Understand the benefit of using decomposition and abstraction to model aspects of the real world and analyse, understand and solve problems
Understand the benefits of using subprograms
be able to follow and write algorithms (flowcharts, pseudocode*, program code) that use sequence, selection, repetition (count-controlled, condition-controlled) and iteration (over every item in a data structure), and input, processing and output to s
understand the need for and be able to follow and write algorithms that use variables and constants and one- and two-dimensional data structures (strings, records, arrays)
understand the need for and be able to follow and write algorithms that use arithmetic operators division, multiplication, (addition, subtraction, modulus, integer division, exponentiation), relational operators (equal to, less than, greater than, not
be able to determine the correct output of an algorithm for a given set of data and use a trace table to determine what value a variable will hold at a given point in an algorithm
understand types of errors that can occur in programs (syntax, logic, runtime) and be able to identify and correct logic errors in algorithms
understand how standard algorithms (bubble sort, merge sort, linear search, binary search) work
be able to use logical reasoning and test data to evaluate an algorithm’s fitness for purpose and efficiency (number of compares, number of passes through a loop, use of memory)
be able to apply logical operators (AND, OR, NOT) in truth tables with up to three inputs to solve problems
understand that computers use binary to represent data (numbers, text, sound, graphics) and program instructions and be able to determine the maximum number of states that can be represented by a binary pattern of a given length
understand how computers represent and manipulate unsigned integers and two’s complement signed integers
be able to convert between denary and 8-bit binary numbers (0 to 255, -128 to +127)
be able to add together two positive binary patterns and apply logical and arithmetic binary shifts
understand the concept of overflow in relation to the number of bits available to store a value
understand why hexadecimal notation is used and be able to convert between hexadecimal and binary
understand that data storage is measured in binary multiples (bit, nibble, byte, kibibyte, mebibyte, gibibyte, tebibyte) and be able to construct expressions to calculate file sizes and data capacity requirements
understand the need for data compression and methods of compressing data (lossless, lossy)
understand how computers encode characters using 7-bit ASCII
understand how bitmap images are represented in binary (pixels, resolution, colour depth)
understand the limitations of binary representation of data when constrained by the number of available bits
understand the von Neumann stored program concept and the role of main memory (RAM), CPU (control unit, arithmetic logic unit, registers), clock, address bus, data bus, control bus in the fetch-decode-execute cycle
understand the role of secondary storage and the ways in which data is stored on devices (magnetic, optical, solid state)
understand the role of secondary storage and the ways in which data is stored on devices (magnetic, optical, solid state)
understand the concept of an embedded system and what embedded systems are used for
understand the purpose and functionality of an operating system (file management, process management, peripheral management, user management)
understand the purpose and functionality of utility software (file repair, backup, data compression, disk defragmentation, anti-malware
understand the purpose and functionality of utility software (file repair, backup, data compression, disk defragmentation, anti-malware
understand the importance of developing robust software and methods of identifying vulnerabilities (audit trails, code reviews)
understand the importance of developing robust software and methods of identifying vulnerabilities (audit trails, code reviews)
understand the characteristics and purposes of low-level and high-level programming languages
understand how an interpreter differs from a compiler in the way it translates high-level code into machine code
understand why computers are connected in a network
understand different types of networks (LAN, WAN)
understand how the internet is structured (IP addressing, routers)
understand how the internet is structured (IP addressing, routers)
understand how the characteristics of wired and wireless connectivity impact on performance (speed, range, latency, bandwidth)
understand that network speeds are measured in bits per and be able to construct expressions involving file size, transmission rate and time
understand the role of and need for (Ethernet, Wi-Fi, TCP/IP, HTTP, HTTPS, FTP) and email protocols
understand the role of and need for (Ethernet, Wi-Fi, TCP/IP, HTTP, HTTPS, FTP) and email protocols
understand how the 4-layer (application, transport, internet, link) TCP/IP model handles data transmission over a network
understand characteristics of network topologies (bus, star, mesh)
understand the importance of network security, ways of identifying network vulnerabilities (penetration testing, ethical hacking) and methods of protecting networks (access control, physical security, firewalls)
understand the importance of network security, ways of identifying network vulnerabilities (penetration testing, ethical hacking) and methods of protecting networks (access control, physical security, firewalls)
understand environmental issues associated with the use of digital devices (energy consumption, manufacture, replacement cycle, disposal)
understand ethical and legal issues associated with the collection and use of personal data (privacy, ownership, consent, misuse, data protection)
understand ethical and legal issues associated with the use of artificial intelligence, machine learning and robotics (accountability, safety, algorithmic bias, legal liability)
understand methods of intellectual property protection for computer systems and software (copyright, patents, trademarks, licencing)
understand the threat to digital systems posed by malware (viruses, worms, Trojans, ransomware, key loggers) and how hackers exploit technical vulnerabilities (unpatched software, out-of-date anti-malware) and use social engineering to carry out cyber
understand methods of protecting digital systems and data (anti-malware, encryption, acceptable use policies, backup and recovery procedures)
0 Comments
Show More