GCSE (9-1) Computer Science Teacher's Workbook for AQA 8520 Readings, questions and answers for both theory exams 2nd Edition Axsied James Franklin ak’seed Axsied ak’seed Axsied is producing many new products to support Computer Science for both AQA and other exam boards. Be the first to find out about new products, information and free resources. Stay up to date at www.axsied.com/update For more information and to download free resources visit www.axsied.com today Exam-related AQA GCSE Student AQA GCSE Workbook GCSE Activities Book Workbook Student/Teacher (All boards, site PDF) (Print edition) Bundle (site PDF) GCSE (9-1) Computer Science GCSE (9-1) Computer Science 101 Activities for GCSE Computer Student's Workbook Teacher and Student Workbook Bundle Science - Teacher Edition for AQA 8520 for AQA 8520 for 9-1 specifications answeRrse faodr ibngotsh, qthueeostriyo nesx aamnds answeRrse faodr ibngotsh, qthueeostriyo nesx aamnds quCizzroesss awnodrd gs,e wneorradls eaacrtcivhiteiess, 2nd Edition 2nd Edition 1st Edition James Franklin Axsiaek’seded James Franklin Axsiaek’seded JJaonmaetsh Farna nFikslhiner Axsiaek’seded NEA-related Easy Python Docs AQA Pseudocode to Examples and syntax Python Guide (free) for offline use in NEA Easy Python Docs for GCSE Computer Science NEA offline Python site Syntaexx,a emxpplleasn faotrio thnes, NanEAd 1st Edition James Franklin Axsiaek’seded Fr e e GCSE Computer Science (9–1) Teacher's Workbook for AQA 8520 Readings, questions and answers for both theory exams 2nd Edition Axsied James Franklin ak’seed Axsied ak’seed Acknowledgements Cover image: Aleksei Vasileika, Fotolia The publishers are grateful to the following for permission to reproduce photographs and other material: Photographs and screenshots: R57 Hive thermostat, Emre Nacigil, David Jones; R58,A58 Engilbert Legaspi, Menno Groenmen, Marin Myftiu, Igor Dugonjic; R61,Q61,A61 A Carlos Herrera, Cierpki; R69 Wryls Screenshots of Microsoft products used with permission from Microsoft. Disclaimer No part of this publication has been endorsed by AQA in any way. Where AQA is used within the publication or title, it is only to acknowledge the source of topics being covered. No implication of endorsement should be derived from this. Examples, exercises, questions and answers have all been written to cover material within the AQA GCSE Computer Science syllabus. These have not been written or endorsed by AQA. Due to the nature of the question types they should be supplemented by teacher and examination board written questions. Whilst every effort has been made to ensure that these and all contents of this book are accurate and correct, the publisher cannot be held liable for any omissions or inaccuracies contained herein. Related products The student version of this book may be purchased as a physical copy with ISBN: 978-1-911518-08-2 To order copies please: Visit: www.axsied.com Email: [email protected] Phone: +44 (0)3302 234 750 The publisher welcomes comments and suggestions regarding future editions of both this and other publications. Please contact [email protected]. © James Franklin 2017. All rights reserved. First and second editions published by Axsied in 2016 & 2017. Apart from the permitted terms of any license purchased from the publisher, no part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, or held within any information storage and retrieval system or otherwise without permission in writing from the publisher. ISBN: 978-1-911518-07-5 Useful Information 1 Info This workbook contains all readings, questions and answers for all the topics covered in AQA GCSE Computer Science (8520). This is the teacher’s workbook which contains the answers to all questions. A companion student’s workbook does not contain the answers and is suitable for sharing with students if you wish to set worksheets as a homework or test. You may share this version of the book with students if you wish them to independently study or revise the material. The books may be uploaded to a VLE – be very careful that this is behind a password so that only students or teachers from your institution can access the material. Each of the readings is contained on one page and faces one page of questions. This allows them to be photocopied or printed easily either together or separately. All pages are in black and white to allow printing or photocopying where colour is not available. Each question page contains easier questions on the left and harder questions on the right. There are 10 marks available on each side making a total of 20 marks for each sheet. Calculating percentages is therefore made easy. Learners who find the topic or subject difficult could be asked to complete just the left hand side making the sheets perfect for differentiation. Each topic is numbered. The first section of the book is for readings and questions. The second section of the book is for answers. These are labelled with R, Q and A as in the following table. Readings Questions Answers Crosswords are also available to cover the programming topics of the course. These are labelled C and S for crosswords and solutions respectively. When answering questions, boxes require a tick and circles need to be filled in. Any answer that has a circle to be filled in must only have one answer that is correct. An answer that has squares will have two or more answers that need to be ticked. This is to help prevent learners from making accidental mistakes by not realising how many boxes or circles should be ticked. You may wish to explain this when giving out worksheets. Example Note Boxes require two or more ticks as indicated in the question Circles require one circle to be filled in Useful Information 2 Info The second section of the book contains answers to all questions. All answers should be easy to mark as either correct or incorrect. There are no partial marks to make marking easier and suitable for peer marking. As longer written answers cannot be assessed this way, the questions should be supplemented with questions from previous exam papers or appropriate essay type questions. A progress sheet is included in the following page. You may wish to give each of your students a copy of this so that they are able record their progress and results. You may wish to have them stick the sheet into the front of their books or folders if they are given any. In general, if a student has understood the topic they should be expected to get at least 80% on each of the sheets. Progress Sheet Progress Sheet This progress sheet allows you to record your mark out of 20, or a Revision Sheet percentage, for each worksheet you complete. This sheet can be used for revision. Once you have reviewed each topic 1 2 3 4 5 6 7 8 9 10 either tick the box, or if you have worked on the questions write down your result. Make a note of any topics which you are uncertain of so that you can ask your teacher. 11 12 13 14 15 16 17 18 19 20 1 2 3 4 5 6 7 8 9 10 21 22 23 24 25 26 27 28 29 30 11 12 13 14 15 16 17 18 19 20 31 32 33 34 35 36 37 38 39 40 21 22 23 24 25 26 27 28 29 30 41 42 43 44 45 46 47 48 49 50 31 32 33 34 35 36 37 38 39 40 51 52 53 54 55 56 57 58 59 60 41 42 43 44 45 46 47 48 49 50 61 62 63 64 65 66 67 68 69 70 51 52 53 54 55 56 57 58 59 60 71 72 73 74 75 61 62 63 64 65 66 67 68 69 70 Crosswords (marked out of 10) 1 2 3 4 5 6 7 8 71 72 73 74 75 S ection Readings & Questions 1 Section 1 Readings & Questions 1 Algorithms p. 1 39 Binary Addition p. 77 2 Decomposition p. 3 40 Binary Addition 2 p. 79 3 Abstraction p. 5 41 Hexadecimal to Decimal Conversions p. 81 4 Flow diagrams 1 p. 7 42 Decimal to Hexadecimal Conversions p. 83 5 Flow digarams 2 p. 9 43 Hexadecimal and Binary conversions p. 85 6 Trace tables p. 11 44 Binary Shifts p. 87 7 Linear & Binary Searches p. 13 45 Computing Units p. 89 8 Sorting 1 - Bubble sort p. 15 46 Character sets - ASCII p. 91 9 Sorting 2 - Merge sort p. 17 47 Character sets - Unicode p. 93 10 Imperative languages p. 19 48 Images & Pixels p. 95 11 Assignment, Variables, Constants & Sequences p. 21 49 Image Size p. 97 12 Data Types p. 23 50 Digitising Sound p. 99 13 Inputs, Outputs & Type Conversion p. 25 51 Compression & Internet File Formats p. 101 14 Arithmetic operations p. 27 52 Run-Length Encoding p. 103 15 IF Statements & Boolean Operators p. 29 53 Huffman Coding p. 105 16 Nested Selection and Iteration p. 31 54 Logic Gates p. 107 17 WHILE, REPEAT-UNTIL Loops p. 33 55 Operating Systems p. 109 18 FOR loops p. 35 56 Utility Software p. 111 19 Data structures p. 37 57 Computer Systems p. 113 20 Arrays p. 39 58 Computer Architecture p. 115 21 2D-Arrays p. 41 59 The CPU p. 117 22 Records p. 43 60 RAM, ROM & Virtual Memory p. 119 23 String Manipulation p. 45 61 Storage Technologies & Media p. 121 24 String Manipulation 2 p. 47 62 Storage Devices p. 123 25 Random Numbers p. 49 63 Advantages of Using Networks p. 125 26 File operations p. 51 64 Network Classifications p. 127 27 Structured Programming p. 53 65 Network Topologies p. 129 28 Procedures p. 55 66 Network Hardware p. 131 29 Functions p. 57 67 Network Protocols p. 133 30 Validation and verification p. 59 68 Network Security p. 135 31 Validation and authentication routines p. 61 69 Ethernet & Network Layers p. 137 32 Errors & Testing p. 63 70 Cyber security 1 - Social engineering p. 139 33 High-level & Low-level languages p. 65 71 Cyber security 2 - Malicious Code p. 141 34 Coding Instructions p. 67 72 Cyber security 3 - Other Threats p. 143 35 Assemblers, Compilers & Interpreters p. 69 73 Cyber security 4 - Detection & prevention p. 145 36 Binary p. 71 74 Legislation p. 147 37 Binary to Decimal Conversion p. 73 75 Ethics, Culture & the Environment p. 149 38 Decimal to Binary Conversion p. 75 Crosswords 1 Assignment, Variables, Constants & Sequences (R11) p. 151 2 Data Types (R12) p. 152 3 Numeric Operations (R14) p. 153 4 IF Statements & Boolean Operators (R15) p. 154 5 Nested IF, CASE-SELECT, WHILE, REPEAT & FOR loops, Arrays (R16-20) p. 155 6 String Manipulation (R23-24) p. 156 7 File Operations (R26) p. 157 8 Procedures & Functions (R28-29) p. 158 S ection Answers 2 Section 2 Answers 1 Algorithms p. 159 39 Binary Addition p. 197 2 Decomposition p. 160 40 Binary Addition 2 p. 198 3 Abstraction p. 161 41 Hexadecimal to Decimal Conversions p. 199 4 Flow diagrams 1 p. 162 42 Decimal to Hexadecimal Conversions p. 200 5 Flow digarams 2 p. 163 43 Hexadecimal and Binary conversions p. 201 6 Trace tables p. 164 44 Binary Shifts p. 202 7 Linear & Binary Searches p. 165 45 Computing Units p. 203 8 Sorting 1 - Bubble sort p. 166 46 Character sets - ASCII p. 204 9 Sorting 2 - Merge sort p. 167 47 Character sets - Unicode p. 205 10 Imperative languages p. 168 48 Images & Pixels p. 206 11 Assignment, Variables, Constants & Sequences p. 169 49 Image Size p. 207 12 Data Types p. 170 50 Digitising Sound p. 208 13 Inputs, Outputs & Type Conversion p. 171 51 Compression & Internet File Formats p. 209 14 Arithmetic operations p. 172 52 Run-Length Encoding p. 210 15 IF Statements & Boolean Operators p. 173 53 Huffman Coding p. 211 16 Nested Selection and Iteration p. 174 54 Logic Gates p. 212 17 WHILE, REPEAT-UNTIL Loops p. 175 55 Operating Systems p. 213 18 FOR loops p. 176 56 Utility Software p. 214 19 Data structures p. 177 57 Computer Systems p. 215 20 Arrays p. 178 58 Computer Architecture p. 216 21 2D-Arrays p. 179 59 The CPU p. 217 22 Records p. 180 60 RAM, ROM & Virtual Memory p. 218 23 String Manipulation p. 181 61 Storage Technologies & Media p. 219 24 String Manipulation 2 p. 182 62 Storage Devices p. 220 25 Random Numbers p. 183 63 Advantages of Using Networks p. 221 26 File operations p. 184 64 Network Classifications p. 222 27 Structured Programming p. 185 65 Network Topologies p. 223 28 Procedures p. 186 66 Network Hardware p. 224 29 Functions p. 187 67 Network Protocols p. 225 30 Validation and verification p. 188 68 Network Security p. 226 31 Validation and authentication routines p. 189 69 Ethernet & Network Layers p. 227 32 Errors & Testing p. 190 70 Cyber security 1 - Social engineering p. 228 33 High-level & Low-level languages p. 191 71 Cyber security 2 - Malicious Code p. 229 34 Coding Instructions p. 192 72 Cyber security 3 - Other Threats p. 230 35 Assemblers, Compilers & Interpreters p. 193 73 Cyber security 4 - Detection & prevention p. 231 36 Binary p. 194 74 Legislation p. 232 37 Binary to Decimal Conversion p. 195 75 Ethics, Culture & the Environment p. 233 38 Decimal to Binary Conversion p. 196 Crossword Solutions 1 Assignment, Variables, Constants & Sequences (R11) p. 234 2 Data Types (R12) p. 235 3 Numeric Operations (R14) p. 236 4 IF Statements & Boolean Operators (R15) p. 237 5 Nested IF, CASE-SELECT, WHILE, REPEAT & FOR loops, Arrays (R16-20) p. 238 6 String Manipulation (R23-24) p. 239 7 File Operations (R26) p. 240 8 Procedures & Functions (R28-29) p. 241
Description: