46 Computer Science Topics

We’ve created 46 modules covering every Computer Science topic needed for GCSE level. These are transferable across AQA, CIE, Edexcel, CIE & Internationally. Suitable for teachers or home educators alike.

Whether you’re a brand new Computer Science teacher, or you’ve been teaching ICT for years, our resources will save you hours and hours of lesson preparation every single week.

View the resources →

Data Verification

There are a few kinds of standard errors that are often experienced when doing data entry. Two of the most common of these are transcription errors and transposition errors. Transcription Errors Every time data is manually entered into the system, there’s a possibility that an error will be committed. Human errors do occur, and there …

Read moreData Verification

IP and MAC Addresses

IP Address An Internet Protocol (IP) address is a rational numerical address which is allocated to every single computer and computer device that is a member of a given Transmission Control Protocol / Internet Protocol (TCP/IP)-based network. The IP address is the main element on which the networking architecture is made—no network occurs without it.  …

Read moreIP and MAC Addresses

High and Low Level Languages

High-level Language A high-level language is a programming language intended to streamline computer programming.  It is called high-level because it is quite a few steps away from the original code run on a computer’s central processing unit (CPU).  High-level source code consists of easy-to-read structures that are later translated into a low-level language, which can …

Read moreHigh and Low Level Languages

Database Queries

A query is a way of requesting information from the database. A database query can be either a select query or an action query. A select query is a query for retrieving data, while an action query requests additional actions to be performed on the data, like deletion, insertion, and updating. For example, a manager …

Read moreDatabase Queries

Database Fields

Database A database is a set of data arranged in a way that a computer program can immediately choose required portions of data.  It is often called a DB. A common database can be compared to a filing system which is arranged by fields, records, and files.  A field is a specific piece of data, …

Read moreDatabase Fields

Data Compression

What is Data Compression? Data compression is used everywhere. Many different file types use compressed data. Without data compression a 3-minute song would be over 100Mb in size, while a 10-minute video would be over 1Gb in size. Data compression shrinks big files into much smaller ones. It does this by getting rid of unnecessary …

Read moreData Compression

Memory and Storage

Memory Primary memory or temporary storage is called RAM.  RAM stands for Random Access Memory.  RAM is stored on the motherboard, in modules that are called DIMMs (Dual Inline Memory Module).  A DIMM is called a dual inline module because it has two independent rows of pins, one on each side.   A DIMM memory module …

Read moreMemory and Storage

Free Software, Freeware, Shareware

Free Software Free software is a software that gives the user freedom to execute, reproduce, distribute, study, modify and enhance the software.  To be specific, free software is a matter of freedom, and not of price. It means a user can freely utilise, change, and distribute a program, with one condition. The condition is that …

Read moreFree Software, Freeware, Shareware

HTML Structure and Presentation

HTML HTML (Hypertext Markup Language) is the recognised markup language utilised in forming web pages.  It defines the composition of web pages by using markup.  HTML elements are the primary units of HTML pages, and are  denoted by tags.  HTML tags label parts of content like headings, paragraphs, and tables.  Browsers do not show the …

Read moreHTML Structure and Presentation

Copyright and Plagiarism

Copyright Infringement Copyright infringement only occurs when the elemental work in question is copyrighted.  While copyright is automatic, it doesn’t apply to every single thing we make.  There are a number of things that you cannot copyright.  Things like lists, useful items, choreographic works (unless they have been recorded), fashion and ideas are all examples …

Read moreCopyright and Plagiarism

Database Table

A relational database is made up of different components. The most important of these is the table. All the data in the database is stored in the database table.  Without tables, there would not be much need for relational databases at all. Information on a single subject is placed in order as rows and columns in …

Read moreDatabase Table

DOS (denial-of-service) Attack

A DOS (denial-of-service) attack transpires when an attacker does something that prevents valid users from making use of computer systems, devices, or other network resources. DOS attacks naturally deluge servers, systems, or networks with traffic in order to overpower the victim resources and make it tough (or even impossible) for valid users to use them.  Often …

Read moreDOS (denial-of-service) Attack

Data Transmission

Data transmission is a means of transmitting digital or analog data over a communication medium to one or more devices.  It allows the transmission and communication of devices in different environments: point-to-point, point-to-multipoint, or multipoint-to-multipoint. Data transmission can either be analog or digital, but is mostly earmarked for sending and receiving digital data.  As such, …

Read moreData Transmission

Logic Circuits

A logic circuit is a circuit that executes a processing or controlling function in a computer.  This circuit implements logical operations on information to process it. Logic circuits utilise two values for a given physical quantity (voltage, for example) to denote the Boolean values true and false or 1 and 0 respectively.  Logic circuits have inputs, as well as …

Read moreLogic Circuits

Asymmetric Encryption

Encryption is the process of taking a message and scrambling its contents so that only certain people can look at what’s inside. Two Types of Encryption Symmetric encryption Asymmetric encryption Asymmetric encryption was created to solve the problem brought about by Symmetric encryption.  Let’s look at this illustration.  User 1 has a sensitive document that …

Read moreAsymmetric Encryption

Computer Misuse Act 1990

The Computer Misuse Act (CMA) is a law that was passed in the UK in 1990.  The CMA was intended to craft regulations and exercise authority over computer misconduct and internet deception. The law was enacted in order to: Criminalise unofficial access to computer systems Dissuade dangerous criminals from using a computer to commit a …

Read moreComputer Misuse Act 1990

Hypertext Transfer Protocol (HTTP)

Hypertext Transfer Protocol (HTTP) is a group of guidelines that authorise users of the World Wide Web to exchange information found on web pages. When accessing any web page, inputting http:// in front of the address informs the browser to communicate over HTTP. Nowadays, HTTP is no longer required to be entered at the beginning …

Read moreHypertext Transfer Protocol (HTTP)

MP3 Audio Compression

The MP3 is a relatively fresh discovery in digital music and sound.  Before MP3, there was only the compact disc (CD).  The audio on a CD is translated from an analog source like a master tape, but nowadays most audio is saved directly in a digital format. The MP3 process removes those sounds we can’t …

Read moreMP3 Audio Compression

Control Systems

A control system is a type of system that controls the output in order to provide the desired response.  It is a group of either electronic or mechanical devices which utilise control loops in order to control other systems or devices.  Control systems are automated with the use of computers. It is a vital part …

Read moreControl Systems

MIDI (Musical Instrument Digital Interface)

MIDI, which stands for Musical Instrument Digital Interface, is a connectivity standard for transmitting digital instrument data.  It is mainly utilised by computers, electronic keyboards and synthesisers.  In addition, it is supported by other instruments like beat boxes, electronic drums, and even digital stringed instruments, like guitars and violins. MIDI is a protocol designed for recording and playing …

Read moreMIDI (Musical Instrument Digital Interface)

Biometrics

Biometrics comes from the words bio and metric.  Bio means life while metric means to measure. The biometric system links an event to one individual, while other ID forms, like the personal identification number (PIN), may be used by anyone. Types of Biometrics Physiological identifiers – associated with the structure of the user is confirmed …

Read moreBiometrics