AQA GCSE Computer Science 8525
Paper 2
Click the button to choose your topic.
3.3.1 Number bases
3.4.5 Systems architecture
3.3.2 Converting between number bases
3.5.1 Computer networks
3.3.3 Units of information
3.5.2 Network protocols
3.3.4 Binary arithmetic
3.5.3 Network security
3.3.5 Character encoding
3.5.4 The 4 layer TCP/IP model
3.3.6 Representing images
3.6.1 Fundamentals of cyber security
3.3.7 Representing sound
3.6.2 Cyber security threats
3.3.8 Data compression
3.6.3 Preventing cyber security threats
3.7.1 Relational databases
3.4.1 Hardware and software
3.4.2 Boolean logic
3.7.2 Structured query language (SQL)
3.4.3 Software classification
3.8 Ethical, legal and environmental impacts
3.4.4 Classification of programming languages
© Nichola Wilkin Ltd.
Network security
What is authentication?
Why is network security important?
Give one example of authentication
What is encryption?
Proving a user is who they say they are.
To protect data and systems from unauthorised access and attacks.
Username and password. (Other answers are also correct)
Scrambling data so only authorised users can read it.
Read the question, think of your answer then click the card to flip it and check if you're correct.
What is a MAC address?
How can security methods work together?
How does a firewall decide what to block or allow?
What is MAC address filtering?
When is encryption useful?
What is a firewall?
A unique physical address for a device’s network adapter.
Using multiple methods gives stronger protection than one alone.
Using a set of security rules.
Allowing or blocking devices based on their MAC address.
When sending data over networks like the Internet.
A security system that monitors and filters network traffic.
© Nichola Wilkin Ltd.
This is a sample only so you can see the style.
Some flashcard decks are not included in this sample.
© Nichola Wilkin Ltd.
Terms and Conditions
How you can use these flip cards (teacher licence)
- You may not use this sample resource with your own classes, it is only for review purposes.
- You can share the link with staff within your educational establishment.
Please do not share it outside your educational establishment
- Please do not send the link to other schools, teachers or individuals outside your establishment.
- Please do not upload it to the open internet or anywhere the general public can access it.
Want to recommend it to another teacher? If you think another teacher would love this, please encourage them to purchase their own copy. It is a small thing that makes a big difference to a small business and it helps me keep creating high quality resources for busy teachers.
Terms and Conditions
Read the full Terms and Conditions here: nicholawilkin.com/terms
Check out my knowledge organisers and revision lessons for even more support with your revision.
© 2026 Nichola Wilkin Ltd. All rights reserved.
AQA Flash Cards Sample
Nicky From Nichola Wilkin Ltd
Created on January 26, 2026
Start designing with a free template
Discover more than 1500 professional designs like these:
View
Create Your Story in Spanish
View
Microcourse: Key Skills for University
View
Microcourse: Learn Spanish
View
History Timeline
View
Education Timeline
View
Body Parts Game
View
Resource Bank
Explore all templates
Transcript
AQA GCSE Computer Science 8525
Paper 2
Click the button to choose your topic.
3.3.1 Number bases
3.4.5 Systems architecture
3.3.2 Converting between number bases
3.5.1 Computer networks
3.3.3 Units of information
3.5.2 Network protocols
3.3.4 Binary arithmetic
3.5.3 Network security
3.3.5 Character encoding
3.5.4 The 4 layer TCP/IP model
3.3.6 Representing images
3.6.1 Fundamentals of cyber security
3.3.7 Representing sound
3.6.2 Cyber security threats
3.3.8 Data compression
3.6.3 Preventing cyber security threats
3.7.1 Relational databases
3.4.1 Hardware and software
3.4.2 Boolean logic
3.7.2 Structured query language (SQL)
3.4.3 Software classification
3.8 Ethical, legal and environmental impacts
3.4.4 Classification of programming languages
© Nichola Wilkin Ltd.
Network security
What is authentication?
Why is network security important?
Give one example of authentication
What is encryption?
Proving a user is who they say they are.
To protect data and systems from unauthorised access and attacks.
Username and password. (Other answers are also correct)
Scrambling data so only authorised users can read it.
Read the question, think of your answer then click the card to flip it and check if you're correct.
What is a MAC address?
How can security methods work together?
How does a firewall decide what to block or allow?
What is MAC address filtering?
When is encryption useful?
What is a firewall?
A unique physical address for a device’s network adapter.
Using multiple methods gives stronger protection than one alone.
Using a set of security rules.
Allowing or blocking devices based on their MAC address.
When sending data over networks like the Internet.
A security system that monitors and filters network traffic.
© Nichola Wilkin Ltd.
This is a sample only so you can see the style.
Some flashcard decks are not included in this sample.
© Nichola Wilkin Ltd.
Terms and Conditions
How you can use these flip cards (teacher licence)
- You may not use this sample resource with your own classes, it is only for review purposes.
- You can share the link with staff within your educational establishment.
Please do not share it outside your educational establishment- Please do not send the link to other schools, teachers or individuals outside your establishment.
- Please do not upload it to the open internet or anywhere the general public can access it.
Want to recommend it to another teacher? If you think another teacher would love this, please encourage them to purchase their own copy. It is a small thing that makes a big difference to a small business and it helps me keep creating high quality resources for busy teachers. Terms and Conditions Read the full Terms and Conditions here: nicholawilkin.com/terms Check out my knowledge organisers and revision lessons for even more support with your revision.© 2026 Nichola Wilkin Ltd. All rights reserved.