SAMPLE COURSE OUTLINE COMPUTER SCIENCE GENERAL YEAR 12

Similar documents
COURSE OUTLINE COMPUTER SCIENCE GENERAL YEAR 12: 2019 UNIT 3 AND UNIT 4

Computer Science General Course Year 12. Selected Unit 3 syllabus content for the. Externally set task 2019

SAMPLE COURSE OUTLINE APPLIED INFORMATION TECHNOLOGY ATAR YEAR 12

COMPUTER SCIENCE ATAR COURSE. Year 11 syllabus

SAMPLE COURSE OUTLINE APPLIED INFORMATION TECHNOLOGY ATAR YEAR 11

GCSE Computer Science for OCR Overview Scheme of Work

OCR GCSE (9-1) Computer Science J276 Accompanying Instructional Document

Computing 1: Computer Systems

OCR J276 (9-1) GCSE Computer Science

Autumn 1 Autumn 2 Spring 1 Spring 2 Summer 1 Summer 2. networks. environmental concerns. Knowledge and skills covered: Knowledge and skills covered:

HASTINGS HIGH SCHOOL

Unit 2: Technology Systems

Computing at Cox Green Curriculum Plan. Key Stage 3 Year 7

AQA GCSE Computer Science PLC

ICT & Computing Progress Grid

COURSE OUTLINE APPLIED INFORMATION TECHNOLOGY GENERAL YEAR 12: 2018 UNIT 3 AND UNIT 4

OHIO ASSESSMENTS FOR EDUCATORS (OAE) FIELD 010: COMPUTER INFORMATION SCIENCE

Edexcel GCSE in Computer Science Microsoft IT Academy Mapping

COMPUTING SUBJECT KNOWLEDGE AUDIT

S.1 ICT Distribute students eclass user accounts and school login accounts.

GRADE VIII MODEL PAPER 2017 COMPUTER EDUCATION

DUMBARTON ACADEMY NATIONAL 5 COMPUTING SCIENCE REVISION

Knowledge. Skills. Image: courtesy of commercial licence for 2015 by The Computing Teacher

Switching to AQA from Edexcel

S.1 ICT Week Title Content Remarks. Distribute students eclass user accounts, iclass accounts and school login accounts.

Stewards Pooi Kei College Secondary 4 Information and Communication Technology Teaching Schedule ( )

Types Of Computer Virus Sources Of Virus Virus Warning Signs Virus Detection(Anti-Virus) Virus Prevention and Removal

SAMPLE COURSE OUTLINE DESIGN ATAR YEAR 12

Revision of GCSE Specifications. Draft Proposal. Digital Technology

15. INFORMATICS PRACTICES (CODE: 065)

Computer Science Curriculum Content, KS5

Switching to AQA from OCR

Technology in Action. Chapter 12 Behind the Scenes: Networking and Security. Copyright 2010 Pearson Education, Inc. Publishing as Prentice Hall

Computer Networks. Cables Radio signals (wireless/wifi) Telephone lines Satellite links (Long distance)

6. Under which of the following categories is a laptop computer classified? (1) Microcomputer (2) Minicomputer (3) Mainframe (4) Supercomputer

OCR GCSE Computing Learning Grids H/W

KS3 Computing - Life Without Levels

Entry Level Assessment Blueprint Computer Technology

PRINCE GEORGE'S COMMUNITY COLLEGE OFFICE OF INSTRUCTION MASTER COURSE SYLLABUS

Computer Networking Fundamentals

OVERVIEW OF YEAR 8 CURRICULUM FOR 2016/2017 Subject: Computing

Identify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS)

COMPUTER SCIENCE. ATAR course examination Marking Key

Entry Level Assessment Blueprint Computer Networking Fundamentals

Which one of the following terms describes the physical components of a computer system?

Appendix A: Objectives and Courseware Locations

Use NAT to Hide the Real IP Address of CTC to Establish a Session with ONS 15454

Job Ready Assessment Blueprint. Computer Technology. Test Code: 4122 / Version: 01. Copyright All Rights Reserved.

컴퓨터의기초 7 th Lecture 김현철 (2009 년여름학기 ) 컴퓨터공학부서울대학교. Copyrights 2008 Eom, Hyeonsang All Rights Reserved

SDD PRELIMINARY CHANGES SUMMARY

CSC 170 Fall 2017 Dr. R. M. Siegfried. Study Guide for Final Exam

INTRODUCTION TO ICT.

Utah CTE/Business Education Core Computer Technology I

Computers Are Your Future Eleventh Edition Chapter 7: Networks: Communicating & Sharing Resources

Cambridge International Examinations Cambridge International General Certificate of Secondary Education. Published

Ministry of National Policies and Economic Affairs National Youth Corps. Curriculum of the Information Technology

Chapter 4: Networking and the Internet. Figure 4.1 Network topologies. Network Classifications. Protocols. (continued)

Chapter 4: Networking and the Internet

ST. MARY S COLLEGE FORM 4

QCF Level 3: BTEC Specialist Credit value: 10 Guided learning hours: 60. Aim and purpose. Unit introduction

Syllabus for Computer Science General Part I

Chapter 4: Networking and the Internet

Chapter 4: Networking and the Internet. Network Classifications. Network topologies. Network topologies (continued) Connecting Networks.

ก ก Information Technology II

Information Technology (IT) Paper-I Theory 40 Practical - 60

Name of the Assistant/ Associate Professor:Annu Saini Class and Section:BCA 1 st sem Subject:Computer and Programming Fundamentals July 2018

Objective: Select the appropriate media, cables, ports, and connectors to connect switches to other network devices and hosts

Which one of the following terms describes the physical components of a computer system?

IT Essentials: PC Hardware and Software v4.1 Scope and Sequence

elc International School

I MID SEMESTER. The Indian Community School Kuwait Informatics Practices Year Plan for Class XI

Grade 11: Term 1 Caps Curriculum 2017

Technology in Action

Southam College Computing & ICT Department. Summer Project

Data Communications. Course Design Data Communications. Pre/Post Test (80 Questions/80 Points) Upon Request None No No No

Number of Courses: 21

Unit 11: Computer Networks

Dawood Public School Course Outline Computer Science Class XI

Systems and Principles Unit Syllabus

Information & Communications Technology (ICT) Essentials 2 (2017/2018)

SECURE USE OF IT Syllabus Version 2.0

Information and Communication Technology Paper 1: Written Paper

Network fundamentals IB Computer Science. Content developed by Dartford Grammar School Computer Science Department

Certificate in Purchasing and Supply Management

Microsoft. Course EXC13E: Microsoft Excel 2013 Expert. Technology : Microsoft Office 2013 Delivery Method : Instructor-led (classroom)

Dawood Public School Course Outline Computer Science Class XI

SAMPLE COURSE OUTLINE DESIGN GENERAL YEAR 11

Dawood Public School Course Outline Computer Science

2017/2018 Student Competency Record Computer Information Systems, Advanced weeks

Internet protocols and network hardware

INVIGILATED BY MARKED BY MARKS TALLIED BY

CompTIA Network+ Lab V2.0. Course Outline. CompTIA Network+ Lab V Apr

RPS Technology Standards Grades 9 through 12 Technology Standards and Expectations

GCSE Computer Science Revision and Workbook

William Paterson University of New Jersey Department of Computer Science College of Science and Health Course Outline

KIHARU/KAHURO DISTRICT JOINT EXAMINATION 2013

2) A is any device connected to a network such as a computer, printer, or game console. A) packet B) node C) NOS D) NIC

Jianhui Zhang, Ph.D., Associate Prof. College of Computer Science and Technology, Hangzhou Dianzi Univ.

Chapter 10: Security. 2. What are the two types of general threats to computer security? Give examples of each.

Year 10 OCR GCSE Computer Science (9-1)

Transcription:

SAMPLE COURSE OUTLINE COMPUTER SCIENCE GENERAL YEAR 12

Copyright School Curriculum and Standards Authority, 2015 This document apart from any third party copyright material contained in it may be freely copied, or communicated on an intranet, for non-commercial purposes in educational institutions, provided that the School Curriculum and Standards Authority is acknowledged as the copyright owner, and that the Authority s moral rights are not infringed. Copying or communication for any other purpose can be done only within the terms of the Copyright Act 1968 or with prior written permission of the School Curriculum and Standards Authority. Copying or communication of any third party copyright material can be done only within the terms of the Copyright Act 1968 or with permission of the copyright owners. Any content in this document that has been derived from the Australian Curriculum may be used under the terms of the Creative Commons Attribution-NonCommercial 3.0 Australia licence Disclaimer Any resources such as texts, websites and so on that may be referred to in this document are provided as examples of resources that teachers can use to support their learning programs. Their inclusion does not imply that they are mandatory or that they are the only resources relevant to the course. 2015/40861v5

1 Sample course outline Computer Science General Year 12 Semester 1 Unit 3 Developing computer-based solutions and producing spreadsheet and database solutions 1 2 3 4 6 Course introduction overview of Semester 1 assessment requirements Systems analysis and development the concept of project management, including: planning scheduling budgeting tracking types of system development methodologies prototyping system development life cycle (SDLC) Systems analysis and development stages of the SDLC preliminary analysis analysis design development implementation evaluation and maintenance systems development documentation as a part of the SDLC context diagrams using Yourdon/Demarco notation Systems analysis and development computer system hardware and software the concept of boot process storage capacities, including: bit byte kilobyte megabyte gigabyte terabyte appropriate hardware components for a computer system designed for a specific purpose, including: input output processing storage (primary and secondary) the role of the standard operating environment (SOE) Systems analysis and development analyse context diagrams document an existing system create context diagrams using Yourdon/Demarco notation, as a part of the SDLC Sample course outline Computer Science General Year 12

2 7 9 10 12 functions of the components of the central processing unit (CPU) arithmetic logic unit (ALU) control unit (CU) registers program counter system clock the concept of the fetch-execute cycle troubleshooting strategies, including: diagnosis of fault implement a solution document troubleshoot procedure appropriate physical preventative maintenance measures the purpose of an ICT code of conduct ethics in the development and use of ICT systems privacy considerations in the development and use of ICT systems digital communications etiquette when using ICT system Managing data spreadsheet terms, including: cell formula function (sum, average, max, min, count, countif) label worksheet lookup tables (hlookup, vlookup) Managing data hierarchical structure of data character/byte field record table/relation data protection methods, including: encryption authentication o passwords o biometric o digital signature data types, including: number date/time currency text (string) Boolean (true/false) Managing data create solutions using a spreadsheet application using: functions charts lookup functions sorting

3 13 12 16 database terms, including: data, field and record data integrity data redundancy ethical and legal issues relating to the personal use and storage of data legal requirements and implication of information kept by various organisations about individuals issues related to use of online databases design considerations for visual interfaces and navigation systems within database systems the purpose of database documentation for the user Task 5: Externally set task: A task set by the SCSA based on the following content from Unit 3 <teacher to insert information provided by the Authority> Managing data create a working single table database which includes: data types primary keys forms reports queries create a visual interface for users of a database create database documentation

4 Semester 2 Unit 4 Developing computer-based solutions and communications 1 2 3 4 7 Course review review of Semester 1 assessment requirements overview of Semester 2 Developing software purpose and function of software to operate a computer system operating systems utility software, including: o file compression o defragmenter o anti-virus o anti-malware application software requirements for software licensing, including: freeware open source shareware Developing software stages of the software development cycle (SDC) state the problem plan and design develop the solution test the solution evaluate the solution factors affecting the development of software, including: user needs user interface Programming characteristics of data types, including: integer real (floating point number) Boolean character naming conventions for variables types of code, including: source executable types of control structures, including: sequence selection o one-way (if then) o two-way (if then else) o multi-way (nested if) iteration o test first (while) o test last (repeat until) o fixed (for) Developing software apply software development requirements, including: user needs user interface apply the SDC to create a digital solution Programming use pseudocode to represent a programming solution create flow charts to represent a programming solution

5 8 13 14 types of program or code errors, including: syntax errors run-time errors logical errors the concept of data validation, including: test data trace table modelling of an algorithm to test for logic using flow charts Networks and communications functions of the following computer hardware components required for networks router switch firewall modem network interface card (NIC) wireless access point bridge communication terms, including: protocols digital analogue ethernet types of communication networks personal area network (PAN) local area network (LAN) wide area network (WAN) Programming apply, using pseudocode and a programming language, the following programming concepts: constants variables apply, using pseudocode and a programming language, the following control structures: sequence selection iteration apply, using pseudocode and a programming language, the following techniques: develop internal and external documentation select and apply suitable test data for checking the solution use trace tables to test for and debug logic errors apply the SDC to create a digital solution

6 15 16 technologies appropriate for the implementation of a client/server and peer-to-peer network star network topology diagrammatic representation of network topologies for PAN, LAN and WAN characteristics of transmission media, including: twisted pair fibre optic satellite cellular wireless Networks and communications types of communication protocols, including: post office protocol 3 (POP3) internet message access protocol (IMAP) simple mail transfer protocol (SMTP) wireless access protocol (WAP) methods used to ensure security of information over the internet, including: authentication encryption firewalls types of malware, including: viruses worms trojans spyware Networks and communications create network diagrams using CISCO network diagram conventions to represent network topologies for PAN and LAN