IB Computer Science HL standards: Difference between revisions

From Computer Science Wiki
No edit summary
No edit summary
Line 8: Line 8:
|-
|-
! Assessment Statement  !! Big Idea
! Assessment Statement  !! Big Idea
 
|  colspan="2" | System fundamentals
|Identify the context for which a new system is planned.||
|-
|Describe the need for change management.||
|-
|Outline compatibility issues resulting from situations including legacy systems or business mergers.||
|-
|Compare the implementation of systems using a client’s hardware with hosting systems remotely.||
|-
|Evaluate alternative installation processes.||
|-
|Discuss problems that may arise as a part of data migration.||
|-
|Suggest various types of testing.||
|-
|Describe the importance of user documentation.||
|-
|Evaluate different methods of providing user documentation.||
|-
|Evaluate different methods of delivering user training.||
|-
|Identify a range of causes of data loss.||
|-
|Outline the consequences of data loss in a specified situation.||
|-
|Describe a range of methods that can be used to prevent data loss.||
|-
|Describe strategies for managing releases and updates.||
|-
|Define the terms: hardware, software, peripheral, network, human resources.||
|-
|Describe the roles that a computer can take in a networked world.||
|-
|Discuss the social and ethical issues associated with a networked world.||
|-
|Identify the relevant stakeholders when planning a new system.||
|-
|Describe methods of obtaining requirements from stakeholders.||
|-
|Describe appropriate techniques for gathering the information needed to arrive at a workable solution.||
|-
|Construct suitable representations to illustrate system requirements.||
|-
|Describe the purpose of prototypes to demonstrate the proposed system to the client.||
|-
|Discuss the importance of iteration during the design process.||
|-
|Explain the possible consequences of failing to involve the end-user in the design process.||
|-
|Discuss the social and ethical issues associated with the introduction of new IT systems.||
|-
|Define the term usability.||
|-
|Identify a range of usability problems with commonly used digital devices.||
|-
|Identify methods that can be used to improve the accessibility of systems.||
|-
|Identify a range of usability problems that can occur in a system.||
|-
|Discuss the moral, ethical, social, economic and environmental implications of the interaction between humans and machines.||
|-
|  colspan="2" | Computer Organization
|-
|Outline the architecture and function of the CPU, ALU, CU and the registers within the CPU||
|-
|Explain the use of cache memory.||
|-
|Explain the machine instruction cycle.||
|-
|Identify the need for persistent storage.||
|-
|Describe the main functions of an operating system.||
|-
|Outline the use of a range of application software.||
|-
|Identify common features of applications.||
|-
|Define the terms: bit, byte, binary, denary/decimal, hexadecimal.||
|-
|Outline the way in which data is represented in the computer.||
|-
|Define the Boolean operators: AND, OR, NOT, NAND, NOR and XOR.||
|-
|Construct truth tables using the above operators.||
|-
|Construct a logic diagram using AND, OR, NOT, NAND, NOR and XOR gates.||
|-
| colspan="2" | Networks
|-
|Identify different types of networks.||
|-
|Outline the importance of standards in the construction of networks.||
|-
|Describe how communication over networks is broken down into different layers.||
|-
|Identify the technologies required to provide a VPN.||
|-
|Evaluate the use of a VPN.||
|-
|Define the terms: protocol, data packet.||
|-
|Explain why protocols are necessary.||
|-
|Explain why the speed of data transmission across a network can vary.||
|-
|Explain why compression of data is often necessary when transmitting across a network.||
|-
|Outline the characteristics of different transmission media.||
|-
|Explain how data is transmitted by packet switching.||
|-
|Outline the advantages and disadvantages of wireless networks.||
|-
|Describe the hardware and software components of a wireless network.||
|-
|Describe the characteristics of wireless networks.||
|-
|Describe the different methods of network security.||
|-
|Evaluate the advantages and disadvantages of each method of network security.||
|-
| colspan="2" | Computational thinking, problem-solving and programming
|-
|Identify the procedure appropriate to solving a problem.||
|-
|Evaluate whether the order in which activities are undertaken will result in the required outcome.||
|-
|Explain the role of sub-procedures in solving a problem.||
|-
|Identify when decision-making is required in a specified situation.||
|-
|Identify the decisions required for the solution to a specified problem.||
|-
|Identify the condition associated with a given decision in a specified problem.||
|-
|Explain the relationship between the decisions and conditions of a system.||
|-
|Deduce logical rules for real-world situations.||
|-
|Identify the inputs and outputs required in a solution.||
|-
|Identify pre-planning in a suggested problem and solution.||
|-
|Explain the need for pre-conditions when executing an algorithm.||
|-
|Outline the pre- and post-conditions to a specified problem.||
|-
|Identify exceptions that need to be considered in a specified problem solution.||
|-
|Identify the parts of a solution that could be implemented concurrently.||
|-
|Describe how concurrent processing can be used to solve a problem.||
|-
|Evaluate the decision to use concurrent processing in solving a problem.||
|-
|Identify examples of abstraction.||
|-
|Explain why abstraction is required in the derivation of computational solutions for a specified situation.||
|-
|Construct an abstraction from a specified situation.||
|-
|Distinguish between a real-world entity and its abstraction.||
|-
|Describe the characteristics of standard algorithms on linear arrays.||
|-
|Outline the standard operations of collections.||
|-
|Discuss an algorithm to solve a specific problem.||
|-
|Analyse an algorithm presented as a flow chart.||
|-
|Analyse an algorithm presented as pseudocode.||
|-
|Construct pseudocode to represent an algorithm.||
|-
|Suggest suitable algorithms to solve a specific problem.||
|-
|Deduce the efficiency of an algorithm in the context of its use.||
|-
|Determine the number of times a step in an algorithm will be performed for given input data.||
|-
|State the fundamental operations of a computer.||
|-
|Distinguish between fundamental and compound operations of a computer.||
|-
|Explain the essential features of a computer language.||
|-
|Explain the need for higher level languages.||
|-
|Outline the need for a translation process from a higher level language to machine executable code.||
|-
|Define the terms: variable, constant, operator, object.||
|-
|Define common operators.||
|-
|Analyse the use of variables, constants and operators in algorithms.||
|-
|Construct algorithms using loops, branching.||
|-
|Describe the characteristics and applications of a collection.||
|-
|Construct algorithms using the access methods of a collection.||
|-
|Discuss the need for sub-programmes and collections within programmed solutions.||
|-
|Construct algorithms using pre- defined sub-programmes, one- dimensional arrays and/or collections.||
|-
| colspan="2" | Abstract Data Structures
|-
|Identify a situation that requires the use of recursive thinking.||
|-
|Identify recursive thinking in a specified problem solution.||
|-
|Trace a recursive algorithm to express a solution to a problem.||
|-
|Describe the characteristics of a two- dimensional array.||
|-
|Construct algorithms using two- dimensional arrays.||
|-
|Describe the characteristics and applications of a stack.||
|-
|Construct algorithms using the access methods of a stack.||
|-
|Describe the characteristics and applications of a queue.||
|-
|Construct algorithms using the access methods of a queue.||
|-
|Explain the use of arrays as static stacks and queues.||
|-
|Describe the features and characteristics of a dynamic data structure.||
|-
|Describe how linked lists operate logically.||
|-
|Sketch linked lists (single, double and circular).||
|-
|Describe how trees operate logically (both binary and non-binary).||
|-
|Define the terms: parent, left-child, right-child, subtree, root and leaf.||
|-
|State the result of inorder, postorder and preorder tree traversal.||
|-
|Sketch binary trees.||
|-
|Define the term dynamic data structure.||
|-
|Compare the use of static and dynamic data structures.||
|-
|Suggest a suitable structure for a given situation.||
|-
| colspan="2" |Resource Management
|-
|Identify the resources that need to be managed within a computer system.||
|-
|Evaluate the resources available in a variety of computer systems.||
|-
|Identify the limitations of a range of resources in a specified computer system.||
|-
|Describe the possible problems resulting from the limitations in the resources in a computer system.||
|-
|Explain the role of the operating system in terms of managing memory, peripherals and hardware interfaces.||
|-
|Outline OS resource management techniques: scheduling, policies, multitasking, virtual memory, paging, interrupt, polling.||
|-
|Discuss the advantages of producing a dedicated operating system for a device.||
|-
|Outline how an operating system hides the complexity of the hardware from users and applications.||
|-
| colspan="2" | Control
|-
|Discuss a range of control systems.||
|-
|Outline the uses of microprocessors and sensor input in control systems.||
|-
|Evaluate different input devices for the collection of data in specified situations.||
|-
|Explain the relationship between a sensor, the processor and an output transducer.||
|-
|Describe the role of feedback in a control system.||
|-
|Discuss the social impacts and ethical considerations associated with the use of embedded systems.||
|-
|Compare a centrally controlled system with a distributed system.||
|-
|Outline the role of autonomous agents acting within a larger system.||
|-
| colspan="2" | Web science
|-
|Distinguish between the internet and World Wide Web (web).||
|-
|Describe how the web is constantly evolving.||
|-
|Identify the characteristics of the following: HTTP, HTTPS, HTML, URL, XML, XSLT, CSS.||
|-
|Identify the characteristics of a uniform resource identifier (URI) URL.||
|-
|Describe the purpose of a URL.||
|-
|Describe how a domain name server functions.||
|-
|Identify the characteristics of the internet protocol (IP) transmission control protocol (TCP) file transfer protocol (FTP).||
|-
|Outline the different components of a web page.||
|-
|Explain the importance of protocols and standards on the web.||
|-
|Describe the different types of web page.||
|-
|Explain the differences between a static web page and a dynamic web page.||
|-
|Explain the functions of a browser.||
|-
|Evaluate the use of client-side scripting and server-side scripting in web pages.||
|-
|Describe how web pages can be connected to underlying data sources.||
|-
|Describe the function of the common gateway interface (CGI).||
|-
|Evaluate the structure of different types of web pages.||
|-
|Define the term search engine.||
|-
|Distinguish between the surface web and the deep web.||
|-
|Outline the principles of searching algorithms used by search engines.||
|-
|Describe how a web crawler functions.||
|-
|Discuss the relationship between data in a meta-tag and how it is accessed by a web crawler.||
|-
|Discuss the use of parallel web crawling.||
|-
|Outline the purpose of web-indexing in search engines.||
|-
|Suggest how web developers can create pages that appear more prominently in search engine results.||
|-
|Describe the different metrics used by search engines.||
|-
|Explain why the effectiveness of a search engine is determined by the assumptions made when developing it.||
|-
|Discuss the use of white hat and black hat search engine optimization.||
|-
|Outline future challenges to search engines as the web continues to grow.||
|-
|Define the terms: mobile computing, ubiquitous computing, peer-2-peer network, grid computing.||
|-
|Compare the major features of: mobile computing ubiquitous computing peer-2-peer network grid computing.||
|-
|Distinguish between interoperability and open standards.||
|-
|Describe the range of hardware used by distributed networks.||
|-
|Explain why distributed systems may act as a catalyst to a greater decentralization of the web.||
|-
|Distinguish between lossless and lossy compression.||
|-
|Evaluate the use of decompression software in the transfer of information.||
|-
|Discuss how the web has supported new methods of online interaction such as social networking.||
|-
|Describe how cloud computing is different from a client-server architecture.||
|-
|Discuss the effects of the use of cloud computing for specified organizations.||
|-
|Discuss the management of issues such as copyright and intellectual property on the web.||
|-
|Describe the interrelationship between privacy, identification and authentication.||
|-
|Describe the role of network architecture, protocols and standards in the future development of the web.||
|-
|Explain why the web may be creating unregulated monopolies.||
|-
|Discuss the effects of a decentralized and democratic web.||
|-
|Describe how the web can be represented as a directed graph.||
|-
|Outline the difference between the web graph and sub-graphs.||
|-
|Describe the main features of the web graph such as bowtie structure, strongly connected core (SCC), diameter.||
|-
|Explain the role of graph theory in determining the connectivity of the web.||
|-
|Explain that search engines and web crawling use the web graph to access information.||
|-
|Discuss whether power laws are appropriate to predict the development of the web.||
|-
|Define the term semantic web.||
|-
|Distinguish between the text-web and the multimedia-web.||
|-
|Describe the aims of the semantic web.||
|-
|Distinguish between an ontology and folksonomy.||
|-
|Describe how folksonomies and emergent social structures are changing the web.||
|-
|Explain why there needs to be a balance between expressivity and usability on the semantic web.||
|-
|Evaluate methods of searching for information on the web.||
|-
|Distinguish between ambient intelligence and collective intelligence.||
|-
|Discuss how ambient intelligence can be used to support people.||
|-
|Explain how collective intelligence can be applied to complex issues.||
|}
|}



Revision as of 10:53, 12 August 2016

Introduction[edit]

These are the standards for IB computer science, Higher Level (HL). Pay attention to the command term at the start of each standard. It describes at what level you must understand the standard. Please reference levels of knowing for a deeper discussion of this important idea.

IB standards are the intellectual property of the International Baccalaureate Organization. [1]

Assessment Statement Big Idea System fundamentals Identify the context for which a new system is planned.
Describe the need for change management.
Outline compatibility issues resulting from situations including legacy systems or business mergers.
Compare the implementation of systems using a client’s hardware with hosting systems remotely.
Evaluate alternative installation processes.
Discuss problems that may arise as a part of data migration.
Suggest various types of testing.
Describe the importance of user documentation.
Evaluate different methods of providing user documentation.
Evaluate different methods of delivering user training.
Identify a range of causes of data loss.
Outline the consequences of data loss in a specified situation.
Describe a range of methods that can be used to prevent data loss.
Describe strategies for managing releases and updates.
Define the terms: hardware, software, peripheral, network, human resources.
Describe the roles that a computer can take in a networked world.
Discuss the social and ethical issues associated with a networked world.
Identify the relevant stakeholders when planning a new system.
Describe methods of obtaining requirements from stakeholders.
Describe appropriate techniques for gathering the information needed to arrive at a workable solution.
Construct suitable representations to illustrate system requirements.
Describe the purpose of prototypes to demonstrate the proposed system to the client.
Discuss the importance of iteration during the design process.
Explain the possible consequences of failing to involve the end-user in the design process.
Discuss the social and ethical issues associated with the introduction of new IT systems.
Define the term usability.
Identify a range of usability problems with commonly used digital devices.
Identify methods that can be used to improve the accessibility of systems.
Identify a range of usability problems that can occur in a system.
Discuss the moral, ethical, social, economic and environmental implications of the interaction between humans and machines.
Computer Organization
Outline the architecture and function of the CPU, ALU, CU and the registers within the CPU
Explain the use of cache memory.
Explain the machine instruction cycle.
Identify the need for persistent storage.
Describe the main functions of an operating system.
Outline the use of a range of application software.
Identify common features of applications.
Define the terms: bit, byte, binary, denary/decimal, hexadecimal.
Outline the way in which data is represented in the computer.
Define the Boolean operators: AND, OR, NOT, NAND, NOR and XOR.
Construct truth tables using the above operators.
Construct a logic diagram using AND, OR, NOT, NAND, NOR and XOR gates.
Networks
Identify different types of networks.
Outline the importance of standards in the construction of networks.
Describe how communication over networks is broken down into different layers.
Identify the technologies required to provide a VPN.
Evaluate the use of a VPN.
Define the terms: protocol, data packet.
Explain why protocols are necessary.
Explain why the speed of data transmission across a network can vary.
Explain why compression of data is often necessary when transmitting across a network.
Outline the characteristics of different transmission media.
Explain how data is transmitted by packet switching.
Outline the advantages and disadvantages of wireless networks.
Describe the hardware and software components of a wireless network.
Describe the characteristics of wireless networks.
Describe the different methods of network security.
Evaluate the advantages and disadvantages of each method of network security.
Computational thinking, problem-solving and programming
Identify the procedure appropriate to solving a problem.
Evaluate whether the order in which activities are undertaken will result in the required outcome.
Explain the role of sub-procedures in solving a problem.
Identify when decision-making is required in a specified situation.
Identify the decisions required for the solution to a specified problem.
Identify the condition associated with a given decision in a specified problem.
Explain the relationship between the decisions and conditions of a system.
Deduce logical rules for real-world situations.
Identify the inputs and outputs required in a solution.
Identify pre-planning in a suggested problem and solution.
Explain the need for pre-conditions when executing an algorithm.
Outline the pre- and post-conditions to a specified problem.
Identify exceptions that need to be considered in a specified problem solution.
Identify the parts of a solution that could be implemented concurrently.
Describe how concurrent processing can be used to solve a problem.
Evaluate the decision to use concurrent processing in solving a problem.
Identify examples of abstraction.
Explain why abstraction is required in the derivation of computational solutions for a specified situation.
Construct an abstraction from a specified situation.
Distinguish between a real-world entity and its abstraction.
Describe the characteristics of standard algorithms on linear arrays.
Outline the standard operations of collections.
Discuss an algorithm to solve a specific problem.
Analyse an algorithm presented as a flow chart.
Analyse an algorithm presented as pseudocode.
Construct pseudocode to represent an algorithm.
Suggest suitable algorithms to solve a specific problem.
Deduce the efficiency of an algorithm in the context of its use.
Determine the number of times a step in an algorithm will be performed for given input data.
State the fundamental operations of a computer.
Distinguish between fundamental and compound operations of a computer.
Explain the essential features of a computer language.
Explain the need for higher level languages.
Outline the need for a translation process from a higher level language to machine executable code.
Define the terms: variable, constant, operator, object.
Define common operators.
Analyse the use of variables, constants and operators in algorithms.
Construct algorithms using loops, branching.
Describe the characteristics and applications of a collection.
Construct algorithms using the access methods of a collection.
Discuss the need for sub-programmes and collections within programmed solutions.
Construct algorithms using pre- defined sub-programmes, one- dimensional arrays and/or collections.
Abstract Data Structures
Identify a situation that requires the use of recursive thinking.
Identify recursive thinking in a specified problem solution.
Trace a recursive algorithm to express a solution to a problem.
Describe the characteristics of a two- dimensional array.
Construct algorithms using two- dimensional arrays.
Describe the characteristics and applications of a stack.
Construct algorithms using the access methods of a stack.
Describe the characteristics and applications of a queue.
Construct algorithms using the access methods of a queue.
Explain the use of arrays as static stacks and queues.
Describe the features and characteristics of a dynamic data structure.
Describe how linked lists operate logically.
Sketch linked lists (single, double and circular).
Describe how trees operate logically (both binary and non-binary).
Define the terms: parent, left-child, right-child, subtree, root and leaf.
State the result of inorder, postorder and preorder tree traversal.
Sketch binary trees.
Define the term dynamic data structure.
Compare the use of static and dynamic data structures.
Suggest a suitable structure for a given situation.
Resource Management
Identify the resources that need to be managed within a computer system.
Evaluate the resources available in a variety of computer systems.
Identify the limitations of a range of resources in a specified computer system.
Describe the possible problems resulting from the limitations in the resources in a computer system.
Explain the role of the operating system in terms of managing memory, peripherals and hardware interfaces.
Outline OS resource management techniques: scheduling, policies, multitasking, virtual memory, paging, interrupt, polling.
Discuss the advantages of producing a dedicated operating system for a device.
Outline how an operating system hides the complexity of the hardware from users and applications.
Control
Discuss a range of control systems.
Outline the uses of microprocessors and sensor input in control systems.
Evaluate different input devices for the collection of data in specified situations.
Explain the relationship between a sensor, the processor and an output transducer.
Describe the role of feedback in a control system.
Discuss the social impacts and ethical considerations associated with the use of embedded systems.
Compare a centrally controlled system with a distributed system.
Outline the role of autonomous agents acting within a larger system.
Web science
Distinguish between the internet and World Wide Web (web).
Describe how the web is constantly evolving.
Identify the characteristics of the following: HTTP, HTTPS, HTML, URL, XML, XSLT, CSS.
Identify the characteristics of a uniform resource identifier (URI) URL.
Describe the purpose of a URL.
Describe how a domain name server functions.
Identify the characteristics of the internet protocol (IP) transmission control protocol (TCP) file transfer protocol (FTP).
Outline the different components of a web page.
Explain the importance of protocols and standards on the web.
Describe the different types of web page.
Explain the differences between a static web page and a dynamic web page.
Explain the functions of a browser.
Evaluate the use of client-side scripting and server-side scripting in web pages.
Describe how web pages can be connected to underlying data sources.
Describe the function of the common gateway interface (CGI).
Evaluate the structure of different types of web pages.
Define the term search engine.
Distinguish between the surface web and the deep web.
Outline the principles of searching algorithms used by search engines.
Describe how a web crawler functions.
Discuss the relationship between data in a meta-tag and how it is accessed by a web crawler.
Discuss the use of parallel web crawling.
Outline the purpose of web-indexing in search engines.
Suggest how web developers can create pages that appear more prominently in search engine results.
Describe the different metrics used by search engines.
Explain why the effectiveness of a search engine is determined by the assumptions made when developing it.
Discuss the use of white hat and black hat search engine optimization.
Outline future challenges to search engines as the web continues to grow.
Define the terms: mobile computing, ubiquitous computing, peer-2-peer network, grid computing.
Compare the major features of: mobile computing ubiquitous computing peer-2-peer network grid computing.
Distinguish between interoperability and open standards.
Describe the range of hardware used by distributed networks.
Explain why distributed systems may act as a catalyst to a greater decentralization of the web.
Distinguish between lossless and lossy compression.
Evaluate the use of decompression software in the transfer of information.
Discuss how the web has supported new methods of online interaction such as social networking.
Describe how cloud computing is different from a client-server architecture.
Discuss the effects of the use of cloud computing for specified organizations.
Discuss the management of issues such as copyright and intellectual property on the web.
Describe the interrelationship between privacy, identification and authentication.
Describe the role of network architecture, protocols and standards in the future development of the web.
Explain why the web may be creating unregulated monopolies.
Discuss the effects of a decentralized and democratic web.
Describe how the web can be represented as a directed graph.
Outline the difference between the web graph and sub-graphs.
Describe the main features of the web graph such as bowtie structure, strongly connected core (SCC), diameter.
Explain the role of graph theory in determining the connectivity of the web.
Explain that search engines and web crawling use the web graph to access information.
Discuss whether power laws are appropriate to predict the development of the web.
Define the term semantic web.
Distinguish between the text-web and the multimedia-web.
Describe the aims of the semantic web.
Distinguish between an ontology and folksonomy.
Describe how folksonomies and emergent social structures are changing the web.
Explain why there needs to be a balance between expressivity and usability on the semantic web.
Evaluate methods of searching for information on the web.
Distinguish between ambient intelligence and collective intelligence.
Discuss how ambient intelligence can be used to support people.
Explain how collective intelligence can be applied to complex issues.




References[edit]

  1. IB Diploma Programme Computer science guide (first examinations 2014). Cardiff, Wales, United Kingdom: International Baccalaureate Organization. January 2012.