Computer Science (9608) | AS LEVEL | Full Scale Course
This Full-Scale course / Complete Course offers a complete online coverage for both the syllabus and the preparation for the examination. The AS Level Computer Science 9608 Complete Course online / Full-Scale Course Online (AS Level Computer Science 9608 Full …
Overview
This Full-Scale course / Complete Course offers a complete online coverage for both the syllabus and the preparation for the examination. The AS Level Computer Science 9608 Complete Course online / Full-Scale Course Online (AS Level Computer Science 9608 Full Scale Course online / Complete Course online) is the complete course, where the prime goal is to train a student from scratch to learn everything that they need to know for the examination, as well as in-depth understanding of the syllabus material. We incorporate a sophisticated strategy to target all the subject areas that are required to get the best grade possible. The AS Level Computer Science 9608 Course covers the complete syllabus of Computer Science (9608) – AS Level. The AS Level Course has been designed to help any student, no matter how much they have prepared for the subject. Students at all levels can benefit from the AS Level Computer Science 9608 Course. You are not required to buy any book to complement the AS Level Computer Science 9608 Course as it covers all that is required for a successful attempt at the subject. Also, being a Full-Scale Course, the curriculum follows periodic content availability, just like a real classroom.
However, the timing of the class does not matter: each student can cover the material as per their own feasibility. Whenever new content is uploaded or is available, an announcement is made both on the AS Level Computer Science 9608 Course page and communicated via e-mail to the students so that they may stay informed. Also, you may join later as the AS Level Computer Science 9608 Complete Course online / Full-Scale Course Online (AS Level Computer Science 9608 Full Scale Course online / Complete Course online) allows for backward compatibility. Thus, a student joining in week 3 has access to the materials of week 1 and week 2, as well as limited ability to submit the assignments of these weeks. The curriculum shall be updated as the AS Level Computer Science 9608 Course progresses.
Ideally, the course contains:
- Complete lectures of Each Topic in A Unique Way
- Notes and Videos
- Periodic Assignments with Proper Grading and Feedback
- Past Paper Based Quizzes
- Forum Access To Ask Any Question
- Complete availability of the Teacher.
- Best Resources and Guidelines
- Tip and Tricks for Paper Solution
- Paper Attempting Methodology for Best Grades
Join the AS Level Computer Science 9608 Complete Course online / Full-Scale Course Online (AS Level Computer Science 9608 Full Scale Course online / Complete Course online)Â now and get the best grades in upcoming examination.
What Educate A Change Expects From The Student For This Course?
Full Scale Courses on Educate A Change are designed specifically to study the syllabus in-depth and solve as many past papers as possible. Our expectation with such AS Level Computer Science 9608 Course are as follows:
- The student may or may not be aware of the basic contents of the syllabus. Thus, these courses suit the students who are studying a syllabus for the first time.
- The student may or may not understand the basic paper solution pattern.
- The student’s expectation regarding AS Level Computer Science 9608 Complete Course online / Full-Scale Course Online (AS Level Computer Science 9608 Full Scale Course online / Complete Course online)Â is to learn the complete syllabus, learn paper solving techniques and practice as many past papers as possible for the upcoming examination.
- The student needs a complete and in-depth understanding of the entire syllabus content.
- AS Level Computer Science 9608 Complete Course online / Full-Scale Course Online (AS Level Computer Science 9608 Full Scale Course online / Complete Course online) is the student’s preferred method to get the best grade in their exams.
How Will The Course Progress?
The AS Level Computer Science 9608 Complete Course online / Full-Scale Course Online (AS Level Computer Science 9608 Full Scale Course online / Complete Course online) has been designed to provide maximum flexibility to our students. Here is a breakup of how the AS Level Computer Science 9608 Course will progress in general. This division is subject to change based on the progression of the AS Level Computer Science 9608 Course:
- Once your AS Level Computer Science 9608 Complete Course online / Full-Scale Course Online (AS Level Computer Science 9608 Full Scale Course online / Complete Course online)Â has been activated, a timer starts to run on each of the content areas reflected in the curriculum section.Â
- The timer remains unique to each student. It defines the exact time when you will receive a new content.
- Generally, the Full Scale Courses have a weekly progression. This aspect means you will get new contents at different times during the week. Again, the timer shows you the exact time for the content to arrive in your portal.
- If there are any significant changes, you will be informed in the announcements section. Additionally, you may locate the announcements in your e-mail as well. Do not forget to check the junk/ spam folder regularly.
- The timings for live classes, if any, are also coordinated using the announcements section and emails.
- There are specific classes in the AS Level Computer Science 9608 Complete Course online / Full-Scale Course Online (AS Level Computer Science 9608 Full Scale Course online / Complete Course online) called quizzes. These quizzes can be attempted at any point as you wish. There is no restriction as to when you have to attempt them. However, there is a restriction on the number of times you can access any quiz. Make sure you remain aware of those restrictions. They are mentioned at the start of the quiz.
- Additionally, there are assignments in the AS Level Computer Science 9608 Complete Course online / Full-Scale Course Online (AS Level Computer Science 9608 Full Scale Course online / Complete Course online)Â as well. These assignments are designed using the past paper contents, mostly. In some assignments, you have more than 1 submission as well. In such cases, you have to make sure that we receive your second submission before marking date passes since your first submission. Also, only one submission is marked by the instructor.
- You may attempt the assignment directly on the portal or you may attempt it on a piece of paper and attach pictures or PDF here on the portal. Both ways are completely acceptable. Emailing the assignment is not allowed. Similarly, you may not use social media to submit an assignment.
- The past paper discussion classes of AS Level Computer Science 9608 Complete Course online / Full-Scale Course Online (AS Level Computer Science 9608 Full Scale Course online / Complete Course online)Â will focus on providing the detailed solution methods of past papers. Additionally, video discussion using recorded videos will be provided for the most important questions. Detailed points, techniques and information for each question are also included.
- The official AS Level Computer Science 9608 Course discussion board or FORUM is accessible to all the enrolled students. You may ask any question related to any class, quiz, past paper discussion or assignment etc. both in public and private on this forum. This forum is the official method to ask questions and get answers by your instructor. You can ask using written, audio, video or image questions. Additionally, you can quote different answers on the forum for further clarification as well.
What may NOT be expected from the course?
AS Level Computer Science 9608 Complete Course online / Full-Scale Course Online (AS Level Computer Science 9608 Full Scale Course online / Complete Course online) is a formal course, which makes it impossible for Educate A Change to make any adjustments for any specific students. Students must not expect the AS Level Computer Science 9608 Course to:
- Give the material before the time on your timer.
- Give all the material at once.
- Give more time for the material to be accessed than the course’s time.
- Give the material in any other form than mentioned in the course
- The AS Level Computer Science 9608 Course does NOT register or pay your fee for the official Cambridge examination
Additionally, you may NOT except the instructor
- To give you any personal mentoring outside the course in the same price.
- Answer questions and other issues you may have regarding the course on personal social media.
- Collaborate with you in any shape or form outside the mentioned methods of the AS Level Computer Science 9608 Complete Course online / Full-Scale Course Online (AS Level Computer Science 9608 Full Scale Course online / Complete Course online)
A reply or support in any of the above-mentioned issues may NOT be expected.
Curriculum
- 19 Sections
- 542 Lessons
- 32 Weeks
- Sample ContentSample Notes, Videos, Quizzes, Cheat Sheets, Assignments and Much More For Pre-Purchase Consideration.4
- Course Related InformationImportant Information Related To The Courses, Live Classes, Zoom Links etc.3
- Notes + Written Material For Contents of The SyllabusNotes for Chapters + Written Resources Regarding The Content145
- 3.1Data Representation: Show Understanding Of Binary Magnitudes And The Difference Between Binary Prefixes And Decimal Prefixes
- 3.2Data Representation: Show Understanding Of Different Number Systems
- 3.3Data Representation: Show Understanding Of How Overflow Can Occur
- 3.4Data Representation: Show Understanding Of How Overflow Can Occur
- 3.5Data Representation: Show Understanding Of And Be Able To Represent Character Data In Its Internal Binary Form, Depending On The Character Set Used
- 3.6Multimedia – Graphics: Show Understanding Of How Data For A Bitmapped Image Are Encoded
- 3.7Multimedia – Graphics: Perform Calculations To Estimate The File Size For A Bitmap Image
- 3.8Multimedia – Graphics: Show Understanding Of The Effects Of Changing Elements Of A Bitmap Image On The Image Quality And File Size
- 3.9Multimedia – Graphics: Show Understanding Of How Data For A Vector Graphic Are Encoded
- 3.10Multimedia – Graphics: Justify The Use Of A Bitmap Image Or A Vector Graphic For A Given Task
- 3.11Multimedia – Sound: Show Understanding Of How Sound Is Represented And Encoded
- 3.12Multimedia – Sound: Show Understanding Of The Impact Of Changing The Sampling Rate And Resolution
- 3.13Compression: Show Understanding Of The Need For And Examples Of The Use Of Compression
- 3.14Compression: Show Understanding Of Lossy And Lossless Compression And Justify The Use Of A Method In A Given Situation
- 3.15Compression: Show Understanding Of How A Text File, Bitmap Image, Vector Graphic And Sound File Can Be Compressed
- 3.16Networks Including The Internet: Show Understanding Of The Purpose And Benefits Of Networking Devices
- 3.17Networks Including The Internet: Show Understanding Of The Characteristics Of A LAN (Local Area Network) And A WAN (Wide Area Network)
- 3.18Networks Including The Internet: Explain The Client-Server And Peer-To-Peer Models Of Networked Computers
- 3.19Networks Including The Internet: Show Understanding Of Thin-Client And Thick-Client And The Differences Between Them
- 3.20Networks Including The Internet: Show Understanding Of The Bus, Star, Mesh And Hybrid Topologies
- 3.21Networks Including The Internet: Understand How Packets Are Transmitted Between Two Hosts For A Given Topology
- 3.22Networks Including The Internet: Justify The Use Of A Topology For A Given Situation
- 3.23Networks Including The Internet: Show Understanding Of Cloud Computing
- 3.24Networks Including The Internet: Show Understanding Of The Differences Between And Implications Of The Use Of Wireless And Wired Networks
- 3.25Networks Including The Internet: Describe The Characteristics Of Copper Cable, Fibre-Optic Cable, Radio Waves (Including WiFi), Microwaves, Satellites
- 3.26Networks Including The Internet: Describe The Hardware That Is Used To Support A LAN
- 3.27Networks Including The Internet: Describe The Role And Function Of A Router In A Network
- 3.28Networks Including The Internet: Show Understanding Of Ethernet And How Collisions Are Detected And Avoided
- 3.29Networks Including The Internet: Show Understanding Of Bit Streaming
- 3.30Networks Including The Internet: Show Understanding Of The Differences Between The World Wide Web (WWW) And The Internet
- 3.31Networks Including The Internet: Describe The Hardware That Is Used To Support The Internet
- 3.32Networks Including The Internet: Explain The Use Of IP Addresses In The Transmission Of Data Over The Internet
- 3.33Networks Including The Internet: Explain How A Uniform Resource Locator (URL) Is Used To Locate A Resource On The World Wide Web (WWW) And The Role Of The Domain Name Service (DNS)
- 3.34Computers And Their Components: Show Understanding Of The Need For Input, Output, Primary Memory And Secondary (Including Removable) Storage
- 3.35Computers And Their Components: Show Understanding Of Embedded Systems
- 3.36Computers And Their Components: Describe The Principal Operations Of Hardware Devices
- 3.37Computers And Their Components: Show Understanding Of The Use Of Buffers
- 3.38Computers And Their Components: Explain The Differences Between Random Access Memory (RAM) And Read Only Memory (ROM)
- 3.39Computers And Their Components: Explain The Differences Between Static RAM (SRAM) And Dynamic RAM (DRAM)
- 3.40Computers And Their Components: Explain The Difference Between Programmable ROM (PROM), Erasable Programmable ROM (EPROM) And Electrically Erasable Programmable ROM (EEPROM)
- 3.41Computers And Their Components: Show An Understanding Of Monitoring And Control Systems
- 3.42Logic Gates And Logic Circuits: Understand And Define The Functions Of NOT, AND, OR, NAND, NOR And XOR (EOR) Gates
- 3.43Logic Gates And Logic Circuits: Construct The Truth Table For Each Of The Logic Gates Above
- 3.44Logic Gates And Logic Circuits: Construct A Logic Circuit From A Problem Statement, A Logic Expression, Or A Truth Table
- 3.45Logic Gates And Logic Circuits: Construct A Truth Table From A Problem Statement, A Logic Circuit, Or A Logic Expression
- 3.46Logic Gates And Logic Circuits: Construct A Logic Expression From A Problem Statement, A Logic Circuit, Or A Truth Table
- 3.47Central Processing Unit (CPU) Architecture: Show Understanding Of The Basic Von Neumann Model For A Computer System And The Stored Program Concept
- 3.48Central Processing Unit (CPU) Architecture: Show Understanding Of The Purpose And Role Of Registers, Including The Difference Between General Purpose And Special Purpose Registers
- 3.49Central Processing Unit (CPU) Architecture: Show Understanding Of The Purpose And Roles Of The Arithmetic And Logic Unit (ALU), Control Unit (CU) And System Clock, Immediate Access Store (IAS)
- 3.50Central Processing Unit (CPU) Architecture: Show Understanding Of How Data Are Transferred Between Various Components Of The Computer System Using The Address Bus, Data Bus And Control Bus
- 3.51Central Processing Unit (CPU) Architecture: Show Understanding Of How Factors Contribute To The Performance Of The Computer System
- 3.52Central Processing Unit (CPU) Architecture: nderstand How Different Ports Provide Connection To Peripheral Devices
- 3.53Central Processing Unit (CPU) Architecture: Describe The Stages Of The Fetch-Execute (F-E) Cycle
- 3.54Central Processing Unit (CPU) Architecture: Show Understanding Of The Purpose Of Interrupts
- 3.55Assembly Language: Show Understanding Of The Relationship Between Assembly Language And Machine Code
- 3.56Assembly Language: Describe The Different Stages Of The Assembly Process For A Two-Pass Assembler
- 3.57Assembly Language: Describe The Different Stages Of The Assembly Process For A Two-Pass Assembler
- 3.58Assembly Language: Show Understanding That A Set Of Instructions Are Grouped
- 3.59Assembly Language: Show Understanding Of And Be Able To Use Different Modes Of Addressing
- 3.60Bit Manipulation: Show Understanding Of And Perform Binary Shifts
- 3.61Bit Manipulation: Show Understanding Of How Bit Manipulation Can Be Used To Monitor/Control A Device
- 3.62Operating Systems: Explain Why A Computer System Requires An Operating System (OS)
- 3.63Operating Systems: Explain The Key Management Tasks Carried Out By The Operating System
- 3.64Operating Systems: Show Understanding Of The Need For Typical Utility Software Provided With An Operating System
- 3.65Operating Systems: how Understanding Of Program Libraries
- 3.66Language Translators: Show Understanding Of The Need For Assembler Software, Compiler And Interpreter
- 3.67Language Translators: Explain The Benefits And Drawbacks Of Using Either A Compiler Or Interpreter And Justify The Use Of Each
- 3.68Language Translators: Show Awareness That High-Level Language Programs May Be Partially Compiled And Partially Interpreted
- 3.69Language Translators: Describe Features Found In A Typical Integrated Development Environment (IDE)
- 3.70Data Security: Explain The Difference Between The Terms Security, Privacy And Integrity Of Data
- 3.71Data Security: Show Appreciation Of The Need For Both The Security Of Data And The Security Of The Computer System
- 3.72Data Security: Describe Security Measures Designed To Protect Computer Systems
- 3.73Data Security: Show Understanding Of The Threats To Computer And Data Security Posed By Networks And The Internet
- 3.74Data Security: Describe Methods That Can Be Used To Restrict The Risks Posed By Threats
- 3.75Data Security: Describe Security Methods Designed To Protect The Security Of Data
- 3.76Data Integrity: Describe How Data Validation And Data Verification Help Protect The Integrity Of Data
- 3.77Data Integrity: Describe and Use Methods of Data Validation
- 3.78Data Integrity: Describe and Use Methods of Data Verification During Data Entry and Data Transfer
- 3.79Ethics And Ownership: Show Understanding Of The Need For And Purpose Of Ethics As A Computing Professional
- 3.81Ethics And Ownership: Show Understanding Of The Need To Act Ethically And The Impact Of Acting Ethically Or Unethically For A Given Situation
- 3.82Ethics And Ownership: Show Understanding Of The Need For Copyright Legislation
- 3.83Ethics And Ownership: Show Understanding Of The Different Types Of Software Licencing And Justify The Use Of A Licence For A Given Situation
- 3.84Ethics And Ownership: Show Understanding Of Artificial Intelligence (AI)
- 3.85Database Concepts: Show Understanding Of The Limitations Of Using A File-Based Approach For The Storage And Retrieval Of Data
- 3.86Database Concepts: Describe The Features Of A Relational Database That Address The Limitations Of A File-Based Approach
- 3.87Database Concepts: Show Understanding Of And Use The Terminology Associated With A Relational Database Model
- 3.88Database Concepts: Use An Entity-Relationship (E-R) Diagram To Document A Database Design
- 3.89Database Concepts: Show Understanding Of The Normalisation Process
- 3.90Database Concepts: Explain Why A Given Set Of Database Tables Are, Or Are Not, In 3NF
- 3.91Database Concepts: Produce A Normalised Database Design For A Description of a Database, a Given Set of Data, or A Given Set of Tables
- 3.92Database Management Systems (DBMS): Show Understanding Of The Features Provided By A Database Management System (DBMS) That Address The Issues Of A File Based Approach
- 3.93Database Management Systems (DBMS): Show Understanding Of How Software Tools Found Within A DBMS Are Used In Practice
- 3.94Show Understanding Of How Software Tools Found Within A DBMS Are Used In Practice: Show Understanding That The DBMS Carries Out All Creation/Modification Of The Database Structure Using Its Data Definition Language (DDL)
- 3.95Show Understanding Of How Software Tools Found Within A DBMS Are Used In Practice: Show Understanding That The DBMS Carries Out All Queries And Maintenance Of Data Using Its DML
- 3.96Show Understanding Of How Software Tools Found Within A DBMS Are Used In Practice: Show Understanding That The Industry Standard For Both DDL And DML Is Structured Query Language (SQL)
- 3.97Show Understanding Of How Software Tools Found Within A DBMS Are Used In Practice: Understand given SQL (DDL) statements and Be Able To Write Simple SQL (DDL) Statements Using A Sub-Set of Statements
- 3.98Show Understanding Of How Software Tools Found Within A DBMS Are Used In Practice: Write An SQL Script To Query Or Modify Data (DML) Which Are Stored In (At Most Two) Database Tables
- 3.99Computational Thinking Skills: Computational Thinking Skills:
- 3.100Computational Thinking Skills: Describe And Use Decomposition
- 3.101Algorithms: Show Understanding That An Algorithm Is A Solution To A Problem Expressed As A Sequence Of Defined Steps
- 3.102Algorithms: Write Pseudocode That Contains Input, Process And Output
- 3.103Algorithms: Write Pseudocode Using The Three Basic Constructs Of Sequence, Selection And Iteration
- 3.104Algorithms: Document A Simple Algorithm Using A Structured English Description, A Flowchart Or Pseudocode
- 3.105Algorithms: Write Pseudocode From A Structured English Description Or A Flowchart
- 3.106Algorithms: Draw A Flowchart From A Structured English Description Or Pseudocode
- 3.107Algorithms: Describe And Use The Process Of Stepwise Refinement To Express An Algorithm To A Level Of Detail From Which The Task May Be Programmed
- 3.108Algorithms: Use Logic Statements To Define Parts Of An Algorithm Solution
- 3.109Data Types And Records: Select And Use Appropriate Data Types For A Problem Solution
- 3.110Data Types And Records: Show Understanding Of The Purpose Of A Record Structure To Hold A Set Of Data Of Different Data Types Under One Identifier
- 3.111Arrays: Use The Technical Terms Associated With Arrays
- 3.112Arrays: Select A Suitable Data Structure (1D Or 2D Array) To Use For A Given Task
- 3.113Arrays: Write Pseudocode For 1D And 2D Arrays
- 3.114Arrays: Write Pseudocode To Process Array Data
- 3.115Files: Show Understanding Of Why Files Are Needed
- 3.116Files: Write Pseudocode To Handle Text Files That Consist Of One Or More Lines
- 3.117Introduction To Abstract Data Types (ADT): Show Understanding That An ADT Is A Collection Of Data And A Set Of Operations On Those Data
- 3.118Introduction To Abstract Data Types (ADT): Show Understanding That A Stack, Queue And Linked List Are Examples Of ADTs
- 3.119Introduction To Abstract Data Types (ADT): Use A Stack, Queue And Linked List To Store Data
- 3.120Introduction To Abstract Data Types (ADT): Describe How A Queue, Stack And Linked List Can Be Implemented Using Arrays
- 3.121Programming Basics: Implement And Write Pseudocode From A Given Design Presented As Either A Program Flowchart Or Structured English
- 3.122Programming Basics: Write Pseudocode Statements
- 3.123Programming Basics: Use Built-in Functions and Library Routines
- 3.124Constructs: Use Pseudocode To Write IF Statements, CASE Structures, Count-Controlled Loops, Post-Condition Loops, And Pre-Condition Loops
- 3.125Constructs: Justify Why One Loop Structure May Be Better Suited To Solve A Problem Than The Others
- 3.126Structured Programming: Define And Use A Procedure
- 3.127Structured Programming: Explain Where In The Construction Of An Algorithm It Would Be Appropriate To Use A Procedure
- 3.128Structured Programming: Use Parameters (By Value Or By Reference)
- 3.129Structured Programming: Define And Use A Function
- 3.130Structured Programming: Explain Where In The Construction Of An Algorithm It Is Appropriate To Use A Function
- 3.131Structured Programming: Use The Terminology Associated With Procedures And Functions
- 3.132Structured Programming: Write Efficient Pseudocode
- 3.133Write Efficient Pseudocode: Show Understanding Of The Purpose Of A Development Life Cycle
- 3.134Write Efficient Pseudocode: Show Understanding Of The Need For Different Development Life Cycles Depending On The Program Being Developed
- 3.135Write Efficient Pseudocode: Describe The Principles, Benefits And Drawbacks Of Each Type Of Life Cycle
- 3.136Write Efficient Pseudocode: Show Understanding Of The Analysis, Design, Coding, Testing And Maintenance Stages In The Program Development Life Cycle
- 3.137Program Design: Use A Structure Chart To Decompose A Problem Into Sub-Tasks
- 3.138Program Design: Show Understanding Of The Purpose Of State-Transition Diagrams To Document An Algorithm
- 3.139Program Testing And Maintenance: Show Understanding Of Ways Of Exposing And Avoiding Faults In Programs
- 3.140Program Testing And Maintenance: Locate And Identify Different Types Of Errors
- 3.141Program Testing And Maintenance: Correct Identified Errors
- 3.142Program Testing And Maintenance: Show Understanding Of The Methods Of Testing Available And Select Appropriate Data For A Given Method
- 3.143Program Testing And Maintenance: Show Understanding Of The Need For A Test Strategy And Test Plan And Their Likely Contents
- 3.144Program Testing And Maintenance: Choose Appropriate Test Data For A Test Plan
- 3.145Program Testing And Maintenance: Show Understanding Of The Need For Continuing Maintenance Of A System And The Differences Between Each Type Of Maintenance
- 3.146Program Testing And Maintenance: Analyse An Existing Program And Make Amendments To Enhance Functionality
- Video Lectures For The ContentVideo Lectures Covering Course Content In Detail30
- 4.1Data Representation10 Minutes
- 4.2Multimedia: Graphics, Sound13 Minutes
- 4.3Compression7 Minutes
- 4.4Network Including The Internet1 Hour
- 4.5Central Processing Unit (CPU) Architecture15 Minutes
- 4.6Logic Gates and Logic Circuits10 Minutes
- 4.7Assembly Language10 Minutes
- 4.8Bit Manipulation4 Minutes
- 4.9Operating Systems
- 4.10Language Translators20 Minutes
- 4.11Data Security21 Minutes
- 4.12Data Integrity7 Minutes
- 4.13Database Concepts
- 4.14Database Management Systems (DMBS)
- 4.15Data Definition Language (DDL) And Data Manipulation Language (DML)
- 4.16Ethics And Ownership
- 4.17Computer And Their Components
- 4.18Logic Gates And Logic Circuits
- 4.19Computational Thinking Skills
- 4.20Algorithms
- 4.21Data Types And Records
- 4.22Arrays
- 4.23Files
- 4.24Introduction To Abstract Data Types (ADT)
- 4.25Programming Basics
- 4.26Constructs
- 4.27Structured Programming
- 4.28Program Development Life Cycle
- 4.29Program Design
- 4.30Program Testing And Maintenance
- QuizzesShort Quizzes To Auto-Test Your Knowledge of The Syllabus29
- 5.1Data Representation10 Minutes0 Questions
- 5.2Multimedia: Graphics, Sound10 Minutes0 Questions
- 5.3Compression10 Minutes0 Questions
- 5.4Networks Including The Internet10 Minutes0 Questions
- 5.5Computer And Their Components10 Minutes0 Questions
- 5.6Logic Gates And Logic Circuits10 Minutes0 Questions
- 5.7Central Processing Unit (CPU) Architecture10 Minutes0 Questions
- 5.8Assembly Language10 Minutes0 Questions
- 5.9Bit Manipulation10 Minutes0 Questions
- 5.10Operating Systems10 Minutes0 Questions
- 5.11Language Translators10 Minutes0 Questions
- 5.12Data Security10 Minutes0 Questions
- 5.13Data Integrity10 Minutes0 Questions
- 5.14Ethics And Ownership10 Minutes0 Questions
- 5.15Database Concepts10 Minutes0 Questions
- 5.16Database Management Systems (DMBS)10 Minutes0 Questions
- 5.17Data Definition Language (DDL) And Data Manipulation Language (DML)10 Minutes0 Questions
- 5.18Computational Thinking Skills10 Minutes0 Questions
- 5.19Algorithms10 Minutes0 Questions
- 5.20Data Types And Records10 Minutes0 Questions
- 5.21Arrays10 Minutes0 Questions
- 5.22Files10 Minutes0 Questions
- 5.23Introduction To Abstract Data Types (ADT)10 Minutes0 Questions
- 5.24Programming Basics10 Minutes0 Questions
- 5.25Constructs10 Minutes0 Questions
- 5.26Structured Programming10 Minutes0 Questions
- 5.27Program Development Life Cycle10 Minutes0 Questions
- 5.28Program Design10 Minutes0 Questions
- 5.29Program Testing And Maintenance10 Minutes0 Questions
- Quizzes For PreparationQuizzes With Detailed Explained Answers And Common Mistakes Discussed In Detail145
- 6.1Data Representation: Show Understanding Of Binary Magnitudes And The Difference Between Binary Prefixes And Decimal Prefixes
- 6.2Data Representation: Show Understanding Of Different Number Systems
- 6.3Data Representation: Show Understanding Of How Overflow Can Occur
- 6.4Data Representation: Show Understanding Of How Overflow Can Occur
- 6.5Data Representation: Show Understanding Of And Be Able To Represent Character Data In Its Internal Binary Form, Depending On The Character Set Used
- 6.6Multimedia – Graphics: Show Understanding Of How Data For A Bitmapped Image Are Encoded
- 6.7Multimedia – Graphics: Perform Calculations To Estimate The File Size For A Bitmap Image
- 6.8Multimedia – Graphics: Show Understanding Of The Effects Of Changing Elements Of A Bitmap Image On The Image Quality And File Size
- 6.9Multimedia – Graphics: Show Understanding Of How Data For A Vector Graphic Are Encoded
- 6.10Multimedia – Graphics: Justify The Use Of A Bitmap Image Or A Vector Graphic For A Given Task
- 6.11Multimedia – Sound: Show Understanding Of How Sound Is Represented And Encoded
- 6.12Multimedia – Sound: Show Understanding Of The Impact Of Changing The Sampling Rate And Resolution
- 6.13Compression: Show Understanding Of The Need For And Examples Of The Use Of Compression
- 6.14Compression: Show Understanding Of Lossy And Lossless Compression And Justify The Use Of A Method In A Given Situation
- 6.15Compression: Show Understanding Of How A Text File, Bitmap Image, Vector Graphic And Sound File Can Be Compressed
- 6.16Networks Including The Internet: Show Understanding Of The Purpose And Benefits Of Networking Devices
- 6.17Networks Including The Internet: Show Understanding Of The Characteristics Of A LAN (Local Area Network) And A WAN (Wide Area Network)
- 6.18Networks Including The Internet: Explain The Client-Server And Peer-To-Peer Models Of Networked Computers
- 6.19Networks Including The Internet: Show Understanding Of Thin-Client And Thick-Client And The Differences Between Them
- 6.20Networks Including The Internet: Show Understanding Of The Bus, Star, Mesh And Hybrid Topologies
- 6.21Networks Including The Internet: Understand How Packets Are Transmitted Between Two Hosts For A Given Topology
- 6.22Networks Including The Internet: Justify The Use Of A Topology For A Given Situation
- 6.23Networks Including The Internet: Show Understanding Of Cloud Computing
- 6.24Networks Including The Internet: Show Understanding Of The Differences Between And Implications Of The Use Of Wireless And Wired Networks
- 6.25Networks Including The Internet: Describe The Characteristics Of Copper Cable, Fibre-Optic Cable, Radio Waves (Including WiFi), Microwaves, Satellites
- 6.26Networks Including The Internet: Describe The Hardware That Is Used To Support A LAN
- 6.27Networks Including The Internet: Describe The Role And Function Of A Router In A Network
- 6.28Networks Including The Internet: Show Understanding Of Ethernet And How Collisions Are Detected And Avoided
- 6.29Networks Including The Internet: Show Understanding Of Bit Streaming
- 6.30Networks Including The Internet: Show Understanding Of The Differences Between The World Wide Web (WWW) And The Internet
- 6.31Networks Including The Internet: Describe The Hardware That Is Used To Support The Internet
- 6.32Networks Including The Internet: Explain The Use Of IP Addresses In The Transmission Of Data Over The Internet
- 6.33Networks Including The Internet: Explain How A Uniform Resource Locator (URL) Is Used To Locate A Resource On The World Wide Web (WWW) And The Role Of The Domain Name Service (DNS)
- 6.34Computers And Their Components: Show Understanding Of The Need For Input, Output, Primary Memory And Secondary (Including Removable) Storage
- 6.35Computers And Their Components: Show Understanding Of Embedded Systems
- 6.36Computers And Their Components: Describe The Principal Operations Of Hardware Devices
- 6.37Computers And Their Components: Show Understanding Of The Use Of Buffers
- 6.38Computers And Their Components: Explain The Differences Between Random Access Memory (RAM) And Read Only Memory (ROM)
- 6.39Computers And Their Components: Explain The Differences Between Static RAM (SRAM) And Dynamic RAM (DRAM)
- 6.40Computers And Their Components: Explain The Difference Between Programmable ROM (PROM), Erasable Programmable ROM (EPROM) And Electrically Erasable Programmable ROM (EEPROM)
- 6.41Computers And Their Components: Show An Understanding Of Monitoring And Control Systems
- 6.42Logic Gates And Logic Circuits: Understand And Define The Functions Of NOT, AND, OR, NAND, NOR And XOR (EOR) Gates
- 6.43Logic Gates And Logic Circuits: Construct The Truth Table For Each Of The Logic Gates Above
- 6.44Logic Gates And Logic Circuits: Construct A Logic Circuit From A Problem Statement, A Logic Expression, Or A Truth Table
- 6.45Logic Gates And Logic Circuits: Construct A Truth Table From A Problem Statement, A Logic Circuit, Or A Logic Expression
- 6.46Logic Gates And Logic Circuits: Construct A Logic Expression From A Problem Statement, A Logic Circuit, Or A Truth Table
- 6.47Central Processing Unit (CPU) Architecture: Show Understanding Of The Basic Von Neumann Model For A Computer System And The Stored Program Concept
- 6.48Central Processing Unit (CPU) Architecture: Show Understanding Of The Purpose And Role Of Registers, Including The Difference Between General Purpose And Special Purpose Registers
- 6.49Central Processing Unit (CPU) Architecture: Show Understanding Of The Purpose And Roles Of The Arithmetic And Logic Unit (ALU), Control Unit (CU) And System Clock, Immediate Access Store (IAS)
- 6.50Central Processing Unit (CPU) Architecture: Show Understanding Of How Data Are Transferred Between Various Components Of The Computer System Using The Address Bus, Data Bus And Control Bus
- 6.51Central Processing Unit (CPU) Architecture: Show Understanding Of How Factors Contribute To The Performance Of The Computer System
- 6.52Central Processing Unit (CPU) Architecture: nderstand How Different Ports Provide Connection To Peripheral Devices
- 6.53Central Processing Unit (CPU) Architecture: Describe The Stages Of The Fetch-Execute (F-E) Cycle
- 6.54Central Processing Unit (CPU) Architecture: Show Understanding Of The Purpose Of Interrupts
- 6.55Assembly Language: Show Understanding Of The Relationship Between Assembly Language And Machine Code
- 6.56Assembly Language: Describe The Different Stages Of The Assembly Process For A Two-Pass Assembler
- 6.57Assembly Language: Describe The Different Stages Of The Assembly Process For A Two-Pass Assembler
- 6.58Assembly Language: Show Understanding That A Set Of Instructions Are Grouped
- 6.59Assembly Language: Show Understanding Of And Be Able To Use Different Modes Of Addressing
- 6.60Bit Manipulation: Show Understanding Of And Perform Binary Shifts
- 6.61Bit Manipulation: Show Understanding Of How Bit Manipulation Can Be Used To Monitor/Control A Device
- 6.62Operating Systems: Explain Why A Computer System Requires An Operating System (OS)
- 6.63Operating Systems: Explain The Key Management Tasks Carried Out By The Operating System
- 6.64Operating Systems: Show Understanding Of The Need For Typical Utility Software Provided With An Operating System
- 6.65Operating Systems: how Understanding Of Program Libraries
- 6.66Language Translators: Show Understanding Of The Need For Assembler Software, Compiler And Interpreter
- 6.67Language Translators: Explain The Benefits And Drawbacks Of Using Either A Compiler Or Interpreter And Justify The Use Of Each
- 6.68Language Translators: Show Awareness That High-Level Language Programs May Be Partially Compiled And Partially Interpreted
- 6.69Language Translators: Describe Features Found In A Typical Integrated Development Environment (IDE)
- 6.70Data Security: Explain The Difference Between The Terms Security, Privacy And Integrity Of Data
- 6.71Data Security: Show Appreciation Of The Need For Both The Security Of Data And The Security Of The Computer System
- 6.72Data Security: Describe Security Measures Designed To Protect Computer Systems
- 6.73Data Security: Show Understanding Of The Threats To Computer And Data Security Posed By Networks And The Internet
- 6.74Data Security: Describe Methods That Can Be Used To Restrict The Risks Posed By Threats
- 6.75Data Security: Describe Security Methods Designed To Protect The Security Of Data
- 6.76Data Integrity: Describe How Data Validation And Data Verification Help Protect The Integrity Of Data
- 6.77Data Integrity: Describe and Use Methods of Data Validation
- 6.78Data Integrity: Describe and Use Methods of Data Verification During Data Entry and Data Transfer
- 6.79Ethics And Ownership: Show Understanding Of The Need For And Purpose Of Ethics As A Computing Professional
- 6.80Ethics And Ownership: Show Understanding Of The Need To Act Ethically And The Impact Of Acting Ethically Or Unethically For A Given Situation
- 6.81Ethics And Ownership: Show Understanding Of The Need For Copyright Legislation
- 6.82Ethics And Ownership: Show Understanding Of The Different Types Of Software Licencing And Justify The Use Of A Licence For A Given Situation
- 6.83Ethics And Ownership: Show Understanding Of Artificial Intelligence (AI)
- 6.84Database Concepts: Show Understanding Of The Limitations Of Using A File-Based Approach For The Storage And Retrieval Of Data
- 6.85Database Concepts: Describe The Features Of A Relational Database That Address The Limitations Of A File-Based Approach
- 6.86Database Concepts: Show Understanding Of And Use The Terminology Associated With A Relational Database Model
- 6.87Database Concepts: Use An Entity-Relationship (E-R) Diagram To Document A Database Design
- 6.88Database Concepts: Show Understanding Of The Normalisation Process
- 6.89Database Concepts: Explain Why A Given Set Of Database Tables Are, Or Are Not, In 3NF
- 6.90Database Concepts: Produce A Normalised Database Design For A Description of a Database, a Given Set of Data, or A Given Set of Tables
- 6.91Database Management Systems (DBMS): Show Understanding Of The Features Provided By A Database Management System (DBMS) That Address The Issues Of A File Based Approach
- 6.92Database Management Systems (DBMS): Show Understanding Of How Software Tools Found Within A DBMS Are Used In Practice
- 6.93Show Understanding Of How Software Tools Found Within A DBMS Are Used In Practice: Show Understanding That The DBMS Carries Out All Creation/Modification Of The Database Structure Using Its Data Definition Language (DDL)
- 6.94Show Understanding Of How Software Tools Found Within A DBMS Are Used In Practice: Show Understanding That The DBMS Carries Out All Queries And Maintenance Of Data Using Its DML
- 6.95Show Understanding Of How Software Tools Found Within A DBMS Are Used In Practice: Show Understanding That The Industry Standard For Both DDL And DML Is Structured Query Language (SQL)
- 6.96Show Understanding Of How Software Tools Found Within A DBMS Are Used In Practice: Understand given SQL (DDL) statements and Be Able To Write Simple SQL (DDL) Statements Using A Sub-Set of Statements
- 6.97Show Understanding Of How Software Tools Found Within A DBMS Are Used In Practice: Write An SQL Script To Query Or Modify Data (DML) Which Are Stored In (At Most Two) Database Tables
- 6.98Computational Thinking Skills: Computational Thinking Skills:
- 6.99Computational Thinking Skills: Describe And Use Decomposition
- 6.100Algorithms: Show Understanding That An Algorithm Is A Solution To A Problem Expressed As A Sequence Of Defined Steps
- 6.101Algorithms: Write Pseudocode That Contains Input, Process And Output
- 6.102Algorithms: Write Pseudocode Using The Three Basic Constructs Of Sequence, Selection And Iteration
- 6.103Algorithms: Document A Simple Algorithm Using A Structured English Description, A Flowchart Or Pseudocode
- 6.104Algorithms: Write Pseudocode From A Structured English Description Or A Flowchart
- 6.105Algorithms: Draw A Flowchart From A Structured English Description Or Pseudocode
- 6.106Algorithms: Describe And Use The Process Of Stepwise Refinement To Express An Algorithm To A Level Of Detail From Which The Task May Be Programmed
- 6.107Algorithms: Use Logic Statements To Define Parts Of An Algorithm Solution
- 6.108Data Types And Records: Select And Use Appropriate Data Types For A Problem Solution
- 6.109Data Types And Records: Show Understanding Of The Purpose Of A Record Structure To Hold A Set Of Data Of Different Data Types Under One Identifier
- 6.110Arrays: Use The Technical Terms Associated With Arrays
- 6.111Arrays: Select A Suitable Data Structure (1D Or 2D Array) To Use For A Given Task
- 6.112Arrays: Write Pseudocode For 1D And 2D Arrays
- 6.113Arrays: Write Pseudocode To Process Array Data
- 6.114Files: Show Understanding Of Why Files Are Needed
- 6.115Files: Write Pseudocode To Handle Text Files That Consist Of One Or More Lines
- 6.116Introduction To Abstract Data Types (ADT): Show Understanding That An ADT Is A Collection Of Data And A Set Of Operations On Those Data
- 6.117Introduction To Abstract Data Types (ADT): Show Understanding That A Stack, Queue And Linked List Are Examples Of ADTs
- 6.118Introduction To Abstract Data Types (ADT): Use A Stack, Queue And Linked List To Store Data
- 6.119Introduction To Abstract Data Types (ADT): Describe How A Queue, Stack And Linked List Can Be Implemented Using Arrays
- 6.120Programming Basics: Implement And Write Pseudocode From A Given Design Presented As Either A Program Flowchart Or Structured English
- 6.121Programming Basics: Write Pseudocode Statements
- 6.122Programming Basics: Use Built-in Functions and Library Routines
- 6.123Constructs: Use Pseudocode To Write IF Statements, CASE Structures, Count-Controlled Loops, Post-Condition Loops, And Pre-Condition Loops
- 6.124Constructs: Justify Why One Loop Structure May Be Better Suited To Solve A Problem Than The Others
- 6.125Structured Programming: Define And Use A Procedure
- 6.126Structured Programming: Explain Where In The Construction Of An Algorithm It Would Be Appropriate To Use A Procedure
- 6.127Structured Programming: Use Parameters (By Value Or By Reference)
- 6.128Structured Programming: Define And Use A Function
- 6.129Structured Programming: Explain Where In The Construction Of An Algorithm It Is Appropriate To Use A Function
- 6.130Structured Programming: Use The Terminology Associated With Procedures And Functions
- 6.131Structured Programming: Write Efficient Pseudocode
- 6.132Write Efficient Pseudocode: Show Understanding Of The Purpose Of A Development Life Cycle
- 6.133Write Efficient Pseudocode: Show Understanding Of The Need For Different Development Life Cycles Depending On The Program Being Developed
- 6.134Write Efficient Pseudocode: Describe The Principles, Benefits And Drawbacks Of Each Type Of Life Cycle
- 6.135Write Efficient Pseudocode: Show Understanding Of The Analysis, Design, Coding, Testing And Maintenance Stages In The Program Development Life Cycle
- 6.136Program Design: Use A Structure Chart To Decompose A Problem Into Sub-Tasks
- 6.137Program Design: Show Understanding Of The Purpose Of State-Transition Diagrams To Document An Algorithm
- 6.138Program Testing And Maintenance: Show Understanding Of Ways Of Exposing And Avoiding Faults In Programs
- 6.139Program Testing And Maintenance: Locate And Identify Different Types Of Errors
- 6.140Program Testing And Maintenance: Correct Identified Errors
- 6.141Program Testing And Maintenance: Show Understanding Of The Methods Of Testing Available And Select Appropriate Data For A Given Method
- 6.142Program Testing And Maintenance: Show Understanding Of The Need For A Test Strategy And Test Plan And Their Likely Contents
- 6.143Program Testing And Maintenance: Choose Appropriate Test Data For A Test Plan
- 6.144Program Testing And Maintenance: Show Understanding Of The Need For Continuing Maintenance Of A System And The Differences Between Each Type Of Maintenance
- 6.145Program Testing And Maintenance: Analyse An Existing Program And Make Amendments To Enhance Functionality
- AssignmentsDetailed Assignments For Syllabus Preparation (Including Past Paper Questions)29
- 7.1Data Representation3 Days
- 7.2Multimedia – Graphics, Sound3 Days
- 7.3Compression3 Days
- 7.4Networks Including The Internet3 Days
- 7.5Computer And Their Components3 Days
- 7.6Logic Gates And Logic Circuits3 Days
- 7.7Central Processing Unit (CPU) Architecture3 Days
- 7.8Assembly Language3 Days
- 7.9Bit Manipulation3 Days
- 7.10Operating Systems3 Days
- 7.11Language Translators3 Days
- 7.12Data Security3 Days
- 7.13Data Integrity3 Days
- 7.14Ethics And Ownership3 Days
- 7.15Database Concepts3 Days
- 7.16Database Management Systems (DMBS)3 Days
- 7.17Data Definition Language (DDL) And Data Manipulation Language (DML)3 Days
- 7.18Computational Thinking Skills3 Days
- 7.19Algorithms3 Days
- 7.20Data Types And Records3 Days
- 7.21Arrays3 Days
- 7.22Files3 Days
- 7.23Introduction To Abstract Data Types (ADT)3 Days
- 7.24Programming Basics3 Days
- 7.25Constructs3 Days
- 7.26Structured Programming3 Days
- 7.27Program Development Life Cycle3 Days
- 7.28Program Design3 Days
- 7.29Program Testing And Maintenance3 Days
- Paper Pattern/ Paper Preparation/ Techniques To Attempt The Paper/ Common Mistakes To AvoidDetailed Information Including Written + Video Material Regarding Paper Attempt / Preparation/ Techniques/ Common Mistakes To Avoid0
- Solved Past PapersDetailed Written Explanations And Solutions of Past Papers, Including Model Answers and Explanations For Past Paper Questions0
- Past Paper SessionsVideo Content Regarding Past Paper Solutions0
- Notes (Rearranged Version)Notes Arranged In A Different Style For Preparation Ease29
- 11.1Data Representation
- 11.2Multimedia – Graphics, Sound
- 11.3Compression
- 11.4Networks Including The Internet
- 11.5Computer And Their Components
- 11.6Logic Gates And Logic Circuits10 Minutes
- 11.7Central Processing Unit (CPU) Architecture
- 11.8Assembly Language
- 11.9Bit Manipulation
- 11.10Operating Systems
- 11.11Language Translators
- 11.12Data Security
- 11.13Data Integrity
- 11.14Ethics And Ownership
- 11.15Database Concepts
- 11.16Database Management Systems (DMBS)
- 11.17Data Definition Language (DDL) And Data Manipulation Language (DML)
- 11.18Computational Thinking Skills
- 11.19Algorithms
- 11.20Data Types And Records
- 11.21Arrays
- 11.22Files
- 11.23Introduction To Abstract Data Types (ADT)
- 11.24Programming Basics
- 11.25Constructs
- 11.26Structured Programming
- 11.27Program Development Life Cycle
- 11.28Program Design
- 11.29Program Testing And Maintenance
- Videos Lectures (Pre-Recorded)Videos Recorded In A Different Style For Preparation Ease0
- Code Guides And Applications0
- Cheat SheetsShort, Quick Revision Cheat Sheets145
- 14.1Data Representation: Show Understanding Of Binary Magnitudes And The Difference Between Binary Prefixes And Decimal Prefixes
- 14.2Data Representation: Show Understanding Of Different Number Systems
- 14.3Data Representation: Show Understanding Of How Overflow Can Occur
- 14.4Data Representation: Show Understanding Of How Overflow Can Occur
- 14.5Data Representation: Show Understanding Of And Be Able To Represent Character Data In Its Internal Binary Form, Depending On The Character Set Used
- 14.6Multimedia – Graphics: Show Understanding Of How Data For A Bitmapped Image Are Encoded
- 14.7Multimedia – Graphics: Perform Calculations To Estimate The File Size For A Bitmap Image
- 14.8Multimedia – Graphics: Show Understanding Of The Effects Of Changing Elements Of A Bitmap Image On The Image Quality And File Size
- 14.9Multimedia – Graphics: Show Understanding Of How Data For A Vector Graphic Are Encoded
- 14.10Multimedia – Graphics: Justify The Use Of A Bitmap Image Or A Vector Graphic For A Given Task
- 14.11Multimedia – Sound: Show Understanding Of How Sound Is Represented And Encoded
- 14.12Multimedia – Sound: Show Understanding Of The Impact Of Changing The Sampling Rate And Resolution
- 14.13Compression: Show Understanding Of The Need For And Examples Of The Use Of Compression
- 14.14Compression: Show Understanding Of Lossy And Lossless Compression And Justify The Use Of A Method In A Given Situation
- 14.15Compression: Show Understanding Of How A Text File, Bitmap Image, Vector Graphic And Sound File Can Be Compressed
- 14.16Networks Including The Internet: Show Understanding Of The Purpose And Benefits Of Networking Devices
- 14.17Networks Including The Internet: Show Understanding Of The Characteristics Of A LAN (Local Area Network) And A WAN (Wide Area Network)
- 14.18Networks Including The Internet: Explain The Client-Server And Peer-To-Peer Models Of Networked Computers
- 14.19Networks Including The Internet: Show Understanding Of Thin-Client And Thick-Client And The Differences Between Them
- 14.20Networks Including The Internet: Show Understanding Of The Bus, Star, Mesh And Hybrid Topologies
- 14.21Networks Including The Internet: Understand How Packets Are Transmitted Between Two Hosts For A Given Topology
- 14.22Networks Including The Internet: Justify The Use Of A Topology For A Given Situation
- 14.23Networks Including The Internet: Show Understanding Of Cloud Computing
- 14.24Networks Including The Internet: Show Understanding Of The Differences Between And Implications Of The Use Of Wireless And Wired Networks
- 14.25Networks Including The Internet: Describe The Characteristics Of Copper Cable, Fibre-Optic Cable, Radio Waves (Including WiFi), Microwaves, Satellites
- 14.26Networks Including The Internet: Describe The Hardware That Is Used To Support A LAN
- 14.27Networks Including The Internet: Describe The Role And Function Of A Router In A Network
- 14.28Networks Including The Internet: Show Understanding Of Ethernet And How Collisions Are Detected And Avoided
- 14.29Networks Including The Internet: Show Understanding Of Bit Streaming
- 14.30Networks Including The Internet: Show Understanding Of The Differences Between The World Wide Web (WWW) And The Internet
- 14.31Networks Including The Internet: Describe The Hardware That Is Used To Support The Internet
- 14.32Networks Including The Internet: Explain The Use Of IP Addresses In The Transmission Of Data Over The Internet
- 14.33Networks Including The Internet: Explain How A Uniform Resource Locator (URL) Is Used To Locate A Resource On The World Wide Web (WWW) And The Role Of The Domain Name Service (DNS)
- 14.34Computers And Their Components: Show Understanding Of The Need For Input, Output, Primary Memory And Secondary (Including Removable) Storage
- 14.35Computers And Their Components: Show Understanding Of Embedded Systems
- 14.36Computers And Their Components: Describe The Principal Operations Of Hardware Devices
- 14.37Computers And Their Components: Show Understanding Of The Use Of Buffers
- 14.38Computers And Their Components: Explain The Differences Between Random Access Memory (RAM) And Read Only Memory (ROM)
- 14.39Computers And Their Components: Explain The Differences Between Static RAM (SRAM) And Dynamic RAM (DRAM)
- 14.40Computers And Their Components: Explain The Difference Between Programmable ROM (PROM), Erasable Programmable ROM (EPROM) And Electrically Erasable Programmable ROM (EEPROM)
- 14.41Computers And Their Components: Show An Understanding Of Monitoring And Control Systems
- 14.42Logic Gates And Logic Circuits: Understand And Define The Functions Of NOT, AND, OR, NAND, NOR And XOR (EOR) Gates
- 14.43Logic Gates And Logic Circuits: Construct The Truth Table For Each Of The Logic Gates Above
- 14.44Logic Gates And Logic Circuits: Construct A Logic Circuit From A Problem Statement, A Logic Expression, Or A Truth Table
- 14.45Logic Gates And Logic Circuits: Construct A Truth Table From A Problem Statement, A Logic Circuit, Or A Logic Expression
- 14.46Logic Gates And Logic Circuits: Construct A Logic Expression From A Problem Statement, A Logic Circuit, Or A Truth Table
- 14.47Central Processing Unit (CPU) Architecture: Show Understanding Of The Basic Von Neumann Model For A Computer System And The Stored Program Concept
- 14.48Central Processing Unit (CPU) Architecture: Show Understanding Of The Purpose And Role Of Registers, Including The Difference Between General Purpose And Special Purpose Registers
- 14.49Central Processing Unit (CPU) Architecture: Show Understanding Of The Purpose And Roles Of The Arithmetic And Logic Unit (ALU), Control Unit (CU) And System Clock, Immediate Access Store (IAS)
- 14.50Central Processing Unit (CPU) Architecture: Show Understanding Of How Data Are Transferred Between Various Components Of The Computer System Using The Address Bus, Data Bus And Control Bus
- 14.51Central Processing Unit (CPU) Architecture: Show Understanding Of How Factors Contribute To The Performance Of The Computer System
- 14.52Central Processing Unit (CPU) Architecture: nderstand How Different Ports Provide Connection To Peripheral Devices
- 14.53Central Processing Unit (CPU) Architecture: Describe The Stages Of The Fetch-Execute (F-E) Cycle
- 14.54Central Processing Unit (CPU) Architecture: Show Understanding Of The Purpose Of Interrupts
- 14.55Assembly Language: Show Understanding Of The Relationship Between Assembly Language And Machine Code
- 14.56Assembly Language: Describe The Different Stages Of The Assembly Process For A Two-Pass Assembler
- 14.57Assembly Language: Describe The Different Stages Of The Assembly Process For A Two-Pass Assembler
- 14.58Assembly Language: Show Understanding That A Set Of Instructions Are Grouped
- 14.59Assembly Language: Show Understanding Of And Be Able To Use Different Modes Of Addressing
- 14.60Bit Manipulation: Show Understanding Of And Perform Binary Shifts
- 14.61Bit Manipulation: Show Understanding Of How Bit Manipulation Can Be Used To Monitor/Control A Device
- 14.62Operating Systems: Explain Why A Computer System Requires An Operating System (OS)
- 14.63Operating Systems: Explain The Key Management Tasks Carried Out By The Operating System
- 14.64Operating Systems: Show Understanding Of The Need For Typical Utility Software Provided With An Operating System
- 14.65Operating Systems: how Understanding Of Program Libraries
- 14.66Language Translators: Show Understanding Of The Need For Assembler Software, Compiler And Interpreter
- 14.67Language Translators: Explain The Benefits And Drawbacks Of Using Either A Compiler Or Interpreter And Justify The Use Of Each
- 14.68Language Translators: Show Awareness That High-Level Language Programs May Be Partially Compiled And Partially Interpreted
- 14.69Language Translators: Describe Features Found In A Typical Integrated Development Environment (IDE)
- 14.70Data Security: Explain The Difference Between The Terms Security, Privacy And Integrity Of Data
- 14.71Data Security: Show Appreciation Of The Need For Both The Security Of Data And The Security Of The Computer System
- 14.72Data Security: Describe Security Measures Designed To Protect Computer Systems
- 14.73Data Security: Show Understanding Of The Threats To Computer And Data Security Posed By Networks And The Internet
- 14.74Data Security: Describe Methods That Can Be Used To Restrict The Risks Posed By Threats
- 14.75Data Security: Describe Security Methods Designed To Protect The Security Of Data
- 14.76Data Integrity: Describe How Data Validation And Data Verification Help Protect The Integrity Of Data
- 14.77Data Integrity: Describe and Use Methods of Data Validation
- 14.78Data Integrity: Describe and Use Methods of Data Verification During Data Entry and Data Transfer
- 14.79Ethics And Ownership: Show Understanding Of The Need For And Purpose Of Ethics As A Computing Professional
- 14.80Ethics And Ownership: Show Understanding Of The Need To Act Ethically And The Impact Of Acting Ethically Or Unethically For A Given Situation
- 14.81Ethics And Ownership: Show Understanding Of The Need For Copyright Legislation
- 14.82Ethics And Ownership: Show Understanding Of The Different Types Of Software Licencing And Justify The Use Of A Licence For A Given Situation
- 14.83Ethics And Ownership: Show Understanding Of Artificial Intelligence (AI)
- 14.84Database Concepts: Show Understanding Of The Limitations Of Using A File-Based Approach For The Storage And Retrieval Of Data
- 14.85Database Concepts: Describe The Features Of A Relational Database That Address The Limitations Of A File-Based Approach
- 14.86Database Concepts: Show Understanding Of And Use The Terminology Associated With A Relational Database Model
- 14.87Database Concepts: Use An Entity-Relationship (E-R) Diagram To Document A Database Design
- 14.88Database Concepts: Show Understanding Of The Normalisation Process
- 14.89Database Concepts: Explain Why A Given Set Of Database Tables Are, Or Are Not, In 3NF
- 14.90Database Concepts: Produce A Normalised Database Design For A Description of a Database, a Given Set of Data, or A Given Set of Tables
- 14.91Database Management Systems (DBMS): Show Understanding Of The Features Provided By A Database Management System (DBMS) That Address The Issues Of A File Based Approach
- 14.92Database Management Systems (DBMS): Show Understanding Of How Software Tools Found Within A DBMS Are Used In Practice
- 14.93Show Understanding Of How Software Tools Found Within A DBMS Are Used In Practice: Show Understanding That The DBMS Carries Out All Creation/Modification Of The Database Structure Using Its Data Definition Language (DDL)
- 14.94Show Understanding Of How Software Tools Found Within A DBMS Are Used In Practice: Show Understanding That The DBMS Carries Out All Queries And Maintenance Of Data Using Its DML
- 14.95Show Understanding Of How Software Tools Found Within A DBMS Are Used In Practice: Show Understanding That The Industry Standard For Both DDL And DML Is Structured Query Language (SQL)
- 14.96Show Understanding Of How Software Tools Found Within A DBMS Are Used In Practice: Understand given SQL (DDL) statements and Be Able To Write Simple SQL (DDL) Statements Using A Sub-Set of Statements
- 14.97Show Understanding Of How Software Tools Found Within A DBMS Are Used In Practice: Write An SQL Script To Query Or Modify Data (DML) Which Are Stored In (At Most Two) Database Tables
- 14.98Computational Thinking Skills: Computational Thinking Skills:
- 14.99Computational Thinking Skills: Describe And Use Decomposition
- 14.100Algorithms: Show Understanding That An Algorithm Is A Solution To A Problem Expressed As A Sequence Of Defined Steps
- 14.101Algorithms: Write Pseudocode That Contains Input, Process And Output
- 14.102Algorithms: Write Pseudocode Using The Three Basic Constructs Of Sequence, Selection And Iteration
- 14.103Algorithms: Document A Simple Algorithm Using A Structured English Description, A Flowchart Or Pseudocode
- 14.104Algorithms: Write Pseudocode From A Structured English Description Or A Flowchart
- 14.105Algorithms: Draw A Flowchart From A Structured English Description Or Pseudocode
- 14.106Algorithms: Describe And Use The Process Of Stepwise Refinement To Express An Algorithm To A Level Of Detail From Which The Task May Be Programmed
- 14.107Algorithms: Use Logic Statements To Define Parts Of An Algorithm Solution
- 14.108Data Types And Records: Select And Use Appropriate Data Types For A Problem Solution
- 14.109Data Types And Records: Show Understanding Of The Purpose Of A Record Structure To Hold A Set Of Data Of Different Data Types Under One Identifier
- 14.110Arrays: Use The Technical Terms Associated With Arrays
- 14.111Arrays: Select A Suitable Data Structure (1D Or 2D Array) To Use For A Given Task
- 14.112Arrays: Write Pseudocode For 1D And 2D Arrays
- 14.113Arrays: Write Pseudocode To Process Array Data
- 14.114Files: Show Understanding Of Why Files Are Needed
- 14.115Files: Write Pseudocode To Handle Text Files That Consist Of One Or More Lines
- 14.116Introduction To Abstract Data Types (ADT): Show Understanding That An ADT Is A Collection Of Data And A Set Of Operations On Those Data
- 14.117Introduction To Abstract Data Types (ADT): Show Understanding That A Stack, Queue And Linked List Are Examples Of ADTs
- 14.118Introduction To Abstract Data Types (ADT): Use A Stack, Queue And Linked List To Store Data
- 14.119Introduction To Abstract Data Types (ADT): Describe How A Queue, Stack And Linked List Can Be Implemented Using Arrays
- 14.120Programming Basics: Implement And Write Pseudocode From A Given Design Presented As Either A Program Flowchart Or Structured English
- 14.121Programming Basics: Write Pseudocode Statements
- 14.122Programming Basics: Use Built-in Functions and Library Routines
- 14.123Constructs: Use Pseudocode To Write IF Statements, CASE Structures, Count-Controlled Loops, Post-Condition Loops, And Pre-Condition Loops
- 14.124Constructs: Justify Why One Loop Structure May Be Better Suited To Solve A Problem Than The Others
- 14.125Structured Programming: Define And Use A Procedure
- 14.126Structured Programming: Explain Where In The Construction Of An Algorithm It Would Be Appropriate To Use A Procedure
- 14.127Structured Programming: Use Parameters (By Value Or By Reference)
- 14.128Structured Programming: Define And Use A Function
- 14.129Structured Programming: Explain Where In The Construction Of An Algorithm It Is Appropriate To Use A Function
- 14.130Structured Programming: Use The Terminology Associated With Procedures And Functions
- 14.131Structured Programming: Write Efficient Pseudocode
- 14.132Write Efficient Pseudocode: Show Understanding Of The Purpose Of A Development Life Cycle
- 14.133Write Efficient Pseudocode: Show Understanding Of The Need For Different Development Life Cycles Depending On The Program Being Developed
- 14.134Write Efficient Pseudocode: Describe The Principles, Benefits And Drawbacks Of Each Type Of Life Cycle
- 14.135Write Efficient Pseudocode: Show Understanding Of The Analysis, Design, Coding, Testing And Maintenance Stages In The Program Development Life Cycle
- 14.136Program Design: Use A Structure Chart To Decompose A Problem Into Sub-Tasks
- 14.137Program Design: Show Understanding Of The Purpose Of State-Transition Diagrams To Document An Algorithm
- 14.138Program Testing And Maintenance: Show Understanding Of Ways Of Exposing And Avoiding Faults In Programs
- 14.139Program Testing And Maintenance: Locate And Identify Different Types Of Errors
- 14.140Program Testing And Maintenance: Correct Identified Errors
- 14.141Program Testing And Maintenance: Show Understanding Of The Methods Of Testing Available And Select Appropriate Data For A Given Method
- 14.142Program Testing And Maintenance: Show Understanding Of The Need For A Test Strategy And Test Plan And Their Likely Contents
- 14.143Program Testing And Maintenance: Choose Appropriate Test Data For A Test Plan
- 14.144Program Testing And Maintenance: Show Understanding Of The Need For Continuing Maintenance Of A System And The Differences Between Each Type Of Maintenance
- 14.145Program Testing And Maintenance: Analyse An Existing Program And Make Amendments To Enhance Functionality
- Practice Questions/ Practice ExamsPractice Questions/ Exams Based Both On Actual Exam Pattern And On Topical Content To Boost Preparation And Improve Performance12
- Mock Tests/ Mock ExamsMock Exams For Final Preparation0
- Class RecordingsClass Recordings From Previous Sessions/ Current Session For Content0
- Other MaterialOther Useful Material For Exams0
- Cheat Sheets Version 2Short, Quick Revision Cheat Sheets29
- 19.1Data Representation
- 19.2Multimedia – Graphics, Sound
- 19.3Compression
- 19.4Networks Including The Internet
- 19.5Computer And Their Components
- 19.6Logic Gates And Logic Circuits
- 19.7Central Processing Unit (CPU) Architecture
- 19.8Assembly Language
- 19.9Bit Manipulation
- 19.10Operating Systems
- 19.11Language Translators
- 19.12Data Security
- 19.13Data Integrity
- 19.14Ethics And Ownership
- 19.15Database Concepts
- 19.16Database Management Systems (DMBS)
- 19.17Data Definition Language (DDL) And Data Manipulation Language (DML)
- 19.18Computational Thinking Skills
- 19.19Algorithms
- 19.20Data Types And Records
- 19.21Arrays
- 19.22Files
- 19.23Introduction To Abstract Data Types (ADT)
- 19.24Programming Basics
- 19.25Constructs
- 19.26Structured Programming
- 19.27Program Development Life Cycle
- 19.28Program Design
- 19.29Program Testing And Maintenance