| № | Topic | Objectives | Materials |
|---|---|---|---|
| 1 | Application Software | 11.1A Software categories 11.3.1.1 justify the choice of applied software and choice criteria based on the goals 11.3.1.2 classify application software |
Theory | Practice questions |
| 2 | Operating Systems | 11.1A Operating Systems. Types of operating systems. 11.3.1.3 describe the purpose and main functions of operating systems 11.3.1.4 compare single-user and multi-user operating systems 11.3.1.5 compare one-task and multitasking operating systems |
Theory | Practice questions |
| 3 | Von Neumann Architecture | 11.1A Von Neumann architecture 11.3.2.1 describe the interaction of CPU with peripheral devices |
Theory | Practice questions |
| 4 | System bus | 11.3.2.2 Describe the purpose of CPU components, system bus and main memory | Theory | Practice questions |
| 5 | Main memory | 11.3.4.1 Explain the differences between RAM and ROM memory | Theory | Practice questions |
| 6 | Cache memory & Virtual memory |
11.3.4.3 Explain the purpose of cache memory 11.3.4.2 Explain the purpose of virtual memory |
Theory | Practice questions |
| 7 | Boolean logic. Logic gates. Truth tables | 11.3.3.3 Build truth tables AND, OR, NOT, NAND, NOR, XOR | Theory | Practice questions |
| 8 | Simplifying Boolean expressions |
11.3.3.1 Distinguish between laws of Boolean logic 11.3.3.2 Simplify logical expressions using the laws of Boolean logic |
Theory | Practice questions |
| № | Topic | Objectives | Materials |
|---|---|---|---|
| 1 | Classifications and categories of programming languages |
11.5.1.1 Distinguish between generations of programming languages 11.5.1.2 Classify programming languages into low and high-level 11.5.1.5 Analyze advantages and disadvantages of high-level languages 11.5.1.6 Analyze advantages and disadvantages of low-level languages |
Theory |
Practice questions Theory | Practice questions |
| 2 | LMC Simulator | 11.5.1.3 Analyze a simple program written in the language of the assembler | Theory | Practice questions |
| 3 | Trace tables | 11.5.1.4 Use trace tables to find and verify the correctness of an algorithm | Theory | Practice questions |
| 4 | Translators |
11.5.1.7 Analyze the advantages and disadvantages of compilers 11.5.1.8 Analyze the advantages and disadvantages of interpreters |
Theory | Practice questions |
| № | Topic | Objectives | Materials |
|---|---|---|---|
| 1 | SDLC models. Project development |
11.2.1.1 Explain the life cycle stages used in the solving of problems 11.2.1.2 Analyze the advantages and disadvantages of cyclical, waterfall, and spiral models |
Theory |
Practice questions Theory | Practice questions |
| 2 | Data analysis. Compare alternative solutions |
11.2.1.3 Describe data collection methods 11.2.1.4 Compare different data analysis techniques 11.2.1.5 Compare alternative solutions to a problem in order to choose the most effective algorithm |
Theory |
Practice questions Theory | Practice questions |
| 3 | Data Flow Diagram | 11.2.1.6 Use data flow diagrams (DFD) to input, process, store and output data in computing systems | Theory | Practice questions |
| 4 | Flowcharts | 11.2.1.7 Use flow charts to input, process, store, and output data in computing systems | Theory | Practice questions |
| № | Topic | Objectives | Materials |
|---|---|---|---|
| 1 | Relational databases |
11.4.1.1 Describe relational databases and their purpose 11.4.1.2 Use the terms attribute, object, index, record, table, and tuple to describe databases 11.4.1.4 Define data types when creating a database 11.4.1.3 Explain the difference between primary, composite, and foreign key |
Theory |
Practice questions Theory | Practice questions Theory | Practice questions |
| 2 | Types of relationships. Entity Relationship Diagrams |
11.4.1.6 Define the connections between tables in a database 11.4.1.3 Explain the difference between primary, composite, and foreign key 11.4.1.7 Create an entity-relationship (ER) model |
Theory | Practice questions |
| 3 | Database normalization | 11.4.1.5 Define the connections between tables in a database (1-3NF) | Theory | Practice questions |
| 4 | SQL query language. DDL & DML |
11.4.2.1 Explain the purpose of the data dictionary 11.4.2.2 Compare the data definition language (DDL), and the data manipulation language (DML) 11.4.2.3 Describe the basic SQL queries for working with tables in a database: CREATE, ALTER, DROP 11.4.2.4 Describe the basic SQL queries for working with one table in a database: SELECT, UPDATE, INSERT, DELETE 11.4.2.5 Use SQL SELECT for data selection in more tables |
Theory |
Practice questions Theory | Practice questions Theory | Practice questions |
| № | Topic | Objectives | Materials |
|---|---|---|---|
| 1 | Project work. Designing a new system | 11.2.1.6 Use data flow diagrams (DFD) to input, process, store, and output data in computing systems | Theory | Practice questions |
| 2 | Project work. ERD. Data dictionary |
11.4.1.4 Define data types when creating a database 11.4.1.7 Create an entity-relationship (ER) model |
Theory |
Practice questions Theory | Practice questions |
| 3 | Project work. Flowcharts of processes | 11.2.1.7 Use flow charts to input, process, store, and output data in computing systems | Theory | Practice questions |
| 4 | Prototyping | 11.2.2.4 Discuss the advantages and disadvantages of using prototypes when developing solutions | Theory | Practice questions |
| 5 | Hardware & software requirements |
11.2.2.7 Define minimum requirements for hardware when implementing solutions 11.3.1.5 Justify their choice of applied software and choice criteria based on the goals |
Theory | Practice questions |
| 6 | Intended benefits and limits of the scope of the solution |
11.2.2.1 Analyse the advantages of a new system 11.2.2.2 Analyse the restrictions of a new system |
Theory | Practice questions |
| 7 | Development frameworks | 11.2.2.3 Describe the characteristics of a development framework | Theory | Practice questions |
| № | Topic | Objectives | Materials |
|---|---|---|---|
| 1 | 1D and 2D Arrays |
11.3A 1D, 2D Arrays 11.5.2.1 use the technical terms associated with arrays including upper and lower bounds 11.5.2.3 write program code using 1D and 2D arrays |
Theory | Practice Questions |
| 2 | Bubble Sort and Insertion Sort |
11.3A Bubble sort and Insertion sort 11.5.2.4 write an algorithm /pseudo-code for sorting by insertion and bubble sort |
Theory | Practice Questions |
| 3 | Binary Search |
11.3A Binary search 11.5.2.5 write a pseudo-code of binary search for the solution of a specific problem |
Theory | Practice Questions |
| 4 | Algorithm Efficiency |
11.3A Algorithm efficiency 11.5.2.6 to understand the time-efficiency of algorithms 11.5.2.7 to understand the space-efficiency of algorithms |
Theory | Practice Questions |
| № | Topic | Objectives | Materials |
|---|---|---|---|
| 1 | HTML Document Structure |
11.3B HTML. Structure of HTML-document 11.5.3.1 create a site using basic HTML tags |
Theory | Practice Questions |
| 2 | HTML Forms |
11.3B HTML. Forms 11.5.3.2 create forms for data entry using HTML tags |
Theory | Practice Questions |
| 7 | CSS: DIV & SPAN |
11.3B CSS. Tags <DIV>, <SPAN> 11.5.3.3 use the CSS stylesheet when creating a site |
Theory | Practice Questions |
| 8 | PHP Scripting |
11.3B Script language (PHP) 11.5.3.8 use script language to provide interactivity 11.5.3.6 use various algorithmic structures in a scripting language |
Theory | Practice Questions |
| 9 | PHP & MySQL Database Connection |
11.3B PHP & MySQL database. Connect to database 11.5.3.4 use script language to connect a database |
Theory | Practice Questions |
| 10 | SQL & PHP: User Registration |
11.3B SQL & PHP. User registration. 11.5.3.8 use script language to provide interactivity |
Theory | Practice Questions |
| № | Topic | Objectives | Materials |
|---|---|---|---|
| 1 | Basic Algorithmic Structures |
11.4A Basic algorithmic structure 11.5.3.9 write a program code using a basic algorithmic "sequential" structure when developing a project 11.5.3.10 write a program code using a basic algorithmic "branching" structure when developing a project 11.5.3.11 write a program code using a basic algorithmic "loop" structure when developing a project |
Theory | Practice Questions |
| 2 | Validation & Verification |
11.4A Validation and verification 11.1.2.5 explain the difference between the terms verification and validation |
Theory | Practice Questions |
| 3 | Good Programming Style |
11.4A Good programming style 11.5.3.12 follow the rules of good programming style when writing a program code |
Theory | Practice Questions |
| № | Topic | Objectives | Materials |
|---|---|---|---|
| 1 | Data Protection |
11.4B Data protection 11.1.2.1 explain the difference between the terms security, privacy, and data integrity |
Theory | Practice Questions |
| 2 | Data Backup & Disk Mirroring |
11.4B Data backup and Disk mirroring 11.1.2.3 describe data protection measures such as data backup and disk mirroring |
Theory | Practice Questions |
| 3 | Encryption & Authorization |
11.4B Encryption. Authorization 11.1.2.4 describe data protection measures such as encryption and access rights to data (authorization) |
Theory | Practice Questions |
| 4 | Blockchain Technology |
11.4B Blockchain technology 11.1.2.6 explain the function and operation of Blockchain technologies |
Theory | Practice Questions |
| 5 | Open & Closed Software |
11.4B Open and closed software 11.1.3.2 describe the specifics of open-source software 11.1.3.3 describe the specifics of closed-source software |
Theory | Practice Questions |
| 6 | Copyright |
11.4B Copyright 11.1.3.1 follow the copyright law when developing applications |
Theory | Practice Questions |
| 7 | Access Restriction |
11.4B Access restriction 11.1.3.4 restrict access to data made available through the Internet using a variety of methods |
Theory | Practice Questions |
| 8 | Cloud Technologies |
11.4B Cloud technologies 11.1.3.5 evaluate the risks of using cloud technologies |
Theory | Practice Questions |
| № | Topic | Objectives | Materials |
|---|---|---|---|
| 1 | LAN & WAN |
11.4C LAN & WAN 11.6.1.1 compare features of local (LAN) and wide-area networks (WAN) |
Theory | Practice Questions |
| 2 | Network Topology |
11.4C Network topology 11.6.1.2 describe the advantages and disadvantages of network topologies bus, ring, star, mesh |
Theory | Practice Questions |
| 3 | Network Hardware |
11.4C Network Hardware 11.6.1.3 explain the purpose of network equipment |
Theory | Practice Questions |
| 4 | Client-Server Model |
11.4C Client-server model 11.6.2.3 know the features of the client-server model |
Theory | Practice Questions |
| 5 | URL |
11.4C URL 11.6.2.1 describe the role of universal resource locator (URL) |
Theory | Practice Questions |
| 6 | DNS |
11.4C DNS 11.6.2.2 describe the purpose and organization of a domain name system (DNS) |
Theory | Practice Questions |
| 7 | Network Protocols |
11.4C Network protocols 11.6.3.1 explain the role of protocols in the network (HTTP, FTP, POP3, SMTP, HTTPS, FTPS) |
Theory | Practice Questions |
| 8 | IP Address |
11.4C IP address 11.6.3.2 explain the format of an IP address and how an IP address is associated with a device on a network |
Theory | Practice Questions |
| № | Topic | Objectives | Materials |
|---|---|---|---|
| 1 | Threats to Computer System |
12.2A Threats to computer system 12.1.3.2 analyze problems arising due to malware, physical risks 12.1.3.1 analyze ethical problems arising due to computer system cracking |
Theory | Practice Questions |
| 2 | Data Protection Measures |
12.2A Data protection measures 12.1.2.1 describe protection measures for data and computer systems such as firewalls, encryption, biometrics |
Theory | Practice Questions |
| 3 | Backup and Disk Mirroring |
12.2A Backup and Disk mirroring 12.1.2.2 use data protection measures such as data backup and disk mirroring |
Theory | Practice Questions |
| 4 | Protect Data from Unauthorized Access |
12.2A Protect data from unauthorized access 12.1.2.3 protect data from unauthorized access |
Theory | Practice Questions |
| 5 | Privacy Policies |
12.2A Privacy policies 12.1.3.3 explain privacy policies 12.1.3.4 analyze problems arising due to disseminating and using information |
Theory | Practice Questions |
| 6 | E-Government |
12.2A E-government 12.1.3.7 use E-gov resources |
Theory | Practice Questions |
| № | Topic | Objectives | Materials |
|---|---|---|---|
| 1 | Creating Documentation |
12.2B Creating documentation 12.2.1.1 use a table of contents when documenting a project 12.2.1.2 use headers and footers when documenting a project 12.2.1.3 use tables when documenting a project 12.2.1.4 set page parameters when documenting a project 12.2.1.5 set page numbers when documenting a project 12.2.1.6 set indents and line spacing when documenting a project |
Theory | Practice Questions |
| 2 | Copyright & Plagiarism |
12.2B Copyright & Plagiarism 12.1.3.5 check documents using antiplagiarism resources 12.1.3.6 name copyright protection rules |
Theory | Practice Questions |
| № | Topic | Objectives | Materials |
|---|---|---|---|
| 1 | Methods of System Implementation |
12.2C Methods of system implementation 12.2.1.7 list system implementation methods 12.2.1.8 compare the advantages and disadvantages of system implementation methods |
Theory | Practice Questions |
| 2 | Project Work: Installation. Implementation Plan |
12.2C Project work. Installation. Implementation plan 12.2.1.9 explain the importance of making a system implementation plan 12.2.1.10 make a system implementation plan |
Theory | Practice Questions |
| № | Topic | Objectives | Materials |
|---|---|---|---|
| 1 | Types of Operating System (Part II) |
12.3A Types of operating system (part II) 12.3.1.1 describe a real-time operating system 12.3.1.2 describe a network operating system 12.3.1.3 describe a batch processing operating system |
Theory | Practice Questions |
| 2 | User Interfaces |
12.3A User interfaces 12.3.1.4 define the advantages and disadvantages of a graphical user interface (GUI) 12.3.1.5 define the advantages and disadvantages of a command-line interface (CLI) 12.3.1.6 define the advantages and disadvantages of natural-language and gesture-recognition user interfaces |
Theory | Practice Questions |
| 3 | Fetch-Decode-Execute Cycle |
12.3A Fetch-Decode-Execute cycle 12.3.2.5 explain three operations in a fetch-execute cycle (fetch / decode / execute) |
Theory | Practice Questions |
| 4 | System Bus |
12.3A System bus 12.3.2.4 explain how data is transferred between different components of a computer system through the address bus, data bus, and control bus |
Theory | Practice Questions |
| 5 | Speed Clock, Word Size, Bus Width |
12.3A Speed clock, word size, bus width 12.3.2.6 explain how the clock speed, word length, and bus width affect the performance |
Theory | Practice Questions |
| 6 | RISC vs CISC |
12.3A RISC vs CISC 12.3.2.1 describe the RISC architecture 12.3.2.2 describe the CISC architecture 12.3.2.3 compare RISC and CISC |
Theory | Practice Questions |
| 7 | Addressable Memory |
12.3A Addressable memory 12.3.4.1 explain the principle of memory addressing 12.3.4.2 explain the principle of storing programs and data |
Theory | Practice Questions |
| 8 | Memory Management. Paging and Segmentation |
12.3A Memory management. Paging and segmentation 12.3.4.2 explain the principle of memory organization by segment and page |
Theory | Practice Questions |
| 9 | Virtual Machine |
12.3A Virtual machine 12.3.4.3 explain the concept of a virtual machine |
Theory | Practice Questions |
| 10 | Boolean Logic |
12.3A Boolean logic 12.3.3.2 build logical structures 12.3.3.4 analyze logical structures |
Theory | Practice Questions |
| 11 | Logic Laws |
12.3A Logic laws 12.3.3.3 simplify logical expressions using the laws of logic |
Theory | Practice Questions |
| № | Topic | Objectives | Materials |
|---|---|---|---|
| 1 | Number Systems. Represent Positive Decimal Numbers in Binary |
12.3B Number systems. Represent positive decimal numbers in binary 12.1.1.1 convert a number from one number system to another 12.1.1.2 explain the advantages of using hexadecimal numbers in computer systems |
Theory | Practice Questions |
| 2 | Binary Addition and Binary Multiplication |
12.3B Binary addition and binary multiplication 12.1.1.3 perform the arithmetic operations: addition and multiplication of binary numbers |
Theory | Practice Questions |
| 3 | Represent Positive and Negative Numbers in Two's Complement |
12.3B Represent positive and negative numbers in two's complement 12.1.1.4 represents positive and negative numbers in two's complement and specifies the range of n bits 12.1.1.5 perform subtraction using two's complement |
Theory | Practice Questions |
| 4 | Fixed Point Numbers and Floating Point Numbers |
12.3B Fixed point numbers and Floating point numbers 12.1.1.6 use binary numbers with a fixed point to represent fractional numbers with a given number of bits 12.1.1.7 represent positive and negative floating-point decimal numbers in binary |
Theory | Practice Questions |
| 5 | Data Structures. Queues & Stacks |
12.3B Data structures. Queues & Stacks 12.5.2.1 describe the operation of stack and queue data structures |
Theory | Practice Questions |
| 6 | Data Structures. Binary Tree |
12.3B Data structures. Binary tree 12.5.2.2 build a binary tree |
Theory | Practice Questions |
| № | Topic | Objectives | Materials |
|---|---|---|---|
| 1 | Internet, WWW, Intranet |
12.3C Internet, WWW, Intranet 12.6.2.1 distinguish features of the Internet, the World Wide Web, and the Intranet |
Theory | Practice Questions |
| 2 | OSI Model |
12.3C OSI model 12.6.1.2 describe the functions of the OSI network model levels |
Theory | Practice Questions |
| 3 | Packet Switching & Circuit Switching |
12.3C Packet switching & circuit switching 12.6.1.1 explain the difference between packet switching and circuit switching |
Theory | Practice Questions |
| 4 | MAC Address |
12.3C MAC address 12.6.2.2 describe the role of MAC addresses in packet routing 12.6.2.3 identify the MAC address of a computer |
Theory | Practice Questions |