The specification for the course is shown on the left. This is a modified version of the AQA AS Computer Science specification in which some parts have been made more granular. For each part of the specification, statistics are shown for how many past papers it was examined in and the percentage of the total of all past marks that it makes up (where a question covers multiple parts of a specification, marks are divided equally between them for the purpose of this calculation). You can also click to view matching flashcards and past paper questions which will be shown on the right.

Paper 2 covers sections 5-9 of the AQA AS Computer Science specification.

5 Fundamentals of data representation

5.1 Number systems

5.1.1 Natural numbers

ReferenceContentAdditional informationQuestions
5.1.1.1
View

Be familiar with the concept of a natural number and the set ℕ of natural numbers (including zero).

ℕ = {0, 1, 2, 3, …}

Exams: 8 / 16Marks: 0.38%Questions: 9

5.1.2 Integer numbers

ReferenceContentAdditional informationQuestions
5.1.2.1
View

Be familiar with the concept of an integer and the set ℤ of integers.

ℤ = { …, -3, -2, -1, 0, 1, 2, 3, … }

Exams: 7 / 16Marks: 0.24%Questions: 7

5.1.3 Rational numbers

ReferenceContentAdditional informationQuestions
5.1.3.1
View

Be familiar with the concept of a rational number and the set ℚ of rational numbers, and that this set includes the integers.

ℚ is the set of numbers that can be written as fractions (ratios of integers). Since a number such as 7 can be written as 7/1, all integers are rational numbers.

Exams: 5 / 16Marks: 0.28%Questions: 7

5.1.4 Irrational numbers

ReferenceContentAdditional informationQuestions
5.1.4.1
View

Be familiar with the concept of an irrational number.

An irrational number is one that cannot be written as a fraction, for example √2.

Exams: 8 / 16Marks: 0.47%Questions: 8

5.1.5 Real numbers

ReferenceContentAdditional informationQuestions
5.1.5.1
View

Be familiar with the concept of a real number and the set ℝ of real numbers, which includes the natural numbers, the rational numbers, and the irrational numbers.

ℝ is the set of all 'possible real world quantities'.

Exams: 6 / 16Marks: 0.28%Questions: 6

5.1.6 Ordinal numbers

ReferenceContentAdditional informationQuestions
5.1.6.1
View

Be familiar with the concept of ordinal numbers and their use to describe the numerical positions of objects.

When objects are placed in order, ordinal numbers are used to tell their position. For example, if we have a well-ordered set S = {'a', 'b', 'c', 'd'}, then 'a' is the 1st object, 'b' the 2nd, and so on.

Exams: 2 / 16Marks: 0.21%Questions: 2

5.1.7 Counting and measurement

ReferenceContentAdditional informationQuestions
5.1.7.1
View

Be familiar with the use of natural numbers for counting.

Exams: 2 / 16Marks: 0.14%Questions: 2
5.1.7.2
View

Be familiar with the use of real numbers for measurement.

Exams: 3 / 16Marks: 0.21%Questions: 3

5.2 Number bases

5.2.1 Number base

ReferenceContentAdditional informationQuestions
5.2.1.1
View

Be familiar with the concept of a number base, in particular:

  • decimal (base 10)
  • binary (base 2)
  • hexadecimal (base 16)

Students should be familiar with expressing a number's base using a subscript as follows:

  • Base 10: Number10, eg 6710
  • Base 2: Number2, eg 100110112
  • Base 16: Number16, eg AE16
Exams: 0 / 16Marks: 0.00%Questions: 0
5.2.1.2
View

Convert between decimal, binary and hexadecimal number bases.

Exams: 9 / 16Marks: 0.86%Questions: 11
5.2.1.3
View

Be familiar with, and able to use, hexadecimal as a shorthand for binary and to understand why it is used in this way.

Exams: 4 / 16Marks: 0.29%Questions: 4

5.3 Units of information

5.3.1 Bits and bytes

ReferenceContentAdditional informationQuestions
5.3.1.1
View

Know that the bit is the fundamental unit of information.

A bit is either 0 or 1.

Exams: 0 / 16Marks: 0.00%Questions: 0
5.3.1.2
View

Know that a byte is a group of 8 bits.

Exams: 2 / 16Marks: 0.07%Questions: 2
5.3.1.3
View

Know that 2n different values can be represented with n bits.

For example, 3 bits can be configured in 23 = 8 different ways: 000, 001, 010, 011, 100, 101, 110, 111.

Exams: 4 / 16Marks: 0.18%Questions: 4

5.3.2 Units

ReferenceContentAdditional informationQuestions
5.3.2.1
View

Know the names, symbols and corresponding powers of 10 for the decimal prefixes:

  • kilo, k - 103
  • mega, M - 106
  • giga, G - 109
  • tera, T - 1012
Exams: 2 / 16Marks: 0.11%Questions: 2
5.3.2.2
View

Know the names, symbols and corresponding powers of 2 for the binary prefixes:

  • kibi, Ki - 210
  • mebi, Mi - 220
  • gibi, Gi - 230
  • tebi, Ti - 240
Exams: 1 / 16Marks: 0.04%Questions: 1
5.3.2.3
View

Know that quantities of bytes can be described using binary prefixes representing powers of 2 or using decimal prefixes representing powers of 10, eg one kibibyte is written as 1KiB = 210 B and one kilobyte is written as 1 kB = 103 B.

Historically the terms kilobyte, megabyte, etc have often been used when kibibyte, mebibyte, etc are meant.

Exams: 3 / 16Marks: 0.18%Questions: 3

5.4 Binary number system

5.4.1 Unsigned binary

ReferenceContentAdditional informationQuestions
5.4.1.1
View

Know the difference between unsigned binary and signed binary.

Students are expected to be able to convert between unsigned binary and decimal and vice versa.

Exams: 2 / 16Marks: 0.07%Questions: 2
5.4.1.2
View

Know that in unsigned binary the minimum and maximum values for a given number of bits, n, are 0 and 2n - 1 respectively.

Exams: 1 / 16Marks: 0.14%Questions: 1

5.4.2 Unsigned binary arithmetic

ReferenceContentAdditional informationQuestions
5.4.2.1
View

Be able to add two unsigned binary integers.

Exams: 5 / 16Marks: 0.43%Questions: 5
5.4.2.2
View

Be able to multiply two unsigned binary integers.

Exams: 3 / 16Marks: 0.43%Questions: 3

5.4.3 Signed binary using two's complement

ReferenceContentAdditional informationQuestions
5.4.3.1
View

Know that signed binary can be used to represent negative integers and that one possible coding scheme is two's complement.

This is the only representation of negative integers that will be examined. Students are expected to be able to convert between signed binary and decimal and vice versa.

Exams: 1 / 16Marks: 0.07%Questions: 1
5.4.3.2
View

Know how to represent negative and positive integers in two's complement.

Exams: 0 / 16Marks: 0.00%Questions: 0
5.4.3.3
View

Know how to perform subtraction using two's complement.

Exams: 5 / 16Marks: 0.64%Questions: 5
5.4.3.4
View

Know how to calculate the range of a given number of bits, n.

Exams: 2 / 16Marks: 0.14%Questions: 2

5.4.4 Numbers with a fractional part

ReferenceContentAdditional informationQuestions
5.4.4.1
View

Know how numbers with a fractional part can be represented in fixed point form in binary in a given number of bits.

Exams: 1 / 16Marks: 0.07%Questions: 1
5.4.4.2
View

Be able to convert decimal to fixed point binary of a given number of bits.

Exams: 1 / 16Marks: 0.14%Questions: 1
5.4.4.3
View

Be able to convert fixed point binary to decimal of a given number of bits.

Exams: 4 / 16Marks: 0.57%Questions: 4

5.5 Information coding systems

5.5.1 Character form of a decimal digit

ReferenceContentAdditional informationQuestions
5.5.1.1
View

Differentiate between the character code representation of a decimal digit and its pure binary representation.

Exams: 3 / 16Marks: 0.21%Questions: 3

5.5.2 ASCII and Unicode

ReferenceContentAdditional informationQuestions
5.5.2.1
View

Describe ASCII and Unicode coding systems for coding character data.

Exams: 1 / 16Marks: 0.07%Questions: 1
5.5.2.2
View

Explain why Unicode was introduced.

Exams: 3 / 16Marks: 0.43%Questions: 3

5.5.3 Error checking and correction

ReferenceContentAdditional informationQuestions
5.5.3.1
View

Describe and explain the use of parity bits.

Exams: 8 / 16Marks: 0.89%Questions: 9
5.5.3.2
View

Describe and explain the use of majority voting.

Exams: 4 / 16Marks: 0.57%Questions: 4
5.5.3.3
View

Describe and explain the use of check digits.

Exams: 1 / 16Marks: 0.14%Questions: 1
5.5.3.4
View

Evaluate the use of parity bits, majority voting and check digits

Exams: 5 / 16Marks: 0.57%Questions: 5

5.6 Representing images, sound and other data

5.6.1 Bit patterns, images, sound and other data

ReferenceContentAdditional informationQuestions
5.6.1.1
View

Describe how bit patterns may represent other forms of data, including graphics and sound.

Exams: 0 / 16Marks: 0.00%Questions: 0

5.6.2 Analogue and digital

ReferenceContentAdditional informationQuestions
5.6.2.1
View

Understand the difference between analogue and digital:

  • data
  • signals
Exams: 3 / 16Marks: 0.43%Questions: 3

5.6.3 Analogue/digital conversion

ReferenceContentAdditional informationQuestions
5.6.3.1
View

Describe the principles of operation of an analogue to digital converter (ADC).

Exams: 5 / 16Marks: 0.86%Questions: 5
5.6.3.2
View

Describe the principles of operation of a digital to analogue converter (DAC).

Exams: 1 / 16Marks: 0.07%Questions: 1

5.6.4 Bitmapped graphics

ReferenceContentAdditional informationQuestions
5.6.4.1
View

Explain how bitmaps are represented.

Exams: 0 / 16Marks: 0.00%Questions: 0
5.6.4.2
View

Explain resolution.

Resolution is expressed as number of dots per inch where a dot is a pixel.

Exams: 0 / 16Marks: 0.00%Questions: 0
5.6.4.3
View

Know that colour depth is the number of bits stored for each pixel.

Exams: 2 / 16Marks: 0.14%Questions: 2
5.6.4.4
View

Know that the size of an image in pixels is width of image in pixels × height of image in pixels.

The size of an image is also alternatively sometimes described as the resolution of an image.

Exams: 0 / 16Marks: 0.00%Questions: 0
5.6.4.5
View

Calculate storage requirements for bitmapped images and be aware that bitmap image files may also contain metadata.

Ignoring metadata, storage requirements = size in pixels x colour depth where size in pixels is width in pixels x height in pixels.

Exams: 8 / 16Marks: 1.36%Questions: 9
5.6.4.6
View

Be familiar with typical metadata.

eg width, height, colour depth.

Exams: 1 / 16Marks: 0.07%Questions: 1

5.6.5 Digital representation of sound

ReferenceContentAdditional informationQuestions
5.6.5.1
View

Describe the digital representation of sound.

Exams: 0 / 16Marks: 0.00%Questions: 0
5.6.5.2
View

Understand sample resolution and its effect on the quality of audio recordings.

Exams: 4 / 16Marks: 0.43%Questions: 5
5.6.5.3
View

Understand sampling rate and its effect on the quality of audio recordings.

Exams: 2 / 16Marks: 0.14%Questions: 2
5.6.5.4
View

Know Nyquist's theorem.

Exams: 4 / 16Marks: 0.43%Questions: 4
5.6.5.5
View

Calculate sound sample sizes in bytes.

Exams: 8 / 16Marks: 1.43%Questions: 8

5.6.6 Musical Instrument Digital Interface (MIDI)

ReferenceContentAdditional informationQuestions
5.6.6.1
View

Describe the purpose of MIDI and the use of event messages in MIDI.

Exams: 3 / 16Marks: 0.43%Questions: 3
5.6.6.2
View

Describe the advantages of using MIDI files for representing music.

Exams: 5 / 16Marks: 0.71%Questions: 5

5.6.7 Data compression

ReferenceContentAdditional informationQuestions
5.6.7.1
View

Know why images and sound files are often compressed and that other files, such as text files, can also be compressed.

Exams: 1 / 16Marks: 0.07%Questions: 1
5.6.7.2
View

Understand the difference between lossless and lossy compression and explain the advantages and disadvantages of each.

Exams: 5 / 16Marks: 0.86%Questions: 5
5.6.7.3
View

Explain the principles behind run length encoding (RLE) for lossless compression.

Exams: 4 / 16Marks: 0.79%Questions: 6
5.6.7.4
View

Explain the principles behind dictionary-based methods for lossless compression.

Exams: 2 / 16Marks: 0.43%Questions: 3

5.6.8 Encryption

ReferenceContentAdditional informationQuestions
5.6.8.1
View

Understand what is meant by encryption and be able to define it.

Caesar and Vernam ciphers are at opposite extremes. One offers perfect security, the other doesn't. Between these two types are ciphers that are computationally secure – see below. Students will be assessed on the two types. Ciphers other than Caesar may be used to assess students' understanding of the principles involved. These will be explained and be similar in terms of computational complexity.

Exams: 1 / 16Marks: 0.07%Questions: 1
5.6.8.2
View

Be familiar with the term cipher.

Exams: 0 / 16Marks: 0.00%Questions: 0
5.6.8.3
View

Be familiar with the term plaintext.

Exams: 0 / 16Marks: 0.00%Questions: 0
5.6.8.4
View

Be familiar with the term ciphertext.

Exams: 0 / 16Marks: 0.00%Questions: 0
5.6.8.5
View

Be familiar with Caesar cipher and be able to apply it to encrypt a plaintext message and decrypt a ciphertext.

Exams: 6 / 16Marks: 0.64%Questions: 6
5.6.8.6
View

Be able to explain why Caesar cipher is easily cracked.

Exams: 3 / 16Marks: 0.36%Questions: 4
5.6.8.7
View

Be familiar with Vernam cipher or one-time pad and be able to apply it to encrypt a plaintext message and decrypt a ciphertext.

Since the key k is chosen uniformly at random, the ciphertext c is also distributed uniformly. The key k must be used once only. The key k is known as a one-time pad.

Exams: 4 / 16Marks: 0.75%Questions: 4
5.6.8.8
View

Explain why Vernam cipher is considered as a cypher with perfect security.

Exams: 4 / 16Marks: 0.43%Questions: 4
5.6.8.9
View

Compare Vernam cipher with ciphers that depend on computational security.

Vernam cipher is the only one to have been mathematically proved to be completely secure. The worth of all other ciphers ever devised is based on computational security. In theory, every cryptographic algorithm except for Vernam cipher can be broken, given enough ciphertext and time.

Exams: 1 / 16Marks: 0.07%Questions: 1

6 Fundamentals of computer systems

6.1 Hardware and software

6.1.1 Relationship between hardware and software

ReferenceContentAdditional informationQuestions
6.1.1.1
View

Define the term hardware.

Exams: 1 / 16Marks: 0.07%Questions: 1
6.1.1.2
View

Define the term software.

Exams: 2 / 16Marks: 0.14%Questions: 2
6.1.1.3
View

Understand the relationship between hardware and software.

Exams: 1 / 16Marks: 0.07%Questions: 1

6.1.2 Classification of software

ReferenceContentAdditional informationQuestions
6.1.2.1
View

Explain what is meant by system software.

Exams: 3 / 16Marks: 0.21%Questions: 3
6.1.2.2
View

Explain what is meant by application software.

Exams: 2 / 16Marks: 0.14%Questions: 2
6.1.2.3
View

Understand the need for, and attributes of, different types of software.

Exams: 0 / 16Marks: 0.00%Questions: 0

6.1.3 System software

ReferenceContentAdditional informationQuestions
6.1.3.1
View

Know that system software includes operating systems (OSs), utility programs, libraries and translators (compiler, assembler, interpreter).

Exams: 4 / 16Marks: 0.43%Questions: 4
6.1.3.2
View

Understand the need for, and functions of operating systems (OSs).

Exams: 1 / 16Marks: 0.07%Questions: 1
6.1.3.3
View

Understand the need for, and functions of utility programs.

Exams: 2 / 16Marks: 0.21%Questions: 2
6.1.3.4
View

Understand the need for, and functions of libraries.

Exams: 1 / 16Marks: 0.14%Questions: 1
6.1.3.5
View

Understand the need for, and functions of translators (compiler, assembler, interpreter).

Exams: 1 / 16Marks: 0.29%Questions: 1

6.1.4 Role of an operating system (OS)

ReferenceContentAdditional informationQuestions
6.1.4.1
View

Understand that a role of the operating system is to hide the complexities of the hardware.

Exams: 2 / 16Marks: 0.14%Questions: 2
6.1.4.2
View

Know that the OS handles resource management, managing hardware to allocate processors, memories and I/O devices among competing processes.

Exams: 5 / 16Marks: 0.50%Questions: 5

6.2 Classification of programming languages

6.2.1 Classification of programming languages

ReferenceContentAdditional informationQuestions
6.2.1.1
View

Show awareness of the development of types of programming languages and their classification into low- and high-level languages.

Exams: 1 / 16Marks: 0.07%Questions: 1
6.2.1.2
View

Know that low-level languages are considered to be:

  • machine-code
  • assembly language
Exams: 1 / 16Marks: 0.07%Questions: 1
6.2.1.3
View

Know that high-level languages include imperative high-level language.

Exams: 2 / 16Marks: 0.14%Questions: 2
6.2.1.4
View

Describe machine-code language and assembly language.

Exams: 2 / 16Marks: 0.21%Questions: 2
6.2.1.5
View

Understand the advantages and disadvantages of machine-code and assembly language programming compared with high-level language programming.

Exams: 6 / 16Marks: 1.50%Questions: 6
6.2.1.6
View

Explain the term 'imperative high-level language' and its relationship to low-level languages.

Exams: 1 / 16Marks: 0.14%Questions: 1

6.3 Types of program translator

6.3.1 Types of program translator

ReferenceContentAdditional informationQuestions
6.3.1.1
View

Understand the role of assemblers.

Exams: 1 / 16Marks: 0.07%Questions: 1
6.3.1.2
View

Understand the role of compilers.

Exams: 1 / 16Marks: 0.07%Questions: 1
6.3.1.3
View

Understand the role of interpreters.

Exams: 0 / 16Marks: 0.00%Questions: 0
6.3.1.4
View

Explain the differences between compilation and interpretation. Describe situations in which each would be appropriate.

Exams: 3 / 16Marks: 0.71%Questions: 3
6.3.1.5
View

Explain why an intermediate language such as bytecode is produced as the final output by some compilers and how it is subsequently used.

Exams: 2 / 16Marks: 0.43%Questions: 4
6.3.1.6
View

Understand the difference between source and object (executable) code.

Exams: 0 / 16Marks: 0.00%Questions: 0

6.4 Logic gates

6.4.1 Logic gates

ReferenceContentAdditional informationQuestions
6.4.1.1
View

Construct truth tables for the NOT logic gate.

Students should know and be able to use ANSI/IEEE standard 91-1984 Distinctive shape logic gate symbols for these logic gates.

Exams: 0 / 16Marks: 0.00%Questions: 0
6.4.1.2
View

Construct truth tables for the AND logic gate.

Exams: 0 / 16Marks: 0.00%Questions: 0
6.4.1.3
View

Construct truth tables for the OR logic gate.

Exams: 2 / 16Marks: 0.06%Questions: 2
6.4.1.4
View

Construct truth tables for the XOR logic gate.

Exams: 4 / 16Marks: 0.24%Questions: 4
6.4.1.5
View

Construct truth tables for the NAND logic gate.

Exams: 4 / 16Marks: 0.25%Questions: 4
6.4.1.6
View

Construct truth tables for the NOR logic gate.

Exams: 3 / 16Marks: 0.17%Questions: 3
6.4.1.7
View

Be familiar with drawing and interpreting logic gate circuit diagrams involving one or more of the above gates.

Exams: 6 / 16Marks: 1.14%Questions: 7
6.4.1.8
View

Complete a truth table for a given logic gate circuit.

Exams: 10 / 16Marks: 1.86%Questions: 10
6.4.1.9
View

Write a Boolean expression for a given logic gate circuit.

Exams: 5 / 16Marks: 0.79%Questions: 5
6.4.1.10
View

Draw an equivalent logic gate circuit for a given Boolean expression.

Exams: 4 / 16Marks: 0.93%Questions: 4

6.5 Boolean algebra

6.5.1 Using Boolean algebra

ReferenceContentAdditional informationQuestions
6.5.1.1
View

Be familiar with the use of Boolean identities and De Morgan's laws to manipulate and simplify Boolean expressions.

Exams: 15 / 16Marks: 4.71%Questions: 20

7 Fundamentals of computer organisation and architecture

7.1 Internal hardware components of a computer

7.1.1 Internal hardware components of a computer

ReferenceContentAdditional informationQuestions
7.1.1.1
View

Have an understanding and knowledge of the basic internal components of a computer system.

Although exam questions about specific machines will not be asked, it might be useful to base this section on the machines used at the centre.

Exams: 0 / 16Marks: 0.00%Questions: 0
7.1.1.2
View

Understand the role of the processor.

Exams: 1 / 16Marks: 0.03%Questions: 1
7.1.1.3
View

Understand the role of main memory.

Exams: 2 / 16Marks: 0.17%Questions: 2
7.1.1.4
View

Understand the role of the address bus.

Exams: 5 / 16Marks: 0.41%Questions: 6
7.1.1.5
View

Understand the role of the data bus.

Exams: 4 / 16Marks: 0.30%Questions: 4
7.1.1.6
View

Understand the role of the control bus.

Exams: 2 / 16Marks: 0.17%Questions: 2
7.1.1.7
View

Understand the role of I/O controllers.

Exams: 2 / 16Marks: 0.17%Questions: 2
7.1.1.8
View

Be able to explain the difference between von Neumann and Harvard architectures and describe where each is typically used.

Embedded systems such as digital signal processing (DSP) systems use Harvard architecture processors extensively. Von Neumann architecture is used extensively in general purpose computing systems.

Exams: 4 / 16Marks: 0.64%Questions: 5
7.1.1.9
View

Understand the concept of addressable memory.

Exams: 0 / 16Marks: 0.00%Questions: 0

7.2 The stored program concept

7.2.1 The meaning of the stored program concept

ReferenceContentAdditional informationQuestions
7.2.1.1
View

Be able to describe the stored program concept: machine code instructions stored in main memory are fetched and executed serially by a processor that performs arithmetic and logical operations.

Exams: 5 / 16Marks: 0.57%Questions: 5

7.3 Structure and role of the processor and its components

7.3.1 The processor and its components

ReferenceContentAdditional informationQuestions
7.3.1.1
View

Explain the role and operation of the arithmetic logic unit.

Exams: 1 / 16Marks: 0.07%Questions: 1
7.3.1.2
View

Explain the role and operation of the control unit.

Exams: 1 / 16Marks: 0.21%Questions: 1
7.3.1.3
View

Explain the role and operation of the clock.

Exams: 0 / 16Marks: 0.00%Questions: 0
7.3.1.4
View

Explain the role and operation of general-purpose registers.

Exams: 2 / 16Marks: 0.14%Questions: 2
7.3.1.5
View

Explain the role and operation of the program counter.

Exams: 0 / 16Marks: 0.00%Questions: 0
7.3.1.6
View

Explain the role and operation of the current instruction register.

Exams: 1 / 16Marks: 0.05%Questions: 1
7.3.1.7
View

Explain the role and operation of the memory address register.

Exams: 1 / 16Marks: 0.04%Questions: 1
7.3.1.8
View

Explain the role and operation of the memory buffer register.

Exams: 2 / 16Marks: 0.08%Questions: 2
7.3.1.9
View

Explain the role and operation of the status register.

Exams: 1 / 16Marks: 0.14%Questions: 1

7.3.2 The Fetch-Execute cycle and the role of registers within it

ReferenceContentAdditional informationQuestions
7.3.2.1
View

Explain how the Fetch-Execute cycle is used to execute machine code programs, including the stages in the cycle (fetch, decode, execute) and details of registers used.

Exams: 7 / 16Marks: 2.10%Questions: 8

7.3.3 The processor instruction set

ReferenceContentAdditional informationQuestions
7.3.3.1
View

Understand the term 'processor instruction set' and know that an instruction set is processor specific.

Exams: 2 / 16Marks: 0.29%Questions: 2
7.3.3.2
View

Know that instructions consist of an opcode and one or more operands (value, memory address or register).

A simple model will be used in which the addressing mode will be incorporated into the bits allocated to the opcode so the latter defines both the basic machine operation and the addressing mode. Students will not be expected to define opcode, only interpret opcodes in the given context of a question.

For example, 4 bits have been allocated to the opcode (3 bits for basic machine operation, eg ADD, and 1 bit for the addressing mode). 4 bits have been allocated to the operand, making the instruction, opcode + operand, 8 bits in length. In this example, 16 different opcodes are possible (24 = 16).

OpcodeOperand
Basic Machine OperationAddressing Mode
00100101
Exams: 4 / 16Marks: 0.39%Questions: 4

7.3.4 Addressing modes

ReferenceContentAdditional informationQuestions
7.3.4.1
View

Understand and apply immediate addressing.

Immediate addressing: the operand is the datum.

Exams: 3 / 16Marks: 0.18%Questions: 3
7.3.4.2
View

Understand and apply direct addressing.

Direct addressing: the operand is the address of the datum. Address to be interpreted as meaning either main memory or register.

Exams: 2 / 16Marks: 0.11%Questions: 2

7.3.5 Machine-code/assembly language operations

ReferenceContentAdditional informationQuestions
7.3.5.1
View

Understand and apply the basic machine-code operations of:

  • load
  • add
  • subtract
  • store
  • branching (conditional and unconditional)
  • compare
  • logical bitwise operators (AND, OR, NOT, XOR)
  • logical
  • shift right
  • shift left
  • halt

Use the basic machine-code operations above when machine-code instructions are expressed in mnemonic form—assembly language, using immediate and direct addressing.

Exams: 16 / 16Marks: 6.54%Questions: 28

7.3.6 Factors affecting processor performance

ReferenceContentAdditional informationQuestions
7.3.6.1
View

Explain the effect on processor performance of multiple cores.

Exams: 2 / 16Marks: 0.19%Questions: 2
7.3.6.2
View

Explain the effect on processor performance of cache memory.

Exams: 4 / 16Marks: 0.57%Questions: 4
7.3.6.3
View

Explain the effect on processor performance of clock speed.

Exams: 4 / 16Marks: 0.42%Questions: 4
7.3.6.4
View

Explain the effect on processor performance of word length.

Exams: 3 / 16Marks: 0.28%Questions: 3
7.3.6.5
View

Explain the effect on processor performance of address bus width.

Exams: 3 / 16Marks: 0.35%Questions: 3
7.3.6.6
View

Explain the effect on processor performance of data bus width.

Exams: 4 / 16Marks: 0.35%Questions: 4

7.4 External hardware devices

7.4.1 Input and output devices

ReferenceContentAdditional informationQuestions
7.4.1.1
View

Know the main characteristics, purpose and suitability of barcode readers and understand their principles of operation.

Exams: 2 / 16Marks: 0.29%Questions: 2
7.4.1.2
View

Know the main characteristics, purpose and suitability of digital cameras and understand their principles of operation.

Exams: 3 / 16Marks: 0.68%Questions: 3
7.4.1.3
View

Know the main characteristics, purpose and suitability of laser printers and understand their principles of operation.

Exams: 2 / 16Marks: 0.96%Questions: 3
7.4.1.4
View

Know the main characteristics, purpose and suitability of RFID and understand their principles of operation.

Exams: 5 / 16Marks: 1.71%Questions: 7

7.4.2 Secondary storage devices

ReferenceContentAdditional informationQuestions
7.4.2.1
View

Explain the need for secondary storage within a computer system.

Exams: 1 / 16Marks: 0.14%Questions: 1
7.4.2.2
View

Know the main characteristics, purposes, suitability and understand the principles of operation of the hard disk.

Exams: 1 / 16Marks: 0.86%Questions: 1
7.4.2.3
View

Know the main characteristics, purposes, suitability and understand the principles of operation of the optical disk.

Exams: 2 / 16Marks: 0.50%Questions: 2
7.4.2.4
View

Know the main characteristics, purposes, suitability and understand the principles of operation of the solid-state disk (SSD).

SSD = NAND flash memory + a controller that manages pages, and blocks and complexities of writing. Based on floating gate transistors that trap and store charge. A block, made up of many pages, cannot overwrite pages; a page has to be erased before it can be written to but technology requires the whole block to be erased. Lower latency and faster transfer speeds than a magnetic disk drive.

Exams: 4 / 16Marks: 0.93%Questions: 4
7.4.2.5
View

Compare the capacity and speed of access of various media and make a judgement about their suitability for different applications.

Exams: 5 / 16Marks: 0.79%Questions: 5

8 Consequences of uses of computing

8.1 Individual (moral), social (ethical), legal and cultural issues and opportunities

ReferenceContentAdditional informationQuestions
8.1.1
View

Show awareness of current individual (moral), social (ethical), legal and cultural opportunities and risks of computing.

Understand that:

  • developments in computer science and digital technologies have dramatically altered the shape of communications and information flows in societies, enabling massive transformations in the capacity to:
    • monitor behaviour
    • amass and analyse personal information
    • distribute, publish, communicate and disseminate personal information
  • computer scientists and software engineers therefore have power, as well as the responsibilities that go with it, in the algorithms that they devise and the code that they deploy.
  • software and their algorithms embed moral and cultural values.
  • the issue of scale, for software the whole world over, creates potential for individual computer scientists and software engineers to produce great good, but with it comes the ability to cause great harm.

Be able to discuss the challenges facing legislators in the digital age.

Teachers may wish to employ two very powerful techniques, hypotheticals and case studies, to engage students in the issues.

Hypotheticals allow students to isolate quickly important ethical principles in an artificially simplified context. For example, a teacher might ask students to explain and defend how, as a Google project manager, they would evaluate a proposal to bring Google's Street View technology to a remote African village. What questions should be asked? Who should be consulted? What benefits, risks and safeguards considered? What are the trade-offs?

Case studies allow students to confront the tricky interplay between the sometimes competing ethical values and principles relevant in real world settings. For example, the Google Street View case might be used to tease out the ethical conflicts between individual and cultural expectations, the principle of informed consent, Street View's value as a service, its potential impact on human perceptions and behaviours, and its commercial value to Google and its shareholders.

There are many resources available on the Internet to support teaching of this topic.

Exams: 12 / 16Marks: 5.42%Questions: 12

9 Fundamentals of communication and networking

9.1 Communication

9.1.1 Communication methods

ReferenceContentAdditional informationQuestions
9.1.1.1
View

Define serial transmission methods.

Exams: 1 / 16Marks: 0.07%Questions: 1
9.1.1.2
View

Define parallel transmission methods.

Exams: 2 / 16Marks: 0.21%Questions: 2
9.1.1.3
View

Discuss the advantages of serial over parallel transmission.

Exams: 4 / 16Marks: 0.79%Questions: 4
9.1.1.4
View

Define and compare synchronous and asynchronous data transmission.

Exams: 3 / 16Marks: 0.43%Questions: 4
9.1.1.5
View

Describe the purpose of start and stop bits in asynchronous data transmission.

Exams: 4 / 16Marks: 0.39%Questions: 5

9.1.2 Communication basics

ReferenceContentAdditional informationQuestions
9.1.2.1
View

Define baud rate.

Exams: 2 / 16Marks: 0.14%Questions: 2
9.1.2.2
View

Define bit rate.

Exams: 2 / 16Marks: 0.14%Questions: 2
9.1.2.3
View

Define bandwidth.

Exams: 4 / 16Marks: 0.30%Questions: 4
9.1.2.4
View

Define latency.

Exams: 3 / 16Marks: 0.16%Questions: 3
9.1.2.5
View

Define protocol.

Exams: 3 / 16Marks: 0.29%Questions: 3
9.1.2.6
View

Differentiate between baud rate and bit rate.

Bit rate can be higher than baud rate if more than one bit is encoded in each signal change.

Exams: 4 / 16Marks: 0.23%Questions: 4
9.1.2.7
View

Understand the relationship between bit rate and bandwidth.

Bit rate is directly proportionate to bandwidth.

Exams: 4 / 16Marks: 0.23%Questions: 4

9.2 Networking

9.2.1 Network topology

ReferenceContentAdditional informationQuestions
9.2.1.1
View

Understand and explain the operation of a physical star topology.

Exams: 2 / 16Marks: 0.29%Questions: 2
9.2.1.2
View

Understand and explain the operation of a logical bus network topology.

A network physically wired in star topology can behave logically as a bus network by using a bus protocol and appropriate physical switching.

Exams: 2 / 16Marks: 0.36%Questions: 2
9.2.1.3
View

Differentiate between the physical star topology and the logical bus network topology.

Exams: 3 / 16Marks: 0.36%Questions: 3

9.2.2 Types of networking between hosts

ReferenceContentAdditional informationQuestions
9.2.2.1
View

Explain peer-to-peer networking and describe situations where it might be used.

In a peer-to-peer network, each computer has equal status.

Exams: 5 / 16Marks: 0.89%Questions: 6
9.2.2.2
View

Explain client-server networking and describe situations where it might be used.

In a client-server network, most computers are nominated as clients and one or more as servers. The clients request services from the servers, which provide these services, for example file server, email server.

Exams: 5 / 16Marks: 0.68%Questions: 5

9.2.3 Wireless networking

ReferenceContentAdditional informationQuestions
9.2.3.1
View

Explain the purpose of WiFi.

A wireless local area network that is based on international standards.

Used to enable devices to connect to a network wirelessly.

Exams: 2 / 16Marks: 0.28%Questions: 2
9.2.3.2
View

Be familiar with the components required for wireless networking.

  • Wireless network adapter
  • Wireless access point
Exams: 1 / 16Marks: 0.07%Questions: 1
9.2.3.3
View

Be familiar with the purpose of Service Set Identifier (SSID).

Exams: 3 / 16Marks: 0.29%Questions: 3
9.2.3.4
View

Be familiar with how wireless networks are secured using WPA (Wifi Protected Access)/WPA2.

Exams: 4 / 16Marks: 0.43%Questions: 4
9.2.3.5
View

Be familiar with how wireless networks are secured by disabling SSID (Service Set Identifier) broadcasting.

Exams: 6 / 16Marks: 0.65%Questions: 6
9.2.3.6
View

Be familiar with how wireless networks are secured using a MAC (Media Access Control) address allow list.

Exams: 6 / 16Marks: 0.79%Questions: 6
9.2.3.7
View

Explain the wireless protocol Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) with and without Request to Send/Clear to Send (RTS/CTS).

Exams: 3 / 16Marks: 1.14%Questions: 3

No flashcards added yet.

AS-Level2024June10open12 marks

A smartphone company has designed a device that can be put into items such as luggage to help locate these items if they are lost. The device works by sending an encrypted signal containing its current location to nearby smartphones. The smartphones relay the signal to the company’s servers via the Internet, allowing a user to see the device’s exact location using a mobile phone app.

The company expects to sell hundreds of millions of devices. The data collected from each device will be permanently kept in secondary storage on the company’s servers. The company is planning to use solid-state drives in the servers that will hold device location data but is unsure whether using solid-state drives is a good idea.

Discuss a range of moral, ethical, legal and cultural issues raised by the new device and explain the properties of solid-state drives that the company should consider when deciding on a secondary storage technology.

In your answer you will be assessed on your ability to follow a line of reasoning to produce a coherent, relevant and structured response.

Level 3
A line of reasoning has been followed to produce a coherent, relevant, substantiated and logically structured response. Answers in this level will demonstrate a clear and detailed awareness of the properties of solid-state drives. The response covers a wide range of issues and is likely to cover the moral ethical, legal and cultural aspects of the question. Several of the points made will have been expanded upon using clear examples and references to real-world implications.

Level 2
A line of reasoning has been followed to produce a mostly coherent, relevant, substantiated and logically structured response. Answers in this level will identify a small number of properties of solid-state drives but may fail to develop points. The response is likely to cover at least two of moral, ethical, legal and cultural aspects of the question. Some of the points made may have been expanded on.

Level 1
There is little evidence that a line of reasoning has been followed. Answers in this level may identify some properties of solid-state drives. Answers may have attempted to identify some moral, ethical, legal and cultural issues. Points are not likely to be expanded upon but where they are, the examples may not be relevant or not relate to the points being made.

Indicative content

Area 1: Moral, ethical, legal and cultural issues

Moral (individual beliefs)
There is the potential for the technology to be misused by criminals (eg stalking, tracking partners/children/pets/strangers/property without permission).
Criminals could put them into the pockets/luggage of targets/victims/children to find out where they live.
Individuals might become over-reliant on the technology and not look after their property.
Individuals might not wish for their phones to be used to send signals on behalf of other users or in support of the company’s network, even with encryption.

Ethical (society)
Right to privacy eroded as your movements are tracked by the company.
“Big Brother” society where your every move is monitored and analysed.
Could it be used to track people in a good way, for example elderly or ill patients.
Individuals in some jurisdictions will have had to agree for their phones to relay signals in support of the company’s network but they may not want to or even know that they have agreed to such terms.

Legal
As the tag moves internationally through different countries different laws will exist about data collection and privacy.
Computer Misuse Act would be applied in the UK to prevent unauthorised access to the tag and the location data.
General Data Protection Regulation (GDPR) affords protections to data subjects and provides rights relating to access, accuracy, deletion, etc.

Cultural (subgroups)
Older people might be very distrustful or fearful of this technology.
This tag would only work in an area with a high number of phones / phone coverage, therefore it is not suitable for rural locations or places with few phone users for other reasons.
Different societies may have different views on the privacy issues related to location tracking.

Area 2: Suitability of storage device

Solid-state drive properties:
Higher read and write speeds than hard disks (because there are no moving parts means they’d be more likely to keep up with the requests).
Less prone to (terminal) failure from dropping/collisions/movement (because there are no moving parts or joints), which means there is less likelihood of costs being incurred from damaged drives.
Generally more energy efficient, which can lead to reduced costs (operational and/or cooling), provide a cooler / more comfortable operating environment, and be more environmentally friendly.
Generally small in physical size, which means that the amount of space required to house them / operational cost can be reduced.
More expensive (per bit) for the same amount of memory, (which means that the company would be investing more in the purchase of the drives initially).
The lifetime of a solid-state drive is relatively fixed, due to there being an approximate maximum number of writes before it becomes unreliable/unusable.

AS-Level2023June11open9 marks

A clothing company has developed an application that allows a user to take a photograph of themself on their mobile phone and upload it to their account on the company servers. The application will then use artificial intelligence to recommend new clothes that it computes will suit the user based on their preferences and the application's own interpretation of the way they look. It will then generate images of the user wearing the recommended clothes.

The user can preview the images and either buy the clothes from the company or use the generated images by linking to them from social media accounts.

Describe how a digital camera would work when capturing a photograph of the user for the application and discuss the moral, ethical, legal and cultural issues that developers of the application may have had to consider while developing it.

Marks are for AO1 (understanding) and AO2 (analyse):

Image Capture:

- Light enters through / is focussed by the lens on to (an array of sensors on) the sensor chip. A. light sensors capture/record light (intensity). A. CCD as sensor.

- Each sensor produces an electrical current/signal.

- The signal represents a pixel.

- An (ADC) converts measurement of light intensity into binary/digital data.

- A (colour) filter is applied to generate separate data values for red, green and blue colour components.

- The pixels are recorded as a group/array.

Moral/Ethical Issues:

- Could the AI or computer program include unconscious bias as a result of the dataset it has access to or the programmers?

- Would the owners of the system use the system to steer customers towards more expensive/higher profit garments?

- Will the owners of the system use the data collected for other purposes?

- May put pressure on users to spend more money than they have.

- Application may include advertising for certain brands.

- Photographs may be uploaded by third parties and the result used without knowledge / consent of the person in the photograph.

- Might the application recommend outfits which may be deemed inappropriate by some?

Legal Issues:

- Will the data be stored securely?

- Who will own copyright of the generated images?

- An image identifies a living person and so can be classed as personal data under the Data Protection Act / GDPR.

- How will the application authenticate that the photograph is of the person using the system or has the permission of the person whose photograph it is?

- Will there be an age authentication of the user of the system? Will there be an age restriction? How is this verified?

- How long will the images be made available for?

Cultural Issues:

- Some outfits suggested may be offensive to certain groups of users (e.g., in certain religions).

- Could the AI make inappropriate decisions about what clothes to suggest based on ethnicity / gender / disability / body-size?

- Developers may deliberately or unintentionally (due to the algorithm) influence fashion trends.

AS-Level2022June11open12 marks

An international technology company produces a smart speaker for use in homes. The smart speaker can be controlled by a user providing voice commands, which means the device must always be listening for audio input. The company stores audio recordings of each user to analyse when improving its voice recognition algorithms. The audio recordings are compressed using lossy compression and then sent over the Internet to be stored at the company's headquarters.

Discuss a range of ethical, legal and cultural issues that are raised by the company storing the audio captured by its smart speakers and justify why the company might use lossy compression.

You will be assessed on your ability to follow a line of reasoning to produce a coherent, relevant and structured response.

  • Level of response marking with levels from 1 to 4:
    • 4: A line of reasoning has been followed to produce a coherent, relevant, substantiated, and logically structured response. Answers in this level will demonstrate a clear justification of the use of lossy compression and show a developed awareness of how the benefits of lossy compression are related to one another. The response covers all four aspects (lossy, ethical, legal, cultural) of the question. A range of the points made will have been expanded upon using clear examples and references to real-world implications. (10–12 marks)
    • 3: A line of reasoning has been followed to produce a coherent, relevant, substantiated, and logically structured response. Answers in this level will address the use of lossy compression but there may not always be a clearly demonstrated understanding of the benefits. The response covers at least three aspects (lossy, ethical, legal, cultural) of the question. Some points made will have been expanded on and some of these will have been expanded upon using examples but these might not always exemplify the points made or lack references to real-world implications. (7–9 marks)
    • 2: A line of reasoning has been followed to produce a mostly coherent, relevant, substantiated, and logically structured response. The response lists some issues that focus on only two or three aspects (lossy, ethical, legal, cultural) of the question. Some points made will have been expanded upon but lack clear examples or may not wholly relate to the points being made. (4–6 marks)
    • 1: No evidence that a line of reasoning has been followed. Answers in this level may identify a point relating to the use of lossy compression but this part of the question may not be addressed at all. The response will attempt to identify some issues raised by the question; points are not likely to be expanded upon but where they are, examples may be irrelevant or not relate to the points being made. (1–3 marks)
  • Indicative content for lossy compression justification:
    • Scale/volume of data: the company has a large volume of audio to store due to the number of users;
    • Size of files: lossy compression reduces file size for transmission/storage, offering greater compression than lossless;
    • Audio quality: files retain enough quality to allow analysis, removing unnecessary/redundant data while maintaining usability.
  • Indicative content for ethical, legal, and cultural issues:
    • Ethical issues, such as:
      • The company has a justifiable goal of improving algorithms, benefiting customers, especially individuals who may rely on voice controls.
      • The company may capture illegal activity, raising questions about reporting responsibilities.
      • Employees could misuse recordings, and inappropriate material exposure may affect employee welfare.
      • Concerns about privacy erosion in homes and obtaining informed consent for data collection.
      • Potential for distrust between users and the company, and risks of data misuse.
    • Legal issues, including:
      • Compliance with data laws like GDPR or Data Protection Act, ensuring data security, integrity, confidentiality, and availability.
      • International legislative compliance for data transmission and storage, and risks of legislative circumvention.
    • Cultural issues, such as:
      • Data use for algorithm improvement, allowing for better support of dialects, languages, or disabilities.
      • Respecting cultural norms or expectations of privacy across different regions.
AS-Level2020June8.1open9 marks

The managers of a care home expect all of their residents to wear a Personal Emergency Response System (PERS) device. This is a device which residents wear around their neck and has a button that can be used to summon help should they feel unwell or require assistance.

A company has developed a life-blogging device. Like the PERS device it is worn around the neck. The life-blogging device monitors bodily signs such as blood pressure and heart rate as well as recording audio and video. The data collected are sent to a server and all of the data collected on the server can be accessed via a website.

The care home managers are considering using the life-blogging system instead of PERS so that the staff can monitor the residents' data. The life-blogging system will allow the care home to respond more quickly to an emergency situation and deal with situations where the resident is not capable of pushing a button. The managers are considering not telling the residents about the new device as they think it may confuse them.

Discuss any moral, ethical, legal and cultural issues that the care home managers should consider before introducing the new life-blogging devices.

Level of response question

LevelDescriptionMark Range
3A line of reasoning has been followed to produce a coherent, relevant, substantiated and logically structured response. The response covers a wide range of issues that are consistently explained and/or supported by examples.

Answers may cover moral/ethical, legal and cultural arguments or examine a smaller range of arguments in depth.
7–9
2A line of reasoning has been followed to produce a mostly coherent, relevant, substantiated and logically structured response that covers a range of issues that are sometimes explained and/or supported by examples.

Answers will cover a range of arguments in some depth.
4–6
1There is little evidence that a line of reasoning has been followed. The response covers a small number of issues that are generally not explained nor supported by examples.

Answers lack range and depth.
1–3

Examples could include:

Note: Some points may fit under more than one heading. These have been indicated with a #.

Moral/Ethical

  • It is unethical to collect data about people without them knowing what the data is to be used for. #
  • It is unethical to have residents wear a device if they don't have a full understanding of its capabilities.
  • If the device is in testing, it may not be as reliable as the PERS devices.
  • The observers may watch the streams for reasons other than monitoring. #
  • It may not be ethical to have your actions monitored in more detail than just your essential life signs.
  • Could be an invasion of privacy. #
  • Who controls the data? Should a resident be able to press a button to stop the recording?
  • Need to consider exactly what data should be recorded/stored. #

Legal

  • Will the data be stored securely? #
  • If the data is being life blogged, who will be able to see it?
  • Will the data be stored in compliance with the data protection regulations?
  • Who will be responsible if the devices go wrong and someone dies? #
  • Will the data be shared with doctors?
  • What happens if the observers see something (eg an illegal act) being carried out on the life blogger cameras? #
  • How long will data be stored?
  • Can monitor staff/visitors via camera in case of abuse allegation. #
  • Do visitors need to be told about cameras? #
  • What happens to data when the resident dies? How long can the data be kept for?
  • Can next of kin get access to data?
  • Who owns the data – the company/home/residents? #
  • In what country will the data be stored?

Cultural

  • Some people from some cultures may not like being videoed (particularly without their knowledge).
  • Residents may not want staff of the opposite gender viewing images of them in certain situations. #

Examples of points covered in depth

IssueExplanation/Depth
It is unethical to collect data about people without them knowing what the data is to be used forAs it could be used for something that they do not want/agree with or make them vulnerable in some way
It is unethical to have residents wear devices if they don't have a full understanding of its capabilitiesPeople cannot agree to wear something that records so much data if they do not know what it does
If the device is in testing, it may not be as reliable as the PERS deviceSystem might fail or send incorrect data if there are problems
AS-Level2019June11open9 marks

There have been some cases where law enforcement officers have requested a phone manufacturer to bypass access restrictions on a phone that they believe contains evidence of criminal activity. The manufacturers frequently refuse to do so.

Discuss a range of ethical and legal issues raised by the manufacturer agreeing or refusing to bypass access restrictions to the contents of the phone.

In your answer you will be assessed on your ability to follow a line of reasoning to produce a coherent, relevant and structured response.

Level of response question

LevelDescriptionMark Range
3A line of reasoning has been followed to produce a coherent, relevant and substantiated and logically structured response. The response covers at least four arguments, some of which have been expanded upon.

Answers must cover both ethical and legal arguments.
7–9
2A line of reasoning has been followed to produce a mostly coherent, relevant, substantiated and logically structured response that covers at least four points (any mix of arguments and expansion points).

Answers must cover both ethical and legal arguments.
4–6
1At least one argument has been made, possibly with an expansion point but there is no evidence that a line of reasoning has been followed.1–3

Examples could include:

Ethical

  • Law enforcement officers may see disturbing images/messages on the phone which could affect the way they feel.
  • This may be seen as a breach of privacy.
  • Personal data such as photos of family may be lost.
  • Law enforcement officers may misuse the phones for their own purposes.
  • Law enforcement officers may be able to use the phone to contact (potential) victims and offer support.
  • Law enforcement officers may use the phones to perform "stings" on other criminals.
  • The ethical issue is one of creating "a slippery slope." If the law enforcement officers are granted access in this case, where will it stop? Will foreign governments have similar access – or the right for the encrypted data to be shared
  • This could cause increased conflict between law enforcement officers and the public.
  • People may have private photos/data which while legal may go against their culture or the cultural beliefs of the law enforcement officer.
  • Breach of trust between manufacturer and client (count as legal if contract rather than trust).

Legal

  • Relevant legislation identified with reference to personal information or privacy.
  • Law enforcement officers may be able to make a decision not to press charges based upon evidence on the phone // May have to let people they believe to be guilty go free if they cannot access data.
  • This may be in breach of (human rights of) privacy.
  • Law enforcement officers may be able to use the data to solve other crimes.
  • Law enforcement officers may be able to use the data to prevent further criminal activity.
  • Allowing access to encrypted information stored on the phone may undermine the very freedoms and liberty that the law is meant to protect.
  • Providing access to phones may also create a vulnerability that hackers (from hostile countries) can exploit.
  • A legal issue when a judge gives permission for a phone's encrypted data to be accessed and it can't/it is refused.
  • If we have the technology to prevent terrorist attacks by gaining valuable data from the attackers' electronic devices then access to encrypted data should be allowed.
  • The police may not keep the data as secure as the user wants.
  • Law enforcement officers may edit the data on the phone.
  • What level of authority/who is needed to give permission to a law enforcement officer to access data?
  • Manufacturers may be breaking the law by refusing to allow access.

Students may be awarded marks for individual issues or expansions upon issues.

Expansion points may include further details on how the issue may arise or the impact of the issue occurring. Examples of expansion points could include:

  • Law enforcement officers may accidentally lose data through inexperience.
  • While it may be a breach in human rights privacy, this may be outweighed by lives saved.
  • If personal data is lost, the owner of the phone may lose income from missed business appointments.
AS-Level2018June7.1open9 marks

A company employs a team of programmers to develop software to control a fleet of driverless cars, providing a taxi service for clients in a large city.

Discuss a range of moral, ethical, legal and cultural issues that the programmers may need to consider whilst developing the service and that may arise during the use of the service by the public.

In your answer you will be assessed on your ability to follow a line of reasoning to produce a coherent, relevant and structured response.

Level of response question

LevelDescriptionMark Range
3A line of reasoning has been followed to produce a coherent, relevant and substantiated and logically structured response. The response covers at least three of moral, ethical, legal and cultural issues. In these areas there is sufficient detail to show that the student has a good level of understanding of the issues faced by the programmers. A good level of understanding would be indicated by at least seven substantiated points being made.7-9
2A line of reasoning has been followed to produce a mostly coherent, relevant, substantiated and logically structured response that covers at least two of moral, ethical, legal and cultural issues. At least four valid points must have been made showing reasonable understanding of the issues faced by the programmers.4-6
1A few relevant points have been made but there is no evidence that a line of reasoning has been followed. At least one of moral, ethical, legal and cultural issues must be covered. Links to the programmer may be tenuous.1-3

Note: The following notes are indicative content only and should not be used as a checklist.

Moral:

  • The developers may have to take on board the responsibility should an accident occur.
  • The developers may need to develop systems that cause the vehicle to make moral decisions in times of crisis e.g. if a crash is inevitable, what does the vehicle choose to crash in to.
  • The developer will have to accept that they are perpetuating or increasing use of vehicles which may have a negative impact on the environment.
  • The ability to keep them protected from hackers who might want to take over their controls while someone is on-board.

Ethical:

  • The developer may be putting taxi drivers out of business.
  • By developing self-driving taxis, other similar businesses may follow suit causing further ethical considerations.
  • Customers may not realise the taxi is computer-controlled until they enter the vehicle leaving them in a dilemma.
  • If a customer is taken ill the taxi may not be able to deal with the situation.

Legal:

  • Legal responsibility for accidents may be called into question.
  • If videos/images are taken during driving these may infringe the privacy of the occupants.
  • Passengers may find it easier to defraud or not pay the taxi company.

Cultural:

  • Some cultures may dislike the assignation of human virtues on machines.
  • The culture of the 'cabbie' may be damaged.
  • As most accidents are caused by driver error and so the use of driverless cars, in theory, would improve safety. How can the public be persuaded of this?
  • Driverless cars would, in theory, reduce congestion and so how can this be communicated to improve uptake?
AS-Level2017June9open9 marks

Google have a service called Street View which allows a user to view surroundings from street-level. Google have extended their Street View service to cover the inside of buildings such as museums and sports stadiums.

Discuss a range of ethical, legal and cultural issues that Google may have needed to deal with when extending the service.

Level of response question

LevelDescriptionMark Range
3A line of reasoning has been followed to produce a coherent, relevant, substantiated and logically structured response. The response covers ethical, legal and cultural issues. In these areas, there is sufficient detail to show that the student has a thorough level of understanding of the issues involved. Although understanding would be indicated by two or three points being made in each of the areas, although potentially thorough coverage of two areas might exceptionally lead to a mark in this band.7-9
2A line of reasoning has been followed to produce a mostly coherent, relevant, substantiated and logically structured response that covers at least two of ethical, legal and cultural issues. In at least one of these areas, at least two valid points must have been made that demonstrates a good understanding, and typically students should have made at least two points in two areas.4-6
1A few relevant points have been made and there is limited evidence that a line of reasoning has been followed.1-3

Points may include:

Ethical:

  • Consider if material in images could be of harm to children
  • Identifying and requesting permission from any members of public caught on the images.
  • Members of the public may not be as happy being photographed in a building as they are on the streets.
  • Recording of adverts could lead to unfair product placement
  • Considering what harmful uses users of the system might use the captured images for.
  • Considering how often Google should update the image data.
  • Dealing with copyrighted information that might have been inadvertently captured.
  • Considering that access via Street View might reduce the number of paying customers for museums.
  • Are young people being dissuaded from leaving home to visit public buildings leading to poor health.
  • Need to consider which areas of a building are appropriate to film (eg toilets, offices, research laboratories)

Legal:

  • Does Google need permission to film in what might be a private building.
  • It may not be legal to film people without permission (on private land).
  • Aspects of data protection legislation might apply.
  • Copyrighted information might be inadvertently captured and may lead to legislation breach.
  • Consider if material in images is legally allowed to be viewed by children.
  • Could be a risk of identifying items to steal leading to liability for crimes being carried out.
  • Ability to identify locations and access could be used for crime or to carry out acts of terrorism.
  • Street View is a worldwide service so would need to consider different legal systems.
  • Consideration to the security of information storage needs to be made.
  • Laws for certain buildings or areas of buildings may be more restrictive than others.

Cultural:

  • Some images of people or exhibits may be offensive to certain cultures.
  • Taking images inside religious buildings for some purposes may be considered inappropriate.
  • Some cultural beliefs may not allow photography of people.
  • Do people have the right to request the deletion of their images?
  • Could the culture of visiting places such as museums (e.g. family/school day trips) be affected by access them online?
  • Need for balance between cultural sensitivities and freedom of expression.

NE. Without suitable context: Faces need to be blurred out, must comply with laws, invasion of privacy.
R. Reference to private homes, implication that will be used for live monitoring.

A-Level2024June9open6 marks

Algorithms and artificial intelligence are being increasingly used to assist with the diagnosis of medical conditions. For example, algorithms based on artificial intelligence can diagnose some medical conditions from X-ray images.

Discuss some of the moral, ethical and legal issues that might arise as a result of using computer systems to assist with diagnosing medical conditions.

In your answer you will be assessed on your ability to follow a line of reasoning to produce a coherent, relevant and structured response.

LevelDescriptionMark Range
3A line of reasoning has been followed to produce a coherent, relevant, substantiated and logically-structured response. The response demonstrates a very good understanding of the issues that might arise with a range of points having been made and developed.5–6
2A limited attempt has been made to follow a line of reasoning and the response has a mostly logical structure. Responses will either go beyond just accuracy and responsibility or, if they focus only on these two issues, points made will be developed.3–4
1A few relevant points have been made but there is no evidence that a line of reasoning has been followed. The points made do not provide evidence of a good understanding of the issues. Responses may focus solely on areas such as the risk of inaccurate diagnosis and who would be held responsible for this.1–2

Indicative Content:

  • Risk of inaccurate diagnosis.
  • Will patients trust a computer system to diagnose them?
  • Who is responsible for the accuracy of a diagnosis // if a diagnosis is incorrect?
  • Does responsibility lie with the people who programmed / designed it or the people operating it? // AI systems themselves cannot be held responsible.
  • Should patients be informed if their diagnosis will be made by a computer system?
  • Should patients have the option to ask for the diagnosis to be done by a person instead? // Will patients accept diagnosis or want it to be confirmed by human (thus removing some benefits of system)? // Should diagnoses be double-checked by a human?
  • A human doctor may feel a moral responsibility that an AI system would not.
  • Data may be of a confidential / private / personal nature // Data Protection Act / GDPR may apply (A. one example of provisions of these laws eg keeping data securely, patients having right to view data).
  • Appropriate security would be required for the system as it would store personal data.
  • Is it legal for an AI system to diagnose (without human assistance)?
  • AI system will need training with data – how will this be obtained?
  • Consent would be needed from patients to use their data for training.
  • Choice of training data may affect reliability / effectiveness of system // algorithmic bias may develop (eg if one group of people not represented / underrepresented).
  • Should system explain reasoning (if possible) to increase confidence in diagnosis?
  • System could be used by GPs, reducing demand for more specialist doctors.
    A. may result in medical staff being made redundant
  • How much evidence of the reliability of a system is needed before humans are no longer involved in the diagnosis?
  • Could relying on computer systems risk missing diagnosis of very rare / new conditions?
  • Could relying on computers de-skill medical staff?
  • Would a doctor feel confident to over-rule a diagnosis by the computer system?
  • If computer system could diagnose conditions that were not spotted by doctors, would this undermine faith in doctors?
    A. AI systems may be able to diagnose some conditions more reliably than humans
  • Could be used to make diagnosis of some conditions possible in poorer countries (where there are fewer doctors).
  • If cost of system is high, benefits of it may not be available to all people // in poorer countries.
  • Are there some conditions that AI could be trusted to diagnose but others that it could not be?
  • Would it be acceptable to use AI if it missed some cases but detected many others?
  • System may detect issues / potential issues which would actually never turn into a condition that needed treating.
  • If more conditions diagnosed, may increase demand for treatments // may put pressure on hospital services.
  • System could go back through old cases and identify potential missed diagnoses.
  • Should patients be asked before old cases re-examined?
  • If data transferred between countries different laws may apply.
  • Should medical data be shared if it can help diagnose other patients?
A-Level2022June6open12 marks

Supermarkets often gather information about their customers and the purchases that they make. This information can be analysed by the supermarket and other companies for a range of purposes.

Some of the information is collected at the checkout, where the identity of the person is read from a loyalty or payment card using RFID (radio-frequency identification) and a barcode reader is used to identify the products being purchased.

By analysing the purchases that a shopper has made, it might be possible to identify such things as whether the shopper has children, is pregnant, or lives in a house with a garden. Other types of analysis might include the amount of money a customer spends, the times that they choose to shop at and the differences in shopping habits of different groups of shoppers.

Describe the principles of operation of the hardware used to collect the information and discuss some of the ethical and legal issues that might arise as a result of the capture and processing of this data.

In your answer you will be assessed on your ability to follow a line of reasoning to produce a coherent, relevant and structured response.

Level 4 (10–12 marks): A line of reasoning has been followed to produce a coherent, relevant, substantiated and logically structured response. The response covers all three areas indicated in the guidance below and there is sufficient detail to show that the student has a good level of understanding of at least two of these.

Level 3 (7–9 marks): A line of reasoning has been followed to produce a coherent, relevant, substantiated and logically structured response which shows a good level of understanding of at least one area indicated in the guidance below and a satisfactory understanding of at least one other area.

Level 2 (4–6 marks): A limited attempt has been made to follow a line of reasoning and the response has a mostly logical structure. Either a good level of understanding has been demonstrated of one area or some understanding had been demonstrated of at least two areas.

Level 1 (1–3 marks): A few relevant points have been made but there is no evidence that a line of reasoning has been followed. The points may only relate to one or two of the areas from the guidance. There is insufficient evidence of a good understanding of any of the three areas.

Area 1: How RFID works

  • RFID tag contains (transmission) circuitry and antenna
  • Memory on tag stores (customer) data
  • RFID reader (at till) transmits / sends signal // emits electric / electro-magnetic field
  • Signal activates / energises / induces current in RFID tag
  • RFID tag transmits / sends data by radio (wave)
  • RFID reader converts radio (wave) / signal back into (binary) data
  • RFID tag (on a card) is a passive device
  • RFID transmits over very short range

Area 2: How barcode works

(reflected light method)

  • A light source / laser is directed at bar code // bar code is illuminated
  • (Moving) mirror / prism moves light beam across bar code // user moves reader across bar code // user moves the bar code across the reader
  • Light reflected back
  • Black / white bands reflect different amounts of light // black reflects less light // white reflects more light
  • Light sensor / photodiode / CCD (measures amount of reflected light)
  • Light reflected converted into an electrical signal A. convert reflection to (binary) numbers / characters / ASCII

(CMOS/CCD/camera method)

  • Grid of (pixel) sensors // CMOS/CCD sensor
  • Each sensor measures light intensity of a point
  • Sensor outputs a voltage dependent upon light intensity
  • Voltages turned into binary data // voltages passed through Analogue-to-Digital Converter (ADC) // voltages turned into a digitised version of the image / barcode
  • Image processing software analyses image
  • This identifies black / white bands in barcode (which are turned into numbers)

Note: Students only need to describe one of the two methods for barcodes.

Area 3: Ethical and legal issues

(ethical)

  • Customers may believe that data about what they buy/spend is personal // invasion of privacy
  • Purchase of some items might be considered sensitive // some data might be considered to be sensitive (accept relevant examples)
  • Will people fully understand what will be done with the data, even if they are told it is being collected
  • Customers need to decide whether to allow the store to collect data about them (is it worth it for the return that they may get eg incentives / vouchers?) //do people feel forced to consent to benefit from offers
  • Can company be sufficiently confident that any other companies they share the data with will process the data legally / fairly/for the purposes that they said they would?
  • Risk of the supermarket carrying out actions that might reveal to other members of a shopper's household things that the supermarket has deduced that the householders don't know
  • Should ethical consideration be given to the products promoted to people using the data collected about them or is it okay to promote a product to anyone?
  • Are there some types of customers who should not be targeted with promotions at all // is it ethical to promote products to vulnerable customers?

(legal)

  • Naming a relevant law – GDPR, Data Protection Act
  • Need to inform customers of what will be done with data // consent required to collect data R. customer has not consented
  • Data must be kept securely
  • Need to consider what purposes data should be used for
  • Consideration of who should be able to access the data // there are rules about who the data can be shared with
  • Possible negative impact if data stolen or leaked // information could be misused
  • Limit on time-period that the data can be kept for
  • Need to ensure that collected data is accurate
  • Ensure data only transferred to countries it is legally allowed to go to // if transferred abroad, different laws may apply
  • The supermarket should let the customers see/edit data about them
  • Use of RFID might make data vulnerable to theft
A-Level2020June10open6 marks

A company provides a social media service through which members can share information about themselves and view information and news from their friends.

The service also displays current affairs news stories to its members. The service does not have journalists who write the stories but instead it uses algorithms to select news stories written by other organisations and individuals and shows these.

Different news stories may be shown to different members.

Discuss:

  • how algorithms might determine which current affairs news stories to display to an individual member
  • the moral, ethical and legal considerations that the developers of the system and its operators should consider in relation to how the algorithms work and which news stories are displayed.

Area 1: How it could work:

  • members could specify their interests / views and stories could be matched to these;
  • consider basic facts about member eg age, gender, location;
  • consider what stories have been read by friends of the member;
  • analyse the type of stories that the user has read before;
  • analyse the information that a member shares about themselves to identify characteristics/interests etc;
  • track how popular a story is to display the most popular ones;
  • look at member's search history;
  • look at member's reaction to other similar stories eg likes;
  • show stories viewed by others with a similar profile to this user;
  • display articles that have been more popular // had more hits // received more positive feedback;
  • compare keywords in articles with keywords in articles previously viewed by the member;
  • how can the algorithm avoid displaying click-bait?;

Area 2: Legal

  • who owns the copyright in the story?;
  • is it legal for the company to reproduce a news story that someone else has written?;
  • is the company legally responsible for the content/accuracy of stories?;
  • do contracts need to be signed between the company and the organisations/ individuals that stories will be displayed from?;
  • do laws in some countries prevent some types of stories being displayed? // need to ensure laws in different countries are followed;
  • need to ensure that stores are age-appropriate;
  • need to notify members about how their information is being used to select stories;

Area 3: Ethical / Moral

  • by choosing what news stories to display, will the service influence the views of members?;
  • how should the company deal with governments/organisations who might want to influence/control which stories are displayed?;
  • should the company accept payments to promote stories?;
  • how should the company deal with complaints / issues raised by members (in a timely fashion)?;
  • will the reproduction of news stories adversely (or positively) affect the number of people who go to read the original stories from their authors?;
  • how can / should reliability of stories be checked / shown (fake news)?;
  • how can / should the company assess bias / prevent spread of propaganda;
  • does the company have a duty to try to provide balance?;
  • should a method be provided so members can request their data is not analysed for this purpose? // importance of consent;
  • should the company let them know that the news they are seeing is being tailored to them / not everyone sees the same news?;

Area 2 or 3: Legal OR Ethical / Moral

  • should the company have people who read/check each story?; Is it practical to do this?;
  • how should the company select which organisations/individuals it will display stories from?;

Max 4 if all points are from one area

A-Level2018June8open3 marks

Explain some of the challenges that face legislators in the digital age.

One mark per challenge that is explained.

  • Information can be combined/processed/transferred in ways that were not previously possible; A. an example of this NE. there is a lot more data
  • Technology evolves quickly (so difficult for law to keep up with changes) // new types of crime become possible // some crimes are easier // future problems may not be understood;
  • Global nature of Internet means crimes may be committed in one country from outside its direct jurisdiction // laws are often national/local whilst the Internet is global // digital crime can be committed from a great distance // different countries have different laws;
  • Some crimes may be committed by states rather than individuals;
  • Different countries/cultures may have different attitudes to principles important to computer science (such as copyright, intellectual property, privacy); Note: this point relates to attitudes not legislation
  • Methods such as encryption make it harder to monitor criminal activity // electronic evidence may be harder to gather than physical evidence // can be harder to identify culprits online (eg by use of proxies, VPN) // peer-to-peer systems make it harder to identify criminal; NE. hard to catch criminals
  • Individuals may have access to large amounts of sensitive information that may be of public interest // conflicts between freedom of speech/information and privacy/state secrets;
  • Technology companies (can use their wealth) to lobby for their own interests // concern over influence of companies on legislators;
  • Resources required to enforce legislation may not be available;

NE. Copyright, Data Protection, Misuse, Hacking

Refer responses containing other relevant points to team leaders.

Max 3

A-Level2017June7open12 marks

Between 2008 and 2010, a company that was gathering data for an online mapping system, using cars fitted with cameras and WiFi equipment, collected some information that was being transmitted on personal WiFi networks. The company apologised for doing this and an investigation found that a small number of software developers had been responsible for adding this functionality to the mapping system data collection software.

In the context of this example, discuss:

  • how it was possible for this data to be collected.
  • what steps the owners of the networks could have taken to prevent the data from being collected.
  • what legal and ethical issues might have arisen as a result of collecting this data.
  • what lessons the company might have learnt from the incident and how their practices might have changed as a result of it.

In your answer you will be assessed on your ability to follow a line of reasoning to produce a coherent, relevant and structured response.

LevelDescriptionMark Range
4A line of reasoning has been followed to produce a coherent, relevant, substantiated and logically structured response. The response covers all four areas indicated in the guidance below and in at least three of these areas there is sufficient detail to show that the student has an excellent level of understanding of the issues and technologies involved. To reach the top of this mark range, an excellent level of understanding must be shown of all four areas.10-12
3A line of reasoning has been followed to produce a coherent, relevant, substantiated and logically structured response but the response may only cover two or three of the areas indicated in the guidance below. A good understanding is shown of each of these areas and if only two areas are covered, the coverage of these is excellent.7-9
2A limited attempt has been made to follow a line of reasoning by covering at least two of the topic areas in the guidance below. Overall, at least four valid points must have been made which can relate to any of the topic areas in the guidance.4-6
1A few relevant points have been made but there is no evidence that a line of reasoning has been followed. The points may only relate to one or two of the four areas from the guidance or may be made in a superficial way with little substantiation.1-3

Guidance – Indicative Response

1. How it was possible for data to be collected

WiFi signals can travel outside of property // over wide area // limited control over range

Any WiFi receiver in range can read the data packets NE. The receiver in the car can read the packets

No need to physically "tap" into a WiFi connection, unlike a cabled connection

A protocol that does not encrypt the transmissions may have been used // unencrypted data sent. NE. Network not secure

2. Steps to prevent

Use a protocol that encrypts data transmissions

A. Encrypt the transmission

R. Password protection

Example of secure protocol eg WPA, WPA2

Disable broadcast of SSID to make network harder to identify (Note: Accept this point even though the SSID would be in other data packets)

Limit power of transmitter so data does not travel outside premises (although in practice this might be hard to achieve)

Use cabled network instead of WiFi.

R. MAC address filtering (as cars were not connecting to networks just intercepting transmissions)

3. Legal and ethical issues

If the data is being transmitted through the air, who does it belong to, if anyone? // Should data transmitted by WiFi be treated like a broadcast (eg TV) or a private communication (eg telephone call)?

Is it wrong to intercept data if people freely choose to transmit it wirelessly? A. Is it ethical to collect data from people without their permission?

Is it legal to intercept data if people freely choose to transmit it wirelessly? What laws apply in this scenario? Is this really hacking?

Are the ethics or laws different for intercepting data transmitted wirelessly than by cable?

Is there a difference between collecting statistical data eg channel number, signal strength, SSID and collecting the payload data?

Was the data just collected or was there an intention to process it as well?

What should the company have done when it realised that the data had been collected? // Should the data have been immediately deleted, or kept so that the company could contact and apologise to people it had collected data from? // What should be done with the data now?

What should the company have done if it inadvertently discovered evidence of illegal activity in the collected data?

Legality/ethicality may depend on the nature of the data gathered // (In the UK) would some of the collected data count as "personal data" (under the Data Protection Act) // could some of the data have been sensitive (accept example eg bank account details, details of minors) NE. Data may be private

To what extent is the company financially liable for collecting the data? Or any consequences of its use?

Could the legal situation be different in different countries where the company operated?

Was the collection of data intentional or just an accidental side-effect of a reasonable process?

What was done to ensure (existing) policies are followed?

Should there have been more oversight of code development?

Could intellectual property have been inadvertently stolen?

Is it ethical to collect/store information secretly from people // without them knowing?

Is it ethical to collect data if there is no (legitimate) purpose for doing so?

Were the developers in breach of their contracts with the company / company guidelines?

Relevant Legislation

Students may name specific pieces of legislation that could have been breached as part of their response. Determining whether or not a breach has actually occurred would probably require more information than is provided in the question and detailed knowledge of the legislation, which is not required by the specification. Therefore, up to two points can be given for students naming relevant pieces of legislation that could have been breached, regardless of whether or not this can be ascertained with certainty. Relevant pieces of legislation include:

  • The Data Protection Act
  • The Computer Misuse Act
  • The Regulation of Investigatory Powers Act
  • The Communications Act

Points should be given for assertions that legislation has definitely been breached, even if this is only a possibility in the context rather than a certainty.

Responses that reference other legislation should be referred to Team Leaders.

A. As an alternative to naming the Data Protection Act, a response could instead question whether privacy laws have been breached, or if a breach of privacy has occurred.

4. Lessons

Improved training for developers in what is legal / ethical (accept company needs to improve understanding of legal/ethical issues)

Need to review guidelines that developers are expected to follow

Need for scrutiny of code / supervision by people outside of development team

Developers could be required to check each other's code

Developers could be required to log changes made to code and reason

Should only collect data that is absolutely necessary // that has a clear purpose // need to review collected data to see why it is being collected and stored // need to fully consider the purpose of any data collection before doing it

Could/should remove equipment for Wi-Fi data capture used in cars to collect mapping data.

NE. Further testing should be carried out unless there is a clear explanation of the mechanism by which testing will check that the software has no additional functionality is described eg inspection of collected data files to verify purpose of contents