{"id":581177,"date":"2020-12-10T11:49:02","date_gmt":"2020-12-10T11:49:02","guid":{"rendered":"https:\/\/teachcomputerscience.com\/?page_id=581177"},"modified":"2020-12-21T12:04:20","modified_gmt":"2020-12-21T12:04:20","slug":"ocr-a-level","status":"publish","type":"page","link":"https:\/\/teachcomputerscience.com\/ocr-a-level\/","title":{"rendered":"OCR A Level Computing Teaching Resources &#038; Revision Material"},"content":{"rendered":"<p>OCR A Level Computer Science mapping file. Download our comprehensive teaching resources and use the mapping table to align to the OCR examination board.<\/p>\n<table data-rows=\"29\" data-cols=\"4\">\n<thead>\n<tr>\n<th>\n<\/th>\n<th>\n<p>OCR specification<\/p>\n<\/th>\n<th>\n<p>A Level Document Reference<\/p>\n<\/th>\n<th>\n<p>Additional content<\/p>\n<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td data-th=\"\">\n<p><strong> 1.1<\/strong><\/p>\n<\/td>\n<td data-th=\"OCR specification\">\n<p style=\"text-align: left;\"><strong><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">The characteristics of contemporary processors, input, output and storage devices<\/span><\/strong><\/p>\n<\/td>\n<td data-th=\"A Level Document Reference\"><\/td>\n<td data-th=\"Additional content\"><\/td>\n<\/tr>\n<tr>\n<td data-th=\"\">\n<p style=\"text-align: left;\">1.1.1<\/p>\n<\/td>\n<td data-th=\"OCR specification\">\n<p><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">Structure and function of the processor<\/span><\/p>\n<\/td>\n<td data-th=\"A Level Document Reference\">\n<p><a href=\"https:\/\/teachcomputerscience.com\/a-level\/contemporary-processors\/computer-architecture\/\" target=\"_blank\" style=\"outline: currentcolor none medium;\" rel=\"noopener\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">1. Computer architecture<\/span><\/a><\/p>\n<p><a href=\"https:\/\/teachcomputerscience.com\/a-level\/contemporary-processors\/functions-and-characteristics-of-cpu\/\" style=\"outline: currentcolor none medium;\" target=\"_blank\" rel=\"noopener\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">2. Functions and characteristics of CPU<\/span><\/a><\/p>\n<\/td>\n<td data-th=\"Additional content\"><\/td>\n<\/tr>\n<tr>\n<td data-th=\"\" rowspan=\"1\" colspan=\"1\">\n<p style=\"text-align: left;\">1.1.2<\/p>\n<\/td>\n<td data-th=\"OCR specification\" rowspan=\"1\" colspan=\"1\">\n<p style=\"text-align: left;\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">Types of processor<\/span><\/p>\n<\/td>\n<td data-th=\"A Level Document Reference\" rowspan=\"1\" colspan=\"1\">\n<p><a href=\"https:\/\/teachcomputerscience.com\/a-level\/contemporary-processors\/types-of-processor\/\" style=\"outline: currentcolor none medium;\" target=\"_blank\" rel=\"noopener\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">3. Types of processor<\/span><\/span><\/a><\/p>\n<\/td>\n<td data-th=\"Additional content\" rowspan=\"1\" colspan=\"1\">Cell<\/td>\n<\/tr>\n<tr>\n<td data-th=\"\" rowspan=\"1\" colspan=\"1\">\n<p style=\"text-align: left;\">1.1.3<\/p>\n<\/td>\n<td data-th=\"OCR specification\" rowspan=\"1\" colspan=\"1\">\n<p style=\"text-align: left;\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">Input, output and storage<\/span><\/p>\n<\/td>\n<td data-th=\"A Level Document Reference\" rowspan=\"1\" colspan=\"1\">\n<p><a href=\"https:\/\/teachcomputerscience.com\/a-level\/contemporary-processors\/input-devices\/\" style=\"outline: currentcolor none medium;\" target=\"_blank\" rel=\"noopener\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">4. Input devices<\/span><\/a><\/p>\n<p><a href=\"https:\/\/teachcomputerscience.com\/a-level\/contemporary-processors\/output-devices\/\" style=\"outline: currentcolor none medium;\" target=\"_blank\" rel=\"noopener\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">5. Output devices &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;<\/span><\/span><\/a><\/p>\n<p><a href=\"https:\/\/teachcomputerscience.com\/a-level\/contemporary-processors\/data-storage\/\" style=\"outline: currentcolor none medium;\" target=\"_blank\" rel=\"noopener\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">6. Data storage<\/span><\/span><\/a><\/p>\n<\/td>\n<td data-th=\"Additional content\" rowspan=\"1\" colspan=\"1\">Cell<\/td>\n<\/tr>\n<tr>\n<td data-th=\"\" rowspan=\"1\" colspan=\"1\"><strong><\/strong><\/p>\n<p style=\"text-align: left;\"><strong>1.2<\/strong><\/p>\n<\/td>\n<td data-th=\"OCR specification\" rowspan=\"1\" colspan=\"1\">\n<p style=\"text-align: left;\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">Software and software development<\/span><\/p>\n<\/td>\n<td data-th=\"A Level Document Reference\" rowspan=\"1\" colspan=\"1\">Cell<\/td>\n<td data-th=\"Additional content\" rowspan=\"1\" colspan=\"1\">Cell<\/td>\n<\/tr>\n<tr>\n<td data-th=\"\" rowspan=\"1\" colspan=\"1\">\n<p style=\"text-align: left;\">1.2.1<\/p>\n<\/td>\n<td data-th=\"OCR specification\" rowspan=\"1\" colspan=\"1\">\n<p style=\"text-align: left;\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">Systems software<\/span><\/p>\n<\/td>\n<td data-th=\"A Level Document Reference\" rowspan=\"1\" colspan=\"1\">\n<p><a href=\"https:\/\/teachcomputerscience.com\/a-level\/software\/systems-software\/\" style=\"outline: currentcolor none medium;\" target=\"_blank\" rel=\"noopener\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">7. Systems Software<\/span><\/span><\/a><\/p>\n<\/td>\n<td data-th=\"Additional content\" rowspan=\"1\" colspan=\"1\">Cell<\/td>\n<\/tr>\n<tr>\n<td data-th=\"\" rowspan=\"1\" colspan=\"1\">\n<p style=\"text-align: left;\">1.2.2<\/p>\n<\/td>\n<td data-th=\"OCR specification\" rowspan=\"1\" colspan=\"1\">\n<p style=\"text-align: left;\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">Applications Generation<\/span><\/p>\n<\/td>\n<td data-th=\"A Level Document Reference\" rowspan=\"1\" colspan=\"1\">\n<p><a href=\"https:\/\/teachcomputerscience.com\/a-level\/software\/categories-of-software\/\" style=\"outline: currentcolor none medium;\" target=\"_blank\" rel=\"noopener\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">8. Categories of software &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;<\/span><\/span><\/a><\/p>\n<p><a href=\"https:\/\/teachcomputerscience.com\/a-level\/software\/translators\/\" style=\"outline: currentcolor none medium;\" target=\"_blank\" rel=\"noopener\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">9. Translators<\/span><\/span><\/a><\/p>\n<\/td>\n<td data-th=\"Additional content\" rowspan=\"1\" colspan=\"1\">Cell<\/td>\n<\/tr>\n<tr>\n<td data-th=\"\" rowspan=\"1\" colspan=\"1\">\n<p style=\"text-align: left;\">1.2.3<\/p>\n<\/td>\n<td data-th=\"OCR specification\" rowspan=\"1\" colspan=\"1\">\n<p style=\"text-align: left;\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">Software development <\/span><\/p>\n<\/td>\n<td data-th=\"A Level Document Reference\" rowspan=\"1\" colspan=\"1\">\n<p><a href=\"https:\/\/teachcomputerscience.com\/a-level\/software\/software-development-lifecycle\/\" style=\"outline: currentcolor none medium;\" target=\"_blank\" rel=\"noopener\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">10. Software Development life cycle<\/span><\/span><\/a><\/p>\n<p><a href=\"https:\/\/teachcomputerscience.com\/a-level\/software\/introduction-to-algorithms\/\" style=\"outline: currentcolor none medium;\" target=\"_blank\" rel=\"noopener\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">11. Introduction to algorithms<\/span><\/span><\/a><\/p>\n<\/td>\n<td data-th=\"Additional content\" rowspan=\"1\" colspan=\"1\">Cell<\/td>\n<\/tr>\n<tr>\n<td data-th=\"\" rowspan=\"1\" colspan=\"1\">\n<p style=\"text-align: left;\">1.2.4<\/p>\n<\/td>\n<td data-th=\"OCR specification\" rowspan=\"1\" colspan=\"1\">\n<p style=\"text-align: left;\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">Types of programming language<\/span><\/p>\n<\/td>\n<td data-th=\"A Level Document Reference\" rowspan=\"1\" colspan=\"1\">\n<p style=\"text-align: left;\"><a href=\"https:\/\/teachcomputerscience.com\/a-level\/software\/procedural-and-object-oriented-languages\/\" target=\"_blank\" style=\"outline: currentcolor none medium;\" rel=\"noopener\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">12. Procedural and object oriented<\/span> <span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">languages<\/span><\/span><\/a><\/p>\n<p><a href=\"https:\/\/teachcomputerscience.com\/a-level\/software\/assembly-languages\/\" style=\"outline: currentcolor none medium;\" target=\"_blank\" rel=\"noopener\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">13. Assembly languages<\/span><\/span><\/a><\/p>\n<\/td>\n<td data-th=\"Additional content\" rowspan=\"1\" colspan=\"1\">Cell<\/td>\n<\/tr>\n<tr>\n<td data-th=\"\" rowspan=\"1\" colspan=\"1\">\n<p style=\"text-align: left;\"><strong>1.3<\/strong><\/p>\n<\/td>\n<td data-th=\"OCR specification\" rowspan=\"1\" colspan=\"1\">\n<p style=\"text-align: left;\"><strong><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">Exchanging data<\/span><\/strong><\/p>\n<\/td>\n<td data-th=\"A Level Document Reference\" rowspan=\"1\" colspan=\"1\">Cell<\/td>\n<td data-th=\"Additional content\" rowspan=\"1\" colspan=\"1\">Cell<\/td>\n<\/tr>\n<tr>\n<td data-th=\"\" rowspan=\"1\" colspan=\"1\">\n<p style=\"text-align: left;\">1.3.1<\/p>\n<\/td>\n<td data-th=\"OCR specification\" rowspan=\"1\" colspan=\"1\">\n<p style=\"text-align: left;\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">Compression, Encryption and Hashing<\/span><\/p>\n<\/td>\n<td data-th=\"A Level Document Reference\" rowspan=\"1\" colspan=\"1\">\n<p><a href=\"https:\/\/teachcomputerscience.com\/a-level\/exchanging-data\/compression-encryption-and-hashing\/\" style=\"outline: currentcolor none medium;\" target=\"_blank\" rel=\"noopener\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">14. Compression, Encryption and Hashing<\/span><\/span><\/a><\/p>\n<\/td>\n<td data-th=\"Additional content\" rowspan=\"1\" colspan=\"1\">Cell<\/td>\n<\/tr>\n<tr>\n<td data-th=\"\" rowspan=\"1\" colspan=\"1\">\n<p style=\"text-align: left;\">1.3.2<\/p>\n<\/td>\n<td data-th=\"OCR specification\" rowspan=\"1\" colspan=\"1\">\n<p style=\"text-align: left;\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">Databases<\/span><\/p>\n<\/td>\n<td data-th=\"A Level Document Reference\" rowspan=\"1\" colspan=\"1\">\n<p><a href=\"https:\/\/teachcomputerscience.com\/a-level\/exchanging-data\/introduction-to-databases\/\" style=\"outline: currentcolor none medium;\" target=\"_blank\" rel=\"noopener\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">15. Introduction to databases<\/span><\/span><\/a><\/p>\n<p><a href=\"https:\/\/teachcomputerscience.com\/a-level\/exchanging-data\/relational-databases\/\" style=\"outline: currentcolor none medium;\" target=\"_blank\" rel=\"noopener\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">16. Relational databases<\/span><\/span><\/a><\/p>\n<p><a href=\"https:\/\/teachcomputerscience.com\/a-level\/exchanging-data\/structured-query-language\/\" style=\"outline: currentcolor none medium;\" target=\"_blank\" rel=\"noopener\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">17. Structured query language<\/span><\/span><\/a><\/p>\n<p><a href=\"https:\/\/teachcomputerscience.com\/a-level\/exchanging-data\/transaction-processing-and-acid\/\" style=\"outline: currentcolor none medium;\" target=\"_blank\" rel=\"noopener\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">18. Transaction processing and ACID<\/span><\/span><\/a><\/p>\n<\/td>\n<td data-th=\"Additional content\" rowspan=\"1\" colspan=\"1\">Cell<\/td>\n<\/tr>\n<tr>\n<td data-th=\"\" rowspan=\"1\" colspan=\"1\">\n<p style=\"text-align: left;\">1.3.3<\/p>\n<\/td>\n<td data-th=\"OCR specification\" rowspan=\"1\" colspan=\"1\">\n<p style=\"text-align: left;\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">Networks<\/span><\/p>\n<\/td>\n<td data-th=\"A Level Document Reference\" rowspan=\"1\" colspan=\"1\">\n<p><a href=\"https:\/\/teachcomputerscience.com\/a-level\/exchanging-data\/introduction-to-computer-networks\/\" style=\"outline: currentcolor none medium;\" target=\"_blank\" rel=\"noopener\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">19. Introduction to computer networks<\/span><\/span><\/a><\/p>\n<p><a href=\"https:\/\/teachcomputerscience.com\/a-level\/exchanging-data\/network-topologies\/\" style=\"outline: currentcolor none medium;\" target=\"_blank\" rel=\"noopener\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">20. Network topologies<\/span><\/span><\/a><\/p>\n<p><a href=\"https:\/\/teachcomputerscience.com\/a-level\/exchanging-data\/network-protocols-and-layers\/\" style=\"outline: currentcolor none medium;\" target=\"_blank\" rel=\"noopener\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">21. Network protocols and layers<\/span><\/span><\/a><\/p>\n<p><a href=\"https:\/\/teachcomputerscience.com\/a-level\/exchanging-data\/internet-technologies\/\" style=\"outline: currentcolor none medium;\" target=\"_blank\" rel=\"noopener\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">22. Internet technologies<\/span><\/span><\/a><\/p>\n<p><a href=\"https:\/\/teachcomputerscience.com\/a-level\/exchanging-data\/network-security\/\" style=\"outline: currentcolor none medium;\" target=\"_blank\" rel=\"noopener\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">23. Network security<\/span><\/span><\/a><\/p>\n<p><a href=\"https:\/\/teachcomputerscience.com\/a-level\/exchanging-data\/cloud-computing-and-web-applications\/\" style=\"outline: currentcolor none medium;\" target=\"_blank\" rel=\"noopener\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">27. Cloud computing and web applications<\/span><\/span><\/a><\/p>\n<\/td>\n<td data-th=\"Additional content\" rowspan=\"1\" colspan=\"1\">Cell<\/td>\n<\/tr>\n<tr>\n<td data-th=\"\" rowspan=\"1\" colspan=\"1\">\n<p style=\"text-align: left;\">1.3.4<\/p>\n<\/td>\n<td data-th=\"OCR specification\" rowspan=\"1\" colspan=\"1\">\n<p style=\"text-align: left;\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">Web technologies<\/span><\/p>\n<\/td>\n<td data-th=\"A Level Document Reference\" rowspan=\"1\" colspan=\"1\">\n<p style=\"text-align: left;\"><a href=\"https:\/\/teachcomputerscience.com\/a-level\/exchanging-data\/designing-web-pages-using-html-and-css\/\" target=\"_blank\" style=\"outline: currentcolor none medium;\" rel=\"noopener\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">24. Designing web pages using HTML and CSS<\/span><\/span><\/span><\/a><\/p>\n<p><a href=\"https:\/\/teachcomputerscience.com\/a-level\/exchanging-data\/javascript\/\" style=\"outline: currentcolor none medium;\" target=\"_blank\" rel=\"noopener\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">25. JavaScript &nbsp; &nbsp; &nbsp;<\/span><\/a><\/p>\n<p><a href=\"https:\/\/teachcomputerscience.com\/a-level\/exchanging-data\/search-engine-indexing\/\" style=\"outline: currentcolor none medium;\" target=\"_blank\" rel=\"noopener\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">26. Search engine indexing<\/span><\/a><\/p>\n<p><a href=\"https:\/\/teachcomputerscience.com\/a-level\/exchanging-data\/cloud-computing-and-web-applications\/\" style=\"outline: currentcolor none medium;\" target=\"_blank\" rel=\"noopener\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">27. Cloud computing and web applications<\/span><\/a><\/p>\n<\/td>\n<td data-th=\"Additional content\" rowspan=\"1\" colspan=\"1\">Cell<\/td>\n<\/tr>\n<tr>\n<td data-th=\"\" rowspan=\"1\" colspan=\"1\"><strong><\/strong><\/p>\n<p style=\"text-align: left;\"><strong>1.4<\/strong><\/p>\n<\/td>\n<td data-th=\"OCR specification\" rowspan=\"1\" colspan=\"1\">\n<p style=\"text-align: left;\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">Data types, data structures and algorithms<\/span><\/p>\n<\/td>\n<td data-th=\"A Level Document Reference\" rowspan=\"1\" colspan=\"1\">Cell<\/td>\n<td data-th=\"Additional content\" rowspan=\"1\" colspan=\"1\">Cell<\/td>\n<\/tr>\n<tr>\n<td data-th=\"\" rowspan=\"1\" colspan=\"1\">\n<p style=\"text-align: left;\">1.4.1<\/p>\n<\/td>\n<td data-th=\"OCR specification\" rowspan=\"1\" colspan=\"1\">\n<p style=\"text-align: left;\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">Data types<\/span><\/p>\n<\/td>\n<td data-th=\"A Level Document Reference\" rowspan=\"1\" colspan=\"1\">\n<p><a href=\"https:\/\/teachcomputerscience.com\/a-level\/data-types-data-structures-and-algorithms\/binary\/\" style=\"outline: currentcolor none medium;\" target=\"_blank\" rel=\"noopener\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">28. Binary<\/span>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;<\/span><\/a><\/p>\n<p><a href=\"https:\/\/teachcomputerscience.com\/a-level\/data-types-data-structures-and-algorithms\/hexadecimal\/\" style=\"outline: currentcolor none medium;\" target=\"_blank\" rel=\"noopener\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">29. Hexadecimal<\/span><\/a><\/p>\n<p><a href=\"https:\/\/teachcomputerscience.com\/a-level\/data-types-data-structures-and-algorithms\/floating-point-numbers\/\" style=\"outline: currentcolor none medium;\" target=\"_blank\" rel=\"noopener\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">30. Floating point numbers<\/span><\/a><\/p>\n<p><a href=\"https:\/\/teachcomputerscience.com\/a-level\/data-types-data-structures-and-algorithms\/character-sets\/\" style=\"outline: currentcolor none medium;\" target=\"_blank\" rel=\"noopener\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">31. Character sets<\/span><\/a><\/p>\n<\/td>\n<td data-th=\"Additional content\" rowspan=\"1\" colspan=\"1\">Cell<\/td>\n<\/tr>\n<tr>\n<td data-th=\"\" rowspan=\"1\" colspan=\"1\">\n<p style=\"text-align: left;\">1.4.2<\/p>\n<\/td>\n<td data-th=\"OCR specification\" rowspan=\"1\" colspan=\"1\">\n<p style=\"text-align: left;\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">Data structures<\/span><\/p>\n<\/td>\n<td data-th=\"A Level Document Reference\" rowspan=\"1\" colspan=\"1\">\n<p><a href=\"https:\/\/teachcomputerscience.com\/a-level\/data-types-data-structures-and-algorithms\/arrays-tuples-and-records\/\" style=\"outline: currentcolor none medium;\" target=\"_blank\" rel=\"noopener\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">32. Arrays, tuples and records<\/span><\/span><\/a><\/p>\n<p><a href=\"https:\/\/teachcomputerscience.com\/a-level\/data-types-data-structures-and-algorithms\/lists-and-linked-lists\/\" style=\"outline: currentcolor none medium;\" target=\"_blank\" rel=\"noopener\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">33. Lists and linked lists<\/span><\/a><\/p>\n<p><a href=\"https:\/\/teachcomputerscience.com\/a-level\/data-types-data-structures-and-algorithms\/stacks\/\" style=\"outline: currentcolor none medium;\" target=\"_blank\" rel=\"noopener\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">34. Stacks &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;<\/span><\/a><\/p>\n<p><a href=\"https:\/\/teachcomputerscience.com\/a-level\/data-types-data-structures-and-algorithms\/queues\/\" style=\"outline: currentcolor none medium;\" target=\"_blank\" rel=\"noopener\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">35. Queues &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;<\/span><\/a><\/p>\n<p><a href=\"https:\/\/teachcomputerscience.com\/a-level\/data-types-data-structures-and-algorithms\/graphs\/\" style=\"outline: currentcolor none medium;\" target=\"_blank\" rel=\"noopener\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">36. Graphs &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp;<\/span><\/a><\/p>\n<p><a href=\"https:\/\/teachcomputerscience.com\/a-level\/data-types-data-structures-and-algorithms\/trees\/\" style=\"outline: currentcolor none medium;\" target=\"_blank\" rel=\"noopener\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">37. Trees &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;<\/span><\/a><\/p>\n<p><a href=\"https:\/\/teachcomputerscience.com\/a-level\/data-types-data-structures-and-algorithms\/hash-table\/\" style=\"outline: currentcolor none medium;\" target=\"_blank\" rel=\"noopener\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">38. Hash table &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;<\/span><\/a><\/p>\n<\/td>\n<td data-th=\"Additional content\" rowspan=\"1\" colspan=\"1\">Cell<\/td>\n<\/tr>\n<tr>\n<td data-th=\"\" rowspan=\"1\" colspan=\"1\">\n<p style=\"text-align: left;\">1.4.3<\/p>\n<\/td>\n<td data-th=\"OCR specification\" rowspan=\"1\" colspan=\"1\">\n<p style=\"text-align: left;\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">Boolean algebra<\/span><\/p>\n<\/td>\n<td data-th=\"A Level Document Reference\" rowspan=\"1\" colspan=\"1\">\n<p><a href=\"https:\/\/teachcomputerscience.com\/a-level\/data-types-data-structures-and-algorithms\/logic-gates-and-circuits\/\" style=\"outline: currentcolor none medium;\" target=\"_blank\" rel=\"noopener\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">39. Logic gates and circuits<\/span><\/a><\/p>\n<p><a href=\"https:\/\/teachcomputerscience.com\/a-level\/data-types-data-structures-and-algorithms\/de-morgans-laws\/\" style=\"outline: currentcolor none medium;\" target=\"_blank\" rel=\"noopener\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">40. de Morgan&#8217;s laws<\/span><\/a><\/p>\n<p><a href=\"https:\/\/teachcomputerscience.com\/a-level\/data-types-data-structures-and-algorithms\/karnaugh-maps\/\" style=\"outline: currentcolor none medium;\" target=\"_blank\" rel=\"noopener\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">41. Karnaugh maps &nbsp; &nbsp; &nbsp; &nbsp;<\/span><\/a><\/p>\n<p><a href=\"https:\/\/teachcomputerscience.com\/a-level\/data-types-data-structures-and-algorithms\/adders-and-flip-flops\/\" style=\"outline: currentcolor none medium;\" target=\"_blank\" rel=\"noopener\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">42. Adders and flip-flops<\/span><\/a><\/p>\n<\/td>\n<td data-th=\"Additional content\" rowspan=\"1\" colspan=\"1\">Cell<\/td>\n<\/tr>\n<tr>\n<td data-th=\"\" rowspan=\"1\" colspan=\"1\"><strong><\/strong><\/p>\n<p style=\"text-align: left;\"><strong>1.5<\/strong><\/p>\n<\/td>\n<td data-th=\"OCR specification\" rowspan=\"1\" colspan=\"1\"><strong><\/strong><\/p>\n<p style=\"text-align: left;\"><strong><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">Legal, moral, cultural and ethical issues<\/span><\/strong><\/p>\n<\/td>\n<td data-th=\"A Level Document Reference\" rowspan=\"1\" colspan=\"1\">Cell<\/td>\n<td data-th=\"Additional content\" rowspan=\"1\" colspan=\"1\">Cell<\/td>\n<\/tr>\n<tr>\n<td data-th=\"\" rowspan=\"1\" colspan=\"1\">\n<p style=\"text-align: left;\">1.5.1<\/p>\n<\/td>\n<td data-th=\"OCR specification\" rowspan=\"1\" colspan=\"1\">\n<p style=\"text-align: left;\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">Computing related legislation<\/span><\/p>\n<\/td>\n<td data-th=\"A Level Document Reference\" rowspan=\"1\" colspan=\"1\">\n<p><a href=\"https:\/\/teachcomputerscience.com\/a-level\/legal-moral-cultural-and-ethical-issues\/computing-related-legislation\/\" style=\"outline: currentcolor none medium;\" target=\"_blank\" rel=\"noopener\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">43. Computing related legislation<\/span><\/span><\/a><\/p>\n<\/td>\n<td data-th=\"Additional content\" rowspan=\"1\" colspan=\"1\">Cell<\/td>\n<\/tr>\n<tr>\n<td data-th=\"\" rowspan=\"1\" colspan=\"1\">\n<p style=\"text-align: left;\">1.5.2<\/p>\n<\/td>\n<td data-th=\"OCR specification\" rowspan=\"1\" colspan=\"1\">\n<p style=\"text-align: left;\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">Moral and ethical Issues<\/span><\/p>\n<\/td>\n<td data-th=\"A Level Document Reference\" rowspan=\"1\" colspan=\"1\">\n<p><a href=\"https:\/\/teachcomputerscience.com\/a-level\/legal-moral-cultural-and-ethical-issues\/moral-and-ethical-issues\/\" style=\"outline: currentcolor none medium;\" target=\"_blank\" rel=\"noopener\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">44. Moral and ethical Issues<\/span><\/span><\/a><\/p>\n<\/td>\n<td data-th=\"Additional content\" rowspan=\"1\" colspan=\"1\">Cell<\/td>\n<\/tr>\n<tr>\n<td data-th=\"\" rowspan=\"1\" colspan=\"1\"><strong><\/strong><\/p>\n<p style=\"text-align: left;\"><strong>2.1<\/strong><\/p>\n<\/td>\n<td data-th=\"OCR specification\" rowspan=\"1\" colspan=\"1\">\n<p style=\"text-align: left;\"><strong><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">Elements of computational thinking<\/span><\/strong><\/p>\n<\/td>\n<td data-th=\"A Level Document Reference\" rowspan=\"1\" colspan=\"1\">Cell<\/td>\n<td data-th=\"Additional content\" rowspan=\"1\" colspan=\"1\">Cell<\/td>\n<\/tr>\n<tr>\n<td data-th=\"\" rowspan=\"1\" colspan=\"1\">\n<p style=\"text-align: left;\">2.1.1<\/p>\n<p style=\"text-align: left;\">2.1.2<\/p>\n<p style=\"text-align: left;\">2.1.3<\/p>\n<p style=\"text-align: left;\">2.1.4<\/p>\n<p style=\"text-align: left;\">2.1.5<\/p>\n<\/td>\n<td data-th=\"OCR specification\" rowspan=\"1\" colspan=\"1\">\n<p style=\"text-align: left;\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">Thinking abstractly<\/span><\/p>\n<p style=\"text-align: left;\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">Thinking ahead<\/span><\/span><\/p>\n<p style=\"text-align: left;\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">Thinking procedurally<\/span><\/span><\/p>\n<p style=\"text-align: left;\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">Thinking logically<\/span><\/span><\/p>\n<p style=\"text-align: left;\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">Thinking concurrently<\/span><\/span><\/p>\n<\/td>\n<td data-th=\"A Level Document Reference\" rowspan=\"1\" colspan=\"1\">\n<p><a href=\"https:\/\/teachcomputerscience.com\/a-level\/elements-of-computational-thinking\/computational-thinking\/\" style=\"outline: currentcolor none medium;\" target=\"_blank\" rel=\"noopener\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">45. Computational thinking<\/span><\/span><\/a><\/p>\n<\/td>\n<td data-th=\"Additional content\" rowspan=\"1\" colspan=\"1\">Cell<\/td>\n<\/tr>\n<tr>\n<td data-th=\"\" rowspan=\"1\" colspan=\"1\">\n<p style=\"text-align: left;\"><strong>2.2<\/strong><\/p>\n<\/td>\n<td data-th=\"OCR specification\" rowspan=\"1\" colspan=\"1\"><strong><\/strong><\/p>\n<p style=\"text-align: left;\"><strong><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">Problem solving and programming<\/span><\/strong><\/p>\n<\/td>\n<td data-th=\"A Level Document Reference\" rowspan=\"1\" colspan=\"1\">Cell<\/td>\n<td data-th=\"Additional content\" rowspan=\"1\" colspan=\"1\">Cell<\/td>\n<\/tr>\n<tr>\n<td data-th=\"\" rowspan=\"1\" colspan=\"1\">\n<p style=\"text-align: left;\">2.2.1<\/p>\n<\/td>\n<td data-th=\"OCR specification\" rowspan=\"1\" colspan=\"1\">\n<p style=\"text-align: left;\">Programming techniques<\/p>\n<\/td>\n<td data-th=\"A Level Document Reference\" rowspan=\"1\" colspan=\"1\">\n<p><a href=\"https:\/\/teachcomputerscience.com\/a-level\/problem-solving-and-programming\/introduction-to-programming\/\" style=\"outline: currentcolor none medium;\" target=\"_blank\" rel=\"noopener\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">46. Introduction to programming<\/span><\/span><\/a><\/p>\n<p><a href=\"https:\/\/teachcomputerscience.com\/a-level\/problem-solving-and-programming\/basic-programming-constructs\/\" style=\"outline: currentcolor none medium;\" target=\"_blank\" rel=\"noopener\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">47. Basic programming constructs<\/span><\/span><\/a><\/p>\n<p><a href=\"https:\/\/teachcomputerscience.com\/a-level\/problem-solving-and-programming\/functions-and-procedures\/\" style=\"outline: currentcolor none medium;\" target=\"_blank\" rel=\"noopener\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">48. Functions and procedures<\/span><\/span><\/a><\/p>\n<p><a href=\"https:\/\/teachcomputerscience.com\/a-level\/problem-solving-and-programming\/integrated-development-environment\/\" style=\"outline: currentcolor none medium;\" target=\"_blank\" rel=\"noopener\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">49. Integrated development environment<\/span><\/span><\/a><\/p>\n<p><a href=\"https:\/\/teachcomputerscience.com\/a-level\/problem-solving-and-programming\/object-oriented-techniques\/\" style=\"outline: currentcolor none medium;\" target=\"_blank\" rel=\"noopener\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">50. Object oriented techniques<\/span><\/span><\/a><\/p>\n<\/td>\n<td data-th=\"Additional content\" rowspan=\"1\" colspan=\"1\">Cell<\/td>\n<\/tr>\n<tr>\n<td data-th=\"\" rowspan=\"1\" colspan=\"1\">\n<p style=\"text-align: left;\">2.2.2<\/p>\n<\/td>\n<td data-th=\"OCR specification\" rowspan=\"1\" colspan=\"1\">\n<p style=\"text-align: left;\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">Computational methods<\/span><\/p>\n<\/td>\n<td data-th=\"A Level Document Reference\" rowspan=\"1\" colspan=\"1\">\n<p><a href=\"https:\/\/teachcomputerscience.com\/a-level\/problem-solving-and-programming\/computational-methods\/\" style=\"outline: currentcolor none medium;\" target=\"_blank\" rel=\"noopener\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">51. Computational methods<\/span><\/span><\/a><\/p>\n<\/td>\n<td data-th=\"Additional content\" rowspan=\"1\" colspan=\"1\">Cell<\/td>\n<\/tr>\n<tr>\n<td data-th=\"\" rowspan=\"1\" colspan=\"1\"><strong><\/strong><\/p>\n<p style=\"text-align: left;\"><strong>2.3<\/strong><\/p>\n<\/td>\n<td data-th=\"OCR specification\" rowspan=\"1\" colspan=\"1\"><strong><\/strong><\/p>\n<p style=\"text-align: left;\"><strong><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">Algorithms<\/span><\/strong><\/p>\n<\/td>\n<td data-th=\"A Level Document Reference\" rowspan=\"1\" colspan=\"1\">Cell<\/td>\n<td data-th=\"Additional content\" rowspan=\"1\" colspan=\"1\">Cell<\/td>\n<\/tr>\n<tr>\n<td data-th=\"\" rowspan=\"1\" colspan=\"1\">\n<p style=\"text-align: left;\">2.3.1<\/p>\n<\/td>\n<td data-th=\"OCR specification\" rowspan=\"1\" colspan=\"1\">\n<p style=\"text-align: left;\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">Algorithms<\/span><\/p>\n<\/td>\n<td data-th=\"A Level Document Reference\" rowspan=\"1\" colspan=\"1\">\n<p><a href=\"https:\/\/teachcomputerscience.com\/a-level\/algorithms\/evaluation-and-design-of-algorithms\/\" style=\"outline: currentcolor none medium;\" target=\"_blank\" rel=\"noopener\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">52. Evaluation and design of algorithms<\/span><\/a><\/p>\n<p><a href=\"https:\/\/teachcomputerscience.com\/a-level\/algorithms\/searching-algorithms\/\" style=\"outline: currentcolor none medium;\" target=\"_blank\" rel=\"noopener\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">53. Searching algorithms<\/span><\/span><\/a><\/p>\n<p><a href=\"https:\/\/teachcomputerscience.com\/a-level\/algorithms\/sorting-algorithms\/\" style=\"outline: currentcolor none medium;\" target=\"_blank\" rel=\"noopener\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">54. Sorting algorithms<\/span><\/span><\/a><\/p>\n<p><a href=\"https:\/\/teachcomputerscience.com\/a-level\/algorithms\/algorithms-for-main-data-structures\/\" style=\"outline: currentcolor none medium;\" target=\"_blank\" rel=\"noopener\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">55. Algorithms for main data structures<\/span><\/span><\/a><\/p>\n<p style=\"text-align: left;\"><a href=\"https:\/\/teachcomputerscience.com\/a-level\/algorithms\/dijkstras\/\" target=\"_blank\" style=\"outline: currentcolor none medium;\" rel=\"noopener\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">56. Dijkstra&#8217;s shortest path algorithm and A* algorithm<\/span><\/a><\/p>\n<\/td>\n<td data-th=\"Additional content\" rowspan=\"1\" colspan=\"1\">Cell<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p>OCR A Level Computer Science mapping file. Download our comprehensive teaching resources and use the mapping table to align to the OCR examination board. OCR specification A Level Document Reference Additional content 1.1 The characteristics of contemporary processors, input, output and storage devices 1.1.1 Structure and function of the processor 1. Computer architecture 2. Functions &#8230; <\/p>\n<p class=\"read-more-container\"><a title=\"OCR A Level Computing Teaching Resources &#038; Revision Material\" class=\"read-more button\" href=\"https:\/\/teachcomputerscience.com\/ocr-a-level\/\" aria-label=\"More on OCR A Level Computing Teaching Resources &#038; Revision Material\">Read more<\/a><\/p>\n","protected":false},"author":3747,"featured_media":0,"parent":0,"menu_order":48,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_generate-full-width-content":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"tags":[],"class_list":["post-581177","page","type-page","status-publish"],"acf":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/teachcomputerscience.com\/wp-json\/wp\/v2\/pages\/581177","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/teachcomputerscience.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/teachcomputerscience.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/teachcomputerscience.com\/wp-json\/wp\/v2\/users\/3747"}],"replies":[{"embeddable":true,"href":"https:\/\/teachcomputerscience.com\/wp-json\/wp\/v2\/comments?post=581177"}],"version-history":[{"count":1,"href":"https:\/\/teachcomputerscience.com\/wp-json\/wp\/v2\/pages\/581177\/revisions"}],"predecessor-version":[{"id":666896,"href":"https:\/\/teachcomputerscience.com\/wp-json\/wp\/v2\/pages\/581177\/revisions\/666896"}],"wp:attachment":[{"href":"https:\/\/teachcomputerscience.com\/wp-json\/wp\/v2\/media?parent=581177"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/teachcomputerscience.com\/wp-json\/wp\/v2\/tags?post=581177"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}