Standard |
Big Idea
|
Use predefined functions and parameters, classes and methods to divide a complex problem into simpler parts. |
Computational Thinking |
Yes
|
Describe a software development process used to solve software problems (e.g., design, coding, testing, verification). |
Computational Thinking |
Yes
|
System fundamentals
|
Identify the context for which a new system is planned. |
|
Describe the need for change management. |
|
Outline compatibility issues resulting from situations including legacy systems or business mergers. |
|
Compare the implementation of systems using a client’s hardware with hosting systems remotely. |
|
Evaluate alternative installation processes. |
|
Discuss problems that may arise as a part of data migration. |
|
Suggest various types of testing. |
|
Describe the importance of user documentation. |
|
Evaluate different methods of providing user documentation. |
|
Evaluate different methods of delivering user training. |
|
Identify a range of causes of data loss. |
|
Outline the consequences of data loss in a specified situation. |
|
Describe a range of methods that can be used to prevent data loss. |
|
Describe strategies for managing releases and updates. |
|
Define the terms: hardware, software, peripheral, network, human resources. |
|
Describe the roles that a computer can take in a networked world. |
|
Discuss the social and ethical issues associated with a networked world. |
|
Identify the relevant stakeholders when planning a new system. |
|
Describe methods of obtaining requirements from stakeholders. |
|
Describe appropriate techniques for gathering the information needed to arrive at a workable solution. |
|
Construct suitable representations to illustrate system requirements. |
|
Describe the purpose of prototypes to demonstrate the proposed system to the client. |
|
Discuss the importance of iteration during the design process. |
|
Explain the possible consequences of failing to involve the end-user in the design process. |
|
Discuss the social and ethical issues associated with the introduction of new IT systems. |
|
Define the term usability. |
|
Identify a range of usability problems with commonly used digital devices. |
|
Identify methods that can be used to improve the accessibility of systems. |
|
Identify a range of usability problems that can occur in a system. |
|
Discuss the moral, ethical, social, economic and environmental implications of the interaction between humans and machines. |
|
Computer Organization
|
Outline the architecture of the central processing unit (CPU) and the functions of the arithmetic logic unit (ALU) and the control unit (CU) and the registers within the CPU. |
|
Describe primary memory. |
|
Explain the use of cache memory. |
|
Explain the machine instruction cycle. |
|
Identify the need for persistent storage. |
|
Describe the main functions of an operating system. |
|
Outline the use of a range of application software. |
|
Identify common features of applications. |
|
Define the terms: bit, byte, binary, denary/decimal, hexadecimal. |
|
Outline the way in which data is represented in the computer. |
|
Define the Boolean operators: AND, OR, NOT, NAND, NOR and XOR. |
|
Construct truth tables using the above operators. |
|
Construct a logic diagram using AND, OR, NOT, NAND, NOR and XOR gates. |
|
Networks
|
Identify different types of networks. |
|
Outline the importance of standards in the construction of networks. |
|
Describe how communication over networks is broken down into different layers. |
|
Identify the technologies required to provide a VPN. |
|
Evaluate the use of a VPN. |
|
Define the terms: protocol, data packet. |
|
Explain why protocols are necessary. |
|
Explain why the speed of data transmission across a network can vary. |
|
Explain why compression of data is often necessary when transmitting across a network. |
|
Outline the characteristics of different transmission media. |
|
Explain how data is transmitted by packet switching. |
|
Outline the advantages and disadvantages of wireless networks. |
|
Describe the hardware and software components of a wireless network. |
|
Describe the characteristics of wireless networks. |
|
Describe the different methods of network security. |
|
Evaluate the advantages and disadvantages of each method of network security. |
|
Computational thinking, problem-solving and programming
|
Identify the procedure appropriate to solving a problem. |
|
Evaluate whether the order in which activities are undertaken will result in the required outcome. |
|
Explain the role of sub-procedures in solving a problem. |
|
Identify when decision-making is required in a specified situation. |
|
Identify the decisions required for the solution to a specified problem. |
|
Identify the condition associated with a given decision in a specified problem. |
|
Explain the relationship between the decisions and conditions of a system. |
|
Deduce logical rules for real-world situations. |
|
Identify the inputs and outputs required in a solution. |
|
Identify pre-planning in a suggested problem and solution. |
|
Explain the need for pre-conditions when executing an algorithm. |
|
Outline the pre- and post-conditions to a specified problem. |
|
Identify exceptions that need to be considered in a specified problem solution. |
|
Identify the parts of a solution that could be implemented concurrently. |
|
Describe how concurrent processing can be used to solve a problem. |
|
Evaluate the decision to use concurrent processing in solving a problem. |
|
Identify examples of abstraction. |
|
Explain why abstraction is required in the derivation of computational solutions for a specified situation. |
|
Construct an abstraction from a specified situation. |
|
Distinguish between a real-world entity and its abstraction. |
|
Describe the characteristics of standard algorithms on linear arrays. |
|
Outline the standard operations of collections. |
|
Discuss an algorithm to solve a specific problem. |
|
Analyse an algorithm presented as a flow chart. |
|
Analyse an algorithm presented as pseudocode. |
|
Construct pseudocode to represent an algorithm. |
|
Suggest suitable algorithms to solve a specific problem. |
|
Deduce the efficiency of an algorithm in the context of its use. |
|
Determine the number of times a step in an algorithm will be performed for given input data. |
|
State the fundamental operations of a computer. |
|
Distinguish between fundamental and compound operations of a computer. |
|
Explain the essential features of a computer language. |
|
Explain the need for higher level languages. |
|
Outline the need for a translation process from a higher level language to machine executable code. |
|
Define the terms: variable, constant, operator, object. |
|
Define common operators. |
|
Analyse the use of variables, constants and operators in algorithms. |
|
Construct algorithms using loops, branching. |
|
Describe the characteristics and applications of a collection. |
|
Construct algorithms using the access methods of a collection. |
|
Discuss the need for sub-programmes and collections within programmed solutions. |
|
Construct algorithms using pre- defined sub-programmes, one- dimensional arrays and/or collections. |
|
Web science
|
Distinguish between the internet and World Wide Web (web). |
|
Describe how the web is constantly evolving. |
|
Identify the characteristics of the following: HTTP, HTTPS, HTML, URL, XML, XSLT, CSS. |
|
Identify the characteristics of a uniform resource identifier (URI) URL. |
|
Describe the purpose of a URL. |
|
Describe how a domain name server functions. |
|
Identify the characteristics of the internet protocol (IP) transmission control protocol (TCP) file transfer protocol (FTP). |
|
Outline the different components of a web page. |
|
Explain the importance of protocols and standards on the web. |
|
Describe the different types of web page. |
|
Explain the differences between a static web page and a dynamic web page. |
|
Explain the functions of a browser. |
|
Evaluate the use of client-side scripting and server-side scripting in web pages. |
|
Describe how web pages can be connected to underlying data sources. |
|
Describe the function of the common gateway interface (CGI). |
|
Evaluate the structure of different types of web pages. |
|
Define the term search engine. |
|
Distinguish between the surface web and the deep web. |
|
Outline the principles of searching algorithms used by search engines. |
|
Describe how a web crawler functions. |
|
Discuss the relationship between data in a meta-tag and how it is accessed by a web crawler. |
|
Discuss the use of parallel web crawling. |
|
Outline the purpose of web-indexing in search engines. |
|
Suggest how web developers can create pages that appear more prominently in search engine results. |
|
Describe the different metrics used by search engines. |
|
Explain why the effectiveness of a search engine is determined by the assumptions made when developing it. |
|
Discuss the use of white hat and black hat search engine optimization. |
|
Outline future challenges to search engines as the web continues to grow. |
|
Define the terms: mobile computing, ubiquitous computing, peer-2-peer network, grid computing. |
|
Compare the major features of: mobile computing ubiquitous computing peer-2-peer network grid computing. |
|
Distinguish between interoperability and open standards. |
|
Describe the range of hardware used by distributed networks. |
|
Explain why distributed systems may act as a catalyst to a greater decentralization of the web. |
|
Distinguish between lossless and lossy compression. |
|
Evaluate the use of decompression software in the transfer of information. |
|
Discuss how the web has supported new methods of online interaction such as social networking. |
|
Describe how cloud computing is different from a client-server architecture. |
|
Discuss the effects of the use of cloud computing for specified organizations. |
|
Discuss the management of issues such as copyright and intellectual property on the web. |
|
Describe the interrelationship between privacy, identification and authentication. |
|
Describe the role of network architecture, protocols and standards in the future development of the web. |
|
Explain why the web may be creating unregulated monopolies. |
|
Discuss the effects of a decentralized and democratic web. |
|