BOOK
Edexcel GCSE (9-1) Computer Science Student Book
Ann Weidmann | David Waller | Alex Hadwen-Bennett | Chris Charles | Shaun Whorton | Author
(2017)
Additional Information
Book Details
Abstract
The Pearson Edexcel GCSE (9-1) Computer Science Student Book provides detailed coverage of the 2016 specification, enabling you to approach your exams and assessment with confidence.
This Student Book offers:
- a comprehensive understanding of computer science and computational thinking, helping you to access the course content and make progress with your learning.
- an awareness of the applications of computer science for problem solving in the real world
- definitions of key words, enabling you to recognise and use appropriate terms and vocabulary
- regular activities to support progression and encourage further thinking and investigation
- preparation for the exam section to support revision.
Our Student Book will also be available as a Kindle edition.
Table of Contents
| Section Title | Page | Action | Price |
|---|---|---|---|
| Front Cover | Front Cover | ||
| Contents | iii | ||
| Introduction | iv | ||
| Chapter 1: Problem solving | 1 | ||
| 1.1: Algorithms | 2 | ||
| Understanding algorithms | 2 | ||
| Creating algorithms | 8 | ||
| Working with algorithms | 20 | ||
| Sorting and searching algorithms | 29 | ||
| Searching algorithms | 34 | ||
| 1.2: Decomposition and abstraction | 40 | ||
| Problem solving | 40 | ||
| Decomposition | 40 | ||
| Chapter 2: Programming | 45 | ||
| 2.1: Develop code | 46 | ||
| Algorithms and programs | 46 | ||
| 2.2: Making programs easy to read | 54 | ||
| Code readability | 54 | ||
| 2.3: Strings | 58 | ||
| 2.4: Data structures | 62 | ||
| Arrays | 62 | ||
| Records | 65 | ||
| 2.5: Input/output | 68 | ||
| User input | 68 | ||
| Testing validation rules | 71 | ||
| Working with text files | 72 | ||
| Writing data to a text file | 74 | ||
| 2.6: Subprograms | 77 | ||
| Built-in functions | 80 | ||
| 2.7: Testing and evaluation | 83 | ||
| Testing | 83 | ||
| Runtime errors | 85 | ||
| Using an Integrated Development Environment (IDE) | 86 | ||
| The test plan | 87 | ||
| Evaluating programs | 89 | ||
| Chapter 3: Data | 91 | ||
| 3.1: Binary | 92 | ||
| Why binary? | 92 | ||
| Number systems | 93 | ||
| Binary arithmetic | 96 | ||
| Hexadecimal numbers | 103 | ||
| 3.2: Data representation | 106 | ||
| Representation of text | 106 | ||
| Representation of bitmap images | 109 | ||
| 3.3: Data storage and compression | 117 | ||
| Data storage | 117 | ||
| Data compression | 118 | ||
| 3.4: Encryption | 125 | ||
| 3.5: Databases | 130 | ||
| Chapter 4: Computers | 139 | ||
| 4.1: Machines and computational modelling | 140 | ||
| The input-process-output model | 140 | ||
| 4.2: Hardware | 143 | ||
| Stored programs: the von Neumann model | 143 | ||
| Hardware components of a computer system RAM and ROM | 144 | ||
| Cache memory | 146 | ||
| Fetch-decode-execute: in detail | 147 | ||
| Secondary storage | 149 | ||
| Cloud storage | 151 | ||
| Embedded systems | 153 | ||
| 4.3: Logic | 155 | ||
| Truth tables | 155 | ||
| Writing logic statements | 157 | ||
| 4.4: Software | 160 | ||
| Operating systems | 160 | ||
| Utility software | 163 | ||
| Security tools | 164 | ||
| Simulation and modelling | 165 | ||
| 4.5: Programming languages | 167 | ||
| Low-level programming language | 167 | ||
| High-level languages | 169 | ||
| Chapter 5: Communication and the internet | 171 | ||
| 5.1: Networks | 172 | ||
| Computer networks and their use | 172 | ||
| Different types of network | 173 | ||
| Communication media | 180 | ||
| Wired or wireless connectivity? | 181 | ||
| Network data speed | 182 | ||
| Calculating the time needed to transmit a file | 182 | ||
| Protocols | 183 | ||
| Email protocols | 184 | ||
| Network protocols | 184 | ||
| Internet protocols | 187 | ||
| 5.2: Network security | 189 | ||
| Network security and its importance | 189 | ||
| Network security importance | 190 | ||
| Authentication and validation | 191 | ||
| Other ways to secure a network | 191 | ||
| Cloud storage and security | 193 | ||
| Contemporary storage and security | 194 | ||
| Cyberattacks | 196 | ||
| 5.3: The internet and the World Wide Web | 202 | ||
| The internet | 202 | ||
| The World Wide Web | 203 | ||
| Chapter 6: The bigger picture | 206 | ||
| 6.1: Computing and the environment | 207 | ||
| Manufacture | 207 | ||
| Usage | 209 | ||
| Disposal | 210 | ||
| Preserving the environment | 211 | ||
| 6.2: Privacy | 213 | ||
| Personal data | 213 | ||
| Cyber-security | 216 | ||
| 6.3: Digital inclusion | 218 | ||
| Towards digital inclusion | 218 | ||
| 6.4: Professionalism | 221 | ||
| 6.5: The legal impact | 223 | ||
| Intellectual property | 223 | ||
| Licensing | 224 | ||
| Preparing for your exam | 226 | ||
| Paper 1 – Principles of Computer Science | 226 | ||
| Paper 2 – Application of Computational Thinking | 229 | ||
| Non-examined assessment – the project | 235 | ||
| How well are we doing? | 235 | ||
| Glossary | 240 | ||
| Index | 247 | ||
| Back Cover | Back Cover |