AQA · GCSE · 8525
AQA GCSE Computer Science (8525) — Specification (2026)
Topic-by-topic keywords, key terms and definitions for precise exam language—separate from our revision checklists (topic coverage) and formula sheets (equations).
Examiner-style keywords and definitions organised by syllabus topic. Terms are tagged Essential (start here), Core (typical exam standard), and Advanced for harder distinctions — tick each row when you can recall it. Your progress is saved in this browser for this list.
AQA GCSE Computer Science (8525)
AQA GCSE Computer Science (8525) — Specification (2026)
Topics align to AQA GCSE Computer Science (fundamentals of algorithms & programming; programming; data representation; computer systems; networks; cybersecurity; databases; ethical/legal/environmental impacts).
Mark schemes: AQA mark schemes credit correct technical terms and clear, testable statements. Use precise definitions (e.g., ‘bandwidth’, ‘latency’, ‘encryption’) and reference why a technique improves security or performance.
Active recall: 0 / 33 terms ticked
| Recalled | Topic | Level | Keyword | Definition |
|---|---|---|---|---|
| Algorithms & programming | Essential | Algorithm | A step-by-step method for solving a problem. | |
| Algorithms & programming | Core | Iteration | Repeating a section of code using a loop until a condition is met. | |
| Algorithms & programming | Core | Selection | Choosing between alternative paths using a condition (e.g., if/else). | |
| Algorithms & programming | Advanced | Trace table | A table used to track variable values step-by-step through an algorithm. | |
| Data representation | Essential | Binary | A base-2 number system using 0 and 1. | |
| Data representation | Core | Bit | A binary digit (0 or 1). | |
| Data representation | Core | Byte | A group of 8 bits. | |
| Data representation | Advanced | ASCII | A character set that represents text characters using binary codes. | |
| Networks & cybersecurity | Core | Protocol | A set of rules that devices follow to communicate on a network. | |
| Networks & cybersecurity | Core | Packet | A small unit of data sent across a network, containing data and control information. | |
| Networks & cybersecurity | Advanced | Encryption | Converting plaintext into ciphertext using a key to protect confidentiality. | |
| Networks & cybersecurity | Advanced | Authentication | Verifying the identity of a user or device (e.g., passwords, biometrics, 2FA). | |
| Networks & cybersecurity | Core | Bandwidth | The maximum data transfer capacity of a connection, often in bits per second. | |
| Networks & cybersecurity | Core | Latency | Delay between sending data and it being received. | |
| Networks & cybersecurity | Advanced | Firewall | Hardware/software that monitors and controls network traffic based on rules. | |
| Networks & cybersecurity | Advanced | Phishing | A fraudulent attempt to obtain data by pretending to be a trusted source. | |
| Computer systems | Essential | CPU | Central processing unit: executes instructions and processes data. | |
| Computer systems | Core | Fetch–decode–execute cycle | Process where the CPU fetches an instruction, decodes it, then executes it. | |
| Computer systems | Core | RAM | Random access memory: temporary working memory used by running programs. | |
| Computer systems | Core | ROM | Read-only memory: stores firmware/boot instructions. | |
| Computer systems | Core | Operating system | System software that manages hardware, files, memory, and provides a user interface. | |
| Computer systems | Advanced | Embedded system | A dedicated computer system built into a device to perform a specific function. | |
| Data & databases | Core | Data type | A classification of data (e.g., integer, real, Boolean, string). | |
| Data & databases | Core | Validation | Checking data is reasonable/acceptable (e.g., range check) before processing. | |
| Data & databases | Core | Database | An organised collection of data that can be searched, sorted, and updated. | |
| Data & databases | Core | Primary key | A field that uniquely identifies a record in a table. | |
| Data & databases | Advanced | SQL | Structured Query Language used to query and manipulate relational databases. | |
| Data & databases | Advanced | Normalisation | Structuring a database to reduce duplication and improve data integrity. | |
| Ethical, legal & environmental impacts | Core | Copyright | Legal right that protects original creative work from unauthorised use. | |
| Ethical, legal & environmental impacts | Core | Open source | Software with source code that can be inspected, modified, and shared. | |
| Ethical, legal & environmental impacts | Core | Data privacy | Protecting personal data from misuse or unauthorised access. | |
| Ethical, legal & environmental impacts | Advanced | Digital divide | Gap between those with access to technology and those without. | |
| Ethical, legal & environmental impacts | Advanced | E-waste | Discarded electronic devices and components that require safe disposal/recycling. |
Pair this with our revision checklists, formula sheets hub and past paper finder.