{"id":662037,"date":"2022-06-24T10:37:57","date_gmt":"2022-06-24T10:37:57","guid":{"rendered":"https:\/\/teachcomputerscience.com\/?page_id=662037"},"modified":"2022-06-24T10:38:00","modified_gmt":"2022-06-24T10:38:00","slug":"igcse","status":"publish","type":"page","link":"https:\/\/teachcomputerscience.com\/igcse\/","title":{"rendered":"Edexcel International GCSE Computer Science Teaching Resources &#038; Lesson Plans"},"content":{"rendered":"<p>Edexcel IGCSE (9-1) Computer Science mapping file. Download our comprehensive teaching resources and use the mapping table to align to the Edexcel International examination board.<\/p>\n<table data-rows=\"27\" data-cols=\"4\">\n<thead>\n<tr>\n<th>\n<\/th>\n<th>\n<p>IGCSE specification<\/p>\n<\/th>\n<th>\n<p>GCSE Document Reference<\/p>\n<\/th>\n<th>\n<p>Additional content<\/p>\n<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td data-th=\"\">\n<p><strong><\/strong><strong>1<\/strong><\/p>\n<\/td>\n<td data-th=\"IGCSE specification\">\n<p><strong>Problem Solving<\/strong><\/p>\n<\/td>\n<td data-th=\"GCSE Document Reference\">\n<\/td>\n<td data-th=\"Additional content\">\n<\/td>\n<\/tr>\n<tr>\n<td data-th=\"\">\n<p style=\"text-align: left;\">1.1<\/p>\n<p style=\"text-align: left;\">1.2<\/p>\n<\/td>\n<td data-th=\"IGCSE specification\">\n<p>Algorithms<\/p>\n<p>Decomposition and Abstraction<\/p>\n<\/td>\n<td data-th=\"GCSE Document Reference\">\n<p><a href=\"http:\/\/teachcomputerscience.com\/gcse\/algorithms\/problem-solving-and-algorithm-design\/\" style=\"outline: none;\" target=\"_blank\" rel=\"noopener\">28. Problem solving and algorithm design<\/a><\/p>\n<p><a href=\"https:\/\/teachcomputerscience.com\/gcse\/algorithms\/algorithm-in-pseudocode\/\" style=\"outline: none;\" target=\"_blank\" rel=\"noopener\">34. Algorithm in pseudocode<\/a><\/p>\n<p><a href=\"https:\/\/teachcomputerscience.com\/gcse\/algorithms\/linear-search\/\" style=\"outline: none;\" target=\"_blank\" rel=\"noopener\">29. Linear search<\/a><\/p>\n<p><a href=\"https:\/\/teachcomputerscience.com\/gcse\/algorithms\/binary-search\/\" style=\"outline: none;\" target=\"_blank\" rel=\"noopener\">30. Binary search&nbsp;<\/a><\/p>\n<p><a href=\"https:\/\/teachcomputerscience.com\/gcse\/algorithms\/bubble-sort\/\" style=\"outline: none;\" target=\"_blank\" rel=\"noopener\">31. Bubble sort&nbsp;<\/a><\/p>\n<p><a href=\"https:\/\/teachcomputerscience.com\/gcse\/algorithms\/merge-sort\/\" style=\"outline: none;\" target=\"_blank\" rel=\"noopener\">33. Merge sort<\/a><\/p>\n<p><a href=\"https:\/\/teachcomputerscience.com\/gcse\/programming\/string-manipulation\/\" style=\"outline: none;\" target=\"_blank\" rel=\"noopener\">37. String manipulation<\/a><\/p>\n<p><a href=\"https:\/\/teachcomputerscience.com\/gcse\/programming\/producing-robust-programs\/\" style=\"outline: none;\" target=\"_blank\" rel=\"noopener\">41. Producing robust programs<\/a><\/p>\n<p><a href=\"https:\/\/teachcomputerscience.com\/gcse\/algorithms\/efficiency-of-algorithms\/\" target=\"_blank\" style=\"outline: none;\" rel=\"noopener\">34A. Efficiency of algorithms<\/a><\/p>\n<\/td>\n<td data-th=\"Additional content\">\n<\/td>\n<\/tr>\n<tr>\n<td data-th=\"\">\n<p style=\"text-align: left;\"><strong>2<\/strong><\/p>\n<\/td>\n<td data-th=\"IGCSE specification\">\n<p style=\"text-align: left;\"><strong>Programming\u200b<\/strong><\/p>\n<\/td>\n<td data-th=\"GCSE Document Reference\">Cell<\/td>\n<td data-th=\"Additional content\">\n<p style=\"\">\n<\/p><\/td>\n<\/tr>\n<tr>\n<td data-th=\"\">\n<p style=\"text-align: left;\">2.1<\/p>\n<\/td>\n<td data-th=\"IGCSE specification\">\n<p>Develop code<\/p>\n<\/td>\n<td data-th=\"GCSE Document Reference\">\n<p><a href=\"https:\/\/teachcomputerscience.com\/gcse\/programming\/producing-robust-programs\/\" style=\"outline: none;\" target=\"_blank\" rel=\"noopener\">41. Producing robust programs<\/a><\/p>\n<\/td>\n<td data-th=\"Additional content\">Cell<\/td>\n<\/tr>\n<tr>\n<td data-th=\"\" rowspan=\"1\" colspan=\"1\" style=\"\">\n<p style=\"text-align: left;\">2.2<\/p>\n<\/td>\n<td data-th=\"IGCSE specification\" rowspan=\"1\" colspan=\"1\">\n<p>Constructs<\/p>\n<\/td>\n<td data-th=\"GCSE Document Reference\" rowspan=\"1\" colspan=\"1\">\n<p><a href=\"https:\/\/teachcomputerscience.com\/gcse\/programming\/basic-programming-constructs\/\" style=\"outline: none;\" target=\"_blank\" rel=\"noopener\">35. Basic programming constructs<\/a><\/p>\n<\/td>\n<td data-th=\"Additional content\" rowspan=\"1\" colspan=\"1\">Cell<\/td>\n<\/tr>\n<tr>\n<td data-th=\"\" rowspan=\"1\" colspan=\"1\">\n<p style=\"text-align: left;\">2.3<\/p>\n<\/td>\n<td data-th=\"IGCSE specification\" rowspan=\"1\" colspan=\"1\">\n<p>Data types and structures<\/p>\n<\/td>\n<td data-th=\"GCSE Document Reference\" rowspan=\"1\" colspan=\"1\">\n<p style=\"text-align: left;\"><a href=\"http:\/\/teachcomputerscience.com\/gcse\/programming\/variables-and-data-types\/\" style=\"outline: none;\" target=\"_blank\" rel=\"noopener\">36. Variables and data types<\/a><\/p>\n<p style=\"text-align: left;\"><a href=\"https:\/\/teachcomputerscience.com\/gcse\/programming\/string-manipulation\/\" style=\"outline: none;\" target=\"_blank\" rel=\"noopener\">37. String manipulation<\/a><\/p>\n<p style=\"text-align: left;\"><a href=\"https:\/\/teachcomputerscience.com\/gcse\/programming\/data-structures\/\" style=\"outline: none;\" target=\"_blank\" rel=\"noopener\">40. Data structures&nbsp;<\/a><\/p>\n<p style=\"text-align: left;\"><a href=\"https:\/\/teachcomputerscience.com\/gcse\/programming\/functions-and-procedures\/\" style=\"outline: none;\" target=\"_blank\" rel=\"noopener\">38. Functions and procedures<\/a><\/p>\n<\/td>\n<td data-th=\"Additional content\" rowspan=\"1\" colspan=\"1\">\n<p style=\"\">\n<\/p><\/td>\n<\/tr>\n<tr>\n<td data-th=\"\" rowspan=\"1\" colspan=\"1\">\n<p style=\"text-align: left;\">2.4<\/p>\n<\/td>\n<td data-th=\"IGCSE specification\" rowspan=\"1\" colspan=\"1\">\n<p>Input\/output<\/p>\n<\/td>\n<td data-th=\"GCSE Document Reference\" rowspan=\"1\" colspan=\"1\">\n<p style=\"text-align: left;\"><a href=\"https:\/\/teachcomputerscience.com\/gcse\/algorithms\/algorithm-in-pseudocode\/\" style=\"outline: none;\" target=\"_blank\" rel=\"noopener\">34. Algorithm in pseudocode&nbsp;<\/a><\/p>\n<p style=\"text-align: left;\"><a href=\"https:\/\/teachcomputerscience.com\/gcse\/programming\/file-handling\/\" style=\"outline: none;\" target=\"_blank\" rel=\"noopener\">39. File handling<\/a><\/p>\n<p style=\"text-align: left;\"><a href=\"https:\/\/teachcomputerscience.com\/gcse\/programming\/producing-robust-programs\/\" style=\"outline: none;\" target=\"_blank\" rel=\"noopener\">41. Producing robust programs<\/a><\/p>\n<\/td>\n<td data-th=\"Additional content\" rowspan=\"1\" colspan=\"1\">\n<\/td>\n<\/tr>\n<tr>\n<td data-th=\"\" rowspan=\"1\" colspan=\"1\">\n<p style=\"text-align: left;\">2.5<\/p>\n<\/td>\n<td data-th=\"IGCSE specification\" rowspan=\"1\" colspan=\"1\">\n<p>Operators<\/p>\n<\/td>\n<td data-th=\"GCSE Document Reference\" rowspan=\"1\" colspan=\"1\">\n<p style=\"text-align: left;\"><a href=\"http:\/\/teachcomputerscience.com\/gcse\/programming\/basic-programming-constructs\/\" target=\"_blank\" style=\"outline: none;\" rel=\"noopener\"><\/a><a href=\"https:\/\/teachcomputerscience.com\/gcse\/algorithms\/algorithm-in-pseudocode\/\" target=\"_blank\" style=\"outline: none;\" rel=\"noopener\">34. Algorithm in pseudocode&nbsp;<\/a><\/p>\n<p style=\"text-align: left;\"><a href=\"http:\/\/teachcomputerscience.com\/gcse\/programming\/functions-and-procedures\/\" target=\"_blank\" style=\"outline: none;\" rel=\"noopener\"><\/a><a href=\"http:\/\/teachcomputerscience.com\/gcse\/programming\/basic-programming-constructs\/\" target=\"_blank\" style=\"outline: none;\" rel=\"noopener\">35. Basic programming constructs<\/a><\/p>\n<\/td>\n<td data-th=\"Additional content\" rowspan=\"1\" colspan=\"1\">\n<\/td>\n<\/tr>\n<tr>\n<td data-th=\"\" rowspan=\"1\" colspan=\"1\">\n<p style=\"text-align: left;\">2.6<\/p>\n<\/td>\n<td data-th=\"IGCSE specification\" rowspan=\"1\" colspan=\"1\">\n<p style=\"text-align: left;\">Subprograms<\/p>\n<\/td>\n<td data-th=\"GCSE Document Reference\" rowspan=\"1\" colspan=\"1\">\n<p><a href=\"https:\/\/teachcomputerscience.com\/gcse\/programming\/functions-and-procedures\/\" target=\"_blank\" style=\"outline: none;\" rel=\"noopener\">38. Functions and procedures<\/a><\/p>\n<\/td>\n<td data-th=\"Additional content\" rowspan=\"1\" colspan=\"1\">\n<\/td>\n<\/tr>\n<tr>\n<td data-th=\"\" rowspan=\"1\" colspan=\"1\">\n<p style=\"text-align: left;\"><strong>3<\/strong><\/p>\n<\/td>\n<td data-th=\"IGCSE specification\" rowspan=\"1\" colspan=\"1\">\n<p style=\"text-align: left;\"><strong>Data<\/strong><\/p>\n<\/td>\n<td data-th=\"GCSE Document Reference\" rowspan=\"1\" colspan=\"1\">Cell<\/td>\n<td data-th=\"Additional content\" rowspan=\"1\" colspan=\"1\">\n<\/td>\n<\/tr>\n<tr>\n<td data-th=\"\" rowspan=\"1\" colspan=\"1\">\n<p style=\"text-align: left;\">3.1<\/p>\n<\/td>\n<td data-th=\"IGCSE specification\" rowspan=\"1\" colspan=\"1\">\n<p style=\"text-align: left;\">Binary<\/p>\n<\/td>\n<td data-th=\"GCSE Document Reference\" rowspan=\"1\" colspan=\"1\">\n<p><a href=\"http:\/\/teachcomputerscience.com\/gcse\/algorithms\/algorithm-in-pseudocode\/\" style=\"outline: none;\" target=\"_blank\" rel=\"noopener\"><\/a><a href=\"https:\/\/teachcomputerscience.com\/gcse\/data-representation\/binary-system\/\" target=\"_blank\" style=\"outline: none;\" rel=\"noopener\">10. Binary system<\/a><\/p>\n<p><a href=\"http:\/\/teachcomputerscience.com\/gcse\/algorithms\/algorithm-in-pseudocode\/\" style=\"outline: none;\" target=\"_blank\" rel=\"noopener\"><\/a><a href=\"https:\/\/teachcomputerscience.com\/gcse\/data-representation\/hexadecimal-system\/\" target=\"_blank\" style=\"outline: none;\" rel=\"noopener\">11. Hexadecimal system<\/a><\/p>\n<\/td>\n<td data-th=\"Additional content\" rowspan=\"1\" colspan=\"1\">\n<\/td>\n<\/tr>\n<tr>\n<td data-th=\"\" rowspan=\"1\" colspan=\"1\">\n<p style=\"text-align: left;\">3.2<\/p>\n<\/td>\n<td data-th=\"IGCSE specification\" rowspan=\"1\" colspan=\"1\">\n<p style=\"text-align: left;\">Data representation<\/p>\n<\/td>\n<td data-th=\"GCSE Document Reference\" rowspan=\"1\" colspan=\"1\">\n<p><a href=\"https:\/\/teachcomputerscience.com\/gcse\/data-representation\/character-sets\/\" style=\"outline: none;\" target=\"_blank\" rel=\"noopener\">12. Character sets<\/a><\/p>\n<p><a href=\"https:\/\/teachcomputerscience.com\/gcse\/data-representation\/images\/\" style=\"outline: none;\" target=\"_blank\" rel=\"noopener\">13. Images&nbsp;<\/a><\/p>\n<p><a href=\"https:\/\/teachcomputerscience.com\/gcse\/data-representation\/sounds\/\" style=\"outline: none;\" target=\"_blank\" rel=\"noopener\">14. Sound<\/a><\/p>\n<\/td>\n<td data-th=\"Additional content\" rowspan=\"1\" colspan=\"1\">\n<p style=\"\">\n<\/p><\/td>\n<\/tr>\n<tr>\n<td data-th=\"\" rowspan=\"1\" colspan=\"1\">\n<p style=\"text-align: left;\">3.3<\/p>\n<\/td>\n<td data-th=\"IGCSE specification\" rowspan=\"1\" colspan=\"1\">\n<p style=\"text-align: left;\">Data storage and compression<\/p>\n<\/td>\n<td data-th=\"GCSE Document Reference\" rowspan=\"1\" colspan=\"1\">\n<p style=\"text-align: left;\"><a href=\"https:\/\/teachcomputerscience.com\/gcse\/data-representation\/file-formats-and-compression\/\" target=\"_blank\" style=\"outline: none;\" rel=\"noopener\">15. File formats and compression<\/a><\/p>\n<\/td>\n<td data-th=\"Additional content\" rowspan=\"1\" colspan=\"1\">\n<\/td>\n<\/tr>\n<tr>\n<td data-th=\"\" rowspan=\"1\" colspan=\"1\">\n<p style=\"text-align: left;\">3.4<\/p>\n<\/td>\n<td data-th=\"IGCSE specification\" rowspan=\"1\" colspan=\"1\">\n<p style=\"text-align: left;\">Encryption<\/p>\n<\/td>\n<td data-th=\"GCSE Document Reference\" rowspan=\"1\" colspan=\"1\">\n<p><a href=\"https:\/\/teachcomputerscience.com\/gcse\/networking\/wireless-networks\/\" style=\"outline: none;\" target=\"_blank\" rel=\"noopener\">20. Wireless networks<\/a><\/p>\n<\/td>\n<td data-th=\"Additional content\" rowspan=\"1\" colspan=\"1\"><\/td>\n<\/tr>\n<tr>\n<td data-th=\"\" rowspan=\"1\" colspan=\"1\">\n<p><strong>4<\/strong><\/p>\n<\/td>\n<td data-th=\"IGCSE specification\" rowspan=\"1\" colspan=\"1\">\n<p style=\"text-align: left;\"><strong>Computers<\/strong><\/p>\n<\/td>\n<td data-th=\"GCSE Document Reference\" rowspan=\"1\" colspan=\"1\">\n<\/td>\n<td data-th=\"Additional content\" rowspan=\"1\" colspan=\"1\">\n<p style=\"text-align: left;\">\n<\/p><\/td>\n<\/tr>\n<tr>\n<td data-th=\"\" rowspan=\"1\" colspan=\"1\">\n<p style=\"text-align: left;\">4.1<\/p>\n<\/td>\n<td data-th=\"IGCSE specification\" rowspan=\"1\" colspan=\"1\">\n<p style=\"text-align: left;\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Calibri';font-style:normal;text-decoration-skip-ink:none;\">Machines and computational modelling<\/span><\/p>\n<\/td>\n<td data-th=\"GCSE Document Reference\" rowspan=\"1\" colspan=\"1\">\n<p style=\"text-align: left;\"><a href=\"https:\/\/teachcomputerscience.com\/gcse\/theory\/introduction-to-computers\/\" style=\"outline: none;\" target=\"_blank\" rel=\"noopener\">01. Introduction to computers<\/a><\/p>\n<\/td>\n<td data-th=\"Additional content\" rowspan=\"1\" colspan=\"1\"><\/td>\n<\/tr>\n<tr>\n<td data-th=\"\" rowspan=\"1\" colspan=\"1\">\n<p style=\"text-align: left;\">4.2<\/p>\n<\/td>\n<td data-th=\"IGCSE specification\" rowspan=\"1\" colspan=\"1\">\n<p style=\"text-align: left;\">Hardware<\/p>\n<\/td>\n<td data-th=\"GCSE Document Reference\" rowspan=\"1\" colspan=\"1\">\n<p style=\"text-align: left;\"><a href=\"https:\/\/teachcomputerscience.com\/gcse\/computer-architecture\/von-neumann-architecture\/\" style=\"outline: none;\" target=\"_blank\" rel=\"noopener\">06. von Neumann architecture&nbsp;<\/a><\/p>\n<p style=\"text-align: left;\"><a href=\"https:\/\/teachcomputerscience.com\/gcse\/computer-architecture\/functions-and-characteristics-of-cpu\/\" style=\"outline: none;\" target=\"_blank\" rel=\"noopener\">07 Functions and characteristics of CPU&nbsp;<\/a><\/p>\n<p style=\"text-align: left;\"><a href=\"https:\/\/teachcomputerscience.com\/gcse\/memory\/computer-memory\/\" style=\"outline: none;\" target=\"_blank\" rel=\"noopener\">16. Computer memory<\/a><\/p>\n<p style=\"text-align: left;\"><a href=\"https:\/\/teachcomputerscience.com\/gcse\/memory\/data-storage\/\" style=\"outline: none;\" target=\"_blank\" rel=\"noopener\">17. Data storage&nbsp;<\/a><\/p>\n<\/td>\n<td data-th=\"Additional content\" rowspan=\"1\" colspan=\"1\"><\/td>\n<\/tr>\n<tr>\n<td data-th=\"\" rowspan=\"1\" colspan=\"1\">\n<p style=\"text-align: left;\">4.3<\/p>\n<\/td>\n<td data-th=\"IGCSE specification\" rowspan=\"1\" colspan=\"1\">\n<p style=\"text-align: left;\">Logic<\/p>\n<\/td>\n<td data-th=\"GCSE Document Reference\" rowspan=\"1\" colspan=\"1\">\n<p style=\"text-align: left;\"><a href=\"https:\/\/teachcomputerscience.com\/gcse\/theory\/logic-gates-and-logic-circuits\/\" style=\"outline: none;\" target=\"_blank\" rel=\"noopener\">03. Logic gates and circuits<\/a><\/p>\n<\/td>\n<td data-th=\"Additional content\" rowspan=\"1\" colspan=\"1\">\n<\/td>\n<\/tr>\n<tr>\n<td data-th=\"\" rowspan=\"1\" colspan=\"1\">\n<p style=\"text-align: left;\">4.4<\/p>\n<\/td>\n<td data-th=\"IGCSE specification\" rowspan=\"1\" colspan=\"1\">\n<p>Software<\/p>\n<\/td>\n<td data-th=\"GCSE Document Reference\" rowspan=\"1\" colspan=\"1\">\n<p><a href=\"https:\/\/teachcomputerscience.com\/gcse\/theory\/operating-systems\/\" target=\"_blank\" style=\"outline: none;\" rel=\"noopener\">04. Operating system<\/a><\/p>\n<\/td>\n<td data-th=\"Additional content\" rowspan=\"1\" colspan=\"1\">\n<p style=\"\">\n<\/p><\/td>\n<\/tr>\n<tr>\n<td data-th=\"\" rowspan=\"1\" colspan=\"1\">\n<p style=\"text-align: left;\">4.5<\/p>\n<\/td>\n<td data-th=\"IGCSE specification\" rowspan=\"1\" colspan=\"1\">\n<p>Programming languages<\/p>\n<\/td>\n<td data-th=\"GCSE Document Reference\" rowspan=\"1\" colspan=\"1\">\n<p><a href=\"https:\/\/teachcomputerscience.com\/gcse\/theory\/high-and-low-level-languages\/\" target=\"_blank\" style=\"outline: none;\" rel=\"noopener\">05. Low and high level languages<\/a><\/p>\n<\/td>\n<td data-th=\"Additional content\" rowspan=\"1\" colspan=\"1\">\n<\/td>\n<\/tr>\n<tr>\n<td data-th=\"\" rowspan=\"1\" colspan=\"1\">\n<p style=\"text-align: left;\"><strong>5<\/strong><\/p>\n<\/td>\n<td data-th=\"IGCSE specification\" rowspan=\"1\" colspan=\"1\">\n<p><strong>Communications and Internet<\/strong><\/p>\n<\/td>\n<td data-th=\"GCSE Document Reference\" rowspan=\"1\" colspan=\"1\">Cell<\/td>\n<td data-th=\"Additional content\" rowspan=\"1\" colspan=\"1\">\n<\/td>\n<\/tr>\n<tr>\n<td data-th=\"\" rowspan=\"1\" colspan=\"1\">\n<p style=\"text-align: left;\">5.1<\/p>\n<\/td>\n<td data-th=\"IGCSE specification\" rowspan=\"1\" colspan=\"1\">\n<p>Networks<\/p>\n<\/td>\n<td data-th=\"GCSE Document Reference\" rowspan=\"1\" colspan=\"1\">\n<p><a href=\"https:\/\/teachcomputerscience.com\/gcse\/networking\/introduction-to-computer-networks\/\" style=\"outline: none;\" target=\"_blank\" rel=\"noopener\">18. Introduction to computer networks<\/a><\/p>\n<p><a href=\"https:\/\/teachcomputerscience.com\/gcse\/networking\/network-topologies\/\" style=\"outline: none;\" target=\"_blank\" rel=\"noopener\">19. Network topology<\/a><\/p>\n<p><a href=\"https:\/\/teachcomputerscience.com\/gcse\/networking\/wireless-networks\/\" style=\"outline: none;\" target=\"_blank\" rel=\"noopener\">20. Wireless networks<\/a><\/p>\n<p><a href=\"https:\/\/teachcomputerscience.com\/gcse\/networking\/network-protocols-and-layers\/\" style=\"outline: none;\" target=\"_blank\" rel=\"noopener\">21. Network protocols and layers<\/a><\/p>\n<p><a href=\"https:\/\/teachcomputerscience.com\/gcse\/networking\/network-connections\/\" style=\"outline: none;\" target=\"_blank\" rel=\"noopener\">22. Network connections<\/a><\/p>\n<\/td>\n<td data-th=\"Additional content\" rowspan=\"1\" colspan=\"1\">\n<\/td>\n<\/tr>\n<tr>\n<td data-th=\"\" rowspan=\"1\" colspan=\"1\">\n<p style=\"text-align: left;\">5.2<\/p>\n<\/td>\n<td data-th=\"IGCSE specification\" rowspan=\"1\" colspan=\"1\">\n<p>Network Security<\/p>\n<\/td>\n<td data-th=\"GCSE Document Reference\" rowspan=\"1\" colspan=\"1\">\n<p><a href=\"https:\/\/teachcomputerscience.com\/gcse\/security\/computer-security\/\" style=\"outline: none;\" target=\"_blank\" rel=\"noopener\">26. Computer security<\/a><\/p>\n<\/td>\n<td data-th=\"Additional content\" rowspan=\"1\" colspan=\"1\">Cell<\/td>\n<\/tr>\n<tr>\n<td data-th=\"\" rowspan=\"1\" colspan=\"1\">\n<p style=\"text-align: left;\">5.3<\/p>\n<\/td>\n<td data-th=\"IGCSE specification\" rowspan=\"1\" colspan=\"1\">\n<p>The Internet and the world wide web<\/p>\n<\/td>\n<td data-th=\"GCSE Document Reference\" rowspan=\"1\" colspan=\"1\">\n<p><a href=\"https:\/\/teachcomputerscience.com\/gcse\/networking\/internet-technologies\/\" style=\"outline: none;\" target=\"_blank\" rel=\"noopener\">24. Internet technologies<\/a><\/p>\n<p><a href=\"https:\/\/teachcomputerscience.com\/gcse\/networking\/introduction-to-computer-networks\/\" style=\"outline: none;\" target=\"_blank\" rel=\"noopener\">18. Introduction to computer networks<\/a><\/p>\n<p><a href=\"https:\/\/teachcomputerscience.com\/gcse\/networking\/network-protocols-and-layers\/\" style=\"outline: none;\" target=\"_blank\" rel=\"noopener\">21. Network protocols and layers<\/a><\/p>\n<\/td>\n<td data-th=\"Additional content\" rowspan=\"1\" colspan=\"1\">\n<\/td>\n<\/tr>\n<tr>\n<td data-th=\"\" rowspan=\"1\" colspan=\"1\">\n<p><strong>6<\/strong><\/p>\n<\/td>\n<td data-th=\"IGCSE specification\" rowspan=\"1\" colspan=\"1\">\n<p><strong>The Bigger Picture<\/strong><\/p>\n<\/td>\n<td data-th=\"GCSE Document Reference\" rowspan=\"1\" colspan=\"1\">Cell<\/td>\n<td data-th=\"Additional content\" rowspan=\"1\" colspan=\"1\"><\/td>\n<\/tr>\n<tr>\n<td data-th=\"\" rowspan=\"1\" colspan=\"1\">\n<p style=\"text-align: left;\"><strong><\/strong>6.1<\/p>\n<\/td>\n<td data-th=\"IGCSE specification\" rowspan=\"1\" colspan=\"1\">\n<p>Emerging trends, issues and impact<\/p>\n<\/td>\n<td data-th=\"GCSE Document Reference\" rowspan=\"1\" colspan=\"1\">\n<p><a href=\"https:\/\/teachcomputerscience.com\/gcse\/security\/computer-security\/\" style=\"outline: none;\" target=\"_blank\" rel=\"noopener\">26. Computer security<\/a><\/p>\n<p><a href=\"https:\/\/teachcomputerscience.com\/gcse\/security\/ethics\/\" style=\"outline: none;\" target=\"_blank\" rel=\"noopener\">27. Ethics<\/a><\/p>\n<p><a href=\"https:\/\/teachcomputerscience.com\/gcse\/networking\/wireless-networks\/\" style=\"outline: none;\" target=\"_blank\" rel=\"noopener\">20. Wireless networks<\/a><\/p>\n<p><a href=\"https:\/\/teachcomputerscience.com\/gcse\/theory\/reliability-in-computers\/\" style=\"outline: none;\" target=\"_blank\" rel=\"noopener\">02. Reliability in computers<\/a><\/p>\n<p><a href=\"https:\/\/teachcomputerscience.com\/gcse\/theory\/introduction-to-computers\/\" style=\"outline: none;\" target=\"_blank\" rel=\"noopener\">01. Introduction to computers<\/a><\/p>\n<p><a href=\"https:\/\/teachcomputerscience.com\/gcse\/networking\/cloud-computing-and-web-applications\/\" style=\"outline: none;\" target=\"_blank\" rel=\"noopener\">25. Cloud computing and web applications<\/a><\/p>\n<\/td>\n<td data-th=\"Additional content\" rowspan=\"1\" colspan=\"1\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><\/p>\n\n\n<\/p><p>Congrats, you\u2019ve almost made it \u2013 you\u2019re about to get a GCSE in Computer Science! It\u2019s likely starting to dawn on you that your exams are around the corner and that you have a lot to prepare. But don\u2019t worry, help is here! We\u2019ve got all the guidance you need to get you on track to acing all of your exams! First thing\u2019s first \u2013 do you havea revision plan? If not, it\u2019s time to create a well-structured and thought out study plan. Once you have that half of the job is done. All that\u2019s left is to follow it diligently until exam day. To support you as you prepare for your GCSE Computer Science exams, here\u2019s all you have to know about them and how we can help you.<\/p><p>\n\n\n<p><\/p>\n<p><\/p>\n\n\n<\/p><p>GCSE subject content is most often quite standardised across the different examination board to give everyone an equal chance to do well and be prepared for future studies.However, there are some small and common differences between what each exam board places most weight on during exams. IGSE, in particular, is known for placing a lot of emphasis on theory. This means you should have your definitions and theories ready for exam day as you are likely to be tested on them directly (not just through context-based questions).<\/p><p>\n\n\n<p><\/p>\n<p><\/p>\n\n\n<\/p><p>\n\n\n<p><\/p>\n<p><\/p>\n\n\n<\/p><h3 class=\"wp-block-heading\"><strong>How long will the course take to complete?<\/strong><\/h3><p>\n\n\n<p><\/p>\n<p><\/p>\n\n\n<\/p><p>Most people take two years to complete the GCSE Computer Science course. But, bear in mind that it is possible to do it in less time (one academic year) or to start early and take more time (three years).<\/p><p>\n\n\n<p><\/p>\n<p><\/p>\n\n\n<\/p><h3 class=\"wp-block-heading\"><strong>Is any prior knowledge required?<\/strong><\/h3><p>\n\n\n<p><\/p>\n<p><\/p>\n\n\n<\/p><p>IGSE does not ask for any prior knowledge or course completion in order for you to take the IGCSE Computer Science course.<\/p><p>\n\n\n<p><\/p>\n<p><\/p>\n\n\n<\/p><h3 class=\"wp-block-heading\"><strong>What will I study?<\/strong><\/h3><p>\n\n\n<p><\/p>\n<p><\/p>\n\n\n<\/p><p>Throughout your Edexcel IGCSE Computer Science course you will learn about the fundamentals of algorithms; programming; fundamentals of data representation; computer systems; fundamentals of computer networks; fundamentals of cybersecurity; ethical, legal and environmental impacts of digital technology on wider society,including issues of privacy; aspects of software development; and, programming project. In addition, you\u2019ll also get to do a programming project.<\/p><p>\n\n\n<p><\/p>\n<p><\/p>\n\n\n<\/p><h3 class=\"wp-block-heading\"><strong>What is the examination process like?<\/strong><\/h3><p>\n\n\n<p><\/p>\n<p><\/p>\n\n\n<\/p><p>The examination process to get your IGCSE Computer Science certificate consists of two written papers. The first written assessment ( Principles of Computer Science) will last 2 hours and count for 50% of your final grade. The second paper (Application of Computational Thinking) will test your practical knowledge in C#, Java, or Python, and will last 3 hours. It also counts for 50% of your final mark.\u00a0<\/p><p>\n\n\n<p><\/p>\n<p><\/p>\n\n\n<\/p><h3 class=\"wp-block-heading\"><strong>Study Tips<\/strong><\/h3><p>\n\n\n<p><\/p>\n<p><\/p>\n\n\n<\/p><p>You are advised to revise for a few hours each day in order to prepare for your iGCSE Computer Science exams. Two to three hours a day would be ideal as this would give you enough time to enter deep learning without risking burnout. While you are revising computer science, you are advised to stay away from distractions on your computer during revision hours. Keep them as a treat for the end of the revision session instead and watch your productivity improve.<\/p><p>\n\n\n<p><\/p>\n<p><\/p>\n\n\n<\/p><p>Revision though, especially for a practical subject like this, is much more than just reading textbooks. One of the good ways to spend your revision time is to make mind maps and flashcards. You can not only use what you create for later revision but the very process of making it will help you retain more information! As time passes, begin to do timed practice papers by using past exam papers. Chances are, you haven\u2019t done too many exams under timed conditions yet. This is a great way to test yourself and learn how to manage your time under pressure ahead of the big day. Those of us at GCSE Computer Science are cheering for you. To help you succeed we\u2019ve got many different revision resources like mind maps, quizzes and past papers waiting for you. So let\u2019s get started!<\/p><p>\n\n\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>Edexcel IGCSE (9-1) Computer Science mapping file. Download our comprehensive teaching resources and use the mapping table to align to the Edexcel International examination board. IGCSE specification GCSE Document Reference Additional content 1 Problem Solving 1.1 1.2 Algorithms Decomposition and Abstraction 28. Problem solving and algorithm design 34. Algorithm in pseudocode 29. Linear search 30. &#8230; <\/p>\n<p class=\"read-more-container\"><a title=\"Edexcel International GCSE Computer Science Teaching Resources &#038; Lesson Plans\" class=\"read-more button\" href=\"https:\/\/teachcomputerscience.com\/igcse\/\" aria-label=\"More on Edexcel International GCSE Computer Science Teaching Resources &#038; Lesson Plans\">Read more<\/a><\/p>\n","protected":false},"author":77206,"featured_media":0,"parent":0,"menu_order":24,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_generate-full-width-content":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"tags":[],"class_list":["post-662037","page","type-page","status-publish"],"acf":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/teachcomputerscience.com\/wp-json\/wp\/v2\/pages\/662037","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/teachcomputerscience.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/teachcomputerscience.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/teachcomputerscience.com\/wp-json\/wp\/v2\/users\/77206"}],"replies":[{"embeddable":true,"href":"https:\/\/teachcomputerscience.com\/wp-json\/wp\/v2\/comments?post=662037"}],"version-history":[{"count":11,"href":"https:\/\/teachcomputerscience.com\/wp-json\/wp\/v2\/pages\/662037\/revisions"}],"predecessor-version":[{"id":662050,"href":"https:\/\/teachcomputerscience.com\/wp-json\/wp\/v2\/pages\/662037\/revisions\/662050"}],"wp:attachment":[{"href":"https:\/\/teachcomputerscience.com\/wp-json\/wp\/v2\/media?parent=662037"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/teachcomputerscience.com\/wp-json\/wp\/v2\/tags?post=662037"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}