1.1.1 |
Planning and system installation: Identify the context for which a new system is planned. |
Lessons
|
1.1.2 |
Planning and system installation: Describe the need for change management. |
Lessons
|
1.1.3 |
Planning and system installation: Outline compatibility issues resulting from situations including legacy systems or business mergers. |
Lessons
|
1.1.4 |
Planning and system installation: Compare the implementation of systems using a client’s hardware with hosting systems remotely. |
Lessons
|
1.1.5 |
Planning and system installation: Evaluate alternative installation processes. |
Lessons
|
1.1.6 |
Planning and system installation: Discuss problems that may arise as a part of data migration. |
Lessons
|
1.1.7 |
Planning and system installation: Suggest various types of testing. |
Lessons
|
1.1.8 |
User focus: Describe the importance of user documentation. |
Lessons
|
1.1.9 |
User focus: Evaluate different methods of providing user documentation. |
Lessons
|
1.1.10 |
User focus: Evaluate different methods of delivering user training. |
Lessons
|
1.1.11 |
System backup: Identify a range of causes of data loss. |
Lessons
|
1.1.12 |
System backup: Outline the consequences of data loss in a specified situation. |
Lessons
|
1.1.13 |
System backup: Describe a range of methods that can be used to prevent data loss. |
Lessons
|
1.1.14 |
Software deployment: Describe strategies for managing releases and updates. |
Lessons
|
1.2.1 |
Components of a computer system: Define the terms: hardware, software, peripheral, network, human resources. |
Lessons
|
1.2.2 |
Components of a computer system: Describe the roles that a computer can take in a networked world. |
Lessons
|
1.2.3 |
Components of a computer system: Discuss the social and ethical issues associated with a networked world. |
Lessons
|
1.2.4 |
System design and analysis: Identify the relevant stakeholders when planning a new system. |
Lessons
|
1.2.5 |
System design and analysis: Describe methods of obtaining requirements from stakeholders. |
Lessons
|
1.2.6 |
System design and analysis: Describe appropriate techniques for gathering the information needed to arrive at a workable solution. |
Lessons
|
1.2.7 |
System design and analysis: Construct suitable representations to illustrate system requirements. |
Lessons
|
1.2.8 |
System design and analysis: Describe the purpose of prototypes to demonstrate the proposed system to the client. |
Lessons
|
1.2.9 |
System design and analysis: Discuss the importance of iteration during the design process. |
Lessons
|
1.2.10 |
System design and analysis: Explain the possible consequences of failing to involve the end-user in the design process. |
Lessons
|
1.2.11 |
System design and analysis: Discuss the social and ethical issues associated with the introduction of new IT systems. |
Lessons
|
1.2.12 |
Human interaction with the system: Define the term usability. |
Lessons
|
1.2.13 |
Human interaction with the system: Identify a range of usability problems with commonly used digital devices. |
Lessons
|
1.2.14 |
Human interaction with the system: Identify methods that can be used to improve the accessibility of systems. |
Lessons
|
1.2.15 |
Human interaction with the system: Identify a range of usability problems that can occur in a system. |
Lessons
|
1.2.16 |
Human interaction with the system: Discuss the moral, ethical, social, economic and environmental implications of the interaction between humans and machines. |
Lessons
|
2.1.1 |
Computer architecture: Outline the architecture of the central processing unit (CPU) and the functions of the arithmetic logic unit (ALU) and the control unit (CU) and the registers within the CPU. |
Lessons
|
2.1.2 |
Computer architecture: Describe primary memory. |
Lessons
|
2.1.3 |
Computer architecture: Explain the use of cache memory. |
Lessons
|
2.1.4 |
Computer architecture: Explain the machine instruction cycle. |
Lessons
|
2.1.5 |
Secondary memory: Identify the need for persistent storage. |
Lessons
|
2.1.6 |
Operating systems and application systems: Describe the main functions of an operating system. |
Lessons
|
2.1.7 |
Operating systems and application systems: Outline the use of a range of application software. |
Lessons
|
2.1.8 |
Operating systems and application systems: Identify common features of applications. |
Lessons
|
2.1.9 |
Binary representation: Define the terms: bit, byte, binary, denary/decimal, hexadecimal. |
Lessons
|
2.1.10 |
Binary representation: Outline the way in which data is represented in the computer. |
Lessons
|
2.1.11 |
Simple logic gates: Define the Boolean operators: AND, OR, NOT, NAND, NOR and XOR. |
Lessons
|
2.1.12 |
Simple logic gates: Construct truth tables using the above operators. |
Lessons
|
2.1.13 |
Simple logic gates: Construct a logic diagram using AND, OR, NOT, NAND, NOR and XOR gates. |
Lessons
|
3.1.1 |
Network fundamentals: Identify different types of networks. |
Lessons
|
3.1.2 |
Network fundamentals: Outline the importance of standards in the construction of networks. |
Lessons
|
3.1.3 |
Network fundamentals: Describe how communication over networks is broken down into different layers. |
Lessons
|
3.1.4 |
Network fundamentals: Identify the technologies required to provide a VPN. |
Lessons
|
3.1.5 |
Network fundamentals: Evaluate the use of a VPN. |
Lessons
|
3.1.6 |
Data transmission: Define the terms: protocol, data packet. |
Lessons
|
3.1.7 |
Data transmission: Explain why protocols are necessary. |
Lessons
|
3.1.8 |
Data transmission: Explain why the speed of data transmission across a network can vary. |
Lessons
|
3.1.9 |
Data transmission: Explain why compression of data is often necessary when transmitting across a network. |
Lessons
|
3.1.10 |
Data transmission: Outline the characteristics of different transmission media. |
Lessons
|
3.1.11 |
Data transmission: Explain how data is transmitted by packet switching. |
Lessons
|
3.1.12 |
Wireless networking: Outline the advantages and disadvantages of wireless networks. |
Lessons
|
3.1.13 |
Describe the hardware and software components of a wireless network. |
Lessons
|
3.1.14 |
Describe the characteristics of wireless networks. |
Lessons
|
3.1.15 |
Describe the different methods of network security. |
Lessons
|
3.1.16 |
Evaluate the advantages and disadvantages of each method of network security. |
Lessons
|
4.1.1 |
Thinking procedurally: Identify the procedure appropriate to solving a problem. |
Lessons
|
4.1.2 |
Thinking procedurally: Evaluate whether the order in which activities are undertaken will result in the required outcome. |
Lessons
|
4.1.3 |
Thinking procedurally: Explain the role of sub-procedures in solving a problem. |
Lessons
|
4.1.4 |
Thinking logically: Identify when decision-making is required in a specified situation. |
Lessons
|
4.1.5 |
Thinking logically: Identify the decisions required for the solution to a specified problem. |
Lessons
|
4.1.6 |
Thinking logically: Identify the condition associated with a given decision in a specified problem. |
Lessons
|
4.1.7 |
Thinking logically: Explain the relationship between the decisions and conditions of a system. |
Lessons
|
4.1.8 |
Thinking logically: Deduce logical rules for real-world situations. |
Lessons
|
4.1.9 |
Thinking ahead: Identify the inputs and outputs required in a solution. |
Lessons
|
4.1.10 |
Thinking ahead: Identify pre-planning in a suggested problem and solution. |
Lessons
|
4.1.11 |
Thinking ahead: Explain the need for pre-conditions when executing an algorithm. |
Lessons
|
4.1.12 |
Thinking ahead: Outline the pre- and post-conditions to a specified problem. |
Lessons
|
4.1.13 |
Thinking ahead: Identify exceptions that need to be considered in a specified problem solution. |
Lessons
|
4.1.14 |
Thinking concurrently: Identify the parts of a solution that could be implemented concurrently |
Lessons
|
4.1.15 |
Thinking concurrently: Describe how concurrent processing can be used to solve a problem. |
Lessons
|
4.1.16 |
Thinking concurrently: Evaluate the decision to use concurrent processing in solving a problem. |
Lessons
|
4.1.17 |
Thinking abstractly: Identify examples of abstraction. |
Lessons
|
4.1.18 |
Thinking abstractly: Explain why abstraction is required in the derivation of computational solutions for a specified situation. |
Lessons
|
4.1.19 |
Thinking abstractly: Construct an abstraction from a specified situation. |
Lessons
|
4.1.20 |
Thinking abstractly: Distinguish between a real-world entity and its abstraction. |
Lessons
|
4.2.1 |
Describe the characteristics of standard algorithms on linear arrays. |
Lessons
|
4.2.2 |
Outline the standard operations of collections. |
Lessons
|
4.2.3 |
Discuss an algorithm to solve a specific problem. |
Lessons
|
4.2.4 |
Analyse an algorithm presented as a flow chart. |
Lessons
|
4.2.5 |
Analyse an algorithm presented as pseudocode. |
Lessons
|
4.2.6 |
Construct pseudocode to represent an algorithm. |
Lessons
|
4.2.7 |
Suggest suitable algorithms to solve a specific problem. |
Lessons
|
4.2.8 |
Deduce the efficiency of an algorithm in the context of its use. |
Lessons
|
4.2.9 |
Determine the number of times a step in an algorithm will be performed for given input data. |
Lessons
|
4.3.1 |
Nature of programming languages: State the fundamental operations of a computer. |
Lessons
|
4.3.2 |
Nature of programming languages: Distinguish between fundamental and compound operations of a computer. |
Lessons
|
4.3.3 |
Nature of programming languages: Explain the essential features of a computer language. |
Lessons
|
4.3.4 |
Nature of programming languages: Explain the need for higher level languages. |
Lessons
|
4.3.5 |
Nature of programming languages: Outline the need for a translation process from a higher level language to machine executable code. |
Lessons
|
4.3.6 |
Use of programming languages: Define the terms: variable, constant, operator, object. |
Lessons
|
4.3.7 |
Use of programming languages: Define the operators =, ≠, <, <=, >, >=, mod, div. |
Lessons
|
4.3.8 |
Use of programming languages: Analyse the use of variables, constants and operators in algorithms. |
Lessons
|
4.3.9 |
Use of programming languages: Construct algorithms using loops, branching. |
Lessons
|
4.3.10 |
Use of programming languages: Describe the characteristics and applications of a collection. |
Lessons
|
4.3.11 |
Use of programming languages: Construct algorithms using the access methods of a collection. |
Lessons
|
4.3.12 |
Use of programming languages: Discuss the need for sub-programmes and collections within programmed solutions. |
Lessons
|
4.3.13 |
Use of programming languages: Construct algorithms using predefined sub-programmes, onedimensional arrays and/or collections. |
Lessons
|
5.1.1 |
Thinking recursively: Identify a situation that requires the use of recursive thinking. |
Lessons
|
5.1.2 |
Thinking recursively: Identify recursive thinking in a specified problem solution. |
Lessons
|
5.1.3 |
Thinking recursively: Trace a recursive algorithm to express a solution to a problem. |
Lessons
|
5.1.4 |
Abstract data structures: Describe the characteristics of a twodimensional array. |
Lessons
|
5.1.5 |
Abstract data structures: Construct algorithms using twodimensional arrays. |
Lessons
|
5.1.6 |
Abstract data structures: Describe the characteristics and applications of a stack. |
Lessons
|
5.1.7 |
Abstract data structures: Construct algorithms using the access methods of a stack. |
Lessons
|
5.1.8 |
Abstract data structures: Describe the characteristics and applications of a queue. |
Lessons
|
5.1.9 |
Abstract data structures: Construct algorithms using the access methods of a queue. |
Lessons
|
5.1.10 |
Abstract data structures: Explain the use of arrays as static stacks and queues. |
Lessons
|
5.1.11 |
Linked lists: Describe the features and characteristics of a dynamic data structure. |
Lessons
|
5.1.12 |
Linked lists: Describe how linked lists operate logically. |
Lessons
|
5.1.13 |
Linked lists: Sketch linked lists (single, double and circular). |
Lessons
|
5.1.14 |
Trees: Define the terms: Describe how trees operate logically (both binary and non-binary). |
Lessons
|
5.1.15 |
Trees: Define the terms: parent, left-child, right-child, subtree, root and leaf. |
Lessons
|
5.1.16 |
Trees: State the result of inorder, postorder and preorder tree traversal. |
Lessons
|
5.1.17 |
Trees: Describe how trees operate logically (both binary and non-binary). |
Lessons
|
5.1.18 |
Applications: Define the term dynamic data structure. |
Lessons
|
5.1.19 |
Applications: Compare the use of static and dynamic data structures. |
Lessons
|
5.1.20 |
Applications: Suggest a suitable structure for a given situation. |
Lessons
|
6.1.1 |
System resources: Identify the resources that need to be managed within a computer system. |
Lessons
|
6.1.2 |
System resources: Evaluate the resources available in a variety of computer systems. |
Lessons
|
6.1.3 |
System resources: Identify the limitations of a range of resources in a specified computer system. |
Lessons
|
6.1.4 |
System resources: Describe the possible problems resulting from the limitations in the resources in a computer system. |
Lessons
|
6.1.5 |
Role of the operating system: Explain the role of the operating system in terms of managing memory, peripherals and hardware interfaces. |
Lessons
|
6.1.7 |
Role of the operating system: Outline OS resource management techniques: scheduling, policies, multitasking, virtual memory, paging, interrupt, polling. |
Lessons
|
6.1.8 |
Role of the operating system: Discuss the advantages of producing a dedicated operating system for a device. |
Lessons
|
6.1.9 |
Role of the operating system: Outline how an operating system hides the complexity of the hardware from users and applications. |
Lessons
|
7.1.1 |
Centralized control systems: Discuss a range of control systems. |
Lessons
|
7.1.2 |
Centralized control systems: Outline the uses of microprocessors and sensor input in control systems. |
Lessons
|
7.1.3 |
Centralized control systems: Evaluate different input devices for the collection of data in specified situations. |
Lessons
|
7.1.4 |
Centralized control systems: Explain the relationship between a sensor, the processor and an output transducer. |
Lessons
|
7.1.5 |
Centralized control systems: Describe the role of feedback in a control system. |
Lessons
|
7.1.6 |
Centralized control systems: Discuss the social impacts and ethical considerations associated with the use of embedded systems. |
Lessons
|
7.1.7 |
Distributed systems: Compare a centrally controlled system with a distributed system. |
Lessons
|
7.1.8 |
Distributed systems: Outline the role of autonomous agents acting within a larger system. |
Lessons
|