Eduqas GCSE Computer Science Guidance For Teaching
Eduqas GCSE Computer Science Guidance For Teaching
Introduction 1
Aims of the Guidance for Teaching 1
Information for teachers transitioning from the 2012 WJEC GCSE
2
Computer Science Specification
1. Topics that have been removed 2
2. Topics that include more detail 3
3. New topics 3
Guidance for Teaching 4
Component 1
1. Hardware (with lesson ideas) 5
2. Logical operations (with lesson ideas) 11
3. Communication 13
4. Organisation and structure of data 17
5. Operating Systems 21
6. Principles of Programing 22
7. Software Engineering 23
8. Program Construction 24
9. Security and data management 26
10. Ethical, legal and environmental impacts of digital technology on wider
29
society
Component 2
1. Problem solving 30
2. Algorithms and programming constructs (with lesson ideas) 31
3. Programming languages 35
4. Data structures and data type 37
5. Security and authentication 38
Non-exam assessment (NEA)
Submission date 39
Submission method 39
Practical implications of the rules of non-exam assessment
Conditions/ Resources 39
Release and practice tasks 39
Word count 40
Time arrangements 40
Non-exam assessment marking grids 42
Introduction
The WJEC Eduqas GCSE Computer Science The full set of requirements is outlined in the
qualification, submitted to Ofqual for accreditation for specification which can be accessed on the Eduqas
first teaching from September 2016, is available to: website.
• all schools and colleges in England In addition to this Guidance, support is provided in
the following ways:
• independent schools in Wales.
• Specimen assessment materials
It will be awarded for the first time in summer 2018,
using grades 9 to 1. • Face-to-face CPD events
• Examiners' reports on each question paper
Our GCSE Computer Science specification has
three components. It is designed to allow learners to • Free access to past question papers and mark
apply their knowledge of the theory of computer schemes via the secure website
science and to link this seamlessly with • Direct access to the Subject Officer
programming and computational thinking. • Free online resources
The specification builds on the reputation WJEC has • Exam Results Analysis
established with its current GCSE in Computer • Online Examination Review
Science for clear, reliable assessment supported by
straightforward, accessible guidance and
administration. We have a proven track record of
successfully providing assessment that caters for a
wide range of ability and successfully motivates
many learners towards further study in the subject.
The principal aims of the Guidance for Teaching The Guidance offers assistance to teachers with
are to offer support to teachers in their delivery of support from the Principal Examiners who
the new WJEC Eduqas GCSE in Computer highlight areas of their components as an
Science specification and offer guidance as to expansion of the information in the specification.
the requirements of the qualification and the
assessment process.
The Guidance is not intended as a
comprehensive reference, but as support for
teachers to develop stimulating and exciting
courses tailored to the needs and skills of their
own students in their particular institutions.
1
Information for teachers transitioning from the
2012 WJEC GCSE Computer Science Specification
This section details topics that have changed from the 2012 WJEC GCSE Computer
Science Specification. These changes fall into the following three categories:
Categories 1 and 2 above are not mutually exclusive; as a removed topic may have been
replaced by a different topic that covers content originally defined under a different heading,
but has been strengthened. For example IP and TCP (as separate protocols) and protocol
stacks have been removed but in their place TCP/IP and the 5 layer model have been
included.
2
2. Topics that include more detail
• Von Neumann architecture explicitly stated
• Explain the difference between RISC and CISC types of processors explicitly defined
• Decode now explicit in fetch-execute cycle
• Advantages and disadvantages of network topologies stated
• Wired and wireless communication explicit
• Protocols more explicit (Ethernet, Wi-Fi, HTTPS and email protocols (e.g.
POP3/IMAP/SMTP)
• TCP/IP packets content explicit
• Digital storage of graphics and sound explicit
• Justification of data structures explicit
• The need to design, interpret and manipulate data structures now explicit
• Role of the operating system explicit in terms of the functions it provides, e.g.
resources and interface
• Utility software now a discrete element
• Programming constructs now explicit and include counts, rogue values, sequence,
selection, iteration
• Algorithms now streamlined to ‘follow, make alterations to and write’
• Data types, constants and variables explicit in algorithms
• Scope of variables included explicitly in algorithms
• Self-documenting identifiers and annotation explicit in algorithms
• Mathematical operations included explicitly in algorithms
• Understanding the purpose of high and low level languages now explicit and
identifying where they could be used
• IDE now specified and its role in developing/debugging programs
• The marking grids for the NEA is significantly more detailed
• Cybersecurity explicit and broken into malware types, forms of attack, methods of
identifying vulnerabilities.
3. New topics
• Calculate data capacity requirements (e.g. of a file)
• Role of additional hardware (GPU, sound card etc.)
• Embedded systems
• Use XOR logical operators
• Boolean expressions, rules and identities
• Circuit switching
• TCP/IP and 5 layer model
• Calculate routing cost
• Binary addition
• Shifts
• Records
• Merge and Bubble sort
• Linear and Binary search
• Validation and authentication (security)
• Cybersecurity.
3
Guidance for Teaching
4
Component 1
1. Hardware
Architecture Describe the characteristics of Arithmetic logic unit, control unit (clock),
CPU architecture, including Von data/address/control bus within the Von
Neumann architectures. Neumann architecture.
Knowledge of the existence of the Harvard
architecture.
Identify and explain the role of Know that instructions have to be fetched
the components of the CPU in from memory, decoded within the CPU and
the fetch-decode-execute cycle. then executed.
Registers:
• Program Counter (PC) – a counter that
keeps track of the memory address of
which instruction is to be executed
next.
• Memory Address Register (MAR) – the
address in main memory that is
currently being read or written.
• Current Instruction register (CIR) – a
temporary holding area for the
instruction that has just been fetched
from memory.
Components:
• Control Unit (CU) / Clock – decodes the
program instruction in the CIR,
selecting machine resources and a
particular arithmetic operation, and
coordinates activation of those
resources.
• Arithmetic logic unit (ALU) – performs
mathematical and logical operations.
5
Clock speed
• The faster the clock speed, the faster
the computer is able to run the fetch-
decode-execute cycle and therefore
process more instructions.
• The faster the clock speed, the more
power is generally required which
creates greater requirements for heat
dissipation and can place more strain
on battery life.
• Impact on temperature can be
damaging.
Number of cores
• In a single-core CPU each instruction is
processed one after the other, whereas
in a dual-core CPU, two instructions
may be processed at the same time. In
theory, dual-core CPU should mean
that the computer can process
instructions twice as fast as a single-
core CPU.
• Performance may be affected where
one core is waiting on the result of
another and therefore cannot carry out
any more instructions, leading to the
performance being no better than a
single core processor.
• However multiple cores increase
processor cost.
Explain the difference between RISC has fewer instructions than CISC
RISC and CISC types of To perform complex tasks; RISC CPUs
processors. must combine simple operations so RISC
can be more efficient at performing
simpler tasks.
In order to handle complex instructions
CISC CPUs are physically larger to
accommodate more complex circuitry.
RISC CPUs are designed to use less
power and run cooler meaning that they
can be used in smartphones that don't
have dedicated cooling systems (like
fans).
RISC CPUs tend to be cheaper to mass
produce.
RISC CPUs run at lower clock speeds
than CISC CPUs. They can perform
simpler tasks more quickly than CISC,
but are generally not used to carry out
complex instructions.
6
Input / output Describe the use and Understand and relate the use of input
characteristics of input and devices to given contexts.
output devices.
For example:
• When typing documents, a keyboard is
the preferred device.
• For someone with a disability, such as
paralysis, a sip/puff tube may be used.
• In a noisy environment, voice input
would not be useful.
Primary storage Explain the functional Understand that all memory stores
characteristics of Random information as bits and bytes.
Access Memory (RAM), Read
RAM is a volatile memory type, which
Only Memory (ROM), flash
stores programs and data currently in use.
memory and cache memory.
ROM is non-volatile memory type, which
stores programs and data that does not
change.
Flash memory can be NAND memory.
Flash memory is used for the permanent
storage of data. This means that data is not
lost when the power is switched off.
However, the data stored in flash memory
can be changed.
Cache memory is volatile and can be used
for the temporary storage of frequently
accessed data and instructions. It consists
of a small number of store locations that
can be accessed very quickly by the CPU;
quicker than RAM.
Understand and be able to give uses for
these types of memory in different
contexts.
7
For example:
Magnetic storage:
• Media: hard disk drives
• Suitability: Backing up a home
computer system
• Capacity: 500 MB – 4 TB
• Durability:
• Portability: Yes
• Speed of access:
Optical storage:
• Media: CD/DVD/Blu-ray
• Suitability: Storing multimedia files
• Capacity: 650 MB (CD), 9GB (DVD),
50 GB (Blu-ray)
• Durability:
• Portability: Yes
• Speed of access:
Solid state:
• Media: Flash memory drives
• Suitability: Moving relatively small files
from work to home
• Capacity: 2 GB – 64 GB
• Durability:
• Portability: Yes
• Speed of access:
8
Describe data capacity and Understand data capacity in terms of the
calculate data capacity amount of data (measured in bytes) that
requirements. can be stored by a given medium.
Embedded Describe the use and give Understand that embedded systems exist
systems examples of embedded in many devices in the home and outside
systems. and that these are small, dedicated
computers. Embedded systems tend to be
stored on ROM and are permanent (except
in some cases where firmware is held on
Flash memory and can be changed).
Examples could include washing machines
(the embedded system contains the
washing programs), remote garage door
entry systems, and engine sensors.
Lesson ideas:
Use an old PC – This will take place over a number of lessons
Architecture: Sometimes the scale of the CPU and internal components can be difficult to
grasp. If you can obtain a PC which is not currently in use (most schools have to retain these
until registered as discarded) it can be interesting to pull one apart. The key points here are
to show that the CPU is a small integrated system and that RAM is separate. (Pull off the fan
and heat sink, scrape off the thermal paste and pop the CPU out – then point out that the
CPU is the tiny chip in the middle of the assembly.
Discuss that this tiny chip contains the CU, the ALU and the registers. Reinforce that the
chip contains its own memory (registers and cache) but that the RAM is separate from the
chip and this stores active programs while they are being run. This is an opportunity to
explain the concepts of the CU, ALU and the registers/RAM.
Bits and Bytes: You can explain that RAM holds data stored as bits and bytes. Explain the
concept of bits as 1 and 0 (on and off) as this is all essentially a computer can 'understand'.
Explain that different combinations of 1 and 0 can represent an infinite range of data and
that data is stored as bytes, kilobytes, megabytes etc.
Secondary Storage: There are opportunities here to discuss secondary storage drives
whilst dismantling the PC and to see how these connect to the motherboard.
Discuss the suitability of different storage types in terms of capacity, portability, durability
and speed of access.
It could be an idea to have a 'storage race' to discuss speed. Compare the transfer time of a
large (>2GB) file onto magnetic HDD vs Optical vs Flash memory. The properties of the
storage devices can be looked at here to look at capacities (e.g. the HDD will probably have
9
a high GB or TB storage range whereas a DVD would only have 4.7GB, Flash memory
would be variable but normally lie between the two).
CISC and RISC: While discussing the CPU, point out that there are different types of CPUs,
including RISC and CISC. PC, invariably use the CISC architecture, whereas mobile phones
tend to use a RISC architecture. Explain the difference between RISC and CISC instruction
sets.
Clock speed: You may also want to discuss clock speeds and that it is possible to
overclock. This allows you to explain clock speed, and issues with overclocking (relate back
to the heat sink and fan that you've already taken off the CPU).
Number of cores: Ask five students to volunteer to aid you in demonstrating the advantages
of parallel processing. Explain to the class that a task such as sorting a deck of playing cards
into order (A–K → Clubs, Diamonds, Hearts and Spades), can be completed much faster by
four people (Quad-core processor) than by a single person (Single-core processor).
Give one deck to the student representing a single-core processor and give a quarter of the
other deck to each student in the group of four representing a quad-core processor.
Both groups have to sort the deck as fast as possible
Explain to the class that large problems can be divided into smaller ones, which are then
solved concurrently and faster.
Additional hardware components: The graphics card, sound card (may be integrated) and
other can be shown in this exercise.
Embedded Systems: Point out the BIOS on the motherboard, explain that this is an
example of ROM and it stores simple start-up sequences. Go on to explain that ROMs such
as this can hold any program. Relate this to ROMs in washing machines etc. Explain that
they may not always be ROMs and are sometimes NAND memory that can contain
updateable firmware (e.g. car ECUs) that can be 'flashed' in order to update it.
10
2. Logical operations
Logical Use AND, OR, Understand the basic principles of the 4 logical operations, for
operators NOT and XOR example:
logical operators,
1 AND 0 = 0
combinations of
these, and their 1 OR 0 = 1
application in NOT 1 = 0 (or NOT 0 =1)
appropriate truth
tables to solve 1 XOR 0 = 1
problems. Use these in combination for example:
(1 AND 0) OR (1 AND 1) = 1
NOT (1 XOR 0) = 0
Boolean Simplify Boolean Use the following Boolean identities and rules:
logic expressions
using Boolean AND Form OR Form
identities and
Commutative
rules. A. B = B . A A+B=B+A
Law
Associate
(A. B) . C = A . (B . C) (A + B) + C = A + (B + C)
Law
Distributive
(A+B)+ C = (A+C).(B+C) (A + B) . C = (A . C) + (B . C)
Law
Idempotent
A.A=A A+A=A
Law
Absorption A + A. B = A
A(A+B) = A
Law A + A' B = A+B
Double
Complement x� = x
Law
11
Lesson ideas:
Logical operations - Operation chains:
First point out the difference between AND and OR in terms of a meal
'Do you want a sandwich and a drink?' differs from 'Do you want a sandwich or a drink?'
Once you have established that AND and OR are different, explain that:
1 AND 0 = 0, 0 AND 1 = 0, 1 AND 1 = 1, 0 AND 0 = 0 (explain that both must be 1 for the
result to be 1)
1 OR 0 = 1, 0 OR 1 = 1, 1 OR 1 = 1, 0 OR 0 = 0 (explain that if there is one or more 1, then
the result will be 1)
Next explain that XOR is a different operation where 'one or the other but never both' applies
and that:
1 XOR 0 = 1, 0 XOR 1 = 1, 1 XOR 1 = 0, 0 XOR 0 = 0 (explain only one 1 will give a result of
1)
Finally explain that NOT 'reverses' a result
NOT 1 = 0, NOT 0 = 1
Now try an operation chain with the class. Give a sequence of logical operations, and call
them out to the class/ write them on the board/ show on a presentation. For example start
with this chain, do not give the answers A–D:
1 OR 0 = AnswerA (1)
AnswerA AND 0 = AnswerB (0)
AnswerB XOR 0 = AnswerC (1)
NOT AnswerC = AnswerD (0)
Finally, end with a flourish (this will draw on BODMAS, which you may have to teach if they
haven't been taught it in mathematics yet).
NOT (AnswerD XOR 1) = AnswerE (1)
You can now ask the students about the result they have (this chain should have 1 as its
final result), and work through the problem. Some will have got it wrong, but working through
will help their understanding. Repeat with more chains in class, or as independent learning
tasks.
Truth tables will be the next stage once students have an appreciation of simple operations.
Explain that truth tables are shorthand for the work they have already done.
12
3. Communication
Networks Explain the characteristics of Explain the difference between a wide area
networks and the importance of (WAN) and local area networks (LAN) in terms
different network types, including of distribution. Local area being sited on a
LAN and WAN. single site and wide area being sited on
multiple sites.
Specialist hardware is used to construct
networks, such as:
Switches
• A switch analyses each packet of data and
sends it to the computer it was intended
for.
Hubs
• A hub copies all packets of data to all
devices on the network.
Routers
• A router stores the addresses of
computers on the network and transfers
data between devices.
Gateways
• A gateway joins together two networks
that use different base protocols, e.g. links
a LAN to WAN.
Bridge
• A bridge joins together two networks that
use the same base protocols, e.g. links
LAN to LAN.
Other types of network are Personal Area
Networks (PAN) (very small area),
Metropolitan area networks (MAN) (within a
metropolitan district) and Virtual Private
Networks (VPN) (allows people to log into a
network remotely and access its resources,
which is an implementation of a WAN).
Describe the importance of common Understand the configuration and describe the
network topologies, including ring, importance of:
star, bus and mesh, and their
Ring – where each node connects to exactly
advantages and disadvantages.
two other nodes, providing a single pathway
for signals through each node. High transfer
speeds but can fail if one node fails.
Bus - in which nodes are directly connected to
a common linear cable (or bus). Cheap and
easy to set up but can be slow under heavy
13
traffic (due to collisions) and a break in the
main bus will break the network.
Star – Where one or more central switch, hub
or computer acts as a central conduit to
transmit messages. Very reliable and high
data transfer speeds are possible (fewer
collisions) and easy to identify faults. Can be
expensive to set up as switches and cabling
expensive, if main switch fails, the network
fails and bottlenecking can occur if too much
data is passing through the central switch.
Mesh - each node relays data for the network.
All mesh nodes cooperate in the distribution of
data in the network. This is very reliable and a
network can 'self-heal' by reconfiguring itself
around broken paths. A network is complex,
expensive and difficult to set up. A large part
of the network may be redundant.
Explain and give advantages and Understand that circuit switching was a
disadvantages of circuit switching globally accepted standard until superseded
and packet switching. by packet switching.
Circuit switching requires a series of
connections to be made to form a single route
and that all data traverses the same route.
This is susceptible to interception and failure
as failure of any one connection results in
failure of the entire route.
Packet switching differs in that the data is
broken into packets that all traverse different
routes. The data is reassembled once it
arrives at the destination. Packet switching is
less susceptible to interception and is more
robust because if a route fails then the packet
can use an alternate route.
14
Explain the importance and the use Network protocols are vital to allow computers
of a range of contemporary network on networks to communicate. Without shared
protocols, including Ethernet, Wi-Fi, common protocols, computers would not be
TCP/IP, HTTP, HTTPS, FTP and able to communicate.
email protocols.
There are many types of protocol:
Ethernet – wired (cable connection) protocol.
Wi-Fi – wireless, two common standards are
Bluetooth and 801.11.
TCP/IP– transmission control protocol/
internet protocol – is the basic communication
language or protocol of the Internet.
HTTP – hypertext transfer protocol – allows
webpages to be shared across different
computers and browsers.
HTTPS – A secure variant of HTTP – it works
together with another protocol, Secure
Sockets Layer (SSL), to transport data
securely.
POP3 – post office protocol 3 – is a protocol
for receiving email, in which email is received
and stored by an email server with a client
downloading messages when ready.
SMTP – simple mail transfer protocol -mail
servers use SMTP to send and receive mail
messages, mail applications typically use
SMTP only for sending messages to a mail
server.
IMAP – internet message access protocol -
transfers emails between computer systems
via the internet. The IMAP protocol however is
generally used for email retrieval and storage
as an alternative to POP.
Describe the typical contents of a The typical contents of a TCP/IP packet are:
TCP/IP packet.
• The source address
• The destination address
• Information which enables the data to be
reassembled into its original form
• Other tracking information
• The data itself
• A checksum that checks that the data has not
been corrupted
15
Explain the importance of layers and The TCP/IP protocol, on which the Internet is
the TCP/IP 5-layer model. built, is not a single protocol but rather an
entire suite of related protocols.
The 5 layers of the TCP/IP model are:
• Application
• Transport
• Network
• Data link
• Physical
5 Application Layer
Generates the data and
Host A Host B
The Application layer is the group of applications requiring requests connections
network communications Web Web
Browser Server
4 Transport Layer (TCP/UDP)
Establishes connections
The Transport layer establishes the connection between
with remote host
applications on different hosts.
3 Network Layer (IP)
Transfers packets with
The Network layer is responsible for creating the frames that virtual (IP) addresses
move across the network.
2 Data Link Layer (MAC)
Transfers frames with
The Data Link layer is responsible for creating the frames that physical (MAC)
move across the network. addresses
1 Physical Layer
Transmits and receives data
The Physical layer is the transceiver that drives the signals on
the network.
Describe methods of routing traffic Understand that during routing, networks will
on a network and calculate routing search for the shortest path and the fastest
costs. nodes to transfer data. Together the path
between nodes and the speed of the nodes
are assessed by the device transmitting data.
Computers will look for the route with the
lowest cost (that is the shortest path and
fastest nodes) and transmit data via this
lowest cost route.
Internet Explain how Domain Name System Understand how DNS servers are used to
(DNS) servers and Internet Protocol resolve web addresses into IP addresses.
(IP) addresses work.
Understand that IP addresses are difficult to
remember compared to web addresses and
that this is why DNS is vital to the ease of use
of web addresses.
16
4. Organisation and structure of data
Use arithmetic shift functions Understand the effect of shifts both left
and explain their effect. and right.
Left shift
e.g. for the number 0011002 (1210)
a shift one place to the left would give
0110002 = 2410
Which is equivalent to multiplying by 2
a shift two places to the left would give
1100002 = 48 10
Which is equivalent to multiplying by 4
Right shift
e.g. for the number 0011002 (1210)
a shift one place to the left would give
0001102 = 610
Which is equivalent to dividing by 2
a shift two places to the left would give
0000112 = 310
Which is equivalent to dividing by 4
17
overflow. number that is too large to fit in the space
available then an overflow has occurred.
For example if we tried to store the
addition of the following two 8 bit
numbers in an 8 bit register.
11011011
11111011 +
111010110
The answer is too large to fit into the
register (it is 9 bits in length). Where this
happens, an overflow is said to have
occurred.
Representation of Explain the digital storage of Understand that both raster and vector
graphics and sound graphics. graphics can be stored on a computer.
Understand that raster graphics are dot
matrix data structures representing a grid
of pixels and cannot scale up without loss
of apparent quality. They tend to be large
in terms of the memory required to store
them.
A bitmap image is a type of raster image
and is composed of many tiny parts,
called pixels, which are often many
different colours. It is possible to edit
each individual pixel.
Vector graphics use geometrically
primitive objects (geometric primitives)
such as points, lines, curves, and shapes
or polygons which are based on
mathematical expressions to represent
images. Vector graphics can be scaled
up without loss of apparent quality. They
are smaller than bitmap graphics in terms
of the memory required to store them.
18
Describe the use of metadata Understand and be able to give examples
in files. of the types of metadata that are stored
with files e.g. location, date etc. within an
image or in a sound file, the file or artist,
recording date, song title etc.
Data types Describe the concept of data Integer (whole number) 7, 0, 15, -5
types, including integer,
Boolean (true/false)
Boolean, real, character and
string. Real (number with, or without, fraction)
7.2, 8.9, -6.8, 12.0
Character (single character) a, @, #, 8, Q
String (one or more character) Hello, abc,
b, Y
Data structures Describe, design, interpret Describe relates to being able to describe
and manipulate data and identify a data structure (for instance
structures including records, drawing a representation of a one-
one-dimensional and two- dimensional array or a two-dimensional
dimensional arrays. array).
Design relates to being able to design an
array or record that would be suitable for
a particular purpose (e.g. to design an
array suitable for storing sales data over
a time period).
Interpret relates to being able to utilise a
data structure to select data or to convert
a graphical representation of an array to
a programmed form or vice versa.
Manipulate relates to adding, deleting
and editing data within an array or record.
19
Select, identify and justify This relates to selecting a correct data
appropriate data structures structure for a given situation (e.g. to
for given situations. design an array suitable for storing sales
data over a time period) or to identify the
most appropriate data structure from a
selection of data structures, in each case
being able to justify why the data type is
suitable.
File design Design files and records As above, but in relation to files and
appropriate for a particular records.
application.
Lesson ideas:
Explaining bases
'Back to basics' – Many students will have forgotten that they learned to count in base 10,
and will simply accept 'that's the way it is'.
You may want to start with the line:
'There are 10 types of people in the world, those who understand binary and those who
don't' – leave it on the screen/board during the lesson. Tell the students that this is a fact,
and they will hopefully be intrigued, or point out that it makes no sense.
Remind students that in primary school they will have written 'Hundreds, Tens and Units'
above numbers that they were going to use in maths problems. Explain that by using this
system, and 10 numbers (0-9) they had the building blocks to construct any number.
Now ask them what if they'd only had two numbers, 1 and 0. Could they then represent any
number? Ask for the largest number that they could represent using just two digits. They will
say '11' (unless they already understand binary).
Go on to explain that binary is a different base system. And rather than columns with
'thousands, hundreds, tens, units' the columns are divided …128, 64, 32, 16, 8, 4, 2, 1, and
that with this system, any number can be represented.
Explain that binary as a system produces very long numbers that are difficult to handle and
that although denary can be used as shorthand, a better system is to use base 16
(hexadecimal). Explain that we need 0-9, and some extra digits A-F, and that columns are in
the order …256, 16, 1
Refer back to the 'There are 10 types of people in the world, those who understand binary
and those who don't'
20
5. Operating Systems
Managing Describe the purpose and The O/S manages resources, such as:
resources functionality of the operating
• Manages peripherals such as input
system in managing
and output devices
resources, including
peripherals, processes, • Manages printing using spooling
memory and backing store. • Manages backing store
• File compression
• Disk de-fragmentation
• Manages memory (RAM)
• Manages processes
• Manages security
Providing an Describe the purpose and The O/S provides an interface by:
interface functionality of the operating
• Provides a graphical user interface
system in providing a user
(windows, icons, menus, pointers)
interface.
• Provide a command line interface
• Allowing users to
copy/delete/move/sort/search a file or
folders
• Access system settings such as
hardware.
• Allows users to have more than one
window open
• Provides user with errors/help
messages.
• Allows customisation of interface, e.g.
change desktop background/layout
• Allows user to switch between tasks
(programs/windows)
Utility software Explain the purpose and Explain the purpose and functionality of
functionality of a range of utility software, such as:
utility software.
• Virus scanning
• Firewall
• Defragmentation
• Compression
• System monitoring
• Task management
• Disc scanning and repair
• System backup
21
6. Principles of Programming
Levels of computer Describe the characteristics Low level programming languages do not
language and purpose of high-level and resemble natural languages, such as
low-level languages. English or Welsh. They are made up
entirely of bit patterns (instructions or
data) that can be executed directly by the
CPU.
A high level language is a programming
language that allows code to be written
which is similar to a natural human
language, such as English. Some
programmers prefer to use high level
programming languages as they are
easier to understand, learn and program
as commands are more English-like and
identifiers can be long and meaningful.
High level programming languages also
allow the use of powerful commands that
perform quite complex tasks such as
MsgBox in Visual Basic or the SORT
clause in COBOL.
Identify and describe situations Low level language are useful when
that require the use of a high- speed of execution is critical or when
level or a low-level language. writing software which interfaces directly
with the hardware, e.g. device drivers.
High level languages are used when the
execution speed is not critical, e.g. in
common productivity applications, such
as a word processor.
22
7. Software Engineering
Software tools Explain the role of Integrated Understand the ways in which the IDE
Development Environment assists in the development and
(IDE) tools in developing and debugging of programs including:
debugging programs.
• Editor
• Compiler
• Interpreter
• Linker
• Loader
• Debugger
• Trace
• Break point
• Variable watch
• Memory inspector
• Error diagnostics
23
8. Program Construction
24
Code generation:
• Machine code is generated.
Code optimisation:
• Code optimisation may be
employed to make it more
efficient/faster/less resource
intense.
25
9. Security and data management
Data security Describe the dangers that can An awareness of the risks to data held
arise from the use of on personal computers. Risks of
computers to store personal hacking, loss to viruses, technical
data. breakdown, interception, physical theft
and data theft from discarded
components.
Data management Explain the need for file Understand that backups protect data
backups and generations of following primary data loss.
files. Generations of files, e.g. the
grandfather-father-son regime, allows
data to be restored to a previous
version following catastrophic data loss.
Explain the need for archiving Archiving is the process of storing data
files. which is no longer in current or frequent
use. It is held for security, legal or
historical reasons.
Compression Explain how lossy and lossless Understand that compression reduces
data compression algorithms file size in memory terms.
are used.
Lossy compression results in reduction
of data quality following compression.
Lossless compression results in no loss
of data quality following compression.
26
the dangers that can arise • Antivirus software
from the use of networks. • Firewalls
• Two-factor authentication
• Access levels
• Passwords
Description of the dangers that can
arise from the use of networks, such as:
• Risks of hacking
• Risks of viruses
• Technical breakdown
• Interception.
27
Describe the different forms of Technical weakness:
attack based on technical
• Infection by any of the programs
weaknesses and/or user
above.
behaviour.
• SQL injection
• DoS attack.
• Password-based attack.
• IP address spoofing.
User behaviour
• Social engineering.
• Phishing.
28
Cookies can be seen as a security
issue as they hold personal information
and this can be used or sold and
tracking cookies can hold information
on the websites visited by users.
29
Component 2
1. Problem solving
30
2. Algorithms and programming constructs
31
Identify and explain Identify and explain the following in a given
constructs in object program:
orientated programs.
• superclass
• class
• object
• property
• method
• comment
Follow and make alterations Follow the flow of and dry run algorithms,
to algorithms and programs making changes to the algorithms that will
that solve problems using: affect output or repair a 'broken' algorithm.
sequence, selection and Algorithms can be of sequence, selection
iteration and iteration types and can contain input,
processing and output of values.
input, processing and output.
Variables Identify, explain and use local Identify global and local variables in
and global variables in algorithms and be able to use these
algorithms and programs. appropriately.
Understand that local variables only exist
for the lifetime of a subroutine and that the
data in those variables is only available to
the subroutine in which it is declared.
Understand that global variables exist
throughout an entire program and that the
data in those variables is available to all
routines within the entire program.
Identifiers Explain why the use of self- Understand that programs should be,
documenting identifiers and wherever possible, named sensibly so that
annotation are important in a third party can understand their purpose
programs. e.g. a variable containing a first name
should be defined as firstname
Give examples of self-
documenting identifiers and
annotation.
32
String handling Identify, explain and use String passing
routines for string handling in
Concatenation
algorithms and programs.
String comparison
Substitution
Trimming
Measuring length
Mathematical Identify, explain and apply See appendix C of specification for detail
operations computing-related of computing-related mathematical
mathematical operations in operation used. Use these within
algorithms and programs. algorithms and programs to process data.
Logical Identify, use and explain the See appendix C of specification for detail
operations logical operators AND, OR, of logical operations used. Use these
NOT and XOR in algorithms within algorithms and programs to process
and programs. data.
Searching Explain and use linear and Use linear searches and understand that
binary search algorithms. this is a simple search process where a list
is searched until the required value is
found.
Use binary search algorithms and
understand binary search as a divide and
conquer algorithm where:
The middle value in a list is inspected to
see if it matches the search value.
If the middle value is greater than the
search value, the upper half of the list is
discarded. If it is less than the search
value, the lower half is discarded.
33
This process is repeated, with the list
halving in size each time until the search
value is found.
Testing and Explain how an algorithm or Explain how an algorithm processes data
evaluation program works and evaluate to produce an outcome.
its fitness for purpose in
Compare different algorithms (e.g. is a
meeting requirements.
nested IF statement longer than a nested
loop, if so which has been programmed
more efficiently?).
Dry run algorithms using test data and
explain the outputs.
Lesson ideas:
Binary Search vs Linear search – Ask two groups of students to guess the number you're
thinking of (which is between 1 and 1000). One group should use the binary search
methodology, the others linear search. Who guesses your number first? (For added fun, do
this a number of times with different numbers, then pick 1 as your number to prove that a
binary search is not always quicker).
34
3. Programming languages
Markup languages Design, write, test and refine Understand that tags have different
HTML pages using the effects on text and be able to identify
following tags: tags that have these effects.
• HTML <html> Use the tags to mark up a document to
• Head <head> specific requirements.
• Title <title>
• Body <body>
• Headings <h1> - <h6>
• Paragraph <p>
• Italic <i>
• Bold <b>
• Centre align <center>
• Anchor <a
href=”URL”>
• Unordered List <ul>
• List Item <li>
• Blockquote <blockquote>
• Horizontal Rule <hr>
• Image <img>
and their corresponding
closures.
Object oriented Design, write, test and refine For example, candidates could be
languages Java programs within the required to:
Greenfoot environment, using
• Create a new Greenfoot world
the following skills:
• Populate a given world with one or
• Create new and extend more objects
existing classes • Edit the objects so that they turn
• Create new and edit and move randomly
existing objects • Edit the program code to make the
• Create new and edit objects move in the direction of the
existing worlds arrow keys when pressed
• Write and invoke methods • Edit the objects to detect object
• Change existing methods collision and remove these objects
• Create new and edit from the world
existing properties • Add a sound which will play when
(including public, private, objects requires it to
static, etc.) • Add objects which can receive
• Add and remove objects messages from other objects
from worlds • Edit objects so that they can change
• Use actors the image/value displayed on the
• Move objects around a Greenfoot world
world • Save completed worlds as file
• Keyboard input names stated.
• Add and play sounds
• Implement and use
35
parameter passing (by
value and by reference)
• Access one object from
another
• Implement object collision
detection
• Implement random number
generation
• Use the concept of
inheritance and
encapsulation.
Assembly language Design, write, test and refine For example, candidates could be
simple assembly programs required to design, write, test and
using the following mnemonics: refine simple assembly programs that:
• Input INP • loads register R with the contents of
• Output OUT address X
• Store STA • loads register S with the contents of
• Load LDA address Y
• Add ADD and adds the two numbers together.
• Subtract SUB
• Branch BRA
• End/Stop/Halt HLT
• Data definition DAT
36
4. Data structures and data type
Implementing data Use one-dimensional and two- Use, as appropriate, one dimensional
structures dimensional arrays, files and arrays in algorithms and programs to
records. input, store, process and output data.
Use, as appropriate, two dimensional
arrays in algorithms and programs to
input, store, process and output data.
Use, as appropriate, records in
algorithms and programs to input, store,
process and output data.
Implementing data Use a variety of data types, Use as appropriate data types to hold
types including integer, Boolean, real, data in variables/arrays/records in
character and string. algorithms and programs.
Integer (whole number) 7, 0, 15, -5
Boolean (true/false)
Real (number with, or without, fraction)
7.2, 8.9, -6.8, 12.0
Character (single character) a, @, #, 8,
Q
String (one or more character) Hello,
abc, b, Y
(May be extended practically to different
data types in programs (e.g. single,
double, char, date, decimal etc.)
Variables and Assign, identify and explain the Assign, identify and use constants in
constants use of constants and variables programs and algorithms to store data
in algorithms and programs. that does not change.
Assign, identify and use variables in
programs and algorithms to store data
that can change.
Understand where constants and
variables are appropriate and use
appropriately.
37
variable is the duration of the location
where the variable exists.
Lifetime of Global variables.
Global variables begin to exist when the
program starts.
Global variables cease to exist when
the program exits.
Lifetime of Local variables.
A local variable begins to exist when
the variable is defined within a
subroutine.
A local variable ceases to exist at the
end of the scope in which the variable
is defined (when the subroutine ends).
Security techniques Use appropriate security Use techniques that validate data
techniques, including validation (could be any of the range of validation
and authentication. checks discussed) in algorithms.
Use techniques that authenticate
information entered into an algorithm.
38
Non-exam assessment (NEA)
Submission date
The work will be submitted so that it arrives with the moderator by March 31 of the year of
academic certification. The task must be the one set by WJEC Eduqas as the task for that
academic year.
Submission method
All marks must be submitted to WJEC's Internal Assessment Mark Input System (IAMIS).
This system will automatically identify the required sample and provide the name and
address of a moderator.
Work must be submitted in electronic format. Currently this will involve copying the sample to
removable media (optical or solid state) and to send that media to the moderator's address.
Work should be arranged as described on page 17 of the specification.
Conditions/ Resources
NEA must be conducted under the conditions prescribed. That is, accounts used for the NEA
must be locked down between NEA sessions, and these accounts must have no access to
the internet or email.
No work can be brought in from outside of the NEA controlled environment. Candidates are
free to research outside of the controlled conditions, but this research should be used to
develop their skills and knowledge. No typed work, diagrams or code should be brought into
the exam. This rule is comparable to examination rules in that candidates are free to revise
to improve knowledge and skills outside of examinations, but cannot bring in any physical
work to an examination.
The time spent by candidates on the NEA must be tracked by centres and candidates must
not be permitted to exceed the 20 hours. Centres are free to choose their method of tracking
time, although there must be evidence of this. WJEC Eduqas may request this evidence at
any time.
As the task for the NEA will not be released until September of the year of award, centres will
be free to use other tasks to ensure that candidates are upskilled in preparation for the task.
This could be from specimen material or past papers.
Centres are free to issue 'practice tasks' prior to commencing the NEA to facilitate skill
building. However these tasks must not be drawn directly from the released task.
39
Word count
The 2000 word limit relates to the report that is supplied with the programmed solution. This
word count does not include the program code or annotation.
Time arrangements
The time permitted for the NEA is 20 hours. Clearly, it is impossible for candidates to work
for 20 hours in a single sitting and therefore it is at the discretion of the centre of how to
arrange this time.
The approaches below are valid; however centres may choose different methods.
This would involve candidates working over a single week (say, for 2 x 2 hour sessions in a
single day) and to produce the entire task over this time.
• The task is completed in a short period of time and this may improve manageability in
terms of continuity
• Less susceptible to impact of learner absence
• The 'full immersion' achieved by this approach will result in focused, continuous work
• Students may research as homework nightly and this will be fresh in their memory on
commencement of the next day's tasks
• Tracking of time spent is simple.
• Is highly reliant on all skills for the task having been taught prior to commencement of
the task and is reliant on candidates remembering a large number of concepts
• Requires curriculum rearrangement
• Unforgiving if candidates become stuck on an individual area, as they will not be able
to research and return to the task until they are released from the controlled
conditions
• Inflexible if an individual candidate is absent during the task week
This approach would involve setting aside time within the curriculum for candidates and all
work would be conducted during these sessions. (Sessions of say, blocks of 2 hours each
week are run over a 10 week period).
• The task is completed in a defined time period and this may improve manageability in
terms of tracking of time
• Skills for different sections can be taught discretely in lessons between test sessions
• Candidates may research as homework in the time between tasks.
40
Disadvantages of this method
This would involve teaching skills relevant to the task and then switching to NEA conditions
once candidates had been taught. For example, teaching the concepts of analysis for 30
minutes then switching to controlled conditions for the next 30 minutes once candidates had
been taught the concepts required to tackle the task.
The lessons tasks must not be drawn directly from the released task, and only the skills
required should be taught prior to commencement of the NEA.
• Difficult to track time, as the time candidates are active on the NEA must be tracked
in terms of the minutes spent (as the time on task may be a subset of a lesson (e.g.
30 minutes)
• The methodology can result in candidates relying on short term memory which will
impact their understanding
• Fragmented delivery will impact candidates being able to see the bigger picture in the
development of the project which may result in weaker or disjointed planning,
implementation and evaluations.
41
Non-exam assessment marking grids
Given Task
The task for Component 3 will be a set scenario that will be available for completion in the
academic year of certification. A different scenario will be set for each academic year. All
work carried out for this task should be under teacher supervision, with no access to the
Internet or email. The time permitted for this task is 20 hours, and all time spent on the task
should be monitored and logged by the centre as detailed in this specification.
The scenario will provide candidates with a description of a client’s need for a new computer
based solution to a given problem. In addition to a functional computer program, candidates
will need to produce a word processed report with an advisory limit of 2000 words. The
areas for inclusion in the report are covered in detail in the content for this component and
are summarised below:
Section 1 – Scope of the problem
• Description of the given scenario in terms of input, processing and output
• Objectives, including measurable success criteria for the proposed system.
Section 2 – Design
Descriptions of:
• Input and output facilities required to produce a user interface
• Data structures that will be required
• Documentation of the following routines using a standard convention (pseudo code
or flowchart):
o validation routines
o data handling and processing
o authentication
Section 3 – Software development
• Annotated listing(s) of all programming code
• Evidence of the user interface
Section 4 – Test strategy
• Description of the test strategy
• Description of the purpose of unit, integration and functional testing
• Test plan and test data
Section 5 – Testing
• Evidence of test outcomes with commentaries
Section 6 – Further development
• Discussion of the outcomes of the testing
• Description of the successful features of the solution and identification of areas for
further development
• Suggestions for extensions to the solution
The Refinement Log
The refinement log is an integral part of the project and should be completed during each
session. The purpose of the log is for candidates to demonstrate that they are working in a
logical and systematic manner.
Candidates are expected to record any issues encountered and how these issues were
addressed.
42
The refinement log is supplied as an electronic document and must be submitted with the
computer program and the report.
A sample log page is shown on page 23 of the specification.
The marking grids should be used in conjunction with the advice given on page 24 of the
specification. The NEA marking grids in the specification are designed in a vertical
hierarchical table structure, however, in practice, these grids are easier to use in a horizontal
format, as it is easier to compare the outcomes in the grids in this format. Below, the grids
have been transferred to such a format to facilitate easier use.
43
Scope of the problem - AO3.1
Max 8 marks
Band 0 Band 1 Band 2 Band 3 Band 4
0 marks 1 - 2 marks 3 – 4 marks 5 - 6 marks 7 - 8 marks
Response not credit worthy The candidate has: The candidate has: The candidate has: The candidate has:
or not attempted • Carried out a superficial • Carried out an analysis • Completed an analysis • Completed a thorough
analysis of the given of the given scenario, of the given scenario, analysis of the given
scenario that has only identifying the basic: with no significant scenario identifying all:
partially identified the omissions, identifying
input, processes and most of the:
output required to o data required to create a o data required to create a o data required to create
produce a working working solution functional solution an effective solution
solution o processing requirements o processing to be carried o processing to be carried
to produce a working out by the solution out by the solution
• Put forward objectives solution o required outputs from o required outputs from
for the solution in terms o outputs from the solution the solution the solution
of tasks to be carried
out. Not all objectives • Set objectives, a • Put forward objectives, • Produced a detailed set
are measureable or minority of which are most of which are of objective, that are
appropriate to the measurable, that measurable, that define measurable, that define
solution describe the main tasks the tasks to be carried clearly the tasks
required to create a out by the proposed required to create
working solution solution effective and fully
functional solution
44
Design - AO3.2a
Max 12 marks
Band 0 Band 1 Band 2 Band 3 Band 4
0 marks 1 - 3 marks 4 - 6 marks 7 - 9 marks 10 - 12 marks
Response not credit worthy The candidate has: The candidate has: The candidate has: The candidate has:
or not attempted • Used the objectives • Used the objectives for the • Used the objectives for the • Produced a comprehensive
for the solution as a solution as a basis for the solution to inform a design design that would allow a
basis for an outline design that will produce a that will produce the competent third party to create
design for a partial solution that will achieve a facilities required to ensure a solution that covers all stated
solution majority of the required that the solution is objectives
• Produced outline functionality functional • Identified fully and described in
designs for the • Identified the basic input • Identified and described detail the input and output
identified input and and output facilities to be most of the input and facilities to be provided by the
output facilities provided by the user output facilities to be user interface which will be fit
provided by the user interface provided by the user for purpose
interface • Identified the data interface and has • Described all data structures
• Outlined the key files structures required to considered the needs of required to create an effective
and/or data structures produce a solution that is the user solution, using correct technical
required to produce a partially functional but • Described most data terminology
partial solution carries out the basic structures required using • Described fully the validation
• Given consideration requirements of the given appropriate terminology routines required to ensure that
to possible validation scenario • Identified most inputs that only appropriate data can be
of input data, which • Identified several inputs will require validation and entered into the solution
may not be accurate that will require validation outlined proposals for • Considered fully the need for
or appropriate • Outlined the need for implementing validation authentication
• Partially outlined authentication processes routines • Described all processing
processing routines • Described the basic • Considered the need for routines for an effective
that may use a processing routines for the authentication routines solution as algorithms using a
standard convention solution as algorithms • Described most processing standard convention such as
such as pseudo code using a standard routines for the solution as pseudo code or flowcharts
or flowcharts. The convention such as algorithms using a
descriptions may not pseudo code or flowcharts. standard convention such
be accurate or Some routines may be as pseudo code or
correct. incorrect or incomplete. flowcharts
45
Refinement Log - AO3.2c
Max 5 marks
Band 0 Band 1 Band 2 Band 3
0 marks 1 mark 2 - 3 marks 4 - 5 marks
Response not credit worthy or not The candidate has: The candidate has: The candidate has:
attempted • Outlined the progress made in • Demonstrated a structured • Demonstrated a structured
most sessions approach to developing the approach to developing the
• Described problems solution solution
encountered but may lack the • Carried out activities in an • Carried out activities in an
use of technical terminology appropriate order appropriate order
• Outlined changes that have • Described the progress made in • Evaluated effectively the
been made to the original design each session progress made in each session
• Identified one or more activity for • Provided a description of any • Provided a full description of any
the next session problems encountered with problems encountered with good
satisfactory use of technical use of technical terminology
terminology • Justified any changes that have
• Described any changes that been made to the original design
have been made to the original demonstrating an informed
design understanding of the need for
• Produced sensible actions for change
subsequent sessions • Produced logical and prioritised
actions for subsequent sessions
46
Effectiveness of solution – AO3.2b
Max 15 Marks
Band 0 Band 1 Band 2 Band 3 Band 4 Band 5
0 Marks 1 – 3 Marks 4 – 6 Marks 7 – 9 Marks 10 – 12 Marks 13 – 15 Marks
Response not credit The candidate has The candidate has The candidate has The candidate has The candidate has
worthy or not attempted created a solution that: created a solution that: created a solution that: created a solution that created a solution that
• Partially achieves • Achieves the basic • Achieves a majority is: is:
the requirements of requirements of the of the requirements • Correct and fulfils • Correct and fulfils
the given scenario given scenario of the given most of the all the requirements
• Has a partially • Includes a basic scenario requirements of the of the given
functional user user interface that • Provides evidence given scenario scenario
interface may not be fit for of a functional user • Usable with a user • Usable with a user
purpose interface interface that is interface that is
• Includes a basic • Includes some functional and intuitive and fit for
number of elements of generally easy to audience and
elements of structured use purpose
structured programming • Structured and • Well-structured and
programming • Makes use of modular in nature modular in nature
authentication • Secure with • Efficient in use of
routines authentication resources
• Is portable routines • Secure with
• Portable and effective
generally robust authentication
routines
• Portable, reliable
and robust
47
Technical Quality – AO3.2b
Max 20 Marks
Band 0 Band 1 Band 2 Band 3 Band 4 Band 5
0 Marks 1 – 4 Marks 5 – 8 Marks 9 – 12 Marks 13 – 16 Marks 17 – 20 Marks
Response not credit The candidate has The candidate has The candidate has The candidate has The candidate has created a
worthy or not created a partial solution created a solution that created a functional created a functional successful solution that covers all
attempted to at least one of the covers the basic solution that covers the solution that covers most the requirements of the given
requirements of the requirements of the majority of the requirements of the given scenario.
given scenario. given scenario. requirements of the scenario.
given scenario. The candidate has:
The candidate has: The candidate has: The candidate has: • Written code that is self-
• Made use of • Written code that The candidate has: • Written code that is documenting, well-structured
meaningful includes some • Written code that is self-documenting and and modular in nature
identifiers self-documentation self-documenting modular in nature • Used a consistent
• Used indentation • Used appropriate • Used a consistent • Used a consistent programming style
indentation programming style programming style throughout, including
• Made use of including indentation including indentation indentation and the use of
meaningful • Made use of • Made use of white space around operators
identifiers meaningful meaningful identifiers and keywords
• Provided basic identifiers and and appropriate use • Made full use of meaningful
annotation of the appropriate use of of constants identifiers and appropriate
code constants • Made use of local use of constants
• Made use of local variables and • Created subroutines with well-
variables and minimised the use of defined interfaces
generally minimised global variables • Made effective use of local
the use of global • Produced validation variables and minimised the
variables routines and created use of global variables
• Produced validation routines for exception • Produced effective validation
routines handling routines and created routines
• Provided annotation • Provided effective for exception handling
of the code where annotation of the • Provided informed annotation
appropriate code where of the code where appropriate
appropriate
48
Test strategy - AO2.1b
Max 8 marks
Band 0 Band 1 Band 2 Band 3
0 marks 1 - 2 marks 3 - 5 marks 6 - 8 marks
Response not credit worthy or not The candidate has: The candidate has: The candidate has:
attempted • Attempted to describe of the • Considered the nature of the • Considered fully the nature of the
scope and range of the chosen solution when developing a test solution when developing a well-
test strategy strategy structured test strategy
• Identified the purpose of testing • Provided a description of the • Provided an informed description
the solution scope and range of the chosen of the scope and range of the
• Produced a test plan to carry out test strategy chosen test strategy
the testing of the solution but the • Described the purpose of unit, • Fully explained the purpose of
plan may not cover all key areas integration and functional testing, unit, integration and functional
• Identified test data to partially test taking into account the nature of testing, taking into account the
the solution the solution nature of the solution
• Considered how the outcomes of • Considered in detail how the
the testing process may be useful outcomes of the testing process
in any further development of the will be used to influence any
solution further development of the
• Produced a test plan to carry out solution
unit, integration and functional • Produced a comprehensive plan
testing of most of the for carrying out unit, integration
requirements of the given and functional testing to cover all
scenario requirements of the given
• Identified appropriate test data to scenario
test most functionality of the • Identified comprehensive test data
solution to fully test the solution
49
Testing - AO3.2c
Max 8 marks
Band 0 Band 1 Band 2 Band 3
0 marks 1 - 2 marks 3 - 5 marks 6 - 8 marks
Response not credit worthy or not The candidate has: The candidate has: The candidate has:
attempted • Made use of data to test most • Used the test plan to carry • Followed the test plan in a logical and systematic
areas of the solution that out testing of the solution manner
have been completed • Made use of realistic data to • Made effective use of typical, extreme and
• Presented testing outcomes test all areas of the solution erroneous data
with brief correct • Presented testing outcomes • Presented all testing outcomes with detailed and
commentaries with suitably technical informed commentaries
commentaries
Response not credit worthy or not The candidate has outlined: The candidate has: The candidate has:
attempted • Outcomes of the testing process • Considered the outcomes of the • Considered fully the outcomes of
• Suggestions for extension to the testing processes against the the testing process in terms of the
solution solution objectives solution objectives
• Identified successful features and • Fully described the successful
areas for further development features and areas for further
• Proposed specific suggestions for development
extensions to the solution • Proposed detailed and
comprehensive suggestions for
specific extensions to the solution
50