AQA 8525
Computer Science
Exam-ready revision with key facts, topic drills, and focused practice.
Quick Search
Find topics, key facts, and terms
Worksheets
Printable practice sets with varied questions and mark-ready formats.
500+
Seed worksheets
5
Variations each
GCSE
Spec-aligned
Topics
Complete curriculum organized by paper
Paper 1 + 2
Paper 1
Full Curriculum Overview
Everything you need to know for Computer Science
Exam Overview and Assessment Objectives
Paper 1 + 2 • Both
Key Facts
- Paper 1 and Paper 2 are both 1 hour 30 minutes and 100 marks.
- Use precise technical vocabulary and avoid vague statements.
- Most 6-9 mark questions require structure and evaluation.
- Draw clear diagrams for networks and CPU architecture.
Subtopics
Paper 1 BreakdownPaper 2 BreakdownMaths and Data Skills
Algorithms and Computational Thinking
Paper 1 • Both
Key Facts
- Selection uses IF/ELSE logic; iteration uses loops.
- Binary search requires sorted data.
- Merge sort is faster on large data sets.
- Flowcharts and pseudocode should follow standard conventions.
Subtopics
Algorithm DesignTrace TablesEfficiency and Big OStandard Algorithms
Programming Basics
Paper 1 • Both
Key Facts
- Indentation improves readability and reduces errors.
- Syntax errors stop a program from running.
- Logic errors produce incorrect output with no crash.
- Good algorithms can be expressed in pseudocode or flowcharts.
Subtopics
Variables and Data TypesControl StructuresSubroutinesTesting and Debugging
Data Representation
Paper 1 • Both
Key Facts
- 1 byte = 8 bits; 1 KB = 1024 bytes.
- Higher resolution increases file size.
- Sampling theorem: sample at least twice the highest frequency.
- Hex is base 16 and uses 0-9 and A-F.
Subtopics
Binary and HexImages and SoundCompressionCharacter Encoding
Data Structures
Paper 1 • Both
Key Facts
- Indexing often starts at 0 in many languages.
- Stacks are used in function call handling.
- Queues are used for task scheduling.
Subtopics
Arrays and ListsStacks and QueuesFile Handling
CPU, Memory, and Storage
Paper 2 • Both
Key Facts
- Clock speed and number of cores affect CPU performance.
- RAM is cleared when power is off.
- Virtual memory uses secondary storage to extend RAM.
- SSDs are faster and more durable than HDDs.
Subtopics
CPU ArchitectureMemorySecondary StorageEmbedded Systems
Networks and Protocols
Paper 2 • Both
Key Facts
- MAC addresses identify devices on a LAN.
- IP addresses identify devices on a network.
- DNS turns domain names into IP addresses.
- Packets contain header, payload, and trailer data.
Subtopics
Network TypesHardwareProtocols and LayersNetwork Security
Cybersecurity and Threats
Paper 2 • Both
Key Facts
- Phishing uses fake messages to steal data.
- Strong passwords combine length, symbols, and unpredictability.
- Brute force attacks try every possible password.
- Two-factor authentication adds a second layer of security.
Subtopics
ThreatsPreventionEncryption
Databases and SQL
Paper 2 • Both
Key Facts
- Databases improve data accuracy and reduce duplication.
- Validation checks data type, range, or format.
- Verification ensures data is entered correctly.
Subtopics
Tables and KeysSQL QueriesNormalisation
Software Testing and Development
Paper 2 • Both
Key Facts
- Normal test data is within expected range.
- Boundary data tests limits of the range.
- Erroneous data checks validation and error handling.
Subtopics
Test StrategyDebuggingMaintainability
Ethics, Legal, and Environmental Issues
Paper 2 • Both
Key Facts
- Data must be processed securely and for specific purposes.
- Copyright protects software and digital content.
- Open source allows modification and sharing.
Subtopics
LegalEthical IssuesEnvironmental Impact