Edexcel GCSE Computer Science
The material on this site is not endorsed by Edexcel. We do not guarantee that it covers all of the relevant theory that is required for the examination. Please refer to the Edexcel syllabus to ensure that you are covering the material to the standard required.
GCSE 9-1 Edexcel Computer Science | |||
Section |
Topic |
Syllabus points |
Material |
1: Algorithms
|
Computational thinking | 1.2.1, 1.2.2, 1.2.3, 1.2.4 |
|
Representing algorithms: Flowcharts | 1.1.1, 1.1.2 |
|
|
Representing algorithms: Pseudocode | 1.1.1, 1.1.2 |
|
|
Using algorithms | 1.1.3, 1.1.4, 1.1.5 | ||
Standard algorithms: Sorting | 1.1.8 |
|
|
Standard algorithms: Searching | 1.1.9 |
|
|
2: Programming |
Data types | 2.3.1 |
|
Sequence, Selection, Iteration | 2.2.1, 2.2.2 |
|
|
Variables and constants | 2.3.4, 2.3.5 |
|
|
Operators | 2.5.1, 2.5.2, 2.5.3 |
|
|
Data structures | 2.2.1, 2.3.2 |
|
|
Strings | 2.3.3 |
|
|
Subprograms | 2.3.5, 2.6.1, 2.6.2, 2.6.3 |
|
|
Inputs and outputs | 2.4.1, 2.4.2, 2.4.3 |
|
|
Maintainability | 2.1.2 |
|
|
Types of Errors | 2.1.3, 2.1.5 |
|
|
Testing and Evaluating | 2.1.4, 2.1.6, 2.1.7 |
|
|
3: Data |
Binary | 3.1.1, 3.1.2, 3.1.3, 3.1.4 |
|
Hexadecimal | 3.1.5 |
|
|
Units | 3.3.1, 3.3.4 |
|
|
Representing characters | 3.2.1 |
|
|
Representing images | 3.2.2 |
|
|
Representing sounds | 3.2.3 |
|
|
Compression | 3.2.4, 3.3.2 |
|
|
Run-length encoding | 3.3.3 |
|
|
Encryption and ciphers | 3.4.1, 3.4.2 |
|
|
Databases: Structure | 3.5.1, 3.5.2 |
|
|
Databases: Relationships | 3.5.2 |
|
|
4: Computers |
Input-Process-Output | 4.1.1 |
|
The CPU | 4.2.3 |
|
|
Fetch-Decode-Execute | 4.2.3 |
|
|
Main memory | 4.2.2 |
|
|
Secondary storage | 4.2.4, 4.2.5 |
|
|
Embedded systems | 4.2.6 |
|
|
Boolean logic | 4.3.1, 4.3.2 |
|
|
Operating systems | 4.4.1 |
|
|
Utility software | 4.4.2 |
|
|
Software modelling | 4.4.3 | ||
Translators and languages | 4.5.1, 4.5.2 |
|
|
5: Networks |
Introduction to networks | 5.1.1, 5.1.2, |
|
Network shape | 5.1.3, 5.1.4, 5.1.7 |
|
|
Network protocols | 5.1.5 |
|
|
TCP/IP layers | 5.1.6 |
|
|
Introduction to Network Security | 5.2.1 |
|
|
Cyberattacks | 5.2.2, 5.2.3 |
|
|
Preventing vulnerabilities | 5.2.4, 5.2.5 |
|
|
The Internet | 5.2.2, 5.3.1, 5.3.2 |
|
|
6: The Bigger Picture |
Environment | 6.1.1 |
|
Ethics | 6.1.2 |
|
|
Legislation | 6.1.3 |
|
|
Open/Closed Source | 6.1.3 |
|