people from some cultures may not like being videoed (particularly without their knowledge).
  • Residents may not want staff of the opposite gender viewing images of them in certain situations. #

Examples of points covered in depth

IssueExplanation/Depth
It is unethical to collect data about people without them knowing what the data is to be used forAs it could be used for something that they do not want/agree with or make them vulnerable in some way
It is unethical to have residents wear devices if they don't have a full understanding of its capabilitiesPeople cannot agree to wear something that records so much data if they do not know what it does
If the device is in testing, it may not be as reliable as the PERS deviceSystem might fail or send incorrect data if there are problems
AS-Level2020June8.2open4 marks

The life-blogging device contains a solid-state disk (SSD). It stores its data on this in addition to uploading the data to a server.

Explain two reasons why an SSD is a better choice than a magnetic hard disk for this application.

Mark as follows:

  • SSDs have lower power drain; which is important as the life blogger will run on battery;
  • SSDs are less likely to be damaged if dropped; which is important as the devices will be worn and carried around;
  • SSDs have faster access time; which could allow more data to be stored per second (which may allow finer detail);
  • SSDs are silent; which means they will not disturb the users;
  • SSDs are lighter/less obtrusive/smaller; which is important for a device worn around the neck;
  • SSDs produce less heat; which makes them more comfortable to wear;

Max 2 for advantages
Max 2 for expansions
Max 4 marks

AS-Level2020June9.1open1 mark

State one reason why a user might choose to compress an image file.

Takes up less storage space;
Faster transmission times;
To fit within certain system restrictions (eg e-mail attachment restrictions);
Max 1

AS-Level2020June9.2open1 mark

Describe one advantage of lossless compression over lossy compression.

The file can be reproduced exactly as it was originally;
A. The quality of an image/sound/video would not be reduced.
The original data can be fully recovered if lossless compression has been used // lossless data compression can be reversed; NE. no data is lost NE. no loss of quality
The original data cannot be recovered if lossy compression has been used // lossy compression cannot be reversed // the data is degraded by lossy compression; A. redundant / less important data removed NE. data is lost NE. quality is reduced Max 1
Max 1

AS-Level2020June9.3open3 marks

Explain how data can be compressed using dictionary-based compression.

(Variable) length strings of symbols/substrings of original data are represented by single tokens;
A table/dictionary is formed using the tokens as the keys/index;
The strings of symbols are used as the entries;

Alternative answer for LZ77
A sliding window of previous data is maintained;
A length-distance pair is formed where each of the next length characters; is equal to the characters exactly distance behind it; in the uncompressed stream.

AS-Level2020June10.1open3 marks

Explain the operation of a logical bus network topology.

A node broadcasts data (to the entire network);
All/Any nodes on the network receive/read the data;
A node examines the received data to check if it is the intended recipient;
Only one node can (successfully) transmit data at a time // Nodes use a shared transmission medium;
Max 3

If students write a detailed description covering CSMA/CD (not required for the specification) then award marks as follows:
Computer monitors/listens to (data signal on cable/bus);
If (data) signal present // if cable/bus busy continue to wait;
When no (data) signal present // when cable/bus idle start to transmit;
Whilst transmitting, computer monitors cable/bus to check for collision // to check if signal is identical to what it is sending;
Collision occurs if two computers (start) sending at same time // if two packets/frames in transit at same time;
If collision detected, jamming signal/signal warning of collision sent;
To ensure other (transmitting) computers aware of problem // to stop other computers sending data;
Computer that detected collision also stops sending data;
Then waits a random period before attempting to retransmit/repeating transmission/this process again;
Period is random to reduce likelihood of collision recurring (between computers that caused collision);
If a collision occurs again then waits a longer random time before attempting to transmit again;
Use of exponential back-off algorithm to determine wait time;
Max 3

AS-Level2020June10.2open1 mark

Explain how it is possible for the bit rate of a communications channel to be higher than its baud rate.

Bit rate can be higher than baud rate if more than one bit is encoded in each signal change;

AS-Level2020June10.3open2 marks

A data transmission system uses even parity. Data are transmitted in bytes, with each byte containing seven data bits and one parity bit.

Explain how the receiver will perform error detection on a received byte.

If the number of 1s received/in the byte is even, the data is (assumed to have been) received correctly // has not been corrupted; A. the data is correct
If the number of 1s received/in the byte is odd, the data has been corrupted / is incorrect;
A. odd/even part of second point by implication eg if student has written "is even" for the first point and then "otherwise" for the second.

AS-Level2020June10.4open4 marks

State two advantages of serial data transmission over parallel data transmission and explain how these are achieved.

Serial transmission is cheaper; due to needing fewer wires / less complex hardware;
Serial transmission does not suffer from crosstalk; as there is only one transmission line; A. only one bit is transmitted at a time
Serial transmission does not suffer from data skewing; as only one bit is transmitted at a time;
Serial transmission can be used over longer distances; due to needing fewer wires / less complex hardware // as there is only one transmission line // as only one bit is transmitted at a time;

Award up to 2 marks for each stated advantage and explanation of how it is achieved.
MAX 4

Paper 2 covers sections 5-9 of the AQA AS Computer Science specification.

5 Fundamentals of data representation

5.1 Number systems

5.1.1 Natural numbers

ReferenceContentAdditional information
5.1.1.1
View

Be familiar with the concept of a natural number and the set ℕ of natural numbers (including zero).

ℕ = {0, 1, 2, 3, …}

5.1.2 Integer numbers

ReferenceContentAdditional information
5.1.2.1
View

Be familiar with the concept of an integer and the set ℤ of integers.

ℤ = { …, -3, -2, -1, 0, 1, 2, 3, … }

5.1.3 Rational numbers

ReferenceContentAdditional information
5.1.3.1
View

Be familiar with the concept of a rational number and the set ℚ of rational numbers, and that this set includes the integers.

ℚ is the set of numbers that can be written as fractions (ratios of integers). Since a number such as 7 can be written as 7/1, all integers are rational numbers.

5.1.4 Irrational numbers

ReferenceContentAdditional information
5.1.4.1
View

Be familiar with the concept of an irrational number.

An irrational number is one that cannot be written as a fraction, for example √2.

5.1.5 Real numbers

ReferenceContentAdditional information
5.1.5.1
View

Be familiar with the concept of a real number and the set ℝ of real numbers, which includes the natural numbers, the rational numbers, and the irrational numbers.

ℝ is the set of all 'possible real world quantities'.

5.1.6 Ordinal numbers

ReferenceContentAdditional information
5.1.6.1
View

Be familiar with the concept of ordinal numbers and their use to describe the numerical positions of objects.

When objects are placed in order, ordinal numbers are used to tell their position. For example, if we have a well-ordered set S = {'a', 'b', 'c', 'd'}, then 'a' is the 1st object, 'b' the 2nd, and so on.

5.1.7 Counting and measurement

ReferenceContentAdditional information
5.1.7.1
View

Be familiar with the use of natural numbers for counting.

5.1.7.2
View

Be familiar with the use of real numbers for measurement.

5.2 Number bases

5.2.1 Number base

ReferenceContentAdditional information
5.2.1.1
View

Be familiar with the concept of a number base, in particular:

  • decimal (base 10)
  • binary (base 2)
  • hexadecimal (base 16)

Students should be familiar with expressing a number's base using a subscript as follows:

  • Base 10: Number10, eg 6710
  • Base 2: Number2, eg 100110112
  • Base 16: Number16, eg AE16
5.2.1.2
View

Convert between decimal, binary and hexadecimal number bases.

5.2.1.3
View

Be familiar with, and able to use, hexadecimal as a shorthand for binary and to understand why it is used in this way.

5.3 Units of information

5.3.1 Bits and bytes

ReferenceContentAdditional information
5.3.1.1
View

Know that the bit is the fundamental unit of information.

A bit is either 0 or 1.

5.3.1.2
View

Know that a byte is a group of 8 bits.

5.3.1.3
View

Know that 2n different values can be represented with n bits.

For example, 3 bits can be configured in 23 = 8 different ways: 000, 001, 010, 011, 100, 101, 110, 111.

5.3.2 Units

ReferenceContentAdditional information
5.3.2.1
View

Know the names, symbols and corresponding powers of 10 for the decimal prefixes:

  • kilo, k - 103
  • mega, M - 106
  • giga, G - 109
  • tera, T - 1012
5.3.2.2
View

Know the names, symbols and corresponding powers of 2 for the binary prefixes:

  • kibi, Ki - 210
  • mebi, Mi - 220
  • gibi, Gi - 230
  • tebi, Ti - 240
5.3.2.3
View

Know that quantities of bytes can be described using binary prefixes representing powers of 2 or using decimal prefixes representing powers of 10, eg one kibibyte is written as 1KiB = 210 B and one kilobyte is written as 1 kB = 103 B.

Historically the terms kilobyte, megabyte, etc have often been used when kibibyte, mebibyte, etc are meant.

5.4 Binary number system

5.4.1 Unsigned binary

ReferenceContentAdditional information
5.4.1.1
View

Know the difference between unsigned binary and signed binary.

Students are expected to be able to convert between unsigned binary and decimal and vice versa.

5.4.1.2
View

Know that in unsigned binary the minimum and maximum values for a given number of bits, n, are 0 and 2n - 1 respectively.

5.4.2 Unsigned binary arithmetic

ReferenceContentAdditional information
5.4.2.1
View

Be able to add two unsigned binary integers.

5.4.2.2
View

Be able to multiply two unsigned binary integers.

5.4.3 Signed binary using two's complement

ReferenceContentAdditional information
5.4.3.1
View

Know that signed binary can be used to represent negative integers and that one possible coding scheme is two's complement.

This is the only representation of negative integers that will be examined. Students are expected to be able to convert between signed binary and decimal and vice versa.

5.4.3.2
View

Know how to represent negative and positive integers in two's complement.

5.4.3.3
View

Know how to perform subtraction using two's complement.

5.4.3.4
View

Know how to calculate the range of a given number of bits, n.

5.4.4 Numbers with a fractional part

ReferenceContentAdditional information
5.4.4.1
View

Know how numbers with a fractional part can be represented in fixed point form in binary in a given number of bits.

5.4.4.2
View

Be able to convert decimal to fixed point binary of a given number of bits.

5.4.4.3
View

Be able to convert fixed point binary to decimal of a given number of bits.

5.5 Information coding systems

5.5.1 Character form of a decimal digit

ReferenceContentAdditional information
5.5.1.1
View

Differentiate between the character code representation of a decimal digit and its pure binary representation.

5.5.2 ASCII and Unicode

ReferenceContentAdditional information
5.5.2.1
View

Describe ASCII and Unicode coding systems for coding character data.

5.5.2.2
View

Explain why Unicode was introduced.

5.5.3 Error checking and correction

ReferenceContentAdditional information
5.5.3.1
View

Describe and explain the use of parity bits.

5.5.3.2
View

Describe and explain the use of majority voting.

5.5.3.3
View

Describe and explain the use of check digits.

5.5.3.4
View

Evaluate the use of parity bits, majority voting and check digits

5.6 Representing images, sound and other data

5.6.1 Bit patterns, images, sound and other data

ReferenceContentAdditional information
5.6.1.1
View

Describe how bit patterns may represent other forms of data, including graphics and sound.

5.6.2 Analogue and digital

ReferenceContentAdditional information
5.6.2.1
View

Understand the difference between analogue and digital:

  • data
  • signals

5.6.3 Analogue/digital conversion

ReferenceContentAdditional information
5.6.3.1
View

Describe the principles of operation of an analogue to digital converter (ADC).

5.6.3.2
View

Describe the principles of operation of a digital to analogue converter (DAC).

5.6.4 Bitmapped graphics

ReferenceContentAdditional information
5.6.4.1
View

Explain how bitmaps are represented.

5.6.4.2
View

Explain resolution.

Resolution is expressed as number of dots per inch where a dot is a pixel.

5.6.4.3
View

Know that colour depth is the number of bits stored for each pixel.

5.6.4.4
View

Know that the size of an image in pixels is width of image in pixels × height of image in pixels.

The size of an image is also alternatively sometimes described as the resolution of an image.

5.6.4.5
View

Calculate storage requirements for bitmapped images and be aware that bitmap image files may also contain metadata.

Ignoring metadata, storage requirements = size in pixels x colour depth where size in pixels is width in pixels x height in pixels.

5.6.4.6
View

Be familiar with typical metadata.

eg width, height, colour depth.

5.6.5 Digital representation of sound

ReferenceContentAdditional information
5.6.5.1
View

Describe the digital representation of sound.

5.6.5.2
View

Understand sample resolution and its effect on the quality of audio recordings.

5.6.5.3
View

Understand sampling rate and its effect on the quality of audio recordings.

5.6.5.4
View

Know Nyquist's theorem.

5.6.5.5
View

Calculate sound sample sizes in bytes.

5.6.6 Musical Instrument Digital Interface (MIDI)

ReferenceContentAdditional information
5.6.6.1
View

Describe the purpose of MIDI and the use of event messages in MIDI.

5.6.6.2
View

Describe the advantages of using MIDI files for representing music.

5.6.7 Data compression

ReferenceContentAdditional information
5.6.7.1
View

Know why images and sound files are often compressed and that other files, such as text files, can also be compressed.

5.6.7.2
View

Understand the difference between lossless and lossy compression and explain the advantages and disadvantages of each.

5.6.7.3
View

Explain the principles behind run length encoding (RLE) for lossless compression.

5.6.7.4
View

Explain the principles behind dictionary-based methods for lossless compression.

5.6.8 Encryption

ReferenceContentAdditional information
5.6.8.1
View

Understand what is meant by encryption and be able to define it.

Caesar and Vernam ciphers are at opposite extremes. One offers perfect security, the other doesn't. Between these two types are ciphers that are computationally secure – see below. Students will be assessed on the two types. Ciphers other than Caesar may be used to assess students' understanding of the principles involved. These will be explained and be similar in terms of computational complexity.

5.6.8.2
View

Be familiar with the term cipher.

5.6.8.3
View

Be familiar with the term plaintext.

5.6.8.4
View

Be familiar with the term ciphertext.

5.6.8.5
View

Be familiar with Caesar cipher and be able to apply it to encrypt a plaintext message and decrypt a ciphertext.

5.6.8.6
View

Be able to explain why Caesar cipher is easily cracked.

5.6.8.7
View

Be familiar with Vernam cipher or one-time pad and be able to apply it to encrypt a plaintext message and decrypt a ciphertext.

Since the key k is chosen uniformly at random, the ciphertext c is also distributed uniformly. The key k must be used once only. The key k is known as a one-time pad.

5.6.8.8
View

Explain why Vernam cipher is considered as a cypher with perfect security.

5.6.8.9
View

Compare Vernam cipher with ciphers that depend on computational security.

Vernam cipher is the only one to have been mathematically proved to be completely secure. The worth of all other ciphers ever devised is based on computational security. In theory, every cryptographic algorithm except for Vernam cipher can be broken, given enough ciphertext and time.

6 Fundamentals of computer systems

6.1 Hardware and software

6.1.1 Relationship between hardware and software

ReferenceContentAdditional information
6.1.1.1
View

Define the term hardware.

6.1.1.2
View

Define the term software.

6.1.1.3
View

Understand the relationship between hardware and software.

6.1.2 Classification of software

ReferenceContentAdditional information
6.1.2.1
View

Explain what is meant by system software.

6.1.2.2
View

Explain what is meant by application software.

6.1.2.3
View

Understand the need for, and attributes of, different types of software.

6.1.3 System software

ReferenceContentAdditional information
6.1.3.1
View

Know that system software includes operating systems (OSs), utility programs, libraries and translators (compiler, assembler, interpreter).

6.1.3.2
View

Understand the need for, and functions of operating systems (OSs).

6.1.3.3
View

Understand the need for, and functions of utility programs.

6.1.3.4
View

Understand the need for, and functions of libraries.

6.1.3.5
View

Understand the need for, and functions of translators (compiler, assembler, interpreter).

6.1.4 Role of an operating system (OS)

ReferenceContentAdditional information
6.1.4.1
View

Understand that a role of the operating system is to hide the complexities of the hardware.

6.1.4.2
View

Know that the OS handles resource management, managing hardware to allocate processors, memories and I/O devices among competing processes.

6.2 Classification of programming languages

6.2.1 Classification of programming languages

ReferenceContentAdditional information
6.2.1.1
View

Show awareness of the development of types of programming languages and their classification into low- and high-level languages.

6.2.1.2
View

Know that low-level languages are considered to be:

  • machine-code
  • assembly language
6.2.1.3
View

Know that high-level languages include imperative high-level language.

6.2.1.4
View

Describe machine-code language and assembly language.

6.2.1.5
View

Understand the advantages and disadvantages of machine-code and assembly language programming compared with high-level language programming.

6.2.1.6
View

Explain the term 'imperative high-level language' and its relationship to low-level languages.

6.3 Types of program translator

6.3.1 Types of program translator

ReferenceContentAdditional information
6.3.1.1
View

Understand the role of assemblers.

6.3.1.2
View

Understand the role of compilers.

6.3.1.3
View

Understand the role of interpreters.

6.3.1.4
View

Explain the differences between compilation and interpretation. Describe situations in which each would be appropriate.

6.3.1.5
View

Explain why an intermediate language such as bytecode is produced as the final output by some compilers and how it is subsequently used.

6.3.1.6
View

Understand the difference between source and object (executable) code.

6.4 Logic gates

6.4.1 Logic gates

ReferenceContentAdditional information
6.4.1.1
View

Construct truth tables for the NOT logic gate.

Students should know and be able to use ANSI/IEEE standard 91-1984 Distinctive shape logic gate symbols for these logic gates.

6.4.1.2
View

Construct truth tables for the AND logic gate.

6.4.1.3
View

Construct truth tables for the OR logic gate.

6.4.1.4
View

Construct truth tables for the XOR logic gate.

6.4.1.5
View

Construct truth tables for the NAND logic gate.

6.4.1.6
View

Construct truth tables for the NOR logic gate.

6.4.1.7
View

Be familiar with drawing and interpreting logic gate circuit diagrams involving one or more of the above gates.

6.4.1.8
View

Complete a truth table for a given logic gate circuit.

6.4.1.9
View

Write a Boolean expression for a given logic gate circuit.

6.4.1.10
View

Draw an equivalent logic gate circuit for a given Boolean expression.

6.5 Boolean algebra

6.5.1 Using Boolean algebra

ReferenceContentAdditional information
6.5.1.1
View

Be familiar with the use of Boolean identities and De Morgan's laws to manipulate and simplify Boolean expressions.

7 Fundamentals of computer organisation and architecture

7.1 Internal hardware components of a computer

7.1.1 Internal hardware components of a computer

ReferenceContentAdditional information
7.1.1.1
View

Have an understanding and knowledge of the basic internal components of a computer system.

Although exam questions about specific machines will not be asked, it might be useful to base this section on the machines used at the centre.

7.1.1.2
View

Understand the role of the processor.

7.1.1.3
View

Understand the role of main memory.

7.1.1.4
View

Understand the role of the address bus.

7.1.1.5
View

Understand the role of the data bus.

7.1.1.6
View

Understand the role of the control bus.

7.1.1.7
View

Understand the role of I/O controllers.

7.1.1.8
View

Be able to explain the difference between von Neumann and Harvard architectures and describe where each is typically used.

Embedded systems such as digital signal processing (DSP) systems use Harvard architecture processors extensively. Von Neumann architecture is used extensively in general purpose computing systems.

7.1.1.9
View

Understand the concept of addressable memory.

7.2 The stored program concept

7.2.1 The meaning of the stored program concept

ReferenceContentAdditional information
7.2.1.1
View

Be able to describe the stored program concept: machine code instructions stored in main memory are fetched and executed serially by a processor that performs arithmetic and logical operations.

7.3 Structure and role of the processor and its components

7.3.1 The processor and its components

ReferenceContentAdditional information
7.3.1.1
View

Explain the role and operation of the arithmetic logic unit.

7.3.1.2
View

Explain the role and operation of the control unit.

7.3.1.3
View

Explain the role and operation of the clock.

7.3.1.4
View

Explain the role and operation of general-purpose registers.

7.3.1.5
View

Explain the role and operation of the program counter.

7.3.1.6
View

Explain the role and operation of the current instruction register.

7.3.1.7
View

Explain the role and operation of the memory address register.

7.3.1.8
View

Explain the role and operation of the memory buffer register.

7.3.1.9
View

Explain the role and operation of the status register.

7.3.2 The Fetch-Execute cycle and the role of registers within it

ReferenceContentAdditional information
7.3.2.1
View

Explain how the Fetch-Execute cycle is used to execute machine code programs, including the stages in the cycle (fetch, decode, execute) and details of registers used.

7.3.3 The processor instruction set

ReferenceContentAdditional information
7.3.3.1
View

Understand the term 'processor instruction set' and know that an instruction set is processor specific.

7.3.3.2
View

Know that instructions consist of an opcode and one or more operands (value, memory address or register).

A simple model will be used in which the addressing mode will be incorporated into the bits allocated to the opcode so the latter defines both the basic machine operation and the addressing mode. Students will not be expected to define opcode, only interpret opcodes in the given context of a question.

For example, 4 bits have been allocated to the opcode (3 bits for basic machine operation, eg ADD, and 1 bit for the addressing mode). 4 bits have been allocated to the operand, making the instruction, opcode + operand, 8 bits in length. In this example, 16 different opcodes are possible (24 = 16).

OpcodeOperand
Basic Machine OperationAddressing Mode
00100101

7.3.4 Addressing modes

ReferenceContentAdditional information
7.3.4.1
View

Understand and apply immediate addressing.

Immediate addressing: the operand is the datum.

7.3.4.2
View

Understand and apply direct addressing.

Direct addressing: the operand is the address of the datum. Address to be interpreted as meaning either main memory or register.

7.3.5 Machine-code/assembly language operations

ReferenceContentAdditional information
7.3.5.1
View

Understand and apply the basic machine-code operations of:

  • load
  • add
  • subtract
  • store
  • branching (conditional and unconditional)
  • compare
  • logical bitwise operators (AND, OR, NOT, XOR)
  • logical
  • shift right
  • shift left
  • halt

Use the basic machine-code operations above when machine-code instructions are expressed in mnemonic form—assembly language, using immediate and direct addressing.

7.3.6 Factors affecting processor performance

ReferenceContentAdditional information
7.3.6.1
View

Explain the effect on processor performance of multiple cores.

7.3.6.2
View

Explain the effect on processor performance of cache memory.

7.3.6.3
View

Explain the effect on processor performance of clock speed.

7.3.6.4
View

Explain the effect on processor performance of word length.

7.3.6.5
View

Explain the effect on processor performance of address bus width.

7.3.6.6
View

Explain the effect on processor performance of data bus width.

7.4 External hardware devices

7.4.1 Input and output devices

ReferenceContentAdditional information
7.4.1.1
View

Know the main characteristics, purpose and suitability of barcode readers and understand their principles of operation.

7.4.1.2
View

Know the main characteristics, purpose and suitability of digital cameras and understand their principles of operation.

7.4.1.3
View

Know the main characteristics, purpose and suitability of laser printers and understand their principles of operation.

7.4.1.4
View

Know the main characteristics, purpose and suitability of RFID and understand their principles of operation.

7.4.2 Secondary storage devices

ReferenceContentAdditional information
7.4.2.1
View

Explain the need for secondary storage within a computer system.

7.4.2.2
View

Know the main characteristics, purposes, suitability and understand the principles of operation of the hard disk.

7.4.2.3
View

Know the main characteristics, purposes, suitability and understand the principles of operation of the optical disk.

7.4.2.4
View

Know the main characteristics, purposes, suitability and understand the principles of operation of the solid-state disk (SSD).

SSD = NAND flash memory + a controller that manages pages, and blocks and complexities of writing. Based on floating gate transistors that trap and store charge. A block, made up of many pages, cannot overwrite pages; a page has to be erased before it can be written to but technology requires the whole block to be erased. Lower latency and faster transfer speeds than a magnetic disk drive.

7.4.2.5
View

Compare the capacity and speed of access of various media and make a judgement about their suitability for different applications.

8 Consequences of uses of computing

8.1 Individual (moral), social (ethical), legal and cultural issues and opportunities

ReferenceContentAdditional information
8.1.1
View

Show awareness of current individual (moral), social (ethical), legal and cultural opportunities and risks of computing.

Understand that:

  • developments in computer science and digital technologies have dramatically altered the shape of communications and information flows in societies, enabling massive transformations in the capacity to:
    • monitor behaviour
    • amass and analyse personal information
    • distribute, publish, communicate and disseminate personal information
  • computer scientists and software engineers therefore have power, as well as the responsibilities that go with it, in the algorithms that they devise and the code that they deploy.
  • software and their algorithms embed moral and cultural values.
  • the issue of scale, for software the whole world over, creates potential for individual computer scientists and software engineers to produce great good, but with it comes the ability to cause great harm.

Be able to discuss the challenges facing legislators in the digital age.

Teachers may wish to employ two very powerful techniques, hypotheticals and case studies, to engage students in the issues.

Hypotheticals allow students to isolate quickly important ethical principles in an artificially simplified context. For example, a teacher might ask students to explain and defend how, as a Google project manager, they would evaluate a proposal to bring Google's Street View technology to a remote African village. What questions should be asked? Who should be consulted? What benefits, risks and safeguards considered? What are the trade-offs?

Case studies allow students to confront the tricky interplay between the sometimes competing ethical values and principles relevant in real world settings. For example, the Google Street View case might be used to tease out the ethical conflicts between individual and cultural expectations, the principle of informed consent, Street View's value as a service, its potential impact on human perceptions and behaviours, and its commercial value to Google and its shareholders.

There are many resources available on the Internet to support teaching of this topic.

9 Fundamentals of communication and networking

9.1 Communication

9.1.1 Communication methods

ReferenceContentAdditional information
9.1.1.1
View

Define serial transmission methods.

9.1.1.2
View

Define parallel transmission methods.

9.1.1.3
View

Discuss the advantages of serial over parallel transmission.

9.1.1.4
View

Define and compare synchronous and asynchronous data transmission.

9.1.1.5
View

Describe the purpose of start and stop bits in asynchronous data transmission.

9.1.2 Communication basics

ReferenceContentAdditional information
9.1.2.1
View

Define baud rate.

9.1.2.2
View

Define bit rate.

9.1.2.3
View

Define bandwidth.

9.1.2.4
View

Define latency.

9.1.2.5
View

Define protocol.

9.1.2.6
View

Differentiate between baud rate and bit rate.

Bit rate can be higher than baud rate if more than one bit is encoded in each signal change.

9.1.2.7
View

Understand the relationship between bit rate and bandwidth.

Bit rate is directly proportionate to bandwidth.

9.2 Networking

9.2.1 Network topology

ReferenceContentAdditional information
9.2.1.1
View

Understand and explain the operation of a physical star topology.

9.2.1.2
View

Understand and explain the operation of a logical bus network topology.

A network physically wired in star topology can behave logically as a bus network by using a bus protocol and appropriate physical switching.

9.2.1.3
View

Differentiate between the physical star topology and the logical bus network topology.

9.2.2 Types of networking between hosts

ReferenceContentAdditional information
9.2.2.1
View

Explain peer-to-peer networking and describe situations where it might be used.

In a peer-to-peer network, each computer has equal status.

9.2.2.2
View

Explain client-server networking and describe situations where it might be used.

In a client-server network, most computers are nominated as clients and one or more as servers. The clients request services from the servers, which provide these services, for example file server, email server.

9.2.3 Wireless networking

ReferenceContentAdditional information
9.2.3.1
View

Explain the purpose of WiFi.

A wireless local area network that is based on international standards.

Used to enable devices to connect to a network wirelessly.

9.2.3.2
View

Be familiar with the components required for wireless networking.

  • Wireless network adapter
  • Wireless access point
9.2.3.3
View

Be familiar with the purpose of Service Set Identifier (SSID).

9.2.3.4
View

Be familiar with how wireless networks are secured using WPA (Wifi Protected Access)/WPA2.

9.2.3.5
View

Be familiar with how wireless networks are secured by disabling SSID (Service Set Identifier) broadcasting.

9.2.3.6
View

Be familiar with how wireless networks are secured using a MAC (Media Access Control) address allow list.

9.2.3.7
View

Explain the wireless protocol Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) with and without Request to Send/Clear to Send (RTS/CTS).