AQA 8525

Computer Science

Exam-ready revision with key facts, topic drills, and focused practice.

Quick Search

Find topics, key facts, and terms

Worksheets

Printable practice sets with varied questions and mark-ready formats.

500+

Seed worksheets

5

Variations each

GCSE

Spec-aligned

Browse Worksheets

Topics

Complete curriculum organized by paper

Full Curriculum Overview

Everything you need to know for Computer Science

Exam Overview and Assessment Objectives

Paper 1 + 2 • Both

Key Facts

  • Paper 1 and Paper 2 are both 1 hour 30 minutes and 100 marks.
  • Use precise technical vocabulary and avoid vague statements.
  • Most 6-9 mark questions require structure and evaluation.
  • Draw clear diagrams for networks and CPU architecture.

Subtopics

Paper 1 BreakdownPaper 2 BreakdownMaths and Data Skills
View full notes →

Algorithms and Computational Thinking

Paper 1 • Both

Key Facts

  • Selection uses IF/ELSE logic; iteration uses loops.
  • Binary search requires sorted data.
  • Merge sort is faster on large data sets.
  • Flowcharts and pseudocode should follow standard conventions.

Subtopics

Algorithm DesignTrace TablesEfficiency and Big OStandard Algorithms
View full notes →

Programming Basics

Paper 1 • Both

Key Facts

  • Indentation improves readability and reduces errors.
  • Syntax errors stop a program from running.
  • Logic errors produce incorrect output with no crash.
  • Good algorithms can be expressed in pseudocode or flowcharts.

Subtopics

Variables and Data TypesControl StructuresSubroutinesTesting and Debugging
View full notes →

Data Representation

Paper 1 • Both

Key Facts

  • 1 byte = 8 bits; 1 KB = 1024 bytes.
  • Higher resolution increases file size.
  • Sampling theorem: sample at least twice the highest frequency.
  • Hex is base 16 and uses 0-9 and A-F.

Subtopics

Binary and HexImages and SoundCompressionCharacter Encoding
View full notes →

Data Structures

Paper 1 • Both

Key Facts

  • Indexing often starts at 0 in many languages.
  • Stacks are used in function call handling.
  • Queues are used for task scheduling.

Subtopics

Arrays and ListsStacks and QueuesFile Handling
View full notes →

CPU, Memory, and Storage

Paper 2 • Both

Key Facts

  • Clock speed and number of cores affect CPU performance.
  • RAM is cleared when power is off.
  • Virtual memory uses secondary storage to extend RAM.
  • SSDs are faster and more durable than HDDs.

Subtopics

CPU ArchitectureMemorySecondary StorageEmbedded Systems
View full notes →

Networks and Protocols

Paper 2 • Both

Key Facts

  • MAC addresses identify devices on a LAN.
  • IP addresses identify devices on a network.
  • DNS turns domain names into IP addresses.
  • Packets contain header, payload, and trailer data.

Subtopics

Network TypesHardwareProtocols and LayersNetwork Security
View full notes →

Cybersecurity and Threats

Paper 2 • Both

Key Facts

  • Phishing uses fake messages to steal data.
  • Strong passwords combine length, symbols, and unpredictability.
  • Brute force attacks try every possible password.
  • Two-factor authentication adds a second layer of security.

Subtopics

ThreatsPreventionEncryption
View full notes →

Databases and SQL

Paper 2 • Both

Key Facts

  • Databases improve data accuracy and reduce duplication.
  • Validation checks data type, range, or format.
  • Verification ensures data is entered correctly.

Subtopics

Tables and KeysSQL QueriesNormalisation
View full notes →

Software Testing and Development

Paper 2 • Both

Key Facts

  • Normal test data is within expected range.
  • Boundary data tests limits of the range.
  • Erroneous data checks validation and error handling.

Subtopics

Test StrategyDebuggingMaintainability
View full notes →

Ethics, Legal, and Environmental Issues

Paper 2 • Both

Key Facts

  • Data must be processed securely and for specific purposes.
  • Copyright protects software and digital content.
  • Open source allows modification and sharing.

Subtopics

LegalEthical IssuesEnvironmental Impact
View full notes →