Computer Science PROGRAMME

Contents

Computer Science
  • SYSTEM ARCHITECTURE
    • The central processing unit
    • Components of the CPU
    • Fetch–decode–execute cycle
    • Performance of the CPU
    • Embedded systems MEMORY
    • RAM and ROM
    • Virtual memory
  • Virtual memory
    • Secondary storage 1: optical and magnetic devices
    • Secondary storage 2: solid-state memory
    • Storage 3: capacity, speed and cost
    • Storage 4: portability, durability and reliability
  • WIRED AND WIRELESS NETWORKS
    • Networks 1: LANs and WANs
    • Networks 2: client–server and peer-to-peer
    • Transmission media
    • Connecting computers to a LAN
    • The internet
  • NETWORK TOPOLOGIES, PROTOCOLS AND LAYERS
    • Network topologies
    • Protocols 1: browsers and email clients
    • Protocols 2: network layers
    • Protocols 3: benefits of layers
    • Packets and packet switching
  • SYSTEM SECURITY
    • Threats to networks 1: people as the weak point
    • Threats to networks 2: malware
    • Threats to networks 3: network security
    • Identifying and preventing vulnerabilities
  • SYSTEMS SOFTWARE
    • Operating systems
    • Utility system software
  • ISSUES
    • Ethical and legal issues
    • Cultural issues
    • Environmental issues
    • Privacy issues
    • Legislation
    • Proprietary and open-source software
  • ALGORITHMS
    • Computational thinking
    • Algorithms – pseudocode
    • Algorithms – flow diagrams
    • Standard searching algorithms – linear search
    • Standard searching algorithms – binary search
    • Comparing linear and binary searches
    • Standard sorting algorithms – bubble sort
    • Standard sorting algorithms – insertion sort
    • Standard sorting algorithms – merge sort
    • Interpreting, correcting and completing algorithms
    • Using trace tables
  • PROGRAMMING TECHNIQUES
    • Variables and constants
    • Arithmetic operators
    • Comparison operators
    • Boolean operators
    • Selection
    • Iteration
    • Data types
    • String manipulation
    • Arrays
    • File handling operations
    • Records
    • Structured query language
    • Sub-programs
  • PRODUCING ROBUST PROGRAMS
    • Defensive design
    • Testing and maintainability
  • COMPUTATIONAL LOGIC
    • Computational logic 1
    • Computational logic 2
  • TRANSLATORS AND FACILITIES OF LANGUAGES
    • Programming languages
    • Translators
    • Integrated development environment
  • DATA REPRESENTATION
    • Data representation
    • Converting from denary to binary
    • Converting from binary to denary and binary addition
    • Binary shifts
    • Hexadecimal and denary
    • Hexadecimal and binary
    • Check digits
    • Characters
    • Images
    • Sound
    • Compression

Followed By