BOOK
Edexcel GCSE (9-1) Computer Science Student Book
Ann Weidmann | David Waller | Alex Hadwen-Bennett | Chris Charles | Shaun Whorton | Author
(2017)
Additional Information
Book Details
Abstract
The Pearson Edexcel GCSE (9-1) Computer Science Student Book provides detailed coverage of the 2016 specification, enabling you to approach your exams and assessment with confidence.
This Student Book offers:
- a comprehensive understanding of computer science and computational thinking, helping you to access the course content and make progress with your learning.
- an awareness of the applications of computer science for problem solving in the real world
- definitions of key words, enabling you to recognise and use appropriate terms and vocabulary
- regular activities to support progression and encourage further thinking and investigation
- preparation for the exam section to support revision.
Our Student Book will also be available as a Kindle edition.
Table of Contents
Section Title | Page | Action | Price |
---|---|---|---|
Front Cover | Front Cover | ||
Contents | iii | ||
Introduction | iv | ||
Chapter 1: Problem solving | 1 | ||
1.1: Algorithms | 2 | ||
Understanding algorithms | 2 | ||
Creating algorithms | 8 | ||
Working with algorithms | 20 | ||
Sorting and searching algorithms | 29 | ||
Searching algorithms | 34 | ||
1.2: Decomposition and abstraction | 40 | ||
Problem solving | 40 | ||
Decomposition | 40 | ||
Chapter 2: Programming | 45 | ||
2.1: Develop code | 46 | ||
Algorithms and programs | 46 | ||
2.2: Making programs easy to read | 54 | ||
Code readability | 54 | ||
2.3: Strings | 58 | ||
2.4: Data structures | 62 | ||
Arrays | 62 | ||
Records | 65 | ||
2.5: Input/output | 68 | ||
User input | 68 | ||
Testing validation rules | 71 | ||
Working with text files | 72 | ||
Writing data to a text file | 74 | ||
2.6: Subprograms | 77 | ||
Built-in functions | 80 | ||
2.7: Testing and evaluation | 83 | ||
Testing | 83 | ||
Runtime errors | 85 | ||
Using an Integrated Development Environment (IDE) | 86 | ||
The test plan | 87 | ||
Evaluating programs | 89 | ||
Chapter 3: Data | 91 | ||
3.1: Binary | 92 | ||
Why binary? | 92 | ||
Number systems | 93 | ||
Binary arithmetic | 96 | ||
Hexadecimal numbers | 103 | ||
3.2: Data representation | 106 | ||
Representation of text | 106 | ||
Representation of bitmap images | 109 | ||
3.3: Data storage and compression | 117 | ||
Data storage | 117 | ||
Data compression | 118 | ||
3.4: Encryption | 125 | ||
3.5: Databases | 130 | ||
Chapter 4: Computers | 139 | ||
4.1: Machines and computational modelling | 140 | ||
The input-process-output model | 140 | ||
4.2: Hardware | 143 | ||
Stored programs: the von Neumann model | 143 | ||
Hardware components of a computer system RAM and ROM | 144 | ||
Cache memory | 146 | ||
Fetch-decode-execute: in detail | 147 | ||
Secondary storage | 149 | ||
Cloud storage | 151 | ||
Embedded systems | 153 | ||
4.3: Logic | 155 | ||
Truth tables | 155 | ||
Writing logic statements | 157 | ||
4.4: Software | 160 | ||
Operating systems | 160 | ||
Utility software | 163 | ||
Security tools | 164 | ||
Simulation and modelling | 165 | ||
4.5: Programming languages | 167 | ||
Low-level programming language | 167 | ||
High-level languages | 169 | ||
Chapter 5: Communication and the internet | 171 | ||
5.1: Networks | 172 | ||
Computer networks and their use | 172 | ||
Different types of network | 173 | ||
Communication media | 180 | ||
Wired or wireless connectivity? | 181 | ||
Network data speed | 182 | ||
Calculating the time needed to transmit a file | 182 | ||
Protocols | 183 | ||
Email protocols | 184 | ||
Network protocols | 184 | ||
Internet protocols | 187 | ||
5.2: Network security | 189 | ||
Network security and its importance | 189 | ||
Network security importance | 190 | ||
Authentication and validation | 191 | ||
Other ways to secure a network | 191 | ||
Cloud storage and security | 193 | ||
Contemporary storage and security | 194 | ||
Cyberattacks | 196 | ||
5.3: The internet and the World Wide Web | 202 | ||
The internet | 202 | ||
The World Wide Web | 203 | ||
Chapter 6: The bigger picture | 206 | ||
6.1: Computing and the environment | 207 | ||
Manufacture | 207 | ||
Usage | 209 | ||
Disposal | 210 | ||
Preserving the environment | 211 | ||
6.2: Privacy | 213 | ||
Personal data | 213 | ||
Cyber-security | 216 | ||
6.3: Digital inclusion | 218 | ||
Towards digital inclusion | 218 | ||
6.4: Professionalism | 221 | ||
6.5: The legal impact | 223 | ||
Intellectual property | 223 | ||
Licensing | 224 | ||
Preparing for your exam | 226 | ||
Paper 1 – Principles of Computer Science | 226 | ||
Paper 2 – Application of Computational Thinking | 229 | ||
Non-examined assessment – the project | 235 | ||
How well are we doing? | 235 | ||
Glossary | 240 | ||
Index | 247 | ||
Back Cover | Back Cover |