Oxford University Press
Oxford International AQA Examinations: International GCSE Computer Science
Alison Page
Education & Teaching
Oxford International AQA Examinations: International GCSE Computer Science
US$ 41.99
The publisher has enabled DRM protection, which means that you need to use the BookFusion iOS, Android or Web app to read this eBook. This eBook cannot be used outside of the BookFusion platform.
Description
Contents
Reviews

The only textbook that fully supports the Oxford AQA International GCSE Computer Science specification (9210), for first teaching from September 2017. The practical, step-by-step approach enables students to develop and apply problem solving and computational thinking skills in context. This ensures they are exam ready and prepares them for further study or life in the working world. Thoroughly prepare students for the theoretical and practical papers with extensive coding and programming support plus opportunities for practice. Clear explanations ensure students have a thorough understanding of trickier topics such as such as number representation, relational databases and SQL.

Language
English
ISBN
9780198417316
Front Cover
Title Page
Introduction
Contents
1 Foundations of programming
1.1 Begin programming
Introduction to Python
Output
Variables
Input
Flowcharts
Pseudocode
1.2 Calculation
Numerical expressions
Data types
Convert data type
Integer division
Constants
Processing values
1.3 String handling
Strings
Substrings
Substrings
1.4 Selection
Selection
if… else…
Nested if
Boolean operators
Selection in pseudocode
1.5 Repetition
Loops
Counter loops
Condition loops
Nested loops
Loops in pseudocode
End-conditional
2 Further programming
2.1 Data structure
Lists
Output a list
Add elements to a list
Arrays in pseudocode
2-D arrays and lists
Records
Make a list of records
2.2 File handling
Write to a file
Read from a file
Files in pseudocode
2.3 Subroutines
Introduction to subroutines
Random numbers
Define and call procedures
Parameters
Multiple parameters
Functions and returned values
2.4 Structured programming
The structured approach to programming
Advantages of the structuredapproach
Structured algorithms
2.5 Robust programming
Data validation
Secure programming
Testing
3 Representing algorithms
3.1 Interpret algorithms
Algorithms and programs
Abstraction
Purpose of an algorithm
Trace tables
Trace tables with loops
3.2 Search algorithms
Linear search
Search function
Search a sorted list
Implement the binary searchalgorithm
Compare search algorithms
3.3 Sort algorithms
Sorting a list
Bubble sort
Merge sort
Compare sort algorithms
Graphing time efficiency
4 Number systems
4.1 Binary systems
Binary data
Bits and bytes
Binary and decimal
Counting in binary
Convert between binary and decimal
4.2 Hexadecimal
Hexadecimal and binary
How hexadecimal is used
4.3 Binary arithmetic
Binary addition
Binary multiplication
Binary division
5 Digital data
5.1 Character encoding
Character codes
Unicode
Converting text to characters
5.2 Images
Bitmaps and pixels
Image quality and file size
Turn an image into binary
Creating coloured images
5.3 Sound
Analogue sound
Calculate file sizes
5.4 Compression
Why compression is important
Run-length encoding
Huffman coding
Build a Huffman tree
Huffman compression
6 Software
6.1 Types of software
Hardware and software
System and applicationsoftware
Operating systemsand utilities
6.2 Programming languages
Machine code and assembly language
Low-level and high-levellanguages
Translators
7 Hardware
7.1 The processor
Components of the CPU
The fetch-execute cycle
Main memory
Performance factors
Embedded systems
7.2 Storage
Magnetic storage
Optical storage
Solid state storage
Choosing the right storage
7.3 Boolean logic
Logic gates and circuits
NOT gate
AND gate
OR gate
Logic circuits
Interpret logic circuits
Logic circuits and Boolean expressions
8 Communications
8.1 Networks
What is a network?
Types of network
Network topologies
8.2 Protocols
Network protocols
The four-layer model
The four-layer model (continued)
9 Security
9.1 Security threats
Importance of security
Threats to security
Social engineering
Malware
9.2 Ensuring security
Cyber-security protection
Network security
Encryption
Penetration testing
10 Databases
10.1 Database design
Introducing databases
Table design
Primary key
Relational databases
Database design
10.2 Structured query language (SQL)
Add data with SQL
Edit data with SQL
Select data with SQL
Select data from two tables
11 Web pages
11.1 How web pages are made
What is Hypertext Mark-up Language (HTML)?
Designing web pages with cascading style sheets (CSS)
Client-side and server-side scripting
11.2 Creating web content
Building a basic web page
Using inline and block-level tags to improve web page layout
Sections, images and links
Designing a web pageusing CSS
Answers
Index
The book hasn't received reviews yet.