Algorithm Basics (Cambridge (CIE) A Level Computer Science) : Revision Note

Robert Hampton

Written by: Robert Hampton

Reviewed by: James Woodhouse

Updated on

Definition of algorithm

What is an algorithm?

  • An algorithm is a solution to a problem expressed as a sequence of defined steps

  • Methods of writing an algorithm before attempting to program a solution include:

    • Structured English

    • Pseudocode

    • Flowcharts

Structured English

  • Structured English is a human-readable method for describing algorithms using a combination of natural English language and programming logic

    • It uses clear English phrases to describe each step

    • Logic structures like IF...THEN, REPEAT, and WHILE may appear, but without strict syntax rules

    • Often used in the early planning stages before converting to pseudocode

Ask the user to enter their age
If the age is 18 or over
→ Display a welcome message
Otherwise
→ Display an access denied message

Pseudocode

  • Pseudocode is a precise, structured, and language-independent way of describing an algorithm that resembles a programming language

  • It follows specific exam-board-defined syntax

    • It includes formal elements like IF, THEN, ELSE, WHILE, REPEAT, DECLARE, and for assignment

    • Students must follow CIE’s pseudocode format in exams

INPUT Age
IF Age >= 18 THEN
    OUTPUT "Welcome to the site"
ELSE
    OUTPUT "Sorry, this site is for users 18 and over"
ENDIF

Flowcharts

  • Flowcharts are a visual tool that uses shapes to represent different functions to describe an algorithm

  • Used to visualise the flow of control in a system

  • Standard symbols include:

    • Oval for Start/End

    • Parallelogram for Input/Output

    • Rectangle for Processes

    • Diamond for Decisions

  • Arrows show the sequence of operations

flow-chart-symbols

Identifier tables

What is an identifier table?

  • An identifier table is used when writing pseudocode to keep track of all the identifier names used in an algorithm

  • An identifier is the name given to a variable, constant, array, procedure, or any other named element in the pseudocode

Why use an identifier table?

  • It helps you stay organised when designing an algorithm

  • Ensures consistent naming

  • Makes it easier to understand what each identifier stores or does

  • Useful in exam questions when you are asked to declare variables clearly

Identifier naming rules

  • Must start with a letter (A–Z or a–z)

  • Can include letters, digits (0–9), and underscores (_)

  • Accented characters and symbols are not allowed

  • Identifiers are case insensitive (e.g. Total and total are treated the same)

Identifier

Description

StudentName

Stores a student’s full name

TestScore

Holds a test score value

MAX_SCORE

Maximum score allowed

FormList

Stores names in a form group

You've read 0 of your 5 free revision notes this week

Unlock more, it's free!

Join the 100,000+ Students that ❤️ Save My Exams

the (exam) results speak for themselves:

Did this page help you?

Robert Hampton

Author: Robert Hampton

Expertise: Computer Science Content Creator

Rob has over 16 years' experience teaching Computer Science and ICT at KS3 & GCSE levels. Rob has demonstrated strong leadership as Head of Department since 2012 and previously supported teacher development as a Specialist Leader of Education, empowering departments to excel in Computer Science. Beyond his tech expertise, Robert embraces the virtual world as an avid gamer, conquering digital battlefields when he's not coding.

James Woodhouse

Reviewer: James Woodhouse

Expertise: Computer Science Lead

James graduated from the University of Sunderland with a degree in ICT and Computing education. He has over 14 years of experience both teaching and leading in Computer Science, specialising in teaching GCSE and A-level. James has held various leadership roles, including Head of Computer Science and coordinator positions for Key Stage 3 and Key Stage 4. James has a keen interest in networking security and technologies aimed at preventing security breaches.